#16: Hackers, Attack Anatomy & Security Trends

Published: Aug. 12, 2016, 10:54 p.m.

Attacks against enterprises and their technology vendors are facilitated by the current rapid adoption of embedded systems, cloud solutions, and web based platforms. These attacks often undermine the very monetization, scalability and user experience goals for which these systems were designed and deployed. As malicious hackers advance their techniques at a staggering pace, often rendering current defense tactics obsolete, so too must security practitioners obsess over deploying progressive techniques. Pre-sented by the elite organization of white hat hackers most widely known for being first to break the iPhone, this session will analyze the anatomies of real world attacks against high profile systems, ranging from the well known Target breach, to Texas In-struments RFID, to Apple products, and more. It will extract lessons from these attack anatomies to provide a framework to account for these modern attackers, articulate industry context, and supply attendees with key takeaways, including immediately actionable guidance. Learning Objectives: 1) Discipline Division: Security Separated from Functionality. 2) Perspective Matters: White Box vs. Black Box. 3) Defense Priorities: Secure Assets, not Just Perimeters. 4) Timing Security: Build It In, Not Bolt It On. 5) Procedural Duration: Security as an Ongoing Process.