logo

Locknote: Conclusions and Key Takeaways from Black Hat USA 2022

Conference:  Black Hat USA 2022

2022-08-11

Summary

The conference presentation discussed the different tracks in the conference and the challenges in selecting talks for each track. The speakers also talked about the need for faster adaptation of security measures and the importance of connecting security research to high-level technology trends.
  • The conference had different tracks covering a wide range of topics in application security, hardware, policy, and strategy.
  • Selecting talks for each track can be challenging, as technical content may not attract a lot of people if the title is not catchy.
  • The need for faster adaptation of security measures was emphasized, as the same problems continue to manifest in different ways.
  • Connecting security research to high-level technology trends is important to impact everyone in the community.
  • Understanding the motives of attackers is crucial in identifying actual problems and finding solutions.
The speakers shared their experiences in selecting talks for their respective tracks. They emphasized the importance of finding a balance between technical content and catchy titles to attract more attendees. They also discussed the challenges in hardware security, which is more complex than software and harder to fix. However, they were impressed by the research presented in the hardware track every year. The speakers also highlighted the need to connect security research to high-level technology trends, such as blockchain, which has a ton of security issues. Understanding the motives of attackers was also discussed as crucial in identifying actual problems and finding solutions.

Abstract

To close out Black Hat USA 2022, join Black Hat Founder Jeff Moss and Review Board members Sheila A. Berta, Chris Eng, Natalie Silvanovich and Matt Suiche for an insightful conversation on the most pressing issues facing the InfoSec community. This Locknote will feature a candid discussion on the key takeaways coming out of the conference and how these trends will impact future InfoSec strategies.

Materials:

Tags:

Post a comment