logo
Dates

Author


Conferences

Tags

Sort by:  

Conference:  Defcon 31
Authors: Jen Easterly Director, Cybersecurity and Infrastructure Security Agency, Scott Shapiro Author, , Yale Law School Professor
2023-08-01

Fancy Bear, Dynamic Panda and Charming Kitten – we live in a time where we are constantly under attack without even knowing it. CISA Director Jen Easterly and Yale Law School Professor Scott Shapiro, author of “Fancy Bear Goes Phishing: The Dark History of the Information Age In Five Extraordinary Hacks” discuss how best to understand the challenge of information security; what we can learn from looking back; and how the decisions we make today to prioritize security by design will shape our future.
Conference:  Black Hat Asia 2023
Authors: Xiaosheng Tan
2023-05-11

Data has been regarded as the fifth factor of production, and data security is ranked a high priority by governments across the world. In China, data security-related legislation such as the "Data Security Law" and "Personal Information Protection Law" have been promulgated and have were put into effect in 2022. The number of data security projects also increased rapidly. The government, finance, telecommunications, energy, education, healthcare, and other industries have different regulatory requirements for data security and their strategies for data security are quite different.The biggest challenge facing data security is that data security technologies, products, solutions, and service capabilities are far behind regulatory and customer requirements. Some companies have made meaningful explorations in data security products and solutions, such as privacy enhanced computing, transparent encrypt/decrypt, zero trust in data security, etc.
Authors: Tobin Feldman-FItzthum, Mikko Ylinen
2022-10-25

Typical data protection ensures data is encrypted while in transit and at rest. Confidential computing (CC) adds data protection while data is in use, in memory, enabling end-to-end protection. Highly regulated industries such as finance and health care are driving the market for CC. Cloud service providers are adding CC capabilities in their offerings. In parallel the open-source cloud native ecosystem is seeing more new projects and start-ups building upon CC. For instance, the CNCF recently accepted the sandbox project Confidential Containers with active participation from different hardware and software vendors and CSPs. In this workshop we will talk about CC in cloud native. We will start by giving an overview of CC and a detailed introduction to the Confidential Containers project and its building blocks. Next, we walk the audience through detailed steps to get the Confidential Containers environment set up. Finally, we want to leave some time for interactive discussion with the audience about cloud native use cases and CC.
Authors: Himanshu Dwivedi
2021-09-24

Abstract:This talk will discuss one of many methods that are used in the wild to target Shadow APIs and export large volumes of data with a few clicks of a button (lines of code in python code :). Attendees will learn about a very basic yet non-so-obvious problem in securing data, and how hackers are using creative methods to steal large volumes of data.
Authors: Caroline Wong
2021-09-24

tldr - powered by Generative AI

The presentation discusses the challenges of implementing effective security metrics and proposes a model for measuring security that focuses on protecting value.
  • Security metrics are difficult to implement due to oversimplification or information overload
  • Effective security metrics should focus on protecting value
  • The shift towards valuing digital assets makes cybersecurity more important
  • The speaker shares an anecdote about implementing security metrics at eBay
  • The speaker offers a LinkedIn Learning course on security metrics