BH2020 #1

View Show Index

Segments

1. Pentesting Results Paint A Biased Picture – Roi Cohen – BH20 #1

Sponsored By

Vicarius

Guest

Co-Founder & VP Sales at Vicarius

Roi has over 13 years of experience as a pentester, IT admin, and CISO. In his current Role as Vicarius VP Sales, he helps companies to better product their infrastructure against software vulnerabilities.

Host

Chief Product Officer at CyberSaint

2. Why Secure Remote Access Is Like The Emperors New Clothes – Charl van der Walt, Wicus Ross – BH20 #1

Guests

Senior Security Researcher at Orange Cyberdefense

Wicus Ross is Senior Researcher at Security Research Center for Orange Cyberdefense. He is tasked with investigating industry events and trends, with the single purpose of understanding how these may affect business. Wicus uses his understanding and knowledge to advise customers and threat detection/hunting teams on the appropriate response given the threat or trend.

Global Head of Security Research at Orange Cyberdefense

Charl is a founder of a penetration testing company called SensePost, which was originally based in South Africa but now has global reach since its acquisition by Orange Cyberdefense. He played various roles over his 20 year history with that company, including a stint as CEO in the time preceding the acquisition. In 2020 Charl was appointed to head up the European super-operator’s Security Research division, a role that has him and his team working with diverse datasets and specialists across the group to understand the nature of the security challenges we face and provide insight and guidance on these challenges both internally and externally.

Host

Principal Security Researcher at Eclypsium

3. Purple Teaming With PlexTrac – Dan DeCloss – BH20 #1

Sponsored By

PlexTrac

Guest

Founder / CEO & President at PlexTrac

Dan has over 15 years of experience in cybersecurity. Dan started his career in the Department of Defense and then moved on to consulting where he worked for various companies. Prior to PlexTrac, Dan was the Director of Cybersecurity for Scentsy where he and his team built the security program out of its infancy into a best-in-class program. Dan has a master’s degree in Computer Science from the Naval Postgraduate School with an emphasis in Information Security. Additionally, Dan holds the OSCP and CISSP certifications.

Host

Principal Security Researcher at Eclypsium

4. Protecting Data That Egresses From Cloud Services & SaaS Applications – Jeff Capone – BH20 #1

Sponsored By

SecureCircle

Guest

CEO, Co-founder at SecureCircle

Jeff Capone, PhD, is CEO, Co-founder of SecureCircle, founded in 2015. An award-winning executive leader with expertise in cyber security, enterprise software development, network and storage solutions, and IoT applications, Jeff has a track record of founding and selling successful software companies. Prior to SecureCircle, Jeff served as CTO at NETGEAR and CEO and Co-Founder of Leaf Networks, which was acquired by NETGEAR. Jeff was an assistant professor at Arizona State University and Director of the Network Engineering and Wireless Telecom Laboratory. Jeff’s distinctions include the National Science Foundation’s CAREER award, numerous IEEE Journal and conference publications. He holds a PhD in Electrical Engineering from Northeastern University.

Host

Chief Product Officer at CyberSaint

5. Are You Effectively Addressing API Security? – Michael Borohovski – BH20 #1

Sponsored By

Synopsys

Guest

Director of Software Engineering at Synopsys

Michael “Borski” Borohovski is Director of Software Engineering within the Synopsys Software Integrity Group. He co-founded and was CTO of Tinfoil Security, a SaaS company providing security tooling to DevOps teams, prior to the company’s acquisition by Synopsys in January 2020. With over thirteen years of experience in cybersecurity, Borski has made it his mission to empower developers and protect their work from those seeking to cause mischief. He is also a co-inventor on four patents—with an additional four pending. He holds a BS in Computer Science and Engineering from MIT.

Host

Chief Product Officer at CyberSaint

6. Protecting Ethical Hackers – Gary De Mercurio, Justin Wynn – BH20 #1

Guests

Senior Manager at Coalfire

Arrests at Iowa and a good Samaritan law for Cyber security the mistake Iowa has made allowing politicians to pass sweeping reforms on a subject they knew nothing about based on politics and who owned what, versus what was best for the citizens of Iowa.

Senior Security Consultant at Coalfire

Justin is a Senior Security Consultant who performs all types of offensive penetration testing and specializes in physical security. He credits any success to the lifelong friends he’s made in the industry, who have dramatically accelerated his skills and career, and is eager to help others learn more about security.

Host

Principal Security Researcher at Eclypsium

7. Satellite Broadband Security – James Pavur – BH20 #1

Guest

DPhil Student at Oxford University

In his upcoming Blackhat and DEFCON briefings, James will be presenting the result of several experiments looking at real-world security and privacy in satellite broadband communications. They found that it is possible for attackers using cheap home-television equipment to eavesdrop on the internet traffic of people who are thousands of miles away. In the briefing, he shows how this affects individuals and organizations ranging from home internet customers, to oil companies, to airlines.

Host

Chief Product Officer at CyberSaint

8. What’s Going On With TikTok? – BH20 #1

9. How Did The Twitter Hackers Get Caught? – BH20 #1

You can skip this ad in 5 seconds