CyberRiskTV Live Coverage from BlackHat 2024 – Day 2
View Show IndexSegments
1. CyberRisk TV at Black Hat 2024: Day 2 — Highlights from Day 1 – BH24 #2
Bill Brenner and Paul Wagenseil discuss Day 1 highlights from BSidesLV and look ahead to Day 2 keynotes.
Visit https://securityweekly.com/blackhat for all the CyberRisk Alliance coverage of Hacker Summer Camp!
Hosts
2. Let’s Get Real About Where AI can Help SecOps – Mike Lyborg – BH24 #2
Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on behalf of humans have paved the way for generative AI to be trusted (within reason). The convergence and maturity of these technologies now have the potential to revolutionize how SecOps functions while force-multiplying SOC teams.
If you’re at Black Hat, swing by Theater C at 11:25 tomorrow 8/8 to join Mike, and Swimlane customers ProCircular and Ecolab, as they continue this discussion in the panel “Let’s get real about where AI can help SecOps”!
This segment is sponsored by Swimlane. Visit https://securityweekly.com/swimlanebh to learn more about them!
Guest
For over 15 years, Michael Lyborg has been a trusted leader in the information security space. He is known for his most recent experience as the Chief Information Security Officer (CISO) at Swimlane, the leader in automation for the entire security organization. During his time at Swimlane, he has also served as the Vice President of Global Consulting Services, and successfully led engineering teams and authored controls, policies, plans, and procedures for various compliance certifications, including SOC2, ISO 27001, and CMMC.
Previously, Michael made valuable contributions to Heska Corporation as the IT & Security Operations Manager. He has also served as an Operations Manager for the Marine Special Operations Command, following his service as Chief Instructor at the Marine Special Operations School and as an Infantry Leader of the 2nd Marine Division in the United States Marine Corps.
Host
3. Understanding and Reducing Supply Chain Risk and Software Vulnerability Risks – Danny Jenkins – BH24 #2
In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation.
This segment is sponsored by Threatlocker. Visit https://securityweekly.com/threatlockerbh for a free trial!
Guest
Danny Jenkins, CEO & Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security, is a leading cybersecurity expert with over two decades of experience building and securing corporate networks, including roles on red and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust.
Host
4. Any Browser Can Be A Secure Enterprise Browser – Andrew Harding – BH24 #2
Employees spend up to 80% of their working hours in a web browser, and threat actors are increasingly leveraging browsers to target users and initiate attacks. Disrupting the tool employees use for 80% of their job would have massive impact on productivity. Rather than ripping and replacing, enterprises can turn any browser into a secure enterprise browser.
Segment Resources: Menlo homepage: https://resources.menlosecurity.com/videos/browser-security
Menlo research on three new nation state campaigns: https://www.menlosecurity.com/press-releases/menlo-security-exposes-three-new-nation-state-campaigns
Every browser should be a secure enterprise browser: https://www.menlosecurity.com/blog/every-browser-should-be-a-secure-enterprise-browser
Defending against zero-hour phishing attacks: https://www.menlosecurity.com/blog/state-of-browser-security-defending-browsers-against-ever-evolving-zero-hour-phishing-attacks
This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlobh or schedule a demo to learn more about the role of browser security in eliminating the risk of highly evasive threats!
Guest
Andrew Harding sees browser security as a significant gap in completing cyber defenses and in his role as VP of Security Strategy at Menlo Security, he is committed to delivering solutions that make every browser a secure enterprise browser. Throughout his career, he has contributed to the security architecture of the Internet. His inventions in endpoint security, lawful intercept, mobility, networking, and overlay networks defend networks and infrastructure around the world. He has worked with teams to define and lead market segments in network security, mobility, networking, and endpoint security. Prior to Menlo Security, he held senior product management, strategy and product marketing positions at companies including Danaher, Juniper Networks, Aruba Networks, and Cisco. He lives in the Santa Cruz Mountains, near Monterey Bay, in California.
Host
5. SaaS Security Beyond Just Misconfiguration: Insights from Adaptive Shield’s CEO – Maor Bin – BH24 #2
In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management.
Segment Resources: https://www.adaptive-shield.com/landing-page/the-annual-saas-security-survey-report-2025-ciso-plans-and-priorities/
This segment is sponsored by Adaptive Shield. Visit https://securityweekly.com/adaptiveshieldbh to download the Annual SaaS Security Survey Report!
Guest
A former cybersecurity intelligence officer in the IDF, Maor has over 17 years in cybersecurity leadership. In his career, he led SaaS Threat Detection Research at Proofpoint and won the operational excellence award during his IDI service. Maor got his BSc in Computer Science and is CEO and co-founder of Adaptive Shield, the SaaS Security company that helps security teams continuously manage and control their entire SaaS stack, from threat prevention to detection and response.
Host
6. Zscaler’s Annual Ransomware Report Uncovers Record-Breaking Ransom Payment of US$75 M – Brett Stone-Gross – BH24 #2
The annual report details the latest ransomware attack trends and targets, ransomware families, and effective defense strategies. Findings in the report uncovered an 18% overall increase in ransomware attacks year-over-year, as well as a record-breaking ransom payment of US$75 million – nearly double the highest publicly known ransomware payout – to the Dark Angels ransomware group.
Segment Resources: For a deeper dive into best practices for protecting your organization and the full findings, download the Zscaler ThreatLabz 2024 Ransomware Report Link below - https://zscaler.com/campaign/threatlabz-ransomware-report
This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerbh to learn more about them!
Guest
Dr. Brett Stone-Gross is the Senior Director of Threat Intelligence at Zscaler. He holds a Ph.D. in computer science from the University of California, Santa Barbara and has over 20 years of experience in malware analysis and reverse engineering. Brett has authored more than a dozen publications and presented his work at top cybersecurity conferences. He specializes in advanced technical research focused on sophisticated cyber threats.
Host
7. What’s lurking in your phone? How to uncover malicious apps and other app risks – Nikos Kiourtis – BH24 #2
Every mobile device connecting to enterprise assets hosts a unique blend of work and personal apps, creating a complex landscape of innumerable vulnerabilities. Thankfully, methods exist to provide security teams with the real-world insights necessary to proactively address threats and shield against attacks targeting mobile apps and device endpoints. Nikos Kiourtis, CTO at Quokka, shares the latest findings in mobile security, outlining emerging threats and effective measures to reduce your mobile app attack surface – and safeguarding against potential attacks and data breaches.
Segment Resources: - Panelcast with SC Magazine: 8 ways attackers target mobile apps to steal your data (and how to stop them) https://www.scworld.com/cybercast/8-ways-attackers-target-mobile-apps-to-steal-your-data-and-how-to-stop-them - Ryan Johnson’s talk at DEF CON 32, “Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone?” https://defcon.org/html/defcon-32/dc-32-speakers.html
This segment is sponsored by Quokka. Visit https://securityweekly.com/quokkabh to learn more about their intelligence app solutions!
Guest
Nikos Kiourtis is the Chief Technology Officer at Quokka, leading the company’s engineering and research & development teams. Prior to Quokka, he was a Research Assistant Professor at George Mason University and a Guest Researcher at NIST. Nikos holds a Degree in Mathematics, a MSc in Theoretical Computer Science, and a PhD in Computer Science.
Host
8. Navigating the Modern Threat Landscape – David Kennedy – BH24 #2
David will discuss his Black Hat training session, Applied Threat Hunting and Detection Engineering, which immerses participants into the latest threats, through the entire attack lifecycle, including threat modeling, threat detection, and attacker techniques. David also provides insights on the importance of understanding offensive capabilities and how to tackle current threats effectively.
Segment Resources: Description of David’s BlackHat training: https://www.blackhat.com/us-24/training/schedule/#applied-threat-hunting-and-detection-engineering-37553
Guest
David Kennedy is a Faculty member at IANS Research and Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including ‘The Social-Engineer Toolkit’ (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.
Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.
Host
9. Leveraging AI and Automation to Prevent the Next CrowdStrike Outage – Vivek Bhandari – BH24 #2
The recent CrowdStrike outage and subsequent disruption tested organizations' resiliency and confidence as the world went offline. It served as a reminder that in an increasingly technology-dependent world, things will go wrong – but security leaders can plan accordingly and leverage emerging technologies to help minimize the damage. In this interview, Tanium’s Vice President of Product Marketing Vivek Bhandari explains how AI and automation can help with remediation and even prevent similar outages from happening in the future, and breaks down the future of Autonomous Endpoint Management (AEM) as the solution for continuous cyber resilience in the face of disruption.
Segment Resources: https://www.tanium.com/blog/the-future-of-converged-endpoint-management-is-autonomous-endpoint-management-aem/
This segment is sponsored by Tanium. Visit https://securityweekly.com/taniumbh to learn more about them!
Guest
As the Vice President of Product Marketing, Vivek Bhandari leads the organization responsible for positioning, messaging, and go-to-market strategies for Tanium’s products globally. Prior to Tanium, Vivek led product marketing for VMware’s network security business. Before VMware, Vivek held leadership roles in product management at Google Cloud, Area 1 Security, Cisco, and VeriSign, working on enterprise security products. Vivek has a master’s degree in Computer Science and a bachelor’s degree in Electrical Engineering.
Host
10. How artificial intelligence is helping reimagine public data to combat cyber threats – Shimon Modi – BH24 #2
Given the rapid rise of threat actors utilizing AI for cyber-attacks, security teams need advanced AI capabilities more than ever.
Shimon will discuss how Dataminr’s Pulse for Cyber Risk uses Dataminr’s leading multi-modal AI platform to provide the speed and scale required to build enterprise resilience in the modern cyber threat environment. Dataminr's world-leading AI platform helps companies stay informed - performing trillions of daily computations across billions of public data inputs from more than one million unique public data sources encompassing text, image, video, audio and sensor signals to provide real-time information when you need it most.
https://www.dataminr.com/resources/on-demand-webinar/why-cyber-physical-convergence-really-matters
This segment is sponsored by Dataminr. Visit https://securityweekly.com/dataminrbh to learn more about their world-leading AI platform perform!
Guest
As the VP of Product Management at Dataminr, Shimon leads the strategy and execution of new cybersecurity products that leverage data science, cloud computing, and analytics to deliver real-time insights and alerts to clients across various industries and sectors. He has over 15 years of experience in building, launching, and scaling B2B SaaS solutions from 0 to $MM/ARR.
Shimon has a strong background in cyber security, threat intelligence, and machine learning, and has published multiple papers and patents in these fields. He has also presented at prestigious conferences and served as a technical expert on international standards organizations.
Host
11. BlackHat 2024 Day 2: Wrap-up of the day – BH24 #2
CyberRisk TV’s Bill Brenner and Paul Wagenseil discuss the highlights of Black Hat day 2, from the keynotes to the discussions taking place in the expo hall.
Visit https://securityweekly.com/blackhat for all the CyberRisk Alliance coverage of Hacker Summer Camp!