Network technology advances at a blistering pace, so it’s critical that cybersecurity professionals stay on top of the latest network vulnerabilities, hacks, and exploits.
There’s no better place to do that than Black Hat USA in Las Vegas this August, where an entire Network Defense track of Briefing is dedicated to keep you abreast of the latest happenings in network security.
Defense Against Rapidly Morphing DDOS offers a rare opportunity to learn from the sustained, rapidly-morphing DDOS attacks ProtonMail suffered in 2018. Researchers created an attack toolkit that mimics the ProtonMail attacks and used it to study the efficacy of various defenses against similar threats.
What they found: a combination of an unsupervised machine learning algorithm to determine a baseline, perform anomaly detection and mitigation, and another machine learning algorithm to tune the performance of the first, yielded the most effective defense. Attend this Briefing to learn how to apply these lessons to your own cybersecurity work.
In Operational Templates for State-Level Attack and Collective Defense of Countries you will examine templates for attacking and defending nations. Militaries have long used doctrinal templates – models based on known or postulated adversary doctrine – to support traditional kinetic warfare training and warfighting.
The same approach works well for defending in cyberspace. You’ll receive templates of ways threat actors could disrupt or defeat a country, considering various time horizons and degrees of attribution.
Expect to leave this talk with a playbook for how nations might be attacked and defended, a methodology for creating templates and scenarios useful for your own defensive planning, and an enhanced understanding of our collective vulnerability and the need for teamwork to overcome the problem!
Finally, don’t miss New Vulnerabilities in 5G Networks if you’re at all curious about what to expect from the oncoming wave of 5G devices and networks. Researchers will break down the security features of 5G radio networks and reveal new vulnerabilities affecting both the operator infrastructure and end-devices (including mobiles, NB-IoT, laptop etc).
You’ll also learn how these new vulnerabilities in the 5G/4G security standards can be exploited using low-cost hardware and software platforms and discover a cool new automated tool to carry out practical evaluation and share data-sets with the research community.