Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now


At the Black Hat conference in Las Vegas, CSO’s Steve Ragan chats with Steven Grossman of Bay Dynamics about how companies can survive the avalanche of information security hype and buzzwords when speaking with vendors who are promising everything.


The first 24 hours after a breach

"This session will be about the process that takes place once a data breach occurs. The pressure is extremely high and various teams have to come together in this time of emergency, including incident response team, the board and the executive management, the PR team, risk management and legal. Goals are to strategize and minimize the damage, contain the threat, and ensure that the business continues running in spite of a major incident and at the same time public concerns and pressure are addressed in an efficient manner. Talk points: Getting the call Arriving on scene (first observations and attacker profile analysis) Crisis management with key internal tenants Evidence collection and preservation, digital forensic investigation and analysis"

Strengthening Crypto Through Quantum Randomness

Random numbers and the entropy they contain is the foundation of secure cryptography. Yet, providing sufficient random numbers and entropy with assurances that it cannot be known, monitored, controlled or manipulated by others has proven to be remarkably difficult. How do you know if your random numbers are truly random, and how can you insure that your security system is secure?


Palo Alto Networks

There are two ends of the spectrum of an attack: the cost of a breach to the victim, and the economic motivation of the cybercriminal. Much focus has been spent on understanding the increasing cost of breaches, and potential damages they can cause organizations. As cybercrime has increasingly become a business, we must also understand the relationship between time, cost and potential profit for an attacker. Like any business, it is a simple math problem, the benefit must outweigh the cost. Security decision makers can use this information to increase the cost of conducting successful data breaches to their organization, taking away the economic incentive, and majority of motivation for attackers.

The coming Cyber-Storm and The Internet of Things

"The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products. In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm. Join me for an informal discussion of the challenges for our profession, and some possible solutions."