“So, what did you think of Black Hat this year?” and “Is Black Hat worth going to?” have been FAQs from colleagues and clients alike this week. So I thought I’d put a very brief summary together.
IMO Black Hat USA continues to grow into a better version of the RSA Conference. Less vendor marketing nonsense. Fewer suited, disconnected executive types. Actual practitioners and ‘real’ people to talk to, both in terms of attendees and vendors. I spoke to a ton of people who almost unanimously said that ransomware is still their top worry. A lot of those people have started to realise the importance of ‘Operational IT” in their security strategies, and are thinking about how to automate or orchestrate some of the repeatable processes that are getting forgotten or overlooked.
The top 5 things I can still remember two weeks later:
- A cool exploit testing tool from Sophos. (SophosTester.zip – bottom of the page)
- “Threat hunting” through Alexa with Endgame. (Skip past the fluff to 00:53)
- Many examples, demos, and sessions using MS Office doc exploits on Windows 7 to gain access. (too easy)
- CrowdStrike opened up their malware database for malware researchers/incident responders. (gotta pay, though)
- A questionable Ozzy Osbourne impersonator.
For practitioners, engineers, or anyone with a serious interest in information/cyber-security, the combination of Black Hat and Def Con in the same week and location makes for a very compelling trip where I guarantee you’ll learn something useful.
(Although don’t forget about Gartner security conferences, obviously they’re good too. There’s one in London next month, FYI )
Read Complimentary Relevant Research
Top Strategic Predictions for 2019 and Beyond: Practicality Exists Within Instability
Technology-based change is happening continuously, and most organizations struggle to see the change in advance. Continuous change can...
View Relevant Webinars
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.