17
The NoN Evolution of Security Matt Suiche @msuiche / [email protected] Founder, Comae Technologies

Keynote Session : The Non - Evolution of Security

Embed Size (px)

Citation preview

Page 1: Keynote Session : The Non - Evolution of Security

The NoN Evolution of

SecurityMatt Suiche

@msuiche / [email protected], Comae Technologies

Page 2: Keynote Session : The Non - Evolution of Security

About us UAE-based Cyber Security start-up

Building the most comprehensive and powerful memory forensics platform of the industry.

Services / Advising

Founded by Matt Suiche Co-Founder & Chief Scientist of CloudVolumes (VMware AppVolumes) Microsoft MVP Enterprise Security since 2009 BlackHat Review Board Member Shakacon Program Committee

Page 3: Keynote Session : The Non - Evolution of Security

More and more companiesSource: Crunchbase

Page 4: Keynote Session : The Non - Evolution of Security

More and more fund raisersSource: Crunchbase

Page 5: Keynote Session : The Non - Evolution of Security

More and more moneySource: Crunchbase

Page 6: Keynote Session : The Non - Evolution of Security

2010-2016Source: Crunchbase

Page 7: Keynote Session : The Non - Evolution of Security

Top acquirersSource: Crunchbase

Page 8: Keynote Session : The Non - Evolution of Security

Top startupsSource: Crunchbase

Page 9: Keynote Session : The Non - Evolution of Security

Critical Exploitable Vulnerabilities

Page 10: Keynote Session : The Non - Evolution of Security

Vulnerability trends Up and Down

Page 11: Keynote Session : The Non - Evolution of Security

Increased investment cost per exploit

Page 12: Keynote Session : The Non - Evolution of Security

5 Critical Attributes1. Identify2. Protect3. Detect4. Respond5. Recover

Page 13: Keynote Session : The Non - Evolution of Security

5 Critical Attributes1. Identify2. Protect3. Detect4. Respond5. Recover

Page 14: Keynote Session : The Non - Evolution of Security

Top current trends Endpoint Protection Platform (EPP) Endpoint Detection and Response (EDR) Next-Generation Anti Virus

EPP and EDR will most likely consolidate in the future.

Page 15: Keynote Session : The Non - Evolution of Security

Top #10 BlackHat USA 2016 talks The Linux Kernel Hidden inside Windows 10 by Alex Ionescu Measuring Adversary Costs to Exploit Commercial Software: The Government- Bootstrapped

Non-Profit C.I.T.L. by Mudge + Sarah Zatko Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX by Yeongjin Jang

+ Sangho Lee + Taesoo Kim Keystone Engine: Next Generation Assembler Framework by Nguyen Anh Quynh Advanced CAN Injection Techniques for Vehicle Networks by Charlie Miller + Chris Valasek Demystifying the Secure Enclave Processor by Tarjei Mandt + Mathew Solnik + David Wang Analysis of the Attack Surface of Windows 10 Virtualization-Based Security by Rafal Wojtczuk Windows 10 Mitigation Improvements by Matt Miller + David Weston DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes by Rodrigo Branco

+ Rohit Mothe Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network by

Neil Wyler + Bart Stump