Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

8/6/2009
10:24 PM
David Maynor
David Maynor
Commentary
50%
50%

SecurityBSides: The Best-Kept Vegas Secret

Getting to SecurityBSides made me think of all the Vegas movies where a casino boss takes a cheater out into the desert and buries him in the sand.

Getting to SecurityBSides made me think of all the Vegas movies where a casino boss takes a cheater out into the desert and buries him in the sand.After getting into a towncar at the Caesar's Palace valet stand, the driver took me through an alley, down a dirt road, and into a construction site before finally arriving at a nondescript gated house on a remote cul-de-sac. After assuring the driver that this address was correct and where I really wanted to be, I took a deep breath and walked through the front door. The young lady waiting inside the door who took our names and accepted donations gave the experience the feel of entering a speakeasy. I was surprised there was not a password, secret knock, or mandatory decoder ring presentation.

After this build-up you might assume that I was at this house to purchase guns, drugs, cheap women, or something equally scandalous. Nothing could be further from the truth, I was there to see some presentations on security. While Black Hat had multiple tracks, almost 100 speakers, and entire ballrooms at Caesars Palace -- SecurityBSides had a den converted to a presentation room, a pool, a vending machine dispensing soda while playing music, and several coolers with free soda.

You'd think this setting warranted watered-down speakers, but no: this intimate gathering drew some big names, like Metasploit creator HD Moore. The topics ranged from proximity-based identity theft to earlier Twitter attacks, to advanced war-dialing techniques. Each of the talks was focused more on fostering intellectual debate than promoting the speaker's latest book, or their company's product sales pitch. After listening to a few talks, I began to forget about the way conferences normally run -- with the airplane-sized rooms, antiseptic talks, and the 10-15 minutes of Q&A time afterward where there is neither time nor ability to delve deeply into any topics.

SecurityBSides was nothing like those large cattle-call type conferences. It had the vibe of a hacker commune with lots of interesting people to talk to, room to setup laptops, and to watch as casual conversations turned into brainstorming sessions. One of the nice features of this informal format was that the audiences of 25-30 attending researchers felt okay divulging details of projects they are working on -- giving a peek under the hood to see the engine and talk spark plug,s rather than just glossing over the exterior.

This sense of intimacy and detail was aided by the speakers' choice of whether they wanted all, none, or a portion of their talk to be recorded. Speakers were not only available for questions, they took the time to sit outside the presentation "den" and engage in full discussions of various aspects of their talks. They were willing to chat security as long as folks were willing to join them.

The most interesting part of SecurityBSides is that the coordination, calls for speakers, attendance lists, and marketing was almost entirely by word of mouth. And in this day and age, that means Twitter. SecurityBSides was marketed as an alternative to the impersonal nature of Black Hat. After spending time there, I would say the organizers were enormously successful. I am happy to see that the organizers are planning a similar event opposite during RSA in San Francisco.

David Maynor is CTO of Errata Security. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18986
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users.
CVE-2019-18981
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 lacks an Access Denied outcome for a certain scenario of an incorrect recipient ID of a notification.
CVE-2019-18982
PUBLISHED: 2019-11-15
bundles/AdminBundle/Controller/Admin/EmailController.php in Pimcore before 6.3.0 allows script execution in the Email Log preview window because of the lack of a Content-Security-Policy header.
CVE-2019-18985
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 lacks brute force protection for the 2FA token.
CVE-2019-18928
PUBLISHED: 2019-11-15
Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.