Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/25/2016
07:45 AM
Aamir Lakhani
Aamir Lakhani
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

Building Black Hat: Locking Down One Of The World’s Biggest Security Conferences

For security pros, being asked to help secure Black Hat is like being asked to play on the Olympic basketball team.

Like most networks, infrastructure requirements for Black Hat are constantly evolving to meet the needs of one of the world’s largest gathering of information security professionals. This year, show management wants to increase bandwidth and performance while maintaining security and reliability. So Black Hat 2016 is going a step further to implement secure, high performance switches, along with enterprise firewall security appliances and wireless access points. 

Providing security for an event like Black Hat, especially when it is followed directly by DEF CON, is a significant challenge. Black Hat’s technical team is pulled together by UBM and consists of engineers representing the best and brightest across numerous companies in the networking and security industries. This team begins reviewing the show’s architecture and scoping out the security strategy several months before the event. From a security perspective, the network design is very similar to a university with open networks and data center-like applications.

Onsite setup begins several days before the show events start. We begin with establishing internet connectivity and core infrastructure deep within the lower levels of Mandalay Bay. Then the infrastructure team moves upstairs to establish a Network Operations Center (NOC) that functions as the bridge and also showcases all of the networking and security technologies in use by the event. As we work closer to the official show start, secure wireless is installed along with L2 switching across the venue to provide security and connectivity for all event users.

We then secure the proprietary applications and data used during the show to register attendees, process financial transactions, and manage sensitive data and personal information, using the segmentation functionality built into the firewalls, which is a critical part of the security design.

Our next objective is to create a segmented environment in which the worlds’ elite programmers and hackers can play, while still protecting the network, attendees, vendors, and presenters. The challenge is to create a robust and open environment, while still securing the Black Hat event as a whole.

This is easier said than done, as the security team needs to actively monitor the network and make careful decisions about the kinds of traffic and malware they see. Frequently, traffic is allowed to pass through and propagate that would send an enterprise security manager running through the halls. This keeps everyone on their toes!

In addition to all of the device configuration, physical security is absolutely essential. We make extensive efforts to prevent attackers from gaining physical access to the networking devices and implement precautions that will prevent them from gaining further systems access if they do.

Finally, the team provides constant active monitoring and testing both before and during the show, including the  gathering of forensic data so we can update and improve show security both in real time and in anticipation of future events.

Being asked to help secure Black Hat is a bit like being asked to be on the Olympic basketball team. It’s a gratifying experience to have the opportunity to participate and very exciting to be able to work and play with some of the best folks in the industry. This year is no exception.

Related Black Hat 2016 Content:

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Aamir Lakhani formulates security strategy with more than 15 years of cybersecurity experience, his goal to make a positive impact toward the global war on cybercrime and information security. Lakhani provides thought leadership to industry and has presented research and ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32716
PUBLISHED: 2021-06-24
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-U...
CVE-2021-32717
PUBLISHED: 2021-06-24
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibilit...
CVE-2021-32712
PUBLISHED: 2021-06-24
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
CVE-2021-32713
PUBLISHED: 2021-06-24
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
CVE-2021-32710
PUBLISHED: 2021-06-24
Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions o...