Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading News Desk Live At Black Hat 2015

Security is top of mind for everyone in IT these days. Want to stay on top of the latest hacks, threats, and prevention measures? Then join host Sara Peters for the Dark Reading News Desk show at Black Hat 2015.

Tune in Wednesday and Thursday at 2 p.m. Eastern / 11 a.m. Pacific to see and hear the biggest stories from security's most prestigious conference, live from the show floor. Scheduled speakers are listed below.

Here's what we have lined up, subject to change:

Wednesday, Aug. 5: 

2 p.m. ET / 11 a.m. PT

  • Bay Dynamics, provider of threat intelligence
  • Rod Beckstrom, founding Director of the U.S. National Cybersecurity Center and Chairman of the Global Council on the Future of the Internet, to discuss geo-political aspects of cybersecurity
  • IBM, advanced threat research
  • Adam Meyers, VP of intelligence for CrowdStrike, to discuss intelligence-driven security
  • Stacey Halota, CISO of Graham Holdings Co., to discuss mobile security

3 p.m. ET / 12 p.m. PT

  • Jeremiah Grossman, founder of WhiteHat Security and member of the Black Hat Review Board, to discuss trends in web security and give a behind-the-scenes look at the Black Hat Briefings selection process
  • Patrick Wardle, director of research at Synack, to give a rundown about "writing bad@$$ malware for OS X"
  • John Dickson, CISSP, principal of the Denim Group, to provide the attendee's perspective on what's cool at Black Hat
  • Greg Conti, director of the Army Cyber Institute at West Point, Tom Cross, CTO of Drawbridge Networks, and David Raymond, associate professor at West Point -- to discuss smart cities security and their session "Pen Testing a City"

4 p.m. ET / 1 p.m. PT

  • Raffael Marty, founder and CEO of PixlCloud, about using visualization to make log analysis and forensic investigations more efficient and effective
  • Richard Bejtlich, chief security strategist of FireEye and senior fellow of the Brookings Institution, to discuss thinking strategically about digital security
  • Paul Vixie, CEO of Farsight Security, to discuss how passive DNS can minimize the collateral damage done by law enforcement when they take down organized cybercrime groups
  • Chris Wysopal, co-founder and CTO of Veracode, to talk about application security and vulnerabilities in fundamental components of open-source software and protocols
  • BAE Systems, cyber defense, threat intelligence, and analytics
  • Engin Kirda, chief architect at Lastline, to discuss how most ransomware isn't as complex as you think

Thursday, Aug. 6:

2 p.m. ET / 11 a.m. PT

  • Marion Marschalek, malware reverse engineer on duty for Cyphort, to discuss the peculiarities of nation-state malware research
  • RiskIQ, online digital asset inventory, discovery, and security firm
  • Bob Stratton, general partner of MACH37, to identify the hot areas are for security funding and the common mistakes that security startups make
  • Kelly Jackson-Higgins, executive editor of Dark Reading, to give a rundown of the top stories and trends out of Black Hat so far

3 p.m. ET / 12 p.m. PT

  • Gigamon, network visibility, analytics, and security provider
  • Juan Pablo Perez-Etchegoyen, CTO of Onapsis, to discuss exploiting and defending SAP systems
  • Katie Moussouris, chief policy officer for HackerOne, to discuss how the Wassenaar Arrangement's export control of intrusion software affects the security industry
  • Paul Kurtz, former cybersecurity advisor to the White House, on the importance of information sharing between the public and private sectors, and the impacts of legislation on cybersecurity

4 p.m. ET / 1 p.m. PT

  • Dan Kaminsky, chief scientist and founder of White Ops and keynote speaker of the CISO Summit, to discuss the future of infosec
  • Alexander Matrosov and Oleksandr Bazhaniuk, security researchers for Intel's Advanced Threat Research team, to discuss attacking hypervisors using firmware and hardware
  • Adam Kozy, researcher at CrowdStrike, to discuss China's Great Cannon offensive system
  • Kyle Wilhoit, senior threat researcher at Trend Micro, to break down real attacks against gas pump monitoring systems