YoVDO

Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Wireless Security Courses Network Infrastructure Courses Threat Modeling Courses Network Segmentation Courses

Course Description

Overview

Explore the intricacies of Black Hat's infrastructure in this 44-minute conference talk presented by Conan Dooley at the 44CON Information Security Conference. Dive into the challenges of maintaining a reliable wired training network for nearly two thousand attendees and discover the techniques used to keep the wireless network operational for continuous social media activity. Learn about the creation process, potential attackers, and defense strategies employed. Gain insights into network segmentation, quality of service implementation, threat modeling, and wireless security measures. Examine the design goals, including simplicity and minimal services, and understand how security is integrated into operations. Uncover valuable lessons on prioritizing security and effectively marketing oneself in the information security field.

Syllabus

Intro
My experience at Black Hat
What is Black Hat
Black Hats Infrastructure
Supporting Infrastructure
Events
Volunteers
Network
Security
Wired Infrastructure
Handmade Cables
Network Problems
How it was fixed
Segmenting the network
Quality of service
Gateway laptop
Threat modeling
External attackers
Internal attackers
Threat models
Wireless security
Other Black Hat networks
Wireless spoofing
Black Hat is a nice network
Design goals
Keeping it simple
No services right
Europe
End Results
Lessons Learned
Security is never a priority
Building security into operations
Market yourself


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube