Presentation on the need to re-examine how we engineer systems (taking service providers as an example) and the implications on how we quantify cyber risk if we want to take this message into the board room (as given at BT’s SnoopCon 2019 and Cisco’s June 2019 Knowledge Network webinar for service providers). Continue reading
Presentation on building an effective operational security capability (as given at Cisco Live US/Talos Threat Research Summit 2019). Continue reading
Presentation on Zero Trust and the importance of identity in breach response and recovery (as given at InfoSec Europe 2019 on the tech talk track). Continue reading
Presentation on building effective SOCs (as given at InfoSec Europe 2019 on the interactive workshop track). Continue reading
Presentation on Active Directory integration solutions for UNIX (as given at Black Hat Europe 2018). Continue reading
Presentation on logging and auditing strategies (as given at Secure South West 11). Continue reading
Presentation on “interesting” features of the Intel x86[_64] platform (as given at 44CON 2017).
A lot of recent work has gone into the discovery, analysis, and (on occasion) marketing of hardware weaknesses in the Intel x86[_64] platform particularly with respect to how it is often implemented as part of specific motherboard designs. Some, such as the recent speculative execution borne attacks, are issues in the architecture itself. Other issues, however, affect individual implementations. This talk will take a wide-coverage “state of play” look at x86[_64] platform security covering:
Presentation on finding implementation* bugs outside the mainstream (as given at Securi-Tay 2017). Continue reading
Presentation on how Windows kernel drivers work and where to look for vulnerabilities (as given at 44CON 2015). Continue reading