navigation-background arrow-down-circle Reply Icon Show More Heart Delete Icon wiki-circle wiki-square wiki arrow-up-circle add-circle add-square add arrow-down arrow-left arrow-right arrow-up calendar-circle chat-bubble-2 chat-bubble check-circle check close contact-us credit-card drag menu email embed facebook-circle snapchat-circle facebook-square facebook faq-circle faq film gear google-circle google-square googleplus history home instagram-circle instagram-square instagram linkedin-circle linkedin-square linkedin load monitor Video Player Play Icon person pinterest-circle pinterest-square pinterest play readlist remove-circle remove-square remove search share share2 sign-out star trailer trash twitter-circle twitter-square twitter youtube-circle youtube-square youtube

Black Hat 2015: Event agenda for feds

July 27, 2015 (Photo Credit: Black Hat USA 2014)

Hackers and cybersecurity professionals are getting ready for the annual Black Hat convention in Las Vegas next week, which will have plenty for feds to learn and see about the latest intrusion techniques and how to defend against them.

The jam-packed event has at least one government-focused panel during each session, from the latest in federal cybersecurity policy to the newest tactics for attacking agencies' networks.

Federal Times will be in attendance for feds who can't make the event. For those who will be joining us there, here's a breakdown of the talks and panels that will focus on government cybersecurity:

Wednesday, Aug. 5

10:20 a.m. — How to Hack Government: Technologists as Policy Makers

11:30 a.m. — Take a Hacker to Work Day: How Federal Prosecutors Use the CFAA

1:50 p.m. — Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing / Gameover Zeus: Badguys and Backends

3 p.m. — Big Game Hunting: The Peculiarities of Nation-State Malware Research / Back Doors and Front Doors Breaking the Unbreakable System

4:20 p.m. — Behind the Mask: The Agenda, Tricks and Tactics of the FTC as They Regulate Cybersecurity / Getting it Right: Straight Talk on Threat and Information Sharing

Thursday, Aug. 6

9:45 a.m. — The NSA Playset: A Year of Toys and Tools / Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware

11 a.m. — How to Implement IT Security After a Cyber Meltdown / How the Wassenaar Arrangement's Export Control of 'Intrusion Software' Affects the Security Industry

12:10 p.m. — Information Access and Information Sharing: Where We Are and Where We Are Going (keynote by DHS Deputy Secretary Alejandro Mayorkas)

2:30 p.m. — Is the NSA Still Listening to Your Phone Calls? A Surveillance Debate: Congressional Success or Epic Fail

3:50 p.m. — Hi This is Urgent Plz Fix ASAP: Critical Vulnerabilities and Bug Bounty Programs / Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

5 p.m. — Dance Like Nobody's Watching, Encrypt Like Everyone Is

Planning to attend Black Hat 2015? Which panels and talks look most interesting to you and your agency?

Next Article