Home

2018 CornCon Speakers

Matthew Mather

Bestselling Author

Saturday Opening Keynote: Cyberstorm

BIO

Aaron Blythe

Enterprise Architect, NAIC
Kansas City DevOps

Saturday: Introduction to Shodan

ABSTRACT: I imagine it goes without saying that the internet is an insecure place. With tens of billions of connected devices projected in the next 5 years, this will only become more insecure. Shodan is a powerful search engine tool that can be used to aid you in making sure that you are not exposing any of your IoT devises (or even web servers or services for that matter) to the open internet. Aaron will walk through what Shodan is, how to use Shodan, ethics of using Shodan, and many other related topics. BIO

John Bumgarner

Founder, Cytenna
CTO, U.S. Cyberconsequences Unit

Friday: Through the Looking Glass: Threat Intelligence beyond just ones and zeros

ABSTRACT: Most people usually talk about threat intelligence in terms of questionable IP addresses, domains used for drive-by downloads, interesting twitter keywords, spear phishing emails and malware signatures. Threat intelligence is all these things and much more. This talk will explore the concept of threat intelligence from multiple angles, including automation and analysis.

Saturday: Leveraging Cyberattacks for Economic Warfare

ABSTRACT: The use of economic warfare by nation states dates back millennia, but adversaries today can use a multitude of asymmetric cyberattacks to strike at a country’s economic base, which is the foundation of national stability. This talk will deconstruct past economic warfare events and outline future economic warfare attacks. BIO

 

Tony Cole

Chief Technology Officer, Attivo Networks

Saturday: Deception in the World -Past, Present, and Future

ABSTRACT: This session will explore some of the more successful uses of deception throughout history, it’s present impact on the world, and where deception will likely have more impact in our interconnected future world. BIO

Michael J. Daugherty

CEO LabMD

Saturday: It’s the CyberSecurity Cops! What the Feds Do When They Investigate You and How LabMD Flipped Over Their Game Board

BIO

Angela Dogan

Director, Vendor Risk Management and Compliance, Lynx Technology Partners

Friday: Careers in Cybersecurity: Can there be more than IT?

ABSTRACT: Cybersecurity is the latest buzz word in our world today and everyone is talking about how they are struggling to find talent in the field of Cyber. However, what does that talent look like? What are the fields within Cybersecurity? When we hear the word what do we think of? Well, the reality is Cybersecurity and the employment opportunities under that field are broad and plentiful. It’s best to think of it as having two sides a technical side and a non-technical side. During this discussion we will explore the non-technical side and the growth opportunities within that realm. We will also discuss what an ideal candidate looks like and why soft skills are important in all roles. BIO

Steven Fox

Sr. Manager, Security Compliance & Audit, Workforce Software

Friday: Getting Data Protection Right: Using Risk Assessments for Effective Contracts

ABSTRACT: This session explores the impact of context on personal data, the role of focused risk assessments for visibility into the data supply chain, and how this informs cogent contracts. The insights in this presentation are borne from the up-stream and down-stream GDPR compliance pressures faced by a SaaS provider. Attendees will leave this session with the tools to transform GDPR compliance into a risk-based conversation. BIO

Adam Gates

Engineer, Malwarebytes

Saturday: Threat Landscape 2018
& Panel Moderator

BIO

Travis Hartman

Architect, CACI
President, IWC Labs

Saturday: Drone on the Farm

ABSTRSCT: The continued expansion of drone capabilities gives them tremendous flexibility. The basic premise for utility support is the ability to reach places or perform tasks that would be difficult or cost ineffective for humans.

In this session we examine emerging capabilities that are useful in the field and in the factories. From 1,000 lbs of lift for utility work, wielding flamethrowers, or delivering network attack tools we will look at ways they will impact activities across the Midwest. We will cover current legal restrictions on drone uses and countermeasures for malicious systems. BIO

Bobby Kuzma

Director Community Engagement, Core Security

Saturday: How to Build an InfoSec Career with more than a dash of Impostor Syndrome

ABSTRACT: Once upon a time, there was an IT guy who woke up working in security. He had no clue how he got there. People praised his work, and sought his counsel. Despite this, he never really believed any of them. Every job, every project, he sat in constant fear that *this* would be the project where he'd fail, and everyone would discover that he'd been faking it all along. An Imposter.

Bobby Kuzma is one of those people. In this talk, he'll share his story of how he got here, and how he deals with his Imposter Syndrome on a weekly basis to still do cool things. BIO

Carlos Lerma

Sr.. Information Security Architect, Beam Suntory, Inc.

Saturday: Benvenuto Cellini, Nirvana and The Special Forces: Becoming an Artist, Warrior and Philosopher in Information Security

ABSTRACT: This presentation is a collection of insights from 20 years in the IT Industry, 6 of them in Information Security, across 4 countries and 3 languages. The reflection is a first of its kind at CornCon as no one has spoken about career development or the most common challenges that InfoSec practitioners face in their career path. The presentation uses the pillars or the teachings of Benvenuto Cellini, an Italian polymath whose theory that "a man must be an artist, a warrior and a philosopher" shaped the life and career of Jason Everman, a talented musician and co-founder of the legendary band Nirvana, who decided to leave rock and roll stardom to enlist in the Special Forces. These teachings are directly related to career development in Information Security in an engaging way. The presentation engages the most common career challenges in the industry and aims to provide people with solutions and tools to recognize valuable skills, avoid burnout and build professional momentum in order to make Information Security a career path with a bright and solid future. A presentation of this kind has only been given at CornCon III, but focused only on Women in Security. This is a gender-inclusive talk. BIO

Anthony E. Lauderdale

Head of Threat Intelligence, Motorola Solutions

Saturday: Threat Panel

Saturday: Russian Information Warfare

ABSTRACT: Russian information warfare garnered widespread media attention during the US election, notably the DNC hack, the subsequent leaking of emails and Cambridge Analytica. Regardless of the level of influence Russian had on the election, information warfare has been a strategy of Kremlin for decades. While the western world makes a distinction between cyber and information warfare, this concept is foreign to Russians.  Therefore, compromising a company’s server to leak information is synonymous with utilizing a state media apparatus to spread propaganda.  Information warfare can cover a vast range of overt and covert activities seeking to compromise, falsify, plant, interdict or destroy information. This is accomplished through state sponsored news, Psychological operations (PSYOP), hacking, shell companies, media outlets, statements from political leaders, open source tradecraft, trolling, YouTube, social media campaigns or counterintelligence. The first half of this talk will cover the evolution of Russian information warfare while the second half will delve into the more technical methods (Cyber Warfare) Russia uses to achieve its geopolitical objectives. BIO

 

Jeffrey Man

Infosec Evangelist

Saturday: Tales from the Crypt...analyst

ABSTRACT: As a certified Cryptanalyst for the National Security Agency, the speaker was classically trained in manual cryptography, but also pioneered some of the first computer-based cryptographic systems produced by the agency. Topics discussed will include applications of classic cryptography including one-time pads and various cipher methods to machine-based systems (such as the Enigma) and ultimately to modern computer-based algorithms such as public key cryptography. The talk will also explore the speaker’s experiences in the private sector and how the understanding of cryptography helped numerous times in penetration testing, vulnerability assessment, security architecture, and technical advising. Ultimately, this talk will guide you through a history and evolution of cryptography over the past thirty years using the speaker’s own experiences as a backdrop for a discussion of the migration of cryptography from manual to machine and ultimately to digital. Understanding the history and evolution of cryptography is essential for applying modern cryptographic solutions to solve today’s information security problems, particularly in understanding the residual risks, the shifting attack strategies, and the inherent weaknesses in the implementation or fielding of even the best cryptosystems and solutions. BIO

Richard H. L. Marshall, Esq.

President, X-SES Consultants LLC
Former Assoc. General Counsel, NSA

Saturday: Cyber Myths, Secure Network Challenges, & Solutions

ABSTRACT:

Myths

  • Attribution is impossible/not feasible/ not worth the effort
  • Nothing on my system is valuable to hackers
  • Protect the critical infrastructure and we will be fine
  • Information sharing is the answer
  • Cyber tool proliferation is inevitable - there is no lasting defense
  • The problem is easily solvable _ install my program
  • Offense is easy; defense is hard
  • Cyber attacks occur at the speed of light
  • Just keep the bad guys out
  • Its hopeless
Challenges
  • Critical infrastructure systems attacks are increasing in number and severity
  • Systems less secure now than ever before – offense has just gotten better
  • Security standards are advisory – there are so many from which to choose
  • Infrastructiure date is aggregated – iot – and linked withour regard to risks
  • We really do not know who we are connected to; we assume “safe cyber”
  • Infrastructure attacks by foreign entities is a constraint on our foreign policy
  • The most difficult cybersecurity challenges are legal, commercial, and political
Proposed Solutions
  • Leadership must recognize that change comes from the top
  • Protecting a company’s assets is a business imperative
  • No one is immune from attack – big or small hackers attack all
  • Legal system permits defective software; avoids liability; caveat emptor
  • Commercial decision: more cost effective to accept loss than prevent loss
  • Government policy makers lack the political will to address issues

BIO

Juliet Okafor

SVP, Global Security Solutions, Fortress Information Security

Friday: The Blind Leading the Blind: Why InfoSec Teams Fail at OT Security

ABSTRACT: Organizations with mature and effective IT security programs struggle with extending their capabilities to cover OT assets. In fact, one of the easiest ways to fail at OT security is to blindly apply IT security controls as-is to OT. Organizations must be mindful of technical, operational and cultural considerations. Enterprise assets consist of a mixture of IT assets and purpose-built technologies provided by specialized OT vendors. Many organizations have a separate operational technology or engineering group responsible for OT, complicating questions about accountability, ownership, roles and responsibilities with respect to OT security.

Industrial control systems are built with a goal of running reliably for as long as possible – in some cases up to 30 years. An expectation of always-on availability, combined with low staffing levels and limited operations and maintenance budget, often drives an “if it ain’t broke, don’t fix it” philosophy. While this operational philosophy is understandable, it contributes to a considerable amount of technical debt and security risk. Some of the security features commonly found in the IT space, such as authentication and encryption, are not available on ICS communication protocols.

Through basic inspection and assessment we have discovered that OT networks are much more connected to IT networks and the internet than plant engineers, ship engineers, asset owners or information security officers realize. Technology and business trends that connect IT and OT only expands the attack surface and accelerates a threat actor’s ability to pivot from one network to another.

When building a security program , we recommend taking into account the needs of both IT and OT assets by building an overarching enterprise program that provides comprehensive visibility into risks while addressing the specific needs of each specific environment. BIO

Dr. Phil Polstra

Professor, Bloomsburg University

Saturday: An In-depth Look at Stack Buffer Overflows

ABSTRACT: Stack Buffer overflows are some of the most common flaws in software that can lead to exploitable vulnerabilities. This workshop will guide you through the process of discovering these vulnerabilities and how to successfully exploit them. A brief introduction to 32 bit Intel Assembly will be included in this workshop. A basic understanding of C is helpful, but not strictly required. We will do some hands on exploitation.

Rquirements: Laptop with VirtualBox or other virtualization software and at least 20GB of free space. BIO

 

Richard Rushing

CISO, Motorola Mobility

Friday: Security Leaders Panel

BIO

Winn Schwartau

Founder, InfowarCon
Founder, Security Awareness Company

Saturday: Ain’t I Been Tellin’ Ya For 30 Damn Years?

ABSTRACT: A Winn Schwartau AMA (Ask Me Anything) Session

In the olden days, like 1988, I had an idea: What would happen if we Weaponized computers, networks and the internet (such as they were at the time)? Right after I wrote Terminal Comprise (subsequently renamed Pearl Harbor Dot Com, the basis for Die Hard IV) to flush out the ideas in a fictional format, I testified before Congress and told them unless we took drastic pre-emptive defensive steps, the likelihood of an Electronic Pearl Harbor increased. I was labeled Chicken Little.

In my follow-up non-fiction book, Information Warfare, I formalized my taxonomy model. Class I Information Warfare: privacy, massive identity theft and surveillance. Class II Information Warfare: unrestricted corporate and national espionage. Class III Information Warfare, out-and-out cyber-conflicts between nation states and the emergence of powerful cyberterrorism capabilities. Unfortunately, I was right.

In 1995, after various intelligence agencies stopped coming by the house, and the UK un-banned my book, a series of napkin sketches in Warsaw became the genesis for my next published work, Time-Based Security. But I was not satisfied. I wanted a more comprehensive solution. On the beaches Perth on the Indian Ocean I asked myself some questions: What if…

  • Security can be quantified? Actually measured?
  • Security Vendors can be measurably compared and held to account?
  • We can solve Phishing… Spam… data exfiltration…DoS… Fake News…and more?
  • Security can be mathematically justified?
  • We’ve just been looking at security in the wrong way?

Hmmm…. My latest book, Analogue Network Security, attempts to answer those questions. BIO

Carlos Solari

VP, Comodo

Friday: Securing Legacy Industrial Control Systems

ABSTRACT: We are still surprised to learn that autonomous systems can be hacked and be made to do unsafe, even dangerous things. It sounds futuristic, these autonomous things. To be sure, there is a concern with the future autonomous systems, but there is also a present problem with the legacy automated systems. These legacy systems are what operates critical infrastructure. It is automated, and it is insecure in the extreme. The potential impact can also be in the extreme, as in catastrophic. Here’s a proposition. Let’s stop being surprised. Let’s understand the seriousness of the problem and let’s start doing the securing in an organized way. Carlos proposes three actions that can be done today to get organized and to get started. He will also propose three actions to drive a more secure future of automated systems. BIO

Steven V. Telisak

Special Agent, FBI

Saturday: Threat Panel

BIO

Andy Thompson

National Manager, CyberArk

Saturday: Hacker Carpet Bomb - Live Demos!

ABSTRACT: This talk is series of live demonstrations of real-world attacks that organizations see on a daily basis. The goal is to present as many possible live demos of exploits and attacks as possible in the time alloted. Attacks will include stealing hashes off the wire with Responder & Inveigh, Poison Tap, Bash Bunny, MouseJack and more!

Outline:

* Introduction
* Explanation of the Cyber Kill-Chain
* Poison Tap
* Responder & Inveigh
* Bash Bunny
* MouseJack
* WifiPineapple
* USB Killer
* Mitigation Techniques
* Q&A

BIO

Aaron Turner

CEO, Hotshot

Friday: Mobile Ecosystem Vulnerabilities and Data Regulation Madness - Unintended Consequences of GDPR, HIPAA and Privacy Regulations (DEMO)

Join Aaron Turner for an in-depth look at some of the negative consequences of data protection regulations with specific case studies focusing on healthcare, hospitality and other service industries. With the increase in number and severity of cellular network vulnerabilities, this is becoming an even bigger issue for enterprises around the world. All of this uncertainty results in lost business opportunities and decreased customer service. When employees are forbidden from communicating effectively for fear of data regulation, there are negative outcomes, doctors giving vague instructions to nurses, employers fearing how to communicate with employees off hours. Aaron will walk through lessons learned from several research projects that have successfully protected data on hostile mobile networks while still helping employees be productive and efficient.  BIO

Stefan Wahe

Deputy CIO, UW-Madison

Friday: Security Leaders Panel

BIO

Bob West

Managing Director, Deloitte

Friday: Identity and Cloud

ABSTRACT: The last 10 years have been a period of technology transformation.  The adoption of cloud and mobility have changed how people access and store information and enterprises need to adapt to these changes.  This has significant implications about how identities are managed throughout their lifecycle.  This presentation covers this technology transformation and the approach enterprises need to take to identity can be  properly managed given the changes in technology. BIO

Jon Williams

The Architect

Saturday: Roll them bones! The design and implementation of electronic dice

ABSTRACT: In this presentation, I will walk through the design and implementation of an electronic substitute for the polyhedral dice commonly used in role-playing games. I will discuss the trade-offs of the various means of generating random numbers on a small, embedded platform, the process of designing the custom electronics, and lessons learned about prototyping a device for potential retail sales. BIO

Keith Wilson

Global CISO, W. R. Berkley

Friday: Security Leaders Panel

BIO

Ira Winkler

Infosec Evangelist

Friday: Incorporating Security Practices into Business Processes

Saturday: Hacking Closed Networks

ABSTRACT: TBD

BIO

Xe1phix

Building A Restricted & Trustworthy Linux Environment

ABSTRACT: ParrotSec-Building A Restricted & Trustworthy Environment (A laptop is required)

I will be giving a live demo of several Parrot Linux use cases. Parrot is a GNU/Linux OS specializing in:

  • Security (using firejail to harden everyday applications)
  • Forensics (Carving & Analyzing hidden file metadata)
  • Antiforensics (using LUKS encryption to format a USB drive)
  • Security (use firejail to sandbox everyday applications).

This talk is a live, and interactive workshop. I will be using the linux CLI for the entire talk. I will Give away preinstalled ParrotSec live DVDs To anyone with a laptop so they may follow along.

All of the syntax I execute will be thoroughly documented and explained. Also, the code will be publicly accessible in my gitlab repository. The topics covered in my talk will also have step by step instructional videos posted on my YouTube channel. This way, the audience can replicate the steps I performed in the presentation. BIO

 

     
Dr. John D. Johnson

Co-Founder/Chair, CornCon
CEO/Founder, Aligned Security LLC

All ur kernel r belong to me!

•  Opening Remarks
•  Closing Ceremony
•  Ethics & Technology

BIO

       

© 2018 CornCon