Loading…
Attending this event?
Streaming: https://mssvideo.vcu.edu/RVAsec
Technical [clear filter]
arrow_back View All Dates
Wednesday, June 5
 

10:30am EDT

Patch Perfect: Harmonizing with LLMs to Find Security Vulns
Are LLMs a revolutionary leap forward for security research—or just spicy auto-complete?

The truth lies somewhere in between. This talk cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products. We’ll walk through our process of harnessing large language models (LLMs) for patch-diffing in the context of N-day vulnerability research. Given a vague security advisory and some complicated code diffs, can an LLM get you closer to finding the right spot in the code to dig deeper? Which models work best for this task, and why? Let’s ditch the theory and get our hands dirty with iterative experimentation. Whether you’re a seasoned pentester, applied researcher, or budding practitioner, you'll take away tactical lessons for incorporating AI into your security toolkit.

Speakers
avatar for Josh Shomo

Josh Shomo

Staff Security Engineer, Bishop Fox
As a Staff Security Engineer at Bishop Fox, I lead vulnerability research within the Capability Development team, where I leverage vulnerability intelligence to drive our team to conduct the most impactful in-depth technical investigations. I have created multiple tools that enhanced... Read More →
avatar for Caleb Gross

Caleb Gross

Director of Capability Development, Bishop Fox
Caleb Gross is the Director of Capability Development at Bishop Fox, where he leads a team of offensive security professionals specializing in attack surface research and vulnerability intelligence. Prior to coming to Bishop Fox, he served as an exploitation operator in the US Department... Read More →


Wednesday June 5, 2024 10:30am - 11:20am EDT
Upstairs, Grand Ballroom F/G

11:30am EDT

Unlocking Generative AI: Balancing Innovation with Security
Join us for 'Unlocking Generative AI: Balancing Innovation with Security' as we navigate the complex landscape of generative AI in corporate environments. From understanding the fundamentals to exploring security threats like data poisoning and model theft, discover how large enterprises can safeguard sensitive data and AI models. Learn robust mitigation strategies to tackle these challenges head-on, ensuring a secure future for AI innovation. Don't miss this opportunity to delve into the promising yet challenging world of generative AI security.

Speakers
avatar for Jason Ross

Jason Ross

Security Engineer, Salesforce
Jason Ross is a passionate cybersecurity expert with a diverse skill set, currently focused on building tools and processes to test the security of generative AI models & applications that use them. Jason's past work experiences include penetration testing, cloud security, and OSINT.Jason... Read More →


Wednesday June 5, 2024 11:30am - 12:20pm EDT
Upstairs, Grand Ballroom F/G

1:00pm EDT

Reverse Engineering for Dummies: The “what if?” user
When developing a product, software engineers often discuss the “what if?” user. What if a user builds their own frontend client? What if a user finds that embedded API key? What if a user notices that endpoint doesn’t have authorization? This talk has three real-life examples from the speaker’s perspective as the “what if?” user. Each example will delve into the motivation, the security flaws reverse engineered, and how to improve the security of each product. This talk will cover reverse engineering assets from an Android game, a waitlist to buy exercise equipment, and a Publish Subscribe system for an auction house. This talk aims to generate interest in identifying software design flaws and reverse engineering them, as well as helping teach about common security issues and practical methods of fixing them.

Speakers
avatar for Micah Parks

Micah Parks

Senior Software Engineer
Micah Parks started his professional career about six years ago in the National Security Agency. After moving to the private sector, Micah has continued to work as a security minded software engineer. He has created and maintains multiple open source projects, with the most popular... Read More →


Wednesday June 5, 2024 1:00pm - 1:50pm EDT
Upstairs, Grand Ballroom F/G

2:00pm EDT

Building Illusions in the Cloud: Deception Engineering
Deception engineering is a defence-in-depth strategy which many organisations overlook. Post achieving certain level of maturity over their infrastructure security processes, deception engineering is a great security project to enhance monitoring via high fidelity alerts and targeted knowledge of an attack in terms of where the attack's epicentre exists, what actions are the attackers taking, etc.

This session aims to share the overview of what entails when building a deception engineering charter, how to plan for deploying honeypots and honeytokens, and finally how to handle a potential incident that was detected via a honeypot.

Speakers
avatar for Ayush Priya

Ayush Priya

Lead Data & Cloud Security Engineer, CRED
Ayush is a Cyber Security Engineer specialising in Cloud and Data Security, and DevSecOps practices. He loves to develop automation for security controls and processes. He has delivered talks at various conferences and security communities like GrayHat'20, and Cyber Security Global... Read More →
avatar for Saksham Tushar

Saksham Tushar

Head of Security Operations, CRED
Saksham Tushar specializes in various aspects of Threats, including intelligence, detection, analytics, and hunting. He has experience leading teams and collaborating with organizations such as Informatica, Microsoft, and IBM to establish multiple global Security Operations Centers... Read More →


Wednesday June 5, 2024 2:00pm - 2:50pm EDT
Upstairs, Grand Ballroom F/G

3:10pm EDT

My Way is Not Very Sportsman-Like: Shaping Adversary Behavior to Strengthen Defenses
We’re taking a fresh look at how to beat cyber attackers at their own games! It’s all about using our defender advantages wisely, controlling, constraining, and shaping the adversary’s moves before the attack even begins. We're ditching the old "Defender’s Dilemma" mindset and showing how smart defense strategies can make a huge difference. Let’s shift our thinking, use our advantages better, and boost our defense without breaking the bank.

Speakers
avatar for David J. Bianco

David J. Bianco

Staff Security Strategist, SURGe by Splunk
David is a Staff Security Strategist on Splunk’s SURGe research team. He is also a SANS Certified Instructor, where he teaches network forensics. David has more than 20 years of experience in the information security field, primarily in incident detection and response, threat hunting... Read More →


Wednesday June 5, 2024 3:10pm - 4:00pm EDT
Upstairs, Grand Ballroom F/G
 
Filter sessions
Apply filters to sessions.
Filtered by Date -