­
5 Security Trends from Defcon 2014 - The Largest Hacker Conference - All Articles - CISO Platform

ibl2qc.jpgJust had a hectic week at Defcon and Blackhat. Defcon is the largest gathering of hackers (and those interested in hacking) in the world. In the 22nd edition of the event there were nearly 15000 people from across the world who visited Vegas for Defcon.

I had been visiting both of these events for last several years. I believe I am more of a builder than a hacker but still this is one of the event which draws me every year. It is a great way to keep an eye of what's happening in the world of hacking and provides some valuable insights on how tomorrow could look like.

So here's the top things that I noticed in Defcon 22.

Hacking IOT (Internet of Things) is easy

It seems that the hackers found the sweet spot in breaking the internet of things. Security researchers demonstrated how several products like Google Nest, Dropcam, Elevators, Cars etc can be hacked. The attack techniques are not really new. It's the same old tricks on new set of devices. There is one hard part though- that's interacting with some of the devices. As an example, analyzing the attack surfaces of the car and building the right interfacing mechanism is an one-time hurdle. After that you may use all standard attack techniques. 

Operating Systems are hard to hack

There had been relatively lower number of attacks on operating systems. It is evident that the OS is getting tougher to exploit. The OS vendors have done a decent job in making things tougher for the hacker.

Few (if not none) new attack techniques

There are lots of hacks demonstrated. However most, if not all, are old techniques. There had been no new "class of attack" discovered. At least I did not attend any such talks. 

Read More: Top Talks from Defcon (Part 1)

Mainstream computer science and maths researchers getting into hacking

There had been some talks on maths, machine learning and data mining. This is not very common at Defcon. This is a welcome change. More number of persons with strong maths and science skills are getting into hacking. There had been a decent rift between the computer science (theoretical) enthusiasts and the hackers in past which seems to be getting bridged slowly.

Strong dissent against government spying and privacy violations

There had been a good number of talks on how to detect if you are being spied upon or how to be anonymous on the internet. There is also a very high degree of dissent against the FEDs and government violating privacy. 

Read More: Top Talks from Defcon (Part 1)

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Round Table Dubai 2025 | GISEC

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee

Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))

  • Description:

    We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.

    As cyberattacks grow in…

  • Created by: Biswajit Banerjee
  • Tags: ciso, cyber insurance, dan bowden

CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta

  • Description:

    Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !

    CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…

  • Created by: Biswajit Banerjee