­
Top 10 Talks From Black Hat Conference USA, 2016 - All Articles - CISO Platform

Our editorial team has handpicked the best of the best talks at Black Hat Conference USA, 2016 - one of the largest IT Security Conferences in the world.

Black Hat conference is a security conference which brings together variety of security professionals and hackers to discuss on the current information security challenges and security landscape. The event is composed of two major sections, the Black Hat briefings and Black Hat trainings. Black Hat 2016 USA was held on July 30 - August 4, 2016 in Las Vegas, This year the talks were focused on security challenges in Internet of Things (IOT's), Enterprise Mobility solutions, Cloud security, Microsoft windows 10 and many more. (Source: Black Hat Conference USA, 2016)

The Index below will help you navigate on this page. Each link will take you to the individual sections.

8669814501?profile=original

 

Index: Top Talks Handpicked by CISO Platform Editorial Team

(Click on the sections below to go directly to respective sections)

1) Internet Of Things(IOT) Talks

  1. Light bulb worm 

    Colin O'Flynn from  NewAE technologies shows the possibility spreading worms inside a smart home network through smart light bulbs. He shows that how some of the engineering trade-off and bad architecture can be exploited by any hacker.  In the case of Phillps hue smart lighting system the similar type bulb seems to use the same encryption key for the firmware images. If the attacker has access to the device firmware they can execute any malicious code into the network y simply flashing the devices. Also these simple devices have limited ability to identify the networks hence an attacker can find ways to cause devices  switch networks.

    >> Click Here For PPT



  2. Into the core - In-depth exploration of windows 10 IOT core 

    This talk discuss on the internals of Windows 10 IOT core, Microsoft's operating system aimed at small footprint, low cost devices. Paul Sabanel, security researcher, IBM X-Force advance research draws similarity in Security features and mitigations with the Desktop edition OS.  Microsoft Windows 10 IoT Core attack surfaces, Its potential susceptibility to malware and methods to assess the security of devices running this OS is also discussed.

    >> Click Here For PPT

2) Cloud security talks

  1. Account jumping, post infection persistency and lateral movement in AWS 

    The widespread adoption of AWS as an enterprise platform for storage, computing and services makes it a lucrative opportunity for the development of AWS focused APTs. This session covered several methods of infection including a new concept - "account jumping" for taking over both PaaS (e.g. ElasticBeans) and IaaS (EC2, EC2 Containers) resources, discussing poisoned AMIs, dirty account transfer, as well as leveraging S3 and CloudFront for performing AWS specific credentials thefts that can easily lead to full account access.

    The presenters then discussed the post-infection phase and how attackers can manipulate AWS resources (public endpoints like EC2 IPS, Elastic IPS, load balancers and more) for complete MITM attacks on services.

    >> Click Here For PPT



  2. Hardening AWS environment and automating incidence response for AWS compromises

    The talk discussed the paradigm of Incident Response in the cloud and introduces tools to automate the collection of forensic evidence of a compromised host. It highlights the need to properly configure an AWS environment and provides a tool to aid the configuration process.

    >> Click Here For PPT

3) Mobility Talks

  1. 1000 ways to die in mobile OAUTH 

    The talk is a presentation of the in-depth study to demistify  OAuth for mobile application developers. The presenter pinpoint the key portions in each OAuth protocol flow that are security critical, but are confusing or unspecified for mobile application developers, they then also show several representative cases to concretely explain how real implementations fell into these pitfalls.

    >> Click Here For PPT


  2. Bad for enterprise - Attacking BYOD Enterprise mobile security solution
      

    This interesting talk takes a new look at the Enterprise mobility security (EMS) solutions by highlighting the risks posed by the EMS solutions itself on the organizations. Vincent Tan attempts attack on several EMS protected apps on Mobile devices ( Jail-broken & Non-Jailbroken) proving such solutions ineffective and vulnerable. He also demonstrate how one can disable tampering detection mechanisms and application locks, intercept & decrypt encrypted data, and route "secure" HTTP requests through BURP into established Good VPN tunnels to attack servers on an organization's internal network using his Swizzler exploit tool.

    >> Click Here For PPT

4) Other Interesting talks

  1. Breaking payment point of interaction

    This talks exposes the risk of approaching security from the point of view of Just managing standards. Often the organizations, especially in the payment processing sector, tend to neglect some security risks or don't pay attention to the minute security details which renders them vulnerable to any skilled attackers. Nir Valtman and Patrick Watson discusses the methods to bypass protections put in place by point of interaction(POI) devices. In this presentation, they explain the main flaws and provide live demonstrations of several weaknesses on a widely used pinpad.

    >> Click Here For PPT



  2. Using an expanded cyber kill chain model to increase attack resiliency

    This talk builds on the traditional cyber kill chain model and in shows that how it is not sufficient in the current security challenges. Sean Malone explores an expanded model including the internal kill chain and target manipulation kill chain. he also discusses multiple type of controls that one can implement today in an enterprise to frustrate the adversary plan at each stage.

    >> Click Here For PPT



  3. Breaking hardware enforced security with hypervisors

    Joseph Sharkey in his presentation shows the vulnerability in intel much talked about Hardware enforced security.  He attempts to capture keys from intel's AES-NI instructions and bypass Intel Trusted Execution Environment (TXT) DRTM (dynamic root of trust measurement) through a hypervisor rootkit.

    >> Click Here For PPT

 

5) Want More Comprehensive Analysis? Register for SACON Goa !


Our Team along with some of the Top BlackHat and Defcon Speakers will present their analysis of the Top Talks at SACON Goa. Meet Matt Suiche, Paul Wright, Kenneth Bradberry, Reinhold Wochner etc...and learn more . Click Here To Register

8669814689?profile=original

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee

National Insider Risk Symposium, Washington DC, USA 2025

  • Description:

    We are excited to invite you to the 10th National Insider Risk Symposium, a premier forum bringing together leaders and experts from both the commercial and public sectors to address the evolving landscape of insider threats. CISOPlatform is a proud community partner for this event. 

    Event Details:
    Venue: National Housing Center, 1201 15th St NW, Washington, D.C. 20005
    Dates: September 17–18,…

  • Created by: Biswajit Banerjee
  • Tags: national insider risk symposium, ciso, cybersecurity events, usa events