Hackers, Attack Anatomy, and Security Trends

Attacks against companies and their vendors are facilitated by the current rapid adoption of embedded systems, cloud solutions, and web based platforms. These attacks undermine the very monetization, scalability and user experience goals for which these systems were designed and deployed. As malicious hackers advance their techniques at a staggering pace, often rendering current defense tactics obsolete, so too must security practitioners obsess over deploying progressive techniques. Presented by the elite organization of white hat hackers most widely known for being first to break the iPhone, this session will analyze the anatomies of real world attacks against high profile systems, ranging from the well known Target breach to the equally significant Texas Instruments RFID attack. It will provide a framework of progressive security practices to account for these modern attackers, articulate context across industries, and supply attendees with key takeaways, including immediately actionable guidance.