Black Hat 2017: training, cybersecurity trends and end-point protection

August 03, 2017, Marshall England, Sr. Marketing Director, Technology & Cloud

Every year, Black Hat is a highly anticipated event in the cybersecurity community—and Black Hat 2017 certainly did not disappoint! It was yet another year of record traffic, bustling with visitors from the security community that want to strengthen their security skills and postures. Organizations in the midst of digital transformations and digital native businesses alike sent security teams to learn about various tools and techniques to increase their knowledge of defense and breach prevention.

At the Coalfire booth, we spoke with many representatives from organizations looking to strengthen not just their security postures, but their messaging and strategies to communicate how security enables business. Other common topics included the need for frequent security testing and adding certifications to address clients that serve various industries.

The proliferation of devices - mobile, IoT - and how to protect and manage them is still a focus for organizational security; we held lively discussions about these devices as an attack vector, and the growing importance of using 3rd party testers to probe for vulnerabilities. End point detection and response (EDR) and end point protection platforms (EPP) providers such as Tanium, Endgame and Cybereason booths were abuzz with traffic.  The capabilities to run signal analysis to identify threats and adversaries at the endpoint and neutralize it prior to traversing into the network is a priority for many. The remediation program that comes after an EDR or EPP finding affects the organization's cybersecurity program holistically from access control, configuration management and system hardening, to name a few.

At the show, Coalfire’s vice president of Labs Mike Weber gave some “lively” interviews about cybersecurity, pen testing, vulnerabilities, and the ultimate question: Are companies and individuals ever fully secure? First up, Mike interviewed with David Perry on “The Personal Computer Radio Show.” Mike gave in-depth responses on the ways in which pen testers work to gain access to critical systems and even physical sites on behalf of clients—and fielded questions about how ‘the man on the street’ can know whether the companies they work with are adequately securing their organizations and systems. Check back periodically at The Personal Computer Radio Show next month for the full interview.

Mike was also interviewed via live stream from Black Hat on Twitter by Chuck Harold at Be sure to watch his interview, where he discussed threat hunting, regulations, compliance, and the need for security assessment to reach beyond compliance for an overall stronger security posture.

Security testing teams are always looking to sharpen their skills and to be challenged in preparation for real breach. Black Hat offers four days of training given by leading security professionals. This year there were a number of popular choices, such as gaining access to Active Directory, breaching cars and adding hunt operations to the proactive security approach for security operations. Coalfire led two training classes (two-days each) on adaptive penetration testing. Please check the Coalfire blog in the coming weeks for more details on these trainings, what attendees learned, and deeper insights into the vulnerabilities that still exist even in companies who have invested in solutions, process and policy.

We look forward to meeting you at next year’s Black Hat!

Marshall England


Marshall England — Sr. Marketing Director, Technology & Cloud

Recent Posts

Post Topics