IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: PRESS RELEASE: SPEAKER ALERT

PRESS RELEASE: SPEAKER ALERT | May 28, 2014

Jennifer Steffens, Chief Executive Officer for IOActive, to give keynote presentation at Hack In The Box

PRESENTATION:
Keynote: Hack It Forward
PRESENTER(S):
Jennifer Steffens
CONFERENCE:
HITBSecConf 2014
LOCATION:
Amsterdam, The Netherlands
DATE & TIME:
May 30, 2014 at 9:45 AM

 

Thirty years ago, movies like War Games and The Manhattan Project inspired legions of tech-savvy, brilliant, creative minds. These bright minds pioneered a deeper understanding of software and computing on a grand scale. They were motivated by the fact that they could have fun while making the world a safer place.

In her keynote presentation, Jennifer will consider what’s motivating the InfoSec industry today. With media-sensationalized hacks and government involvement in cyberwarfare, she will pose the following question: How do we ensure that brilliant minds continue to have fun while tackling seemingly impossible challenges?

About Jennifer Steffens
As CEO, Jennifer Steffens is responsible for all aspects of IOActive’s global business operations including sales, delivery, and finance as well as driving the company’s strategic vision. Steffens brings a wealth of industry and business experience to the company, having been an early member of several successful startups.

Earlier in her career, Steffens was a Director at Sourcefire, where she helped build and grow the business from $250K to an over $35M run rate in just four years. Working closely with the CTO, Steffens helped commercialize the open source Snort technology and build several service offerings around the research initiatives. Prior to joining IOActive, she came to Seattle to help the struggling startup GraniteEdge reinvent itself. She spearheaded initiatives to restructure the company, and developed a product strategy to drive early market penetration that ultimately secured two additional rounds of funding.

With over 10 years of industry experience, Steffens has also held senior management positions at Ubizen, NFR Security, and StillSecure. She graduated from Mary Washington University with a Bachelor of Science in Psychology.

About Hack In The Box Security Conference
The main aim of the HITBSecConf conference series is to create a truly technical and deep knowledge event in order to allow you to learn first hand on the security threats you face in todays super connected world. The HITBSecConf platform is used to enable the dissemination, discussion and sharing of critical network security information. Presented by respected members of both the mainstream network security arena as well as the underground or black hat community, our events routinely highlight new and ground-breaking attack and defense methods that have not been seen or discussed in public before.

###

Feeling social?
IOActive in LinkedIn
IOActive on Facebook
IOActive on YouTube
IOActive on Crunchbase
IOActive on Github

PRESS RELEASE: SPEAKER ALERT | May 27, 2014

Cesar Cerrudo, Chief Technology Officer for IOActive Labs, to present at INFILTRATE

PRESENTATION:
Hacking US Traffic Control Systems
PRESENTERS:
Cesar Cerrudo
CONFERENCE:
INFILTRATE Security Conference
LOCATION:
Miami Beach, Florida, US
DATE & TIME:
May 16, 2014 at 14:00 PM

 

Cesar recently conducted research involving devices used by traffic control systems in important cities around the world, including the US, UK, France, Australia, and China. The end result, Cesar was able to hack into and exploit these devices.

In this presentation, Cesar will tell the whole story: how the devices were acquired, the research and onsite tests he conducted, the vulnerabilities he discovered, and how they can be exploited. Cesar will conclude his presentation with demonstrations of cyberwar-style attacks against the vulnerable devices.

To read more about Cesar’s research and to watch a short video highlighting his talk at INFILTRATE, please visit: http://youtu.be/RviQ3YQTxMo

About Cesar Cerrudo
Cesar Cerrudo is CTO for IOActive Labs, where he leads the team in producing ongoing, cutting-edge research in the areas of SCADA, mobile device, application security, and more. Formerly the founder and CEO of Argeniss Consulting – which was acquired by IOActive – Cesar is a world-renowned security researcher and specialist in application security.

Throughout his career, Cesar is credited with discovering and helping to eliminate dozens of vulnerabilities in leading applications including Microsoft SQL Server, Oracle database server, IBM DB2, Microsoft Windows, Yahoo! Messenger, and Twitter. He has a record of finding more than 50 vulnerabilities in Microsoft products and more than 20 in Microsoft Windows operating systems. Cesar has authored several white papers on database and application security as well as attacks and exploitation techniques based on his unique research. He has been invited to present at a variety of companies and conferences including Microsoft, Black Hat, Bellua, CanSecWest, EuSecWest, WebSec, HITB, Microsoft BlueHat, EkoParty, FRHACK, H2HC, Infiltrate, BlueHat, 8.8, Hackito Ergo Sum, NcN, and Defcon. Cesar collaborates with, and is regularly quoted in, print and online publications.

About INFILTRATE
INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.

About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established pedigree in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment through to semiconductor reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA and Asia Pac regions. Visit www.ioactive.com for more information. Follow IOActive on Twitter: http://twitter.com/ioactive.

-###-

PRESS RELEASE: SPEAKER ALERT |

Chris Valasek, Director of Security Intelligence for IOActive, and Charlie Miller, Security Researcher for Twitter, to present at ITWeb Security Summit 2014

PRESENTATION:
Hacking Cars Via the CAN Bus
PRESENTER(S):
Chris Valasek and Charlie Miller
CONFERENCE:
ITWeb Security Summit 2014
LOCATION:
Johannesburg, Gauteng, South Africa
DATE & TIME:
May 28, 2014 at 11:55 AM

 

As automobiles become more connected, security experts naturally begin to think about their vulnerability to attack. During their talk, Chris Valasek and Charlie Miller will discuss how automotive networks operate and their inherent insecurities. Together, they will outline the various attacks that researchers have performed against automobiles and present ways to secure modern vehicles.

Additionally, IOActive South Africa is offering a high-level educational forum – Adventures in Auto Security – for car manufacturers on May 29, from 7am – 10am. The event being held at the Menlyn Boutique Hotel in Pretoria will be an entertaining and enlightening car security breakfast session hosted by Chris Valasek.

Car manufacturers interested in attending the car forum breakfast on May 29, please contact Yvette Du Toit for more information: yvette.dutoit@ioactive.com.

About Chris Valasek
Chris Valasek is the Director of Security Intelligence at IOActive. He specialises in attack methodologies, reverse engineering, and exploitation techniques. Valasek is widely regarded for his research on Windows heap exploitation. He regularly speaks on the security industry conference circuit. His previous tenures include Coverity, Accuvant LABS, and IBM Internet Security Systems. Valasek is also the Chairman of SummerCon, the nation’s oldest hacker conference. Chris holds a B.S. in Computer Science from the University of Pittsburgh.

About Charlie Miller
Charles Miller is a computer security researcher with Twitter. Prior to his current employment, he spent five years working for the National Security Agency. Miller has demonstrated his hacks publicly on products manufactured by Apple. In 2008, he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver, British Columbia, Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009, he demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011, he found a security hole in the iPhone’s/iPad’s security, whereby an application could contact a remote computer to download new, unapproved software. The software could execute any command and steal data (personal or other) using iOS applications’ functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple’s App Store. He then informed Apple about the security hole and was promptly expelled from the App Store by Apple.

About ITWeb Security Summit
Now in its ninth year, ITWeb Security Summit 2014 will bring together international and local IT and security professionals, practitioners, industry experts and analysts to share their experiences, acquire knowledge and gain an understanding of the key tools, techniques and strategies needed to safeguard their organizations’ most valuable asset – information.

PRESS RELEASE: SPEAKER ALERT | April 24, 2014

Chris Valasek, Director of Security Intelligence for IOActive, to present at TEDxGrandviewAve

PRESENTATION:
Breaking the Connectivity
PRESENTERS:
Chris Valasek
CONFERENCE:
TEDx Grandview Ave
LOCATION:
Pittsburgh, Pennsylvania, US
DATE & TIME:
April 26, 2014 at 4:00 PM

 

In this presentation, Chris Valasek will talk about our connected world and the trust we place in the shiny devices that bring us all together, devices that are really just a bunch of parts thrown together and often include old technology. Chris will explain why we need breakers to pull these devices apart and help rebuild them to be better, smarter, and more secure.

About Chris Valasek 
Chris Valasek is the Director of Security Intelligence at IOActive. He specializes in attack methodologies, reverse engineering, and exploitation techniques. Valasek is widely regarded for his research on Windows heap exploitation. He regularly speaks on the security industry conference circuit. His previous tenures include Coverity, Accuvant LABS, and IBM Internet Security Systems. Valasek is also the Chairman of SummerCon, the nation’s oldest hacker conference. Chris holds a B.S. in Computer Science from the University of Pittsburgh.

About TEDxGrandviewAve
The annual TED Conference has given rise to multiple, local initiatives aimed at sharing transformative ideas. That’s where TEDx comes in. TEDx is an independently organized, community-based version of the larger TED-experience.  Planned and coordinated by an all-volunteer team, TEDx showcases transformative and thought-provoking ideas on the local level.

At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.

TEDxGrandviewAve is Pittsburgh’s platform for showcasing the ideas, individuals and innovations that are redefining the Steel City. In the Spring of 2014 on April 26th, TEDxGrandviewAve will celebrate the people of Pittsburgh who dare to create, while inspiring others to take action and follow their lead.

About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established pedigree in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment through to semiconductor reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA and Asia Pac regions. Visit www.ioactive.com for more information. Follow IOActive on Twitter: http://twitter.com/ioactive.

-###-

PRESS RELEASE: SPEAKER ALERT |

Shane Macaulay, Director of Cloud Services for IOActive, and Scott Larson, President of Larson Security, LLC, to present at The United States Cyber Crime Conference

PRESENTATION:
Advanced Persistent Threat: Out-of-band Techniques from the Past, the Present and into the Future
PRESENTERS:
Shane Macaulay and Scott Larson
CONFERENCE:
The United States Cyber Crime Conference 2014
LOCATION:
Leesburg, VA , US
DATE & TIME:
April 29, 2014 at 9:00 AM

 

In this presentation, Shane and Scott will look at malware analysis using hands-on tools and techniques derived from their extensive experience. Combined, Shane and Scott have over a decade’s worth of experience working on engagements in the private sector as well as 25 years working on advanced intrusion investigations in the FBI, joint Department of Defense investigations, the Honeynet Project, and corporate Advanced Persistent Threat (APT) investigations. Their experience spans health care, medical devices, the energy and financial sectors as well as the next ring of targets in the global marketplace outside of the defense and technology sectors.

Shane and Scott will present a detailed examination of various heuristics, reverse engineering, and customized forensic techniques for cloud, network gateway, and host-based systems using anonymized case studies, demonstrations, and technical discussions.

About Shane Macaulay
Shane Macaulay is the Director of Cloud Services for IOActive and is experienced in enterprise-level network and application assessment and consultation.

Macaulay takes a deep, broad approach to security and has worked with every major UNIX distribution, Microsoft platform, and networking operating system. He has contributed to the security community by way of various papers, books, and technical applications, and he has discovered numerous compiler bugs (both native and managed), one of which was used to win the non-obvious source code backdoor contest at DefCon 2010.

Macaulay is an alumni member of the international security group The Honeynet Project and has worked with IBM, Bloomberg, @Stake/Symantec, financial exchanges/firms, and many high-tech industry giants.

About Scott Larson
Scott Larson is a digital forensics, cyber security, cyber crime, and cyber espionage expert who serves as a trusted team member for Fortune 500, law firms, medical non-profits, and governments in data preservation, incident response, and other complex technical, legal and regulatory issues. He worked APT before it was coined APT. Mr. Larson has served as a Court Neutral Expert in the Congressman Jefferson case and as the FBI’s expert for a hack into the U.S. Supreme Court and hacking cases of presidential and congressional campaigns. In 2011, he participated in the White House’s National Security Counsel’s Botnet Mitigation Working Group. Other work includes audit committee investigations, cutting-edge research and development, lab build-outs, embedded staff forensic/analytic knowledge transfer, and out-of-band APT mitigation and remediation through custom techniques. While in the FBI, Mr. Larson led FBIHQ’s Computer Investigations and Infrastructure Program responsible for the operations, personnel, and program budget for the entire FBI. Mr. Larson led the computer portion of the Robert Hanssen spy case and advised the US Attorney’s Office in the Donald Patrick Reagan spy case. He represented the FBI in the G8 and Interpol working groups and participated in numerous DoD investigations and training programs.

About The United States Cyber Crime Conference
The U.S. Cyber Crime Conference is continuing the 12-year tradition of success established by the former DoD Cyber Crime Conference. To keep up with the global cyber threat, the conference is expanding its objective and direction to empower the civilian, defense, and government digital forensics communities (legal, IT, and Criminal Investigative) to team together in the battle against cyber crime. The NEW U.S. Cyber Crime Conference is solely owned and produced by eventPower.

This is the only event of its kind that provides both hands-on digital forensics training and an interactive forum for cyber professionals to network. The conference covers the full spectrum of topics facing defenders as well as law enforcement responders. All aspects of computer crime will be covered, including intrusion investigations, cyber crime law, digital forensics, information assurance, along with research and development, and testing of digital forensic tools.

About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established pedigree in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment through to semiconductor reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA and Asia Pac regions. Visit www.ioactive.com for more information.  Follow IOActive on Twitter: http://twitter.com/ioactive.

-###-

PRESS RELEASE: SPEAKER ALERT | April 18, 2014

Karen Howe, Director of Global Marketing for IOActive, to present at Fremont Women in Technology

PRESENTATION:
The Good, the Bad, and the Ugly Truth about Hacking
PRESENTERS:
Karen Howe
CONFERENCE:
Fremont Women in Technology
LOCATION:
Seattle, WA, US
DATE & TIME:
March 20, 2014 at 6:00 PM

 

What do Target, the Federal Reserve, Neiman Marcus, Sarah Palin, and Yahoo all have in common? They’ve all been hacked. In this session, Karen will cover why hardware and software security has grown into $67 billon dollar market that’s on track to being $87 billion in 2016. She will also trace the anatomy of a hack and discuss attack surfaces, exploits, social engineering, and zero-day disclosures.

About Karen Howe
Karen Howe is a seasoned business leader and marketing veteran with more than 20 years experience working with multimedia and Internet technologies. She is the Director of Global Marketing for IOActive, Inc., a leading information security services provider. Before joining IOActive, Howe was a Director of Marketing for Microsoft within Microsoft Research, Vice President and GM at AOL, CEO of Singingfish, Vice President of Marketing for Mindbloom, Stamps.com, and 2WAY Corp.

Other career highlights include 11 years with Adobe Systems and Aldus Corp., where she helped launch the desktop publishing category and established the company’s Australian subsidiary. She’s won two WEBBY awards and two audio/video search patents. Howe received her B.A. from Whitman College in Walla Walla, Washington.

About Fremont Women in Technology and Tableau Software 
Fremont Women in Technology is a community for networking and idea exchange. The event is hosted by Tableau Software.

Tableau Software (NYSE: DATA) helps people see and understand data. Tableau helps anyone quickly analyze, visualize, and share information. More than 17,000 customer accounts get rapid results with Tableau in the office and on-the-go. And tens of thousands of people use Tableau Public to share data in their blogs and websites.

About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established pedigree in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment through to semiconductor reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA and Asia Pac regions. Follow IOActive on Twitter: http://twitter.com/ioactive.

-###-

PRESS RELEASE: SPEAKER ALERT | April 8, 2014

Ian Amit, Director of Security Services for IOActive, to present at SOURCE Boston

PRESENTER: Ian Amit, Director of Security Services for IOActive
PRESENTATION: Painting a Company Red and Blue
CONFERENCE: SOURCE Boston
LOCATION: Marriott Tremont, Boston, Massachusetts
DATE & TIME: Thursday April 10, 2014 at 1:30pm
INFO: http://www.sourceconference.com/boston/

 

In this presentation, Ian will focus on red team engagements and why they are gaining in popularity. By way of background, red teams attack something, while the opposing blue team defends. Traditionally organisations have focused on defense and many have established highly qualified blue teams. In reality, organisations need the yin and yang of both offensive and defensive measures to truly secure their critical assets against today’s evolving threats. Red team exercises provide an invaluable methodology and process for understanding your weak points from an attacker’s point of view.

This session that Ian will present on is geared for anyone charged with protecting real world assets. Designed to be highly engaging and interactive, Ian will explore relevant scenarios and delve into the dark side of understanding where your most critical assets are open to the greatest risk.

PRESENTER: Ian Amit, Director of Security Services for IOActive
PRESENTATION: IOActive Red Team Domination (the Game)
CONFERENCE: SOURCE Boston
LOCATION: Marriott Tremont, Boston, Massachusetts
DATE & TIME: Wednesday April 9, 2014 at 12:00pm
INFO: http://www.sourceconference.com/boston/

 

Join Ian as he hosts IOActive’s very first hacker scavenger hunt where participants have an opportunity to win their own Raspberry Pi. The red team scavenger hunt – called IOActive Red Team Domination – is a mash up of CTF, lock-picking challenge, crypto, and social engineering. It’s open to all attendees of SOURCE Boston and has been engineered for maximum fun.

About Ian Amit
Ian Amit is Director of Services for IOActive. Ian oversees the northeast US services practice including the financial and healthcare sectors, as well as leading the red team division. Ian brings a mixture of software development, OS, network, and web security to work on a daily basis. He is also a regular guest speaker on Fox Business as well as at leading security conferences around the world (Black Hat, DefCon, OWASP, and InfoSecurity), and has published numerous articles and research material in print, online, and through broadcast media. Ian is one of the founders of the Penetration Testing Execution Standard (PTES), its counterpart – the SexyDefense Initiative, and a core member of the DirtySecurity Crew. Ian holds a Bachelor’s Degree in Computer Science and Business Administration from the Interdisciplinary Center at Herzlya.

About SOURCE
SOURCE Conference is the world’s first security conference and training event to focus on bringing together the business and technical communities. At SOURCE, technical experts publish advanced research and network for job opportunities, while executives keep up with the technology that shapes their important decisions. Both leave SOURCE with an understanding of each other’s perspectives on the critical security problems that face the world.

Through a combination of lectures, workshops, trainings, and discussion groups, SOURCE Boston equips attendees with the knowledge and skills to be effective in today’s fast-paced computer security industry.

SOURCE is designed for computer security experts, senior executives (e.g. CIOs, CTOs, CSOs), advanced security professionals, faculty and students, members of management and business communities who are looking to connect with other security and technology experts.

About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established pedigree in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment through to semiconductor reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA and Asia Pac regions. Visit www.ioactive.com for more information. Follow IOActive on Twitter: http://twitter.com/ioactive.

-###-

PRESS RELEASE: SPEAKER ALERT | April 1, 2014

Eireann Leverett, Senior Consultant for IOActive, to present at Networkshop42

PRESENTATION:
Boilerplate Code: Building Management Systems
PRESENTERS:
Eireann Leverett
CONFERENCE:
Networkshop42
LOCATION:
Leeds, United Kingdom
DATE & TIME:
April 2, 2014 at 9:15 AM

 

In this presentation, Éireann gives a brief tour of Building Management Systems (BMS), showing what you can do to learn more about BMS and how to abuse them. Éireann covers everything from lighting, heating, water heating, waste treatment, lifts, escalators, and sprinklers, up to door access and CCTV. Éireann finishes by listing the five easy things that you can do to improve the security posture of your organization’s BMS.

Éireann Leverett
Éireann Leverett is a Senior Consultant at IOActive where he focuses on Smart Grid and SCADA systems. He studied Artificial Intelligence (AI) and Software Engineering at Edinburgh University and went on to get his Masters in Advanced Computer Science at Cambridge. He studied under Frank Stajano and Jon Crowcroft in Cambridge’s computer security group. In between, he worked for five years at GE Energy and did a six-month engagement with ABB in their corporate research department.

About Janet and Network42 
Janet is a part of Jisc Collections and Janet Limited, a Jisc company. Janet manages the operation and development of the Janet network, on behalf of Jisc. Jisc is the UK’s expert on digital technology for education and research. Its work is guided by its funders, owners (AoC, GuildHE and UUK) and trustees. Janet is government funded, with the primary aim of providing and developing a network infrastructure that meets the needs of the research and education communities.

Network42 is a premier network event, organized by Janet, which brings together a mixture of technical people, high-end suppliers, management of universities and the management of Janet. Network42 is an opportunity to find similar people and share resources – something which is unique to the Janet community.

About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established pedigree in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment through to semiconductor reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA and Asia Pac regions. Visit www.ioactive.com for more information.  Follow IOActive on Twitter: http://twitter.com/ioactive.

-###-

PRESS RELEASE: SPEAKER ALERT | March 8, 2014

Shane Macaulay, Director of Cloud Services for IOActive, to present at CanSecWest 2014

PRESENTATION:
Less is More, Exploring Code/Process-less Techniques and Other Weird Machine Methods to Hide Code (and How to Detect Them)
PRESENTERS:
Shane Macauley
CONFERENCE:
CanSecWest
LOCATION:
Vancouver, Canada
DATE & TIME:
March 13, 2014 at 14:00 PM

 

In this presentation, Shane Macaulay will discuss the impact of Windows 8 kernel changes that enable a precise accounting of kernel virtual address space executable regions, including areas for BIOS, HAL, and ACPI. With Windows 8 in virtual mode, Shane will show a correlation with physical page table security (physical PTE tables) and logical mappings (VAD tree) to effectively demonstrate a memory based ‘rootkit revealer’.

Shane will show the audience detection techniques for codeless hiding places, such as page tables, thread jumping, and general Return-Orientated Programming (RoP) attack code patterns.

“This talk will show how the advancements made by Microsoft in Windows 8 enable us to demonstrate a generic rootkit detection technique. We have implemented this in our new BlockWatch cloud forensic service offering at IOActive,” said Macaulay.

About Shane Macaulay
Shane Macaulay is the Director of Cloud Services for IOActive and is experienced in enterprise-level network and application assessment and consultation.

Macaulay takes a deep, broad approach to security and has worked with every major UNIX distribution, Microsoft platform, and networking operating system. He has contributed to the security community by way of various papers, books, and technical applications, and he has discovered numerous compiler bugs (both native and managed), one of which was used to win the non-obvious source code backdoor contest at DefCon 2010.

Macaulay is an alumni member of the international security group The Honeynet Project and has worked with IBM, Bloomberg, @Stake/Symantec, financial exchanges/firms, and many high-tech industry giants.

About CanSecWest
CanSecWest, the world’s most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and features a single track of thought provoking presentations, each prepared by an experienced professional and talented educator who is at the cutting edge of his or her field. We give preference to new and innovative material, highlighting important, emergent technologies, techniques, or best industry practices.

About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established pedigree in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment through to semiconductor reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA and Asia Pac regions. Visit www.ioactive.com for more information. Follow IOActive on Twitter: http://twitter.com/ioactive.

-###-

PRESS RELEASE: SPEAKER ALERT | March 7, 2014

Cesar Cerrudo, CTO de IOActive Labs, PARA presentar en SEGURINFO Argentina 2014

EXPOSITOR: Cesar Cerrudo, CTO de IOActive Labs
PRESENTACION: Hackeando como en las películas
CONFERENCIA: SEGURINFO Argentina 2014
LUGAR: Sheraton Buenos Aires Hotel & Convention Centre, Buenos Aires, Argentina
FECHA & HORA: Martes 11 de Marzo, 2014 a las 14:30pm
INFO: http://segurinfo.org/detalle.php?a=segurinfo-argentina-2014&t=57&d=263

 

Hackeando como en las películas, mostrara como la realidad está superando a la ficción de las películas en donde casi siempre el hacking se muestra como algo increíble, irrealizable, fantástico, etc. Sé mostrara distintos tipos de ataques de gran impacto, de qué manera es posible realizar estos ataques a gran escala que aunque siendo algunos difíciles y complicados son técnicamente posibles como por ejemplo a hacer explotar cosas, matar y lastimar personas, causar pánico en grandes ciudades, etc.

EXPOSITOR: Cesar Cerrudo,CTO de IOActive Labs
Inés Tornabene, Jefa de la Oficina de Registro, Centro de Protección de Datos Personales
Pedro Hecht, Profesor Titular de Criptografía, Universidad de Buenos Aires (UBA)
PANEL DE DISCUSION: Cyber Security, Cyber Espionage and Cyber Risks
CONFERENCIA: SEGURINFO Argentina 2014
LUGAR: Sheraton Buenos Aires Hotel & Convention Centre, Buenos Aires, Argentina
FECHA & HORA: Tuesday March 11, 2014 at 10:00am
INFO: http://segurinfo.org/detalle.php?a=segurinfo-argentina-2014&t=57&d=263

 

El ciberespacio es un entorno complejo, resultante de la interacción entre personas, software y servicios en Internet, apoyado fundamentalmente en la información -que se encuentra distribuida en todo el mundo- y en la tecnología de los dispositivos de comunicaciones, junto a las redes interconectadas entre sí. En este marco, tanto empresas privadas como gobiernos hacen uso de estas tecnologías para innovar y prestar servicios que utilicen infraestructuras conectadas con Internet. Sin embargo, hay problemas de seguridad que no están cubiertos aún por el estado actual de la información, Internet y las buenas prácticas de las Tecnologías de la Información y las Comunicaciones, produciéndose una brecha entre estos dominios. Esto se debe a que los dispositivos y las redes interconectadas entre sí que apoyan el ciberespacio tienen múltiples propietarios, diferentes intereses de acuerdo a su negocio u objetivos planteados, preocupaciones operativas y reglamentarias, etc.

Los diferentes enfoques puestos de manifiesto por cada organización y proveedor dan lugar a un particular estado de fragmentación de la seguridad para todo el ciberespacio. Además, los riesgos se agravan por la creciente tendencia de delincuentes cibernéticos que esperan tener ganancias lucrativas o bien el reconocimiento de una comunidad con valores alterados, donde los hackers son héroes.

La seguridad en el ciberespacio requiere una solución que no sólo contemple el empleo de nuevas tecnologías y algoritmos robustos de cifrado, sino que debe tener un enfoque integral de dicha problemática, abarcada por políticas, regulaciones, procedimientos y controles continuos.

Acerca de Cesar Cerrudo
CTO en IOActive Labs, donde lidera el equipo encargado de producir investigación sobre las últimas tecnologías en las aéreas de SCADA, dispositivos móviles, seguridad en aplicaciones y demás. Anteriormente fundador y CEO de Argeniss Consulting -empresa adquirida por IOActive- Cesar es un investigador en seguridad reconocido mundialmente especializado en seguridad en aplicaciones. A través de su carrera, Cesar ha descubierto y ayudado a eliminar decenas de vulnerabilidades en aplicaciones muy conocidas como ser Microsoft SQL Server, Oracle Database Server, IBM DB2, Microsoft Biztalk Server, Microsoft Windows y Yahoo! Messenger.

Cesar también ha publicado varios trabajos de investigación en seguridad en aplicaciones y base de datos, en ataques y técnicas de explotación de vulnerabilidades, él ha sido invitado a presentar el resultado de sus investigaciones en varias compañías y conferencias alrededor del mundo incluyendo Microsoft, Black Hat, Bellua, CanSecWest, EuSecWest, WebSec, HITB, Microsoft BlueHat, Ekoparty, FRHACK, H2HC, Defcon, Infiltrate and Hackito Ergo Sum.

Cesar colabora regularmente con comentarios y aportes técnicos en medios impresos y online.

Acerca de SEGURINFO
La Seguridad de la Información es una de las preocupaciones más relevantes en el actual mundo empresarial y es uno de los aspectos más conflictivos del uso de las tecnologías de la información. Su influencia afecta directamente a las actividades de cualquier entorno.

SEGURINFO es  el ámbito donde los CEOs, CIOs, CISOs, CTOs de las empresas, directores y usuarios de tecnología en general puedan interiorizarse con los problemas relacionados a seguridad de la información, compartir experiencias y encontrar las soluciones adecuadas a través de los especialistas que día a día trabajan en esta temática.

El Programa de actividades abarca desde el ámbito tecnológico, pasa por las actividades de diseño y llega a las personas alineándose con los nuevos desafíos de la seguridad de la información, la cual siempre está en permanente cambio y debe gestionarse en forma efectiva y continua.

La práctica de compartir experiencias y actualizar la visión de problemas y soluciones, a través de los expertos, es la constante en las actividades que organiza USUARIA desde 1982.

Acerca de IOActive
IOActive es una firma de servicios especializados en seguridad de la información con un largo y establecido track record entregando excelentes servicios de seguridad a sus clientes. Nuestros equipos de investigación y consultoría de fama mundial ofrecen un porfolio de servicios de seguridad especializados que van desde tests de penetración y auditoria de código de aplicaciones hasta ingeniería inversa de semiconductores. Empresas globales a lo largo de cada industria continúan confiando en IOACtive sus más sensibles y críticos aspectos de seguridad. Fundada en 1998, IOActive tiene su casa central en Seattle, Estados Unidos, con operaciones globales a través de las regiones de América, EMEA y Asia Pac. Visite www.ioactive.com para mas información. Siga a IOActive en Twitter: http://twitter.com/ioactive.

-###-

Posts pagination

Previous page Page 1 … Page 7 Page 8 Page 9 … Page 12 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy