Five Black Hat 2022 Takeaways (and One Bonus!)

 The range and depth of conversations with the most important people in the industry shed illumination on today's most pressing issues.

I selected the five most significant ones:

1. The market is constantly trying to find a way to validate

It seems like the understanding of the advantages of automating attack simulations that validate the security control's effectiveness is growing.

The importance of traditional BAS (Breach and Security Simulation) solutions for fine-tuning security control settings and maximize effectiveness is much better understood in the present. This has led to deeper inquiries about the possibility of running scenarios from end-to-end which simulate an attacker attempting various strategies to get around barriers.

However, even though the importance of traditional BAS is more widely accepted in the present than it was before, as this category has seen a surge in acceptance in the past year and organizations are aware that the scope to be considered that isn't restricted to security control effectiveness validation. A comprehensive security validation procedure must also incorporate other aspects such as attack surfaces and IT policies, awareness of employees and patch program validation and more.

2. The rule of simplicity!

The biggest concern for prospective validation adopters is the complexity. Even the in the keynote address Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency, also known as CISA He emphasized the risk-adjustment that comes from the increasing complexity in the technology stack during his keynote address.

The benefit of BAS technology when incorporated into the security stack already in place is that it can be used very quickly and efficiently identifies the areas where redundant capabilities bloat the flow of data with no advantages, and pinpoints the areas which configuration tweaks would provide the greatest efficiency return, that helps to prioritize remediation effort.

Reduced complexity is also made possible by the accessibility to relevant information and the capability to display it in different formats with one click.

Cymulate's BAS 3-click installation procedure, in conjunction with dynamic dashboards, reports that can be customized and ticketing integrated attracted a lot of attention .

3. Keep the board updated

Security concerns are not the only issues. Effective, thorough and timely communication is an increasing concern for executives as they have become aware of the importance of cyber security and its impact affects their financial results.

Access to quantifiable data as well as security score based on actual proportion of attacks identified and/or prevented by the defense stack is much easier to comprehend than baselines determined by estimates of compliance to the best methods.

Similar to HTML0, the ability to constantly assess and revise will result in a gradual increase in the security ratio. This helps in communicating the importance of cybersecurity investments as well as identifying security shifts at their initial stage instead of much further.

Cymulate's powerful analytics system that has custom dashboards, with dynamic defaults and reports cover the entire variety of Security posture areas. provides a complete view of the investment made and their rate of success and monitors the progress of those investments in the course of.

4. Finding the Blue Team Red Team divider

BAS users have received a surprising response, apart from the anticipated advantages in the hardening of their security postures, was about how it helped to improve the relationships between their internal Red and blue teams. How? When blue teams make use of the automated verification and evaluation tools and assessment capabilities, they are able to automatically validate the effectiveness of their remediation strategies instead of being snared in the pants of a smirking red team. On the other hand of the line the red team has more time to concentrate on more difficult work and are content to give instructions to blue team players.

In addition to purple-based teaming collaboration between the blue and red teams is strengthened as they develop advanced scenarios to enhance the level of analysis for delicate areas.

5. Prioritization

For the course of their "Calculating Risk in the Era of Obscurity: Reading Between the Lines of Security Advisories" presentation, Brian Gorenc, Senior Director, Trend Micro Zero Day Initiative as well as Dustin Childs, Sr. Communications Manager, Trend Micro Zero Day Initiative critiqued the false impression of security that may be derived from patching the high CVSS-scored vulnerabilities in high priority.

Childs is particularly concerned about the risk of relying to CVSS-based prioritization because it can - and could result in spending limited resources on bugs that have the lowest chance of being exploited. He also cautions against settling on the front-page trends in title.

"An unauthenticated remote code execution (RCE) bug in an email server like Microsoft Exchange is going to generate a lot of interest from exploiting writers," he added. "An unauthenticated RCE bug in an email server like Squirrel Mail is probably not going to generate as much attention."

Although it's a good practice is to rely on regularly updated and up-to-date software updates could also give an illusion of security. Childs is critical of the lack of thoroughness in many updates which either do not mention the exact CVE fix and make a general statement that the update has fixed a number of security vulnerabilities or only mention 10 fixed CVEs, but fail to mention the remaining 100 that remain being patched, for example.

As per Childs and Golenc that the solution to the many patching problems boils down prioritization in context.

Attack-Based Vulnerability Management (ABVM) prioritizes management of vulnerability in accordance with security flaws as well as actual vulnerability evaluated by vulnerability to attacks.

It considers not only CVSS scores, but also the effectiveness of compensating security safeguards and the possibility of an attacker who takes benefit of the vulnerability and the possibility that it will be used to spread throughout the system.

---

Bonus

These were the main lessons we took away of Black Hat, but, in addition, we observed huge attention in MSSPs (Managed Security Service Providers) in their search for ways to improve the value they offer their customers by showing that they constantly examine their performance with their monitored security services. The ability to quickly access and share data to show that they have reduced risk progress they made, and record the improvement in responses and detection, as well as to meet the SLAs they have dedicated to. MSSPs that used Cymulate gained new revenue streams and set an advantage over other MSSPs and all without a lot of effort.

We are returning following Black Hat, and we have gathered valuable feedback about our products We are working to refine our current features and be sure to incorporate the many ideas we gained into our stealth new product that's currently in the process of development.

DIGITAL DEVICES LTD

Long before Apple set an average consumers mindset to replacing their handheld gadgets in two years, Digital Devices Ltd believed in Moore's law that computing will double every two years. With our heritage from the days of IBM Personal Computer XT, our founders have gone through the technology advancements of the 1990s and 2000s realizing that technology is an instrumental part of any business's success. With such a fast pace industry, an IT department can never be equipped with the tools and training needed to maintain their competitive edge. Hence, Digital Devices has put together a team of engineers and vendor partners to keep up with the latest industry trends and recommend clients on various solutions and options available to them. From forming close relationships with networking and storage vendors like Juniper, SolarWinds and VMWare to high-performance computing by HPE or AWS Cloud solutions, Digital Devices Limited offers the latest technology solutions to fit the ever-growing needs of the industry.

 Our experts can guide you through the specifications and build cost efficiencies while providing high end, state-of-the-art customer services. We research and analyses market and its current demand and supply chain by offering wide range of bulk supplies of products like AKG C414 XLII, Shireen Cables DC-1021, Shireen Cables DC-2021, Dell p2419h monitor, Dell U2419H, Dell P2719H, Dell P2219H, Lenovo 62A9GAT1UK, LG 65UH5F-H and Complete IT Infrastructure products and services.

Comments

Popular posts from this blog

Support Your Developing business with adaptable application stages