BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesaugusta2023//speaker//Y9B8QW
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesaugusta2023-KLATMX@pretalx.com
DTSTART;TZID=EST:20231007T100000
DTEND;TZID=EST:20231007T110000
DESCRIPTION:Dark allies from the nightmare dimension\, on an unholy crusade
 \, have assembled a variety of hacking demonstrations for your education a
 nd amusement. Secrets and lies across IT\, cloud\, and embedded devices wi
 ll be exposed. Strategies for advancing your asset intelligence aimed at d
 isappointing bad actors will be illuminated. You’ll share this knowledge
  around the water cooler\, apply these security strategies within your org
 anization\, and become that awesome person everyone wants to hang out with
  at office parties\, regardless of that Fantastic Four shirt you keep wear
 ing.\n \nWhat happens when the industrial robot on a factory floor is over
 looked in your asset inventory? We’ll demonstrate what that hack might l
 ook like and hacks against traditional IT and cloud assets. Stories from t
 he trenches—secrets and lies involving cybercriminals\, nation-state act
 ors\, and defenders—will be shared. Strategies for creating and maintain
 ing weaponized asset intelligence that will help keep your organization 
 “left of boom” will be detailed.\n \nWeak asset intelligence makes org
 anizations vulnerable to risks ranging from advanced persistent threats to
  advanced persistent auditors. It only takes one missed\, weak device to c
 ompromise an entire organization. This weakness and low confidence in the 
 data is frequently a function of data management overload\, security tools
  overload\, or slow\, error-prone\, manual efforts. It’s also challengin
 g to correlate data across different departments\, and the relevant intell
 igence exists in product silos. As your attack surface grows—across trad
 itional IT\, cloud\, IoT\, remote employee devices\, and SaaS applications
 —instead of your asset intelligence being a weaponized source for good\,
  it becomes a parade of horribles.\n \nNation-states and cybercriminals wa
 nt this to continue. Cybercriminals have monetized attacks on your assets\
 , and nation-states have built multi-million-dollar tools to target them\,
  maintain persistence\, evade detection\, steal IP\, and conduct sabotage.
  These bad actors count on you being passive and want you to fail. Disappo
 int them! Weaponize your asset intelligence.
DTSTAMP:20260307T213451Z
LOCATION:Track 3
SUMMARY:Hacking Demos\, Dirty Secrets\, Dangerous Lies\, and Asset Intellig
 ence - Brian Contos
URL:https://pretalx.com/bsidesaugusta2023/talk/KLATMX/
END:VEVENT
END:VCALENDAR
