Las Vegas, Nevada
August 6-11, 2022
As a defender it is often hard to chase down attackers without knowing they have been attacking. In this 15-minute recording, I will go over Indicators of Compromise that we see every day, within our customer’s environments. I will help you instrument yourself to find the IOCs that show the attackers hand and how to stop them. I will illustrate methods for finding your APIs and finding flaws in their design as well.
For over the last 20 years, Jason has been ethically peering into Client Behavior, Wireless Networks, Web Applications, APIs and Cloud Systems, helping organizations secure their assets and intellectual property from unauthorized access. As a consultant he's taken hundreds of organizations through difficult compliance mine fields, ensuring their safety. As a researcher he has found flaws in consumer IOT systems and assisted in hardening them against external attacks. At Cequence Security Jason does research, community outreach and supports efforts in identifying Automated Attacks against Web, Mobile, and API-based Applications to keep Cequence's customers safe.
Unwind and enjoy amazing food, drinks, and the company of like-minded individuals during Black Hat 2022. RSVP for an exclusive private dinner at Delmonico Steakhouse on Wednesday, August 10 at 6:30 PM. Our dinner is full, join us at the show.
Application Programming Interfaces (API) are the glue that make mobile and web applications work. And their use is exploding. Driven by user expectations of smooth and engaging application experiences, APIs have become the currency of exchange in today's digital business reality, and organizations of all sizes are using APIs to increase business velocity and create competitive advantage.
July 14, 2022, 11 am PDT - Join Ameya Talwalkar, founder and CEO of Cequence Security and guest speaker Sandy Carielli, Principal Analyst at Forrester will discuss the 6 stages required to achieve a comprehensive API Protection lifecycle program, and the impact it can have to prevent data breaches, theft, fraud, and business disruption.