SECKC REBORN AT KNUCKLEHEADS GARAGE!
Featuring Joe “Kingpin” Grand and Chris Sistrunk of Mandiant!
THANK YOU TO OUR JUNE SPONSORS!!
GOLD SPONSOR: Check Point
SILVER SPONSOR: Commvault
SILVER SPONSOR: Cloudaware
SILVER SPONSOR: Juniper Networks
WHERE: Knuckleheads Garage - 701 North Montgall Avenue, Kansas City, MO 64120 United States
Get ready to kick things off in true hacker style at a new location: Knuckleheads Garage
We’re thrilled to welcome two amazing speakers. Chris Sistrunk and Joe Grand!
Chris Sistrunk, the Technical Leader at Mandiant, Google Cloud Security! For over a decade, he's been protecting critical infrastructure worldwide, leading assessments, hunting threats, and responding to cyberattacks. He founded BSidesJackson, co-founded the BEER-ISAC, and helped organize the ICS Village at DEF CON 22.
Joe Grand, also known as Kingpin! Joe is a computer engineer, hardware hacker, occasional YouTuber, creator of the first electronic badges for DEFCON, member of L0pht Heavy Industries, and former technological juvenile delinquent.
Please read the venue info below & find the schedule at the bottom! We’ll also have BSidesKC electronic badge pickup (contact admin@badgepirates.com with questions) and lockpicking from TOOOL!
IMPORTANT KNUCKLEHEADS GARAGE VENUE INFO:
Bring CASH!! Knuckleheads is CASH ONLY bar!!! Cash & card accepted for food.
There is an ATM available in the venue, if you need one.
Bring your ID! Those under 21 are permitted in the venue, though we’ll need to mark hands.
TRAINS!!! AND DON’T PARK AT REIGER UNLESS U WANNA GET STUCK
Stuck by a train? Don’t fret! There are various ways to get around WITHOUT climbing between the cars, which we do not advise/encourage/sanction.
A fail proof way to avoid any railroad crossings:
Coming from the North: take NE Chouteau Trafficway & Gardner Avenue
Coming from the South: get off highway 70 at Prospect, take the Chestnut St Bridge/Trafficway, turn left on Nicholson Ave.
5:00 - 6:00 Make excuses / pre-drinking
6:00 - 6:10 SecKC 101 / announcements / Welcome to SecKC - @zuul
6:15 - 6:25 Open source news briefing - @hevnsnt
6:45 - 7:30 Under Fire - Lessons Learned in OT Incident Responses - @Chris Sistrunk
Operational technology (OT) systems, the backbone of critical infrastructure like the electric sector, are facing an increasing number of cyber and physical security incidents. These incidents range from targeted OT attacks, IT attacks like ransomware, to physical attacks, all of which can severely disrupt operations and cause significant financial losses. It's essential for organizations to be prepared and have robust incident response plans in place.
This presentation will explore practical approaches to OT incident response that leverage the people, processes, tools, and relationships organizations most likely already have. We will delve into the "Theory of 99," which highlights the prevalence of threat activity in Windows and Linux systems, emphasizing the importance of recognizing the overlap between IT and OT threat tactics. We will highlight the importance of having OT specific incident response playbooks. Additionally, we will examine how organizations can integrate cyber and physical security into their existing disaster recovery and business continuity plans, utilizing frameworks like ICS4ICS, which is specifically designed for those familiar with FEMA/NIMS Incident Command System.
Drawing from real-world OT incident response experiences, the presentation will share valuable lessons learned and provide attendees with actionable strategies to enhance their OT incident response capabilities related to cyber attacks and physical security attacks. By understanding the evolving threat landscape and adapting existing frameworks, organizations can better prepare for and respond to OT incidents, ensuring the resilience of their critical infrastructure.
7:45 - 8:30 Shot Through the Heart: An Introduction to Fault Injection - @Joe Grand AKA Kingpin
Fault injection, also known as "glitching," is a process to intentionally cause a system to misbehave in a way that is beneficial to an attacker. The technique is commonly used against microcontrollers to defeat code protection features or affect cryptographic operations. Once employed only by the hardcore, it is now accessible for any hardware hacker to add to their arsenal. In this presentation, Joe will provide an overview, demonstration, and personal stories of injecting faults into embedded systems in order to reveal their secrets.
8:30 - ??? Mad Beatz by the amazing @j0nny54l1v3