defense | t2 infosec conference https://t2.fi Thu, 08 Mar 2018 18:23:14 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://t2.fi/wp-content/uploads/2020/07/cropped-t2_web-icon-32x32.png defense | t2 infosec conference https://t2.fi 32 32 Dave Aitel keynote 2017 https://t2.fi/2018/03/08/dave-aitel-keynote-2017/ Thu, 08 Mar 2018 18:23:14 +0000 https://t2.fi/?p=1361 Good news everyone! As both SyScan360 and INFILTRATE are just around the corner, it’s about time we release the long-awaited t2’17 keynote by Dave Aitel.  Whether you’re into policy, tactics, offense, defense, or meta in general, the keynote covers a whole gamut of cyber. For the younger generation, understanding the references and why they are relevant …

The post Dave Aitel keynote 2017 first appeared on t2 infosec conference.]]>
Good news everyone!

As both SyScan360 and INFILTRATE are just around the corner, it’s about time we release the long-awaited t2’17 keynote by Dave Aitel.  Whether you’re into policy, tactics, offense, defense, or meta in general, the keynote covers a whole gamut of cyber. For the younger generation, understanding the references and why they are relevant is a good starting point in a path of never-ending learning. Instead of dropping spoilers, here’s the actual presentation itself:

Friends of inconvenient truths, hard questions, analysis of cyber meta (or if you want to see Dave Aitel press volume control button during a presentation), this is the video to watch!

The keynote should be deemed mandatory for anybody working with cyber policy or lawyers.

The post Dave Aitel keynote 2017 first appeared on t2 infosec conference.]]>
Forging the USB Armory https://t2.fi/2017/05/05/forging-the-usb-armory/ Thu, 04 May 2017 22:29:32 +0000 https://t2.fi/?p=1177 We’re continuing with the theme of securing international travel by releasing Andrea Barisani‘s Forging the USB Armory talk from t2’15. Those enjoying international travel and/or operational situations, the dual-use capabilities of the platform might be something of interest. From safe USB charger, encrypted file storage and automated self-destruct, password manager, TOR access point to portable offensive …

The post Forging the USB Armory first appeared on t2 infosec conference.]]>
We’re continuing with the theme of securing international travel by releasing Andrea Barisani‘s Forging the USB Armory talk from t2’15.

Those enjoying international travel and/or operational situations, the dual-use capabilities of the platform might be something of interest. From safe USB charger, encrypted file storage and automated self-destruct, password manager, TOR access point to portable offensive toolkit, the opportunities are endless. Even if open source hardware design is outside your comfort zone, the video gives you a good glimpse into solving hard problems and the capabilities of USB Armory.

Again, as with all our curated releases, this is a must see – enjoy!

The code is available on GitHub, slides here and INTERLOCK code here.

The post Forging the USB Armory first appeared on t2 infosec conference.]]>
Building a Reasonably Safe Travel Burner Laptop https://t2.fi/2017/04/20/building-a-reasonably-safe-travel-burner-laptop/ Thu, 20 Apr 2017 20:00:59 +0000 https://t2.fi/?p=1160 International travel can be difficult, and for a security conscious person especially so. In this video from t2’15 Georg Wicherski demonstrates a way of solving many problems related to carrying a personal computing device with you. For a person crossing borders on a regular basis or otherwise in need of heightened security for their laptop, …

The post Building a Reasonably Safe Travel Burner Laptop first appeared on t2 infosec conference.]]>
International travel can be difficult, and for a security conscious person especially so.

In this video from t2’15 Georg Wicherski demonstrates a way of solving many problems related to carrying a personal computing device with you. For a person crossing borders on a regular basis or otherwise in need of heightened security for their laptop, this is a must see. Enjoy!

Do note that this has been actually implemented in practice instead of being just intellectual mastu^H^H^H a mental exercise. For more details about the setup, refer to the GitHub repository. The setup has been since updated to support TPM remote attestation.

The post Building a Reasonably Safe Travel Burner Laptop first appeared on t2 infosec conference.]]>
If Attackers Can Use Graphs, Then Why Can’t We? https://t2.fi/2017/04/11/if-attackers-can-use-graphs/ Mon, 10 Apr 2017 21:20:55 +0000 https://t2.fi/?p=1140 Those in the business of securing enterprises and organizations should definitely watch OlleB‘s presentation from t2’15. Moving from point-in-time <insert-product-name-here> scans to a more structured approach using graphs, attack models, understanding and eradicating vulnerability classes or using safety/assurance cases is a long-term security investment. Taking your defensive game to the next level requires trying out …

The post If Attackers Can Use Graphs, Then Why Can’t We? first appeared on t2 infosec conference.]]>
Those in the business of securing enterprises and organizations should definitely watch OlleB‘s presentation from t2’15. Moving from point-in-time <insert-product-name-here> scans to a more structured approach using graphs, attack models, understanding and eradicating vulnerability classes or using safety/assurance cases is a long-term security investment.

Taking your defensive game to the next level requires trying out new approaches to old problems and sometimes challenging the conventional wisdom. This video should give you food for thought – it’s one of our favorites!

The post If Attackers Can Use Graphs, Then Why Can’t We? first appeared on t2 infosec conference.]]>
Nano-Scale Red Teaming https://t2.fi/2017/03/20/nano-scale-red-teaming/ Mon, 20 Mar 2017 19:40:23 +0000 https://t2.fi/?p=1022 If you want to learn how to apply defensive measures to protect offensive operations and your capabilities, Jacob Torrey’s “Nano-Scale Red Teaming: Making REs Cry With Device-Specific Opaque Execution” from t2’16 is the presentation to watch. The wealth of knowledge presented on how to create trusted implants via physically uncloneable functions and encrypted execution is …

The post Nano-Scale Red Teaming first appeared on t2 infosec conference.]]>
If you want to learn how to apply defensive measures to protect offensive operations and your capabilities, Jacob Torrey’s “Nano-Scale Red Teaming: Making REs Cry With Device-Specific Opaque Execution” from t2’16 is the presentation to watch.

The wealth of knowledge presented on how to create trusted implants via physically uncloneable functions and encrypted execution is not limited to just theory as Jacob and Assured Information Security, Inc have released PUFlib on GitHub.

Live long and persist!

The post Nano-Scale Red Teaming first appeared on t2 infosec conference.]]>
Haroon Meer keynote 2016 https://t2.fi/2017/02/05/haroon-meer-keynote-2016/ Sun, 05 Feb 2017 10:33:53 +0000 http://t2.fi/?p=1010 The first video we are releasing is the ’16 keynote “Learning the wrong lessons from Offense” by none other than Haroon Meer himself. With strong focus on getting defense right, this is the keynote to watch, regardless of whether you’re into compromises or preventing them. Enjoy!

The post Haroon Meer keynote 2016 first appeared on t2 infosec conference.]]>
The first video we are releasing is the ’16 keynote “Learning the wrong lessons from Offense” by none other than Haroon Meer himself. With strong focus on getting defense right, this is the keynote to watch, regardless of whether you’re into compromises or preventing them.

Enjoy!

The post Haroon Meer keynote 2016 first appeared on t2 infosec conference.]]>