Black Hat USA 2024 is packed with timely, relevant information for today’s security professionals. During the conference this August, we’ll share our deep expertise in AI-first end-to-end security and extensive threat intelligence research. Join us as we present our main stage speaker Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer (CISO) of Microsoft Security, as she shares threat intelligence insights and best practices from the Office of the CISO in her conversation with Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft Threat Intelligence Center (MSTIC).
Also at Black Hat, our Microsoft AI Red Team will be onsite holding training sessions, briefings, and panel discussions. And today, we’re releasing a white paper to demonstrate the impact of red teaming in practice when incorporated in the AI development life cycle. The paper details our innovative “Break-Fix” approach to red teaming AI systems and our close collaboration with Microsoft’s Phi-3 team, which allowed us to reduce the harms by 75% in Microsoft’s state-of-the-art small language models.1
As a proud sponsor of the inaugural AI Summit at Black Hat, we’re further investing in the community by sharing our learnings in both AI for Security and Securing AI. We’ll be participating in a panel discussion titled “Balancing Security and Innovation—Risks and Rewards in AI-Driven Cybersecurity,” where we’ll debate the trade-offs between innovation in AI and security risks and share strategies to foster innovation while maintaining robust security postures.
There’s also a sponsored session titled “Moonstone Sleet: A Deep Dive into their TTPs,” presented by Greg Schloemer, Threat Intelligence Analyst at Microsoft, that takes a deep dive into cyber threat actors associated with the Democratic People’s Republic of Korea (DPRK), as well as educational and engaging theater sessions in our Microsoft booth #1240. With a ton of critical security content to catch—all detailed below—we hope you’ll make time to connect with us at Black Hat 2024.
Join us for core Black Hat sessions, submitted for consideration by Microsoft subject matter experts and selected by the Black Hat content committee to be included in its main agenda.
DATE & TIME | SESSION TITLE | INFORMATION | SPEAKER(S) |
Saturday, August 3, to Tuesday, August 6, 2024 | AI Red Teaming in Practice | Hands-on training on how to red team AI systems and strategies to find and fix failures in state-of-the-art AI systems. | Dr. Amanda Minnich, Senior Researcher, Microsoft; Gary Lopez, Researcher, Microsoft; Martin Pouliot, Researcher, Microsoft |
Wednesday, August 7, 2024, 10:20 AM PT-11:00 AM PT | Breaching AWS Accounts Through Shared Resources | Presenting six critical vulnerabilities that we found in AWS, along with the stories and methodologies behind them. | Yakir Kadkoda, Lead Security Researcher, Aqua Security; Michael Katchinskiy, Security Researcher, Microsoft; Ofek Itach, Senior Security Researcher, Aqua Security |
Wednesday, August 7, 2024, 12:40 PM PT-1:50 PM PT | Hacking generative AI with PyRIT | Understand the presence of security and safety risks within generative AI systems with PyRIT. | Raja Sekhar Rao Dheekonda, Senior Software Engineer, Microsoft |
Wednesday, August 7, 2024, 3:20 PM PT | AI Safety and You: Perspectives on Evolving Risks and Impacts | Panel on the nuts and bolts of AI Safety and operationalizing it in practice. | Dr. Amanda Minnich, Senior Researcher, Microsoft; Nathan Hamiel, Senior Director of Research, Kudelski Security; Rumman Chowdhury; Mikel Rodriguez, Research Scientist, Google Deepmind |
Wednesday, August 7, 2024, 1:30 PM PT-2:10 PM PT | Predict, Prioritize, Patch: How Microsoft Harnesses LLMs for Security Response | A crash course into leveraging Large Language Models (LLMs) to reduce the impact of tedious security response workflows. | Bill Demirkapi, Security Engineer, Microsoft Security Response Center |
Wednesday, August 7, 2024, 3:20 PM PT-4:00 PM PT | Compromising Confidential Compute, One Bug at a Time | Review of methodology and the emulation tooling developed for security testing purposes, and how it influenced our understanding and review strategy. | Ben Hania, Senior Security Researcher, Microsoft; Maxime Villard, Security Researcher, Microsoft; Yair Netzer, Principal Security Researcher, Microsoft |
Thursday, August 8, 2024, 10:20 AM PT-11:00 AM PT | OVPNX: 4 Zero-Days Leading to RCE, LPE and KCE (via BYOVD) Affecting Millions of OpenVPN Endpoints Across the Globe | Microsoft identified vulnerabilities in OpenVPN that attackers could chain and remotely exploit to gain control over endpoints. | Vladimir Tokarev, Senior Security Researcher, Microsoft |
Thursday, August 8, 2024, 1:30 PM PT-2:10 PM PT | Secure Boot, Insecure Reality: Peeling Back Layers of False Security | A deep dive into the systemic weaknesses which undermine the security of your boot environment. | Bill Demirkapi, Security Engineer, Microsoft Security Response Center |
At Black Hat 2024, Microsoft Security is here with security leaders and resources that include:
Connect with Microsoft leaders and representatives to learn about our AI-first end-to-end security for all. Additionally, you’ll be able to view multiple demonstrations on a wide range of topics including threat protection, securing AI, multicloud security, Copilot for Security, data security, and advanced identity. You’ll also be able to connect with our Microsoft Intelligent Security Association (MISA) partners during your visit—the top experts from across the cybersecurity industry with the shared goal of improving customer security worldwide. And if you have specific questions to ask, sign up for a one-on-one chat with Microsoft Security leaders.
At the Theater in the Microsoft booth, watch our series of presentations and panels featuring Microsoft Threat Intelligence Center (MSTIC) experts and Microsoft Researchers. Half of the sessions will be presented by the MSTIC Team. The Microsoft booth will also feature sessions from select partners from the Microsoft Intelligent Security Association (MISA). MISA is an ecosystem of leading Security companies that have integrated their solutions with Microsoft Security technology with a goal of protecting our mutual customers from cybersecurity threats. Twelve partners will showcase their solutions at our MISA demo station and five partners will be presenting their solutions in our mini-theater. We would love to see you there. Click here to view our full theater session schedule.
The event will be co-hosted by Ann Johnson, Corporate Vice President and Deputy CISO of Microsoft Security, and Aarti Borkar, Vice President of Microsoft Security, Customer Success and Microsoft Incident Response, and, we are thrilled to have five MISA partners—Avertium, BlueVoyant, NCC Group, Trustwave, and Quorum Cyber—sponsoring our Microsoft Security VIP Mixer. The mixer is a great time to connect and network with fellow industry experts, and grab a copy of Security Mixology, a threat intelligence-themed cocktail and appetizer cookbook—you’ll be able to meet some of the contributors! Drinks and appetizers will be provided. Reserve your spot to join us at this exclusive event.
On Tuesday, August 6, 2024, from 11:10 AM PT to 11:50 AM PT, we’ll be part of a panel discussion titled “Balancing Security and Innovation—Risks and Rewards in AI-Driven Cybersecurity.” Microsoft is honored to be a VisionAIre sponsor for this event. Brandon Dixon, Partner Product Manager, Security AI Strategy will debate the trade-offs between innovation in AI and security risks, share strategies to foster innovation while maintaining robust security, and more. Note: The AI Summit is a separate, one-day event featuring technical experts, industry leaders, and security tsars, designed to give attendees a comprehensive understanding of the potential risks, challenges, and opportunities associated with AI and cybersecurity.
Security researchers are a critical part of the defender community, on the front lines of security response evolution, working to protect customers and the broader ecosystem. On Thursday, August 8, 2024, we’ll host our invite-only Microsoft Researcher Celebration. And on August 6, 2024, Microsoft Security Response Center (MSRC) will announce the annual top 100 Most Valuable Researchers (MVRs) who help protect our customers through surfacing and reporting security vulnerabilities under Coordinated Vulnerability Disclosure (CVD). Follow @msftsecresponse on X and Microsoft Security Response Center on LinkedIn for the MVR reveal.
In the hands of security professionals and teams, AI can deliver the greatest advantage to organizations of every size, across every industry, tipping the scales in favor of defenders. Microsoft is bringing together every part of the company in a collective mission to advance cybersecurity protection to help our customers and the security community. We offer four powerful advantages to drive security innovation: large-scale data and threat intelligence; the most complete end-to-end protection; industry leading, responsible AI; and the best tools to secure and govern the use of AI. Together we can propel innovation and create a safer world. We’re excited to share the latest product news and Microsoft Security innovations during Black Hat 2024 and we hope to see you there.
Don’t miss this opportunity to connect with Microsoft Security experts and fellow industry leaders—and pick up your copy of Security Mixology!
For more threat intelligence guidance and insights from Microsoft security experts, visit Security Insider.
To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity.
Sources:
1Phi-3 Technical Report: A Highly Capable Language Model Locally on Your Phone, Microsoft. April 2024.
2Microsoft Copilot for Security is generally available on April 1, 2024, with new capabilities, Vasu Jakkal. March 13, 2024.
The post Connect with Microsoft Security at Black Hat USA 2024 appeared first on Microsoft Security Blog.
Source: Microsoft Security