On a sunny Thursday morning on the 5th of June 2014, we arrived at Tobacco Dock in London, via an early flight from the Netherlands.
Initially, it seemed like suit-and-tie event, regardlessly, it was a nice, relaxing atmosphere. Several friendly Men-In-Black types with walkie talkies were also present at the event, this is probably the standard procedure for security conferences, nonetheless I felt reassured that preparations were made to guarantee our physical security.
The attendees were a mixed bunch ranging from hardcore tech geeks to managerial types.
The first presentation started at 10am sharp, these were the presentations
- Awareness-Driven Secure Development – A streamlined secure development lifecycle (SDLC) – presented by Donato Capitella
- iOS Data Security – A look at how iOS apps can secure your data – presented by Andy Waugh
- Software Defined Radios – Attacking wireless communications with low cost SDRs – presented by Jahmel Harris
- Red Team: Live-fire Security Testing – From hacktivism to corporate espionage; advancing security assessments to meet the evolved attacker – presented by Stuart Passé (MWR), Marc Briggs & Peter Connolly (GHT Global)
- Mobile Platform Comparison – A comparison of attacks against the four main mobile platforms and the security features available to mitigate them – presented by Henry Hoggard
- Anomaly vs. Signature Based Attack – Helping defenders keep up with the ever changing attacker methodology – presented by Howard Marshall
The presentations were very interesting. I was familiar with many of the topics that were discussed, but it was good to hear another perspective on them. Most sessions were an overview of a particular aspect of security. We will delve into some of these subjects in-depth later in our security-related blog posts. Software defined radio’s in particular were a topic that was interesting to hear about, given the proliferation of wireless add-ons and internet of things devices. The availability of low-cost hardware that can easily be programmed to intercept and manipulate radio signals (bluetooth, zigbee, Ant+) promises to be a real concern in the future. Bluetooth controlled pacemakers were an example of potentially serious consequences of radio exploits.
More about these topics later…..
Thanks to the MWR staff for a pleasant and well organised conference.
And for those interested in architecture…. the venue: