{"id":10524,"date":"2014-05-29T10:30:23","date_gmt":"2014-05-29T08:30:23","guid":{"rendered":"https:\/\/www.corelan.be\/?p=10524"},"modified":"2014-05-29T10:30:23","modified_gmt":"2014-05-29T08:30:23","slug":"hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/","title":{"rendered":"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape"},"content":{"rendered":"<p>Kristin starts her keynote by explaining that she has been in the business about 22 years ago and used to be in public services. \u00a0A long time ago, she married a husband who was in the military and ran a program for spouses to meet\/connect while their husbands were deployed. During one of the meetings, they discovered \"FTP\", which allowed them to write letters and send them to the marines. \u00a0 She was intrigued and started learning how TCP\/IP works, and helped connecting systems. \u00a0At a later stage, she got involved with connecting routers and implementing access lists... \u00a0that was 23 years ago.Later, she joined TrueSecure (which became CyberTrust, later Verizon) and became a pentester\/ethical hacker. Even today, she still uses her iPad to show CISO's if it's still possible to get inside networks and convince them that things may not be as secure as they think it is.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0551.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0551.jpg\" alt=\"DSC 0551\" width=\"580\" height=\"386\" border=\"0\" \/><\/p>\n<p>IBM runs the IT environment for thousands of customers, Kristin explains. \u00a0That also means that they have seen every single type of security incident possible, which allowed her to learn a lot and draw important lessons.<\/p>\n<p>As a CISO, you should learn how ot use small worlds and be humble. \u00a0Speaking to executives is like speaking to babies, which is also why women make great CISO's, Kristin continues.<\/p>\n<h4>Lesson 1: You can't stop the business from innovating.<\/h4>\n<p>To be succesful at security, you need to understand your audience.\u00a0 \u00a0The security world is being shaped by a few dynamics: \u00a0Globalization, Internet enabled mobile devices, the Internet of Things, Analytics and Cloud computing a just a few examples of these dynamics, driven by an increasing desire and need to be mobile.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0554.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0554.jpg\" alt=\"DSC 0554\" width=\"580\" height=\"386\" border=\"0\" \/><\/p>\n<p>Businesses need to be mobile, explore new geographical markets and areas, or open production facilities in countries that have a lower labor cost . \u00a0Businesses need to act in a global fashion and, as a result, use mobile applications and tools to attact customers and to support business growth. \u00a0Unfortunately, these applications are not built by the Security dept, but by the Marketing Officer. \u00a0 Kristin even expects the IT budgets for marketing departments to increase and thus their influence will also increase. \u00a0Guess what, who's writing the apps? \u00a0Right, \"cousin Chuck\" has experience with writing apps for iTunes, let's ask him. \u00a0And will it be written with security in mind? \u00a0The cloud makes it possible to deploy new applications and delivery of new business services. \u00a0 The reality is that businesses need to interact with \"new consumers\", using new technology. You can't stop that.<\/p>\n<p>Kristin states \"for me, the biggest unknown is regulation\". \u00a0All of the aforementioned is subject to radical change if the right to anonymity is instantiated.<\/p>\n<h4>Lesson 2: Like any biological system, we are all infected.<\/h4>\n<p>In a room with 300 people\/executives, at least 30 people have been compromised. In most cases, people don't believe that. \u00a0People forget that \"anything that is connected to the Internet can be hacked\". \u00a0At the same time, we are connecting \"Everything\" to the internet. \u00a0 The internet of things is a reality, and there's a fair possibility that much of it has been compromised already. \u00a0At the same time, only 1 out of 100 security compromises are ever detected. \u00a0The IBM CyberSecurity Intelligence Team estimates that about 3% of all incidents analyzed by IBM Response Services could be considered \"noteworthy\" ( = potentially material of significant impact). \u00a0 An average organization (of 15K employees), she continues, sees about 1.7 million probes per week, both internally and externally. \u00a0Of course, not all of these probes are malicious. \u00a0About 324 of them represent actual attacks, but without proper tools to detect and manage this, it's extremely difficult to detect these attacks. \u00a0Isolating attacks from noise is important and, at the same time, extremely difficult.<\/p>\n<p>About 56% of the attacks come from outsiders, 17% is caused by malicious insiders, Kristin says. \u00a0A majority of the 17% insiders are privileged users (administrators, etc). \u00a0IT people typically don't like to work within the security boundaries and structures. \u00a0The people that do the most harm from the inside, are \"hard-wired\" to do the harm, with high privileges.\u00a0<\/p>\n<h4>Lesson 3: The \"Bad Guys\" rely on our stupidity, ignorance, or just plain dumb mistakes to get in.<\/h4>\n<p>People will click stuff. They will double-click stuff. \u00a0But it's not the only reason why hackers get in. Companies use vulnerable software, fail to install patches, use AV. They fail to report lost\/stolen devices, allow people to connect their devices to insecure networks (WiFI hotspot at Starbucks), use weak passwords or share business passwords for general use, give passwords over the phone etc etc. From an infrastructure point of view, systems are not hardened the way they should be. \u00a0Test systems are connected to the Internet with default configuration &amp; settings; patches are not deployed on a regular\/timing basis; networks are not segmented, no tools are in place to detect incidents, legacy software\/OSes are still being used in a lot of places.\u00a0<\/p>\n<h4>Lesson 4: Getting ahead of the threat requires you to know how to disrupt the attack chain.<\/h4>\n<p>Not every person in an organization is made equally. Different people have different risk profiles, which means you need different protection techniques. \u00a0Kristin explains that segmenting your user base (IT people, \"VIP\" users, general population, etc), and applying different security profiles may be a good approach. She explains that this concept has been implemented at IBM and people were given disposable hardened Linux images to minimize the impact of incidents. \u00a0<\/p>\n<p>Typically, an attack has 5 stages. \u00a0In other words, you can try to implement mechanisms to disrupt an attacker in each of those 5 stages: \u00a0Break-in, Latch-on, Expand, Gather, Exfiltrate.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0555.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0555.jpg\" alt=\"DSC 0555\" width=\"580\" height=\"386\" border=\"0\" \/><\/p>\n<h4>Lesson 5: It also means knowing how to communicate effectively with senior executives.<\/h4>\n<p>Use small words. \u00a0Don't make things complicated. Don't use big ISO standards, but use analogies management understands. \u00a0For example: \"Implementing security is like building a house\". \u00a0Some things are mandatory ( = basic security), some things \"should\" be done and others can be done to be better than the rest. \u00a0If you're serious about security, and want to improve security at your company, you should<\/p>\n<ul>\n<li>Train people<\/li>\n<li>Have a CCERT<\/li>\n<li>Have a collaborate workplace environment<\/li>\n<li>Build security inside, implement in the day-to-day work<\/li>\n<li>Manage IT security hieg<\/li>\n<li>Manage 3rd party compliance<\/li>\n<li>Manage the digital identity lifecycle<\/li>\n<li>Assure data security<\/li>\n<li>etc<\/li>\n<\/ul>\n<p>FInally, use little words, accept that there is no perfection and be humble.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0553.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0553.jpg\" alt=\"DSC 0553\" width=\"580\" height=\"386\" border=\"0\" \/><\/p>\n<p>\u00a0<\/p>\n<p>Slides:\u00a0<a href=\"https:\/\/web.archive.org\/web\/20140625105714\/http:\/\/haxpo.nl\/hitb2014ams-kristin-lovejoy\/\">http:\/\/haxpo.nl\/hitb2014ams-kristin-lovejoy\/<\/a><\/p>\n<h3>\u00a0<\/h3>\n<hr \/>\n<h3>About Kristin Lovejoy<\/h3>\n<p>Kristin Lovejoy is the General Manager of the IBM Security Services Division, charged with development and delivery of managed and professional security services to IBM clients world-wide. Prior to her role in Services, Kris was IBM\u2019s VP of Information Technology Risk and Global CISO, responsible for managing, monitoring and testing IBM\u2019s corporate security and resiliency functions globally, where she also acted as Chairman of IBM\u2019s IT Risk Steering Committee, co-Chair of IBM\u2019s Data Security Steering committee, co-Chair of the IBM\u2019s Social Networking committee, and member of IBM\u2019s Enterprise Risk Steering Committee. Today Kris is a member of a number of external boards and advisory panels, including SC Magazine\u2019s Editorial Board, Forrester\u2019s Security and Risk Council, and Grotech Ventures. Before joining IBM, she was the CTO, CIO and VP of Support and Services at Consul which was acquired by IBM in 2007 as well as VP of Security Assurance Services for TruSecure Corporation.<\/p>\n<p>Kris is a recognized expert in the field on security, risk, compliance and governance, with appearances on CNBC, NPR and WTOP. Within the past five years she has been recognized as 2012 Compass Award Winner by CSO Magazine, one of E-Week\u2019s 2012 \u201cTop Women Women in Information Security That Everyone Should Know\u201d, Top 25 CTO by InfoWorld, as Top 25 Most Influential Security Executives by Security Magazine. Ms. Lovejoy holds U.S. and EU patents for Object Oriented Risk Management Models and Methods.<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Kristin starts her keynote by explaining that she has been in the business about 22 years ago and used to be in public services. \u00a0A long time ago, she married a husband who was in the military and ran a program for spouses to meet\/connect while their husbands were deployed. During one of the meetings, &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[2775,261],"class_list":["post-10524","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-hitb","tag-corelan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Kristin starts her keynote by explaining that she has been in the business about 22 years ago and used to be in public services. \u00a0A long time ago, she married a husband who was in the military and ran a program for spouses to meet\/connect while their husbands were deployed. During one of the meetings, &hellip; Continue reading &quot;HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-29T08:30:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0551.jpg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape\",\"datePublished\":\"2014-05-29T08:30:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/\"},\"wordCount\":1314,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0551.jpg\",\"keywords\":[\"hitb\",\"corelan\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/\",\"name\":\"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0551.jpg\",\"datePublished\":\"2014-05-29T08:30:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0551.jpg\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0551.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HITB2014AMS &#8211; Day 1 &#8211; Keynote 2: Building a Strategic Defense Against the Global Threat Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/","og_locale":"en_US","og_type":"article","og_title":"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Kristin starts her keynote by explaining that she has been in the business about 22 years ago and used to be in public services. \u00a0A long time ago, she married a husband who was in the military and ran a program for spouses to meet\/connect while their husbands were deployed. During one of the meetings, &hellip; Continue reading \"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape\"","og_url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2014-05-29T08:30:23+00:00","og_image":[{"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0551.jpg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape","datePublished":"2014-05-29T08:30:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/"},"wordCount":1314,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0551.jpg","keywords":["hitb","corelan"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/","url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/","name":"HITB2014AMS - Day 1 - Keynote 2: Building a Strategic Defense Against the Global Threat Landscape - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0551.jpg","datePublished":"2014-05-29T08:30:23+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0551.jpg","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0551.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-2-building-a-strategic-defense-against-the-global-threat-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"HITB2014AMS &#8211; Day 1 &#8211; Keynote 2: Building a Strategic Defense Against the Global Threat Landscape"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":1445,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=10524"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10524\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=10524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=10524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=10524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}