The 9th Annual Black Hat USA Network Operations Center (NOC) Report

Black Hat USA NOC Report: A behind-the-scenes look at the network operations center's challenges and solutions for maintaining a secure and stable network for attendees, including security threats, network congestion, and troubleshooting.

Key takeaways
  • The NOC team faces numerous challenges in maintaining the Black Hat network, including security threats, network congestion, and troubleshooting issues.
  • In some cases, rogue APs can be identified and mitigated, but the NOC team has seen instances where attendees have compromised devices.
  • NetWitness and Threat Grid are used to monitor network traffic and identify potential threats, with the goal of providing warnings and alerts to attendees.
  • The team has implemented measures to prevent data breaches, such as blocking multicast DNS and monitoring for unauthorized file sharing.
  • The NOC team has also implemented a process for handling security incidents, including reporting to affected organizations and providing support to attendees.
  • The team has partnered with various vendors to enhance network security, including Cisco, Palo Alto, Arista, and Lumen.
  • The NOC team faces unique challenges in balancing network stability and security, but has implemented measures to address these issues.
  • The team has also implemented measures to prevent misuse of the network, including monitoring for illegal activities and providing support to attendees.
  • The NOC team has identified various types of attacks and threats, including DNS attacks, file sharing, and social media apps.
  • The team has also implemented measures to identify and mitigate Grayware attacks, which can cause significant network congestion.
  • The NOC team has seen instances where attendees have attempted to use compromised devices to gain access to the network, and has implemented measures to prevent this.
  • The team has also identified various types of malware, including ransomware and Trojans, and has implemented measures to prevent the spread of these malicious files.
  • The NOC team has seen instances where attendees have used the network to launch attacks on other organizations, and has implemented measures to prevent this.
  • The team has also implemented measures to provide support to attendees, including offering training classes and troubleshooting assistance.
  • The NOC team has identified various types of security incidents, including data breaches and unauthorized access, and has implemented measures to handle these incidents.
  • The team has also implemented measures to prevent the spread of malware, including monitoring for suspicious activity and providing support to attendees.
  • The NOC team has seen instances where attendees have used compromised devices to launch attacks on other organizations, and has implemented measures to prevent this.
  • The team has also identified various types of threats, including Grayware and malware, and has implemented measures to prevent the spread of these threats.
  • The NOC team has seen instances where attendees have attempted to use compromised devices to gain access to the network, and has implemented measures to prevent this.