We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
The 9th Annual Black Hat USA Network Operations Center (NOC) Report
Black Hat USA NOC Report: A behind-the-scenes look at the network operations center's challenges and solutions for maintaining a secure and stable network for attendees, including security threats, network congestion, and troubleshooting.
- The NOC team faces numerous challenges in maintaining the Black Hat network, including security threats, network congestion, and troubleshooting issues.
- In some cases, rogue APs can be identified and mitigated, but the NOC team has seen instances where attendees have compromised devices.
- NetWitness and Threat Grid are used to monitor network traffic and identify potential threats, with the goal of providing warnings and alerts to attendees.
- The team has implemented measures to prevent data breaches, such as blocking multicast DNS and monitoring for unauthorized file sharing.
- The NOC team has also implemented a process for handling security incidents, including reporting to affected organizations and providing support to attendees.
- The team has partnered with various vendors to enhance network security, including Cisco, Palo Alto, Arista, and Lumen.
- The NOC team faces unique challenges in balancing network stability and security, but has implemented measures to address these issues.
- The team has also implemented measures to prevent misuse of the network, including monitoring for illegal activities and providing support to attendees.
- The NOC team has identified various types of attacks and threats, including DNS attacks, file sharing, and social media apps.
- The team has also implemented measures to identify and mitigate Grayware attacks, which can cause significant network congestion.
- The NOC team has seen instances where attendees have attempted to use compromised devices to gain access to the network, and has implemented measures to prevent this.
- The team has also identified various types of malware, including ransomware and Trojans, and has implemented measures to prevent the spread of these malicious files.
- The NOC team has seen instances where attendees have used the network to launch attacks on other organizations, and has implemented measures to prevent this.
- The team has also implemented measures to provide support to attendees, including offering training classes and troubleshooting assistance.
- The NOC team has identified various types of security incidents, including data breaches and unauthorized access, and has implemented measures to handle these incidents.
- The team has also implemented measures to prevent the spread of malware, including monitoring for suspicious activity and providing support to attendees.
- The NOC team has seen instances where attendees have used compromised devices to launch attacks on other organizations, and has implemented measures to prevent this.
- The team has also identified various types of threats, including Grayware and malware, and has implemented measures to prevent the spread of these threats.
- The NOC team has seen instances where attendees have attempted to use compromised devices to gain access to the network, and has implemented measures to prevent this.