BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:a40a4737-1f45-4097-b935-da0305a02b93
DTSTAMP:20260514T150559Z
SUMMARY:Attack Surface Framework - Prajwal Panchmahalkar &amp\; Mike Henkel
 man
DESCRIPTION:Attack Surface Framework\n\nFriday August 11\, 14:00 – 15:55\
 , Council Boardroom\, Forum\n\nPrajwal Panchmahalkar & Mike Henkelman\n\nA
 ttack Surface Framework(ASF) aims to protect organizations acting as an at
 tack surface watchdog. The Attack Surface Framework (ASF) was developed wi
 th motivation to automate and address vulnerabilities through continuous s
 canning and tracking risks at scale\, in a comprehensive and adaptable app
 roach\, particularly against 0-day vulnerabilities with publicly available
  POCs. The Attack Surface Framework (ASF) is a modular\, extensible\, and 
 customizable framework designed to help organizations manage their public 
 attack surface risks. ASF will auto-discover assets such as network subnet
 s\, domains including subdomains\, enumerate their ports and services\, tr
 ack deltas and serve as a continuous and flexible\, attacking and alerting
  framework\, leveraging another layer of support. ASF provides modules for
  attack surface management including asset discovery and management\, asse
 t enumeration\, vulnerability scanning\, and vulnerability testing. ASF is
  equipped with a set of CLI tools and an API\, enabling users to interact 
 with the framework and integrate it with other tools and processes. Additi
 onally\, ASF includes a web-based user interface for visualizing an organi
 zation's attack surface and managing vulnerabilities.\n\nPrajwal Panchmaha
 lkar is a Technical Director\, Red Team at VMware Inc.\, He has contribute
 d to public security research and has been the Development Lead for Matriu
 x since 2009. In the past he was a Research Assistant at Texas Tech Univer
 sity working on Security of Critical Infrastructure and Smart Grid Energy 
 Systems\, with a journal published on Elsevier. A Finalist for America's I
 nformation Security Leadership Award 2012 (AISLA) by (ISC)2. Previously Pr
 ajwal was a speaker at BlackHat Arsenal\, c0c0n\, BSidesLV and GrrCon. Cur
 rently on review board for c0c0n\, India. He was a chapter lead for n|u\, 
 Hyderabad an open security community. Prajwal holds a Masters degree in Co
 mputer Science from the Texas Tech University\, Lubbock.\n\nMike Henkelman
  is a Sr Manager\, Vulnerability Management Global at VMWare Inc. He began
  his career as a MCSE certified systems administrator in the mid 90’s be
 fore joining Cisco Systems and working in the IPABU on the edge developmen
 t team for the 2600 series router and 3500 series switch and authoring whi
 te papers on CEF. Going on to manage several enterprise data centers\, he 
 later began focusing on information security and managed Vulnerability Man
 agement programs for companies that include Pivotal Software before joinin
 g VMWare where his team mitigates risk for one of corporate America’s la
 rgest asset libraries with audit attestations that include FedRAMP IL5 Hig
 h\, CE+. I24\, IRAP\, PCI-DSS among nearly two dozen others.\n\nAudience -
  Defense and Offense\n\n\n​
URL:https://forum.defcon.org/node/246317
DTSTART:20230811T220000Z
DTEND:20230811T235501Z
LOCATION:Council Boardroom\, Forum
END:VEVENT
END:VCALENDAR
