Presentation: Protect Our Pentest Tools! Perks and Hurdles in Distributing Red Team Tools
Description:
A discussion about how offensive cybersecurity tools are used by both cybersecurity researchers and bad actors alike. Panelists will cover:
- What ethics and regulation (both from U.S. and abroad) challenges do companies producing offensive tools face?
- How often are licensed or open source offensive tools found in the wild?
- What, if anything, can or should be done to stop bad actors from using open source malware?
- And more nuances to the development of pentest tools!
Facilitators:
Liz Wharton VP Operations, SCYTHE
Omar Santos Principal Engineer, Cisco PSIRT
Katie Moussouris CEO, Luta Seucrity
Casey Ellis Founder/CTO, Bugcrowd
Start: August 13, 12:00
End: August 13, 13:45
Location: DEF CON Policy Roundtable
Description:
A discussion about how offensive cybersecurity tools are used by both cybersecurity researchers and bad actors alike. Panelists will cover:
- What ethics and regulation (both from U.S. and abroad) challenges do companies producing offensive tools face?
- How often are licensed or open source offensive tools found in the wild?
- What, if anything, can or should be done to stop bad actors from using open source malware?
- And more nuances to the development of pentest tools!
Facilitators:
Liz Wharton VP Operations, SCYTHE
Omar Santos Principal Engineer, Cisco PSIRT
Katie Moussouris CEO, Luta Seucrity
Casey Ellis Founder/CTO, Bugcrowd
Start: August 13, 12:00
End: August 13, 13:45
Location: DEF CON Policy Roundtable
