HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

HP Security Research ‘Talkapalooza’ dates released!

By Jewel TImpe, Research Communications Manager

 

HP Security Research (HPSR) giants will hit the road for a four-month global tour that touches down on four continents. Top researchers in malware, vulnerabilities, application security, and HUMINT – along with keynote powerhouse and HP Enterprise Security Products CTO Jacob West – launch the ‘Talkapalooza’ tour at Black Hat USA 2014 in August.

 

Frost & Sullivan recently recognized HP Security Research and HP TippingPoint for setting the industry benchmark among security research organizations for a record fourth year in row. Frost & Sullivan notes that HP “routinely provides best security practices, and vulnerability research is foundational.” Now is your chance to see the team live!

 

The ‘Talkapalooza’ tour will kick off on August 6in Las Vegas, wrapping up on November 20 in Rome. As part of the tour, the researchers will also present in Turkey, Japan, Korea, and Australia. You can find all the tour dates and specific locations below.

 

HPSR will be sharing the knowledge garnered from long hours tending to the threat landscape, with talks on Internet of Things (IoT) security, mobile attacks, web application authorization, sandbox violations, threat modeling and researcher ethics, to name a few.

 

 ‘Talkapalooza’ Tour Dates

Event

Dates

Location

Speaker

Title

Black Hat 2014

Aug 2-7

Las Vegas, NV

Brian Gorenc
Jasiel Spelman

Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

Black Hat 2014

Aug 2-7

Las Vegas, NV

Matt Oh

Reverse Engineering Flash Memory for Fun and Benefit

DefCon 22

Aug 7-10

Las Vegas, NV

Brian Gorenc
Matt Molinyawe

Blowing Up the Celly - Building Your Own SMS/MMS Fuzzer

CodenomiCON

Aug 5

Las Vegas, NV

Dave Weinstein (panel)

IOT Security Panel: Weaponization of Exploits

HitCon

Aug 19-20

Taipei, Taiwan

Matt Oh

Patch Analysis Is Fun

HP Protect 2014

Sep 8-11

Washington, DC

Jacob West

(panel)

New Threats, New Solutions

HP Protect 2014

Sep 8-11

Washington, DC

Jacob West

(panel)

Security Education for the New Generation: A Panel Discussion on Developing the Talent Pipeline

HP Protect 2014

Sep 8-11

Washington, DC

Katerina O'Neil
Alvaro Munoz
Joy Forsythe

Automatic Detection of Inadequate Authorization Checks in Web Applications

HP Protect 2014

Sep 8-11

Washington, DC

Joe Sechman

Prajakta Jagdale

Katerina O'Neil

Unifying the Software Security Vocabulary

HP Protect 2014

Sep 8-11

Washington, DC

Brian Gorenc
Jasiel Spelman

Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

HP Protect 2014

Sep 8-11

Washington, DC

Angela Gunn

Threat Modeling: Kill Chains, Diamond Models, and the 50-Yard Line

HP Protect 2014

Sep 8-11

Washington, DC

Matias Madou

HP Defender: What's Behind the Curtain?

HP Protect 2014

Sep 8-11

Washington, DC

Matias Madou

Introduction to BSIMM: Advancing Your Software Security Initiative

HP Protect 2014

Sep 8-11

Washington, DC

Ted Ross

All About HP Threat Central

HP Protect 2014

Sep 8-11

Washington, DC

Ted Ross

A View from Inside the Cyberunderground

GovernmentWare 2014

Sep 23-26

Singapore

Jacob West

(panel)

CXO track (Topic TBD)

VB 2014

Sep 24-26

Seattle, WA

Heather Goudey

Oleg Petrovsky

The World Turned Upside Down: Researcher Ethics in the New Surveillance Climate

VB 2014

Sep 24-26

Seattle, WA

Matt Oh

Smart Home Appliance Security & Malware

BreakPoint 2014

Oct 8-9

Melbourne, Australia

Brian Gorenc

Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

PacSec 2014

Nov 12-13

Tokyo, Japan

ZDI

Mobile Pwn2Own 2014!

CSA EMEA Congress 2014

Nov 19-20

Rome, Italy

Ted Ross

Computer Security Education

 

Can’t make a talk but want to learn more about the research? Check back here for post-presentation blog posts from our researchers.

 

Tags: conferences| HPSR
Labels: conferences| HPSR
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.