Explore the intricacies of Black Hat's infrastructure in this 44-minute conference talk presented by Conan Dooley at the 44CON Information Security Conference. Dive into the challenges of maintaining a reliable wired training network for nearly two thousand attendees and discover the techniques used to keep the wireless network operational for continuous social media activity. Learn about the creation process, potential attackers, and defense strategies employed. Gain insights into network segmentation, quality of service implementation, threat modeling, and wireless security measures. Examine the design goals, including simplicity and minimal services, and understand how security is integrated into operations. Uncover valuable lessons on prioritizing security and effectively marketing oneself in the information security field.
Lessons Learned from Black Hat’s Infrastructure - The Tweets Must Flow