Skip to main content

Considering how much we love talking about cybersecurity in events, youโ€™d think weโ€™re all hackers. And our lovely hosts may sometimes wish life was a Mr. Robot episode. But fortunately for our industry, they prefer lending their skills to events. Which is why the Event Tech Podcast brings you all the best news from the world of technology! And todayโ€™s episode is a must, even for those of us who arenโ€™t necessarily into the universe of hacking.

Safety and security are topics weโ€™ve tackled many times. But theyโ€™re also extremely hot, especially in the digital age. Black Hat and DEF CON are two of the biggest hacking conferences in the world. So of course, there was quite a bit to learn where cybersecurity is concerned. Will Curran and Brandt Krueger wanted to make sure you didnโ€™t miss a single detail, whether or not you had the chance to attend. Get your black hoodie and unsuspicious sunglasses of choice, because itโ€™s time for the latest news on cybersecurity in events!

Click here for the full audio transcription.

cybersecurity in eventsCybersecurity In Events: Tell Me More!

For those of you who are wondering, Brandt breaks down the details on these two conferences. โ€œWell, itโ€™s actually hacker summer campโ€, he says. โ€œSo Black Hat and DEF CON happen to be back-to-back security-focused conferences, both taking place in Las Vegas. And theyโ€™ve actually added a third one to the mix called BSides, and the idea is this kind of splintered off I think a couple of years ago and itโ€™s kind of all the stuff that people didnโ€™t feel fit anymore in Black Hat or DEF CON. So youโ€™ve got actually three simultaneous, or roughly simultaneous, conferences all going on at the same time regarding digital security, hackingโ€.

Whatโ€™s With All The Hats?

โ€œThe white hat hackers are usually the ones that are the security researchers, theyโ€™re the ones that are trying to break into things to test things, penetration testing, all of those kinds of thingsโ€, Brandt further explains. โ€œAnd then the black hats are the ones that are actually being malicious actorsโ€. So thereโ€™s that just in case you were ever confused with the hat terminology!

In regards to the conferences, Will finds all the information particularly exciting. โ€œI think itโ€™s kind of amazing, all of the stuff that comes out of it jampacked in such a short period of timeโ€, he says. โ€œFinding out that there are all these exposed issues. And whatโ€™s really interesting, too, is that similar to I think any conference, they also present findings that theyโ€™ve probably been collecting over the last year. About major apps, major thingsโ€.

The Internet Of Things

Donโ€™t worry, weโ€™ve got you covered on the specifics. The Internet of Things โ€œitโ€™s any of these now multiple, multiple, multiple connected devices that weโ€™re putting in our homesโ€, explains Brandt. โ€œWeโ€™re just finding more connected devices, thatโ€™s where this whole Internet of Things comes from, that all of these devices are in some way or another connected to the internet. In addition to our phones and our computers and our laptops, weโ€™re having all of these other devices connectโ€.

The Danger Looming Over The IoT

โ€œWeโ€™re seeing a lot of these other devices being very much so hackable. So theyโ€™re not putting a whole lot of thought into these light bulbs and temperature sensors and thermostats and all of the security cameras that people are getting that are being pushed out now. Not only by major manufacturers. But as minor manufacturers try and get in the game to push these products out at a significantly reduced price, theyโ€™re not paying a whole lot of attention to securityโ€, adds Brandt.

โ€œSo, thereโ€™s a lot of interesting and easy hacks on a lot of these Internet of Things devices that a lot of thought hasnโ€™t been put into how do we keep these things secureโ€, he continues. โ€œSo thatโ€™s kind of the 10,000-foot level of whatโ€™s happening. And itโ€™s going to get worse as we put more and more and more and more of these things in our houses and officesโ€.

IoT & Cybersecurity In Events

This might sound a bit scary, but itโ€™s not the Big Brother just yet. And when it comes down to connecting this danger to cybersecurity in events, Will lays it all down. โ€œThatโ€™s obviously a vector to attack similarly to the way weโ€™ve talked about it in our cybersecurityโ€, he says. โ€œItโ€™s that the events industry isnโ€™t necessarily the direct attack. No oneโ€™s going to, โ€œOh, weโ€™re going to take down the events industry.โ€ Itโ€™s all going to come in sideways to get to something elseโ€.

Brandt agrees and adds some important information. โ€œSo, itโ€™s going to be a continuing trend that we just need to keep an eye on what weโ€™re bringing into our homes and offices, and really go into it intentionally. And donโ€™t just buy the cheapest smart bulb, right? Make sure itโ€™s coming from a reputable manufacturer thatโ€™s going to stand by the productโ€, he says. โ€œJust have some intentionality to it, be sure that youโ€™re getting your devices from reputable manufacturersโ€.

Will also alerts to the fact that many of these Internet of Things are no longer exclusive to our homes. In fact, theyโ€™ve already made their way into the event industry. โ€œSo really, really important to know that this isnโ€™t just limited to just your home. And thatโ€™s going to come to the events industry more and more as wellโ€.

Beware Of The USB Cables

USB cables are, in fact, data cables. โ€œSo even though youโ€™re just using it for charging, it is capable of dataโ€, Brandt explains. โ€œSo if you go plugging your phone into a random, โ€œCharge your phone here,โ€ station using the USB port, itโ€™s definitely been shown that theyโ€™ve been able to plant malicious programs on there. Spyware, copy your contacts lists off your phone, all of those kinds of thingsโ€. Make sure you start paying attention to the little letters when agreeing to the terms of service!

At DEF CON, a story about a man who worked โ€œfor quite some time creating very official-looking Apple charging cables, so they look exactly like the ordinary charging cables, but he managed to actually make it so that there is an exploit in the cableโ€, recalls Brandt. โ€œSo, not only now do you have to make sure that youโ€™re not just jacking into any old USB port, now you need to make sure that youโ€™re not borrowing some strangerโ€™s iPhone cable. Because itโ€™s the cable itself that actually hacks your phone and steals your dataโ€. Maybe life is an episode of Mr. Robot after allโ€ฆ

USB Cables & Cybersecurity In Events

Guess where else you can find stations to charge your phone? You guessed it โ€“ events! โ€œAnd then just think about a convention centerโ€, says Brandt. โ€œWhere weโ€™ve got a large event going on, whoโ€™s going to notice if you just roll in with a charging table. So you just look like another vendor dropping something off. No oneโ€™s going to stop you, no oneโ€™s going to pay any attention to it. So I think we need to start keeping track of those kinds of things. Itโ€™s like, โ€œWhere did that come from? Who ordered that?โ€.

โ€œBecause I think thatโ€™s what would happen. The venue would assume that the event brought it in, the event would assume that the venue added it, and meanwhile itโ€™s nobodyโ€™s. And so meanwhile, a hacker just has to sit within wifi distance. Itโ€™s probably not a very powerful chip, but still. Especially down a long hall of a convention center, youโ€™ve just got to sit there and then watch the data roll inโ€, he adds. Will completely agrees that this is a serious risk for cybersecurity in events. โ€œFor an event, itโ€™s such a high-profile targetโ€, he says. โ€œBecause youโ€™re getting so much volume, theyโ€™re coming in so good. People are plugging in super-duper quick. And youโ€™re going to be able to get a lot of peopleโ€™s data very, very quicklyโ€.

cybersecurity in eventsAmazonโ€™s Storage

In addition to being the one place in the world where you can probably find everything, Amazon has other tricks up their sleeves. โ€œItโ€™s actually the web servers that pretty much run 75% of the internet out there. And they also have in addition to Amazon Web Services, which runs live websites, they also provide a lot of high-volume storage solutionsโ€, explains Will. โ€œAnd this oneโ€™s called the Elastic Block Storage snapshots. What that does is allows Amazon basically to store something at a very, very cheap rate. For pennies per gigabyte to store your data that you might not ever really touch very often but you want to have it backed up somewhereโ€.

โ€œWell, some research just presented at DEF CON reveals basically that Amazon is inadvertently leaking their own files from the cloudโ€, he continues. โ€œAnd there are some exposed sections of storage, that are packed with data. If you donโ€™t configure it properly could be set to public. Sso I think the important thing to know about this is that maybe you want to consider what solution youโ€™re using to store all your data and all these things like that online. Always making sure that you check all the settings of everything when youโ€™re setting it up. Because a lot of times, these things are defaulted for ease and simplicityโ€, concludes Will.

Keep Your Data Safe

Brandt adds some insights into the issue of keeping data safe in the digital world. โ€œBut these are basically virtual hard drives. So theyโ€™ve got data even if you โ€œwrite over themโ€, that data is still there. And thatโ€™s true of current regular hard drives as well. Thatโ€™s why you kind of need to shred them, you need to wipe, wipe, wipe that data. But these virtual volumes it looks like are being left kind of unshredded. And your people are figuring out how to poke around in them and find data that has been either reformatted or deleted. Itโ€™s kind of what Iโ€™m pulling out of this, both very badโ€.

It sounds scary, but donโ€™t worry. Hackers work at the speed of light. And if thereโ€™s one thing these conferences do well, is providing solutions for problems like these!

White Hat Mentality

โ€œI think another takeaway too for this is that when it comes to these conferences, there are people kind of poking at it and trying different things. Again, that white hacker kind of mentalityโ€, says Will. โ€œYou should have kind of a white hacker mentality or have someone do it for your events as well. Not only from the cybersecurity in events standpoint, right? Someone who can kind of poke and try and evaluate. But also thatโ€™s how you should think about your own events when youโ€™re planning them as well. How can we poke at and test and try new and different things that might be a vulnerability? So then that way we can fix it. And itโ€™s the only way youโ€™ll know unless someone just decides to do the black hate side of things, which is what we want to avoidโ€.

War Shipping

You can put down the pitchforks, itโ€™s not what looks like! โ€œJust so people understand the name, itโ€™s not just made up craziness, thereโ€™s a couple of things going on thereโ€, explains Brandt. โ€œOne is wardriving, which was the terminology that was used when people would just drive around looking for open wifi networks. Or just driving around looking for unsecured wifi networks. And then later as more people secured their networks, you would just literally park on the street. And then spend all day trying to hack into that network, collecting just enough data to eventually try and figure out what the encryption was. So, thatโ€™s wardrivingโ€.

โ€œSo, thatโ€™s where this idea of war shipping comes fromโ€, he continues. โ€œWhat they set out to do and succeeded in doing was, โ€œOkay, how can we use mailing packages to basically hack a corporate network?โ€. โ€œAnd so what they put together using pretty much off-the-shelf components was a little device. They could pack it into an ordinary shipping package, make it look like itโ€™s coming from Amazon or something like that. And that little device would have a very low power mode that would just power up enough to send a GPS signal back to the command and control servers. And so that way the bad guys, the โ€œbad guysโ€, would know where that device is, and then they would know when it arrived at its destinationโ€.

Is There A Solution?

The entire thing sounds pretty scary, especially considering what it means for businesses. As Brandt says, โ€œthis is another one of those things where itโ€™s devilish. And you know if these guys can figure it out, anybody can figure it out thatโ€™s got any kind of hacking smarts or state sponsorship. So it brings, much like the cables and things like that, another whole new level to having to protect your dataโ€.

Will agrees and, thinking of a solution, adds: โ€œI almost see this potentially creating a mailroom intermediary service. Where, for example, instead of mail getting directly delivered to the building it gets sent somewhere else. And then almost like a TSA check, checks through all your packages, scans it, all these things, theyโ€™ve got to look for devices that are on and all that sort of stuffโ€.

Away From Cybersecurity In Events, But Relevant

Straying a bit further from our industry but towards something of societal importance, Brandt mentions a voter village aspect. โ€œThey actually purchase real live actual voting machines that are being used in the United States. And then give people an opportunity to hack on them. And itโ€™s one of those things that I think we need to be aware of as citizens of this country and other countries to make sure that weโ€™re having fair electionsโ€, he says.

โ€œItโ€™s great to have the technology, itโ€™s great to have the ability to tabulate things quickly, but these machines suckโ€, continues Brandt. โ€œTheyโ€™re absolutely terrible. Last year they were able to hack one using only a USB keyboard, and they were able to do that in less than a minute. I believe this is something we need to be much more aware of. And so I strongly encourage folks to talk to their members of Congress. Because thereโ€™s been legislation thatโ€™s been passed that puts in some pretty common-sense stuff for taking care of our elections and making sure that cities and counties and states have the money that they need in order to secure these things. And it being blocked by certain people in the congress for whatever reasonsโ€.

Category Isโ€ฆAwareness!

โ€œI think itโ€™s really, really important that awareness is a huge part of everything that weโ€™re doingโ€, says Will. โ€œThe important thing is awareness in general of this sort of stuff because the last thing you want to do is be caught off guard because thatโ€™s where you get taken advantage of 100%โ€. Pay attention, protect yourself, and for the love of god, use different passwords.

One Last Thing

Brandt leaves us with an extra piece of knowledge. โ€œIf youโ€™re working with associations or you work for an association, planning their annual conference or even their in-between meetings and events. Just be aware that that, as we predicted, was going to start picking up the targeting of associations, as well as city and state governmentsโ€, he says. โ€œSo, the commonality between these things, between associations and cities and other government entities, is that they have a tendency to post their structure publicly. All of these local organizations and major associations across the country and across the world have a tendency to do thatโ€.

โ€œIf you deal at all with your schools, with your city government, with your local government, your state government, or are working for an association where this information is publicly available. You really need to start paying attention and getting the word out amongst your people that you are a targetโ€, he adds.

Cybersecurity In Events: Conclusions

Itโ€™s time say goodbye to todayโ€™s episode of Event Tech Podcast. Cybersecurity in events is major. And as Brandt puts it, โ€œthe important thing is to make sure that cybersecurity is all of our responsibilities. Itโ€™s not just being taken care of by the white hats and by folks with the glasses down the hall. We need to make sure that weโ€™re all doing our part to make sure that weโ€™re keeping ourselves, our organizations and our attendeesโ€™ data as safe as possibleโ€. Tune in next week for even more tech wisdom!

Resources

DEF CON

black hat

What Security Pros Need to Know About Black Hat and DEF CON

How Not Having Data Backups Will Ruin Your Event

New call-to-action

Brandt Krueger

Author Brandt Krueger

With over 20 years experience in the meetings and events industry, Brandt has spoken at industry events and seminars all over the world, been published in numerous magazines and websites, and teaches public and private classes on meeting and event technology and production. He provides freelance technical production services, and is the owner of Event Technology Consulting.

More posts by Brandt Krueger
Share via
Send this to a friend