Overview
Explore reverse engineering techniques applied to compliance standards in this 31-minute Black Hat conference talk. Discover how to analyze and interpret compliance requirements beyond a checkbox mentality, focusing on understanding the underlying goals and spirit of regulations. Learn to apply reverse engineering principles typically used for machine code to dissect compliance systems, standards, and frameworks. Gain insights into threat modeling, PCI compliance, and the STRIDE model. Understand the power of reverse engineering in improving organizational security posture and meeting regulatory requirements more effectively.
Syllabus
Introduction
Agenda
Reverse Engineering
What is Reverse Engineering
Reverse Engineering is Powerful
Compliance Systems
Stride
Threat Modeling
PCI
Why
PCI Model
Reverse Engineering Analysis
Why Reverse Engineering
Threat Modelling
Questions
Taught by
Black Hat