Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»In Conversation: Learnings for CISOs Post Black Hat and DEF CON
Cyber Security

In Conversation: Learnings for CISOs Post Black Hat and DEF CON

Team-CWDBy Team-CWDSeptember 13, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Every August, the security community converges for two of the biggest events in cybersecurity: Black Hat USA and DEF CON. This year, both gatherings underscored the growing urgency to secure software that underpins mission-critical systems that businesses and municipalities rely on daily.

In conversations with CISOs and other security professionals onsite, several major themes stood out; including AI-enabled security, SBOM adoption and the value of collaboration between industry, government and the open source community.

The Open Software Security Foundation (OpenSSF)’s attendance at both events allowed the foundation to tap into these conversations and see where the open source security industry is headed next. Together we discussed a few of the top focuses for CISOs and security teams, which I explore below alongside other experts from the likes of Trail of Bits, Canonical and the Open Source Tech Improvement Fund (OSTIF). 

AI-Powered Security: Promise and Proof

One of the topics that had executives and security professionals alike buzzing was the premise of AI-powered vulnerability detection. Organizations already face a torrent of security alerts daily, so the premise of automating some or all of that manual labor would be a major efficiency boon.

Security leaders also expressed their concerns about the data protections around AI usage generally – pointing to worries about reliability and repeatability. Proving the value of AI for security is going to be a large focus for the future, with many practitioners musing about AI for cybersecurity.

The culmination of DARPA’s AI Cyber Challenge (AIxCC) at DEF CON added extra emphasis to the value that AI holds for security leaders. Led by DARPA and ARPA-H, AIxCC’s competition aimed to create AI-driven systems capable of automatically detecting and patching vulnerabilities, especially in open source software that underpins critical infrastructure.

As a challenge advisor, I got to work closely with competitors and judges on the challenge, even guiding a few winning projects to open source their creations for public consumption. These winners, like Trail of Bits, showcased that AI in security is no longer just a theoretical tool, but a practicality that more organizations should be exploring.

Michael Brown, principal security engineer at Trail of Bits, pointed out the reality of AI-driven security.

“Government-sponsored competitions like the AIxCC are incredible opportunities for us to make game-changing advances in cybersecurity that benefit everyone,” he said.

“In the AIxCC, our cyber reasoning system, Buttercup, showed that vulnerability discovery and remediation for large and under-resourced software ecosystems can be done automatically, at scale, and at an acceptable cost. These technologies have tremendous potential to tip the scales back in favor of cyber defenders, and almost certainly would not exist or be publicly available without DARPA and ARPA-H’s support,” added Brown.

Our takeaway: AI can meaningfully reduce the time from vulnerability discovery to remediation. The more open source AI security tools there are on the market, the better armed developers will be for preventing threats to their teams.

SBOMs: Moving Toward Practical Adoption

While AI stole many headlines, the conversation on Software Bills of Materials (SBOMs) continued to evolve. At Black Hat, OpenSSF engaged with members of the SBOM community, US government representatives and enterprise security teams to discuss practical challenges in generating and consuming SBOMs.

Some of these include educating development teams, establishing clear standards for teams to operate against and integration with established processes and tools. Accuracy and upkeep of SBOMs also poses a significant manpower challenge.

“SBOMS continue to show great promise and are already starting to deliver on some of their expected benefits, but still face some implementation challenges”

The potential value and challenges of SBOMs are echoed by industry leaders.

“SBOMS continue to show great promise and are already starting to deliver on some of their expected benefits, but still face some implementation challenges,” said Stephanie Domas, CISO at Canonical.

“Accuracy of SBOM generation, adequate reflection of applied patches, and complex versioning situations when dependencies have been forked are all growing pains the industry as a whole will have to work through to continue to deliver on the promise of SBOMS. Collaboration through organizations like OpenSSF will be critical to help us get there,” Domas continued.

The takeaway: SBOM adoption is progressing, but organizations still face hurdles in standardization, integration with CI/CD pipelines, and ensuring the accuracy and timeliness of SBOM data. Many security leaders agreed that automation and better tooling are critical to making SBOMs a dependable part of vulnerability management.

Relationships Matter: Government and Industry Collaboration

Conversations at both Black Hat and DEF CON showed a strong appetite for deeper collaboration between government agencies and the open source community. This was underscored in my meetings with representatives from DARPA, ARPA-H and multiple private sector organizations.

Such collaboration is critical for scaling security solutions. AIxCC is a prime example, to call back to DEF CON. The event brought together government funding, open source expertise and competitive energy to deliver tools that are now available to the global community.

Open sourcing these projects is the equivalent to taking several large steps towards the next groundbreaking AI-driven vulnerability solution. Only through collaboration on a global scale will the most secure, most efficient projects be able to scale.

“Partnerships between the open source community and the federal government can turn good ideas into deployed defenses,” said Derek Zimmer, executive director of the nonprofit Open Source Tech Improvement Fund.

While also at AIxCC at DEF CON, Zimmer noted that “funding, openness, and competition helped accelerate tools the whole community can potentially use,” pointing out that OSTIF supports funding models like this because “success can bring outsized benefits to the open source ecosystem.”

The takeaway: Cross-sector partnerships can fast-track the development and adoption of impactful security solutions. Events like Black Hat and DEF CON underscore this reality, as these conferences are vital for building relationships that lead to real-world security improvements.

Conclusion

This year’s Black Hat and DEF CON events in Las Vegas were a reminder that securing open source software is a shared challenge, and that the tools, relationships and practices forged in collaborative settings can have lasting impact.

AI security, SBOM adoption and government support will continue to evolve and the momentum from this summer’s events suggests the community is ready to meet these challenges head-on.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions
Next Article GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.