Apple bails on Black Hat talk
Engineering blames marketing department
IDG News Service - Apple Inc. has pulled its security engineering team out of a planned public discussion on the company's security practices, which had been set for next week's Black Hat security conference in Las Vegas.
The panel would have been a first for Apple, but the company pulled out of the discussion at the last minute, Black Hat Director Jeff Moss said in an interview Friday.
"Marketing got wind of it, and nobody at Apple is ever allowed to speak publicly about anything without marketing approval," he said.
The panel would have been a highlight of the show, giving attendees an insider look at Apple's security response team. Apple is notoriously secretive about its security policies, a stance that has made it a constant target of criticism in the security community.
"It was them talking about security engineering and how they take security seriously," Moss said. "It would have put Apple in a positive light."
The talk was accepted by Black Hat organizers on July 3 and abruptly canceled on July 21, he said.
"Due to circumstances beyond my control, I regret that I will not be able to participate in Black Hat this year," the panel's organizer said in an e-mail to conference officials, read over the telephone by Moss on Friday.
Moss declined to say who from Apple was scheduled to speak on the panel, saying that by naming them, he could put their jobs in jeopardy.
Engineers thought that the panel would be approved by marketing because they were not set to answer any questions from the audience, he said.
This was not the first Apple talk to be pulled from Black Hat in recent weeks. Another talk, proposed by consultant Charles Edge on Apple's FileVault encryption software, was also pulled recently, Moss said.
That talk had not actually been accepted by conference organizers, but it was the proposal to do the talk that was withdrawn, Moss said.
Edge, a consultant at 318 Inc. in Santa Monica, Calif., declined to comment, but according to a source familiar with the matter, the talk was pulled because Edge has signed confidentiality agreements with Apple.
An Apple spokesman was unable to comment immediately for this story.
Moss said that Apple was welcome back at the show, should the company change its mind.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts