Offensive Security Speaker & Writer
A continuation of the highly-rated 2022 session, providing updated techniques, real-world engagement scenarios, and tactical advice for modern defenders.
Conference BrochureAn exploration of Privileged Access Management (PAM) from an offensive mindset. This session covers why tiered access is critical and how attackers exploit common configuration gaps.
Conference BrochureCompiling seven years of offensive security experience into actionable "war stories." Focused on common entry points and the defensive pivots that actually stop attackers.
An analysis of how built-in Windows 10 applications and default settings can be leveraged by attackers to compromise enterprise endpoints.
Conference BrochureDesigning and executing a risk-based vulnerability management program that aligns with regulatory requirements and industry standards.
Conference Brochure
Front-line observations and best practices for implementing Privileged Access Management in complex cloud and on-prem environments.
Read Article
A white paper detailing how cybersecurity solutions can inadvertently introduce new vulnerabilities and expand an organization's attack surface.
Read White Paper
A deep dive into legacy Windows protocol exploitation and how to properly remediate internal network spoofing vulnerabilities.
Read Blog