KEYNOTES & BRIEFINGS
Technical depth. Real-world experience. Stories that make the threat landscape tangible for executives and practitioners alike. Available for conferences, executive roundtables, and private corporate events.
Symmetric Chaos. Asymmetric Talent.
From the meritocratic hacker crews of the 1980s BBS era to today's coercion-fueled "Com" ecosystem, threat actor recruitment has fundamentally transformed. Delivered by someone who lived it—a former LulzSec member who went from breaching Sony to building a SOC. Your perimeter is no longer your network. It's loyalty.
- > The evolution from voluntary botnets to insider recruitment via Telegram
- > Indicators that someone on your team is being "tapped"
The Panic Gap
Why most IR plans fall apart the moment something real happens. Drawing from advisory work across hundreds of organizations, this talk examines what separates teams that respond effectively from those that spiral.
- > Why playbooks fail when the breach hits
- > Closing the gap between detection and executive communication
Inside the Adversary Mindset
In 2011, I was on the other side. As a member of LulzSec, I participated in attacks that made global headlines. Now I deconstruct that experience for defenders: the target selection process, the reconnaissance patterns, the psychological tactics we used. First-person testimony from someone who was there.
- > How we chose targets—and what made yours look vulnerable
- > The signals attackers look for before they strike
Building an Effective SOC
I've built Security Operations from scratch to 24/7 coverage—and made every mistake along the way. This talk distills those lessons into the critical decisions that determine whether your SOC becomes a detection powerhouse or an expensive alert factory. No vendor pitches. Just the workflow patterns that actually scale.
- > Why most SOCs drown in alerts instead of catching threats
- > The decisions that matter more than your SIEM
This Little Light of Mine
What happens when you can remotely control the lighting at major landmarks? I found out. This original research walks through vulnerabilities I discovered in internet-connected industrial lighting controllers—the kind that illuminate stadiums, bridges, and buildings you'd recognize. It's a case study in how "smart" infrastructure creates attack surfaces no one is watching.
- > Live demonstration of ICS vulnerabilities in the wild
- > Why your building management systems are the next attack surface
On Stage
SELECT PAST CONFERENCE PRESENTATIONS