Cyber Hack

CS_TCH_Animation_Final_medium

The Cyber Hack is a LIVE security lab dedicated to demonstrating the techniques used by cyber criminals to break into your company’s corporate network and the steps you can take to prevent them.

Get ahead of the cyber curve and arm yourself with the knowledge you need to defend yourself from today's most dangerous hackers.

Witness live adaptive pentesting & domain trust exploitation. See well-known vectors such as phising and social engineering in action, as well as less well-known methods such as the 'SMB shakedown', USB attacks, payload encoding and the leveraging of common system misconfigurations.

// ACCESS THE CYBER HACK FOR JUST $99 WITH A BRIEFING & EXPO PASS

OR SEE IF YOU QUALIFY FOR A COMPLIMENTARY PASS...

DO YOU QUALIFY?

Cyber Hack Speakers

Brandon Helms
Brandon Helms

Chief Operations Officer  Rendition Infosec

View

Brandon Helms

Brandon Helms is an American cyber security professional who has dedicated most of his career to leading some of the most advanced cyber operations for both Department of Defense and private sector. Brandon was a Chief Petty Officer in the United States Navy where he ran IT and security operations for fast attack submarines and transitioned into the Technical Director at the National Security Agency. Afterwards, Brandon entered the private sector as the Business Information Security Officer for Palantir Technologies where he embedded with numerous Nation States and Fortune 500 companies to increase their security defenses while minimizing their risk profiles. Today, Brandon is the Chief Operations Officer for Rendition Infosec, LLC where he focuses most of his attention training the next generation of cyber security professionals.

Joshua Crumbaugh
Joshua Crumbaugh

Chief Hacker/CEO PeopleSec

View

Joshua Crumbaugh

Joshua Crumbaugh is an engaging and internationally respected cybersecurity subject matter expert, author, keynote and public speaker.  During Joshua's ethical hacking career he has never encountered a single network that could keep him or his teams out.  He has also accomplished a number of impressive social engineering feats, such as:  talking his way into bank vaults, fortune 500 data centers, corporate offices, restricted areas of casinos and more. His experience in all things security led him to realize something had to change.  This was the catalyst that led him to found PeopleSec where he is the CEO and Chief Hacker.  Joshua is internationally recognized as one of the world's most accomplished social engineers and the world's leading expert on cybersecurity awareness.

Mark Stanford
Mark Stanford

Systems Engineering Manager Cisco Security

View

Mark Stanford
Ryan Merrick
Ryan Merrick

Sr. Strategic Engineer  SentinelOne

View

Ryan Merrick
TaI Guest
TaI Guest

Principal Product Manager Beyond Trust (Bomgar)

View

TaI Guest

Tal Guest is the Principal Product Manager at Bomgar, overseeing the strategy and direction of the company’s cybersecurity products. He works with his colleagues at Bomgar to plan and execute go to market strategies. Mr. Guest has more than 20 years of experience in the technology industry, working in various capacities ranging from hands-on technical work to managing a team of highly skilled engineers. He has a Bachelor of Business degree from Mississippi State focused on information systems and makes his home in Madison, MS.

Timo Tiitinen
Timo Tiitinen

Sr. Sales Engineer Forcepoint

View

Timo Tiitinen
Winn Schwartu
Winn Schwartu

Founder The Security Awareness Company

View

Winn Schwartu

Cyber Hack Seminars

  • Wed 17th Oct 10:30 - 11:20
  • How to Build Effective Defensive Strategies Against Privileged Attacks TaI Guest  |   Beyond Trust (Bomgar)  |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 10:30 to 11:20

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them

    Speaker

    Photo Speaker Name Profile
    TaI Guest TaI Guest View Profile
  • Wed 17th Oct 11:30 - 12:10
  • Threats Don't Kill Networks, People Do Timo Tiitinen  |   Forcepoint   |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 11:30 to 12:10

    Threats Don't Kill Networks, People Do

    Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tablets, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently. Advances in behavioral monitoring, analytics and machine learning are converging, enabling security to go beyond the old black-and-white, threat-centric approach of separating activities into “good” and “bad.” Now, security is becoming context-based, addressing the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.

    Speaker

    Photo Speaker Name Profile
    Timo Tiitinen Timo Tiitinen View Profile
  • Wed 17th Oct 01:00 - 01:50
  • The Cyber Hack with SentinelOne Ryan Merrick  |   SentinelOne   |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 01:00 to 01:50

    The Cyber Hack with SentinelOne

    Ransomware attacks continue to be popular among cyber criminals looking to compromise unsuspecting corporate networks. And it all happens at the endpoint. In a recent Enterprise Risk Index, fileless attacks rose 94% in the first half of the year, including exponential growth in PowerShell attacks.
    Learn how to defend your businesses where traditional AVs could not. SentinelOne's next-generation AV behavioral engines will help you understand and respond if there is ever a threat.

    Speaker

    Photo Speaker Name Profile
    Ryan Merrick Ryan Merrick View Profile
  • Wed 17th Oct 03:00 - 03:30
  • Rethinking branch security Mark Stanford  |   Cisco Security   |   Cyber Hack

    Cyber Hack Theatre

    Wed 17th Oct 03:00 to 03:30

    Rethinking branch security

    Today, security teams and IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective branch office security without any reduction in performance. And with more and more branch locations using direct internet access, how can you quickly and easily protect users on any device, in every office? With Cisco Umbrella, say hello to simple and effective protection for branch offices.

    Speaker

    Photo Speaker Name Profile
    Mark Stanford Mark Stanford View Profile
  • Thu 18th Oct 09:30 - 10:20
  • How to Stop Fake News, Phishing, Spam and All Sorts of Internet Evil Using Analogue Network Security Winn Schwartu  |   The Security Awareness Company  |   Cyber Hack

    Cyber Hack Theatre

    Thu 18th Oct 09:30 to 10:20

    How to Stop Fake News, Phishing, Spam and All Sorts of Internet Evil Using Analogue Network Security

    Winn’s latest book, Analogue Network Security, seeks to cure major issues that plague the internet today. He will discuss the ideas from his book and answer many challenging questions. Like how can we be SURE online claims are true even when they are from anonymous sources? Should technical vulnerabilities be exposed and what is the impact on the tech company? Can we believe governments when they say “trust us…it’s confidential”, and is there a way to prove trust or to regain it once it’s lost? Winn asks a lot of bold questions but he makes up for it with bold answers.

    Speaker

    Photo Speaker Name Profile
    Winn Schwartu Winn Schwartu View Profile
  • Thu 18th Oct 10:30 - 11:20
  • Vishing: Not just for Extroverts! Brandon Helms  |   Rendition Infosec  |   Cyber Hack

    Cyber Hack Theatre

    Thu 18th Oct 10:30 to 11:20

    Vishing: Not just for Extroverts!

    Many attackers use many different social engineering techniques to gain initial footholds into networks but when asked to interact directly with the humans of these companies, the tend to fall short. This talk will focus on using vishing and abusing MFA habits in order to gain initial entry into networks.  

    Speaker

    Photo Speaker Name Profile
    Brandon Helms Brandon Helms View Profile
  • Thu 18th Oct 11:30 - 12:10
  • How to rob a bank over the phone Joshua Crumbaugh  |   PeopleSec  |   Cyber Hack

    Cyber Hack Theatre

    Thu 18th Oct 11:30 to 12:10

    How to rob a bank over the phone

    This talk is 50% real audio from a social engineering engagement and 50% lessons learned from the call. During this call, Joshua talks a VP at a bank into giving up full access to his computer and eventually facilities. At one point during the call, the antivirus even triggers. This is an intense call with a ton of valuable lessons for any social engineer or defender looking to enhance tradecraft or better detect social engineering attacks. 

    Speaker

    Photo Speaker Name Profile
    Joshua Crumbaugh Joshua Crumbaugh View Profile
  • Thu 18th Oct 01:00 - 01:50
  • The Cyber Hack with SentinelOne Ryan Merrick  |   SentinelOne   |   Cyber Hack

    Cyber Hack Theatre

    Thu 18th Oct 01:00 to 01:50

    The Cyber Hack with SentinelOne

    Ransomware attacks continue to be popular among cyber criminals looking to compromise unsuspecting corporate networks. And it all happens at the endpoint. In a recent Enterprise Risk Index, fileless attacks rose 94% in the first half of the year, including exponential growth in PowerShell attacks. 
    Learn how to defend your businesses where traditional AVs could not. SentinelOne's next-generation AV behavioral engines will help you understand and respond if there is ever a threat.

    Speaker

    Photo Speaker Name Profile
    Ryan Merrick Ryan Merrick View Profile
  • Thu 18th Oct 02:00 - 02:50
  • Anatomy of an attack Mark Stanford  |   Cisco Security   |   Cyber Hack

    Cyber Hack Theatre

    Thu 18th Oct 02:00 to 02:50

    Anatomy of an attack

    Cyber criminals are increasingly exploiting the Internet services to build agile and resilient infrastructures, and consequently to protect themselves from being exposed and taken over. This session will explain how the correlation of Internet data on multiple levels (DNS, BGP, ASN, Prefixes/IPs) can be used to build and deliver a new model of security that is pervasive and predictive, and that allows us to expose the attackers' infrastructure. Detection models that can be built and applied (such as co-occurrences, NLPRank, and Spike Detectors), and how the different detectors can be integrated to expose malicious infrastructures and advanced threats

    Speaker

    Photo Speaker Name Profile
    Mark Stanford Mark Stanford View Profile
Top