Cyber Hack

The Cyber Hack is a LIVE security lab dedicated to demonstrating the techniques used by cyber criminals to break into your company’s corporate network and the steps you can take to prevent them.

Get ahead of the cyber curve and arm yourself with the knowledge you need to defend yourself from today's most dangerous hackers.

Witness live adaptive pentesting & domain trust exploitation. See well-known vectors such as phising and social engineering in action, as well as less well-known methods such as the 'SMB shakedown', USB attacks, payload encoding and the leveraging of common system misconfigurations.

// ACCESS THE CYBER HACK FOR JUST $99 WITH A BRIEFING & EXPO PASS

OR SEE IF YOU QUALIFY FOR A COMPLIMENTARY PASS...

DO YOU QUALIFY?

Cyber Hack Speakers

Anil Saldanha
Anil Saldanha

Founder and CEO Seamless Technologies Inc

View

Anil Saldanha

Anil Saldanha is the founder of Seamless Technologies Inc, a startup focused on Cyber Risk Management. He is an expert in health tech, cloud security, identity and access management (IAM), and secure product development. He works with health tech startups in adopting cloud technologies and establishing security/compliance processes.
His industry experience spans 20 years at companies such as Red Hat, Trustwave, Sun Microsystems, and Tempus. As VP of engineering at Tempus, he was instrumental in building a HIPAA compliant cloud based system for cancer genomics. At Trustwave, he was responsible for a massive big data system driving security analytics.

Ben Sadeghipour
Ben Sadeghipour

Hacker Operations Lead HackerOne

View

Ben Sadeghipour

Ben is a the Hacker Operations Lead at HackerOne, the #1 most popular bug bounty platform by day, and a hacker by night. Prior to joining HackerOne, he has helped identify and exploit over 500 security vulnerabilities across 100s of web and mobile applications for companies such as Yahoo, Airbnb, Snapchat, The US Department of Defense, Yelp, Github, and more. He also invested time in the security community, by creating a community of 200+ active hackers who share ideas and their experience. He has also held a few free workshops  and trainings to teach others about security and web application hacking.
 

Brad Arlen
Brad Arlen

CEO OneMe PBC

View

Brad Arlen

Mr. Arlen has worked worldwide as a consultant in the technology space for 25 years across multiple industries from early-stage startups to Fortune 500 organizations.  After completing his CS Engineering degree at The Ohio State University, Brad began his career as a software developer for a Japanese electronics company, spent several years as a Big 4 systems consultant, and formed his own consulting company providing product management and web-based business application development services.

With our lives becoming more digital every day, copies of our personal data propagating everywhere, and no safe and secure way for business services to access our personal data, Brad felt the urgency to focus on personal data privacy.  Founded in 2016, OneMe is based on the belief that providing individuals control and transparency into the use of their personal data will empower, not stifle, businesses and organizations, leading to incredibly powerful, trustful, services and ultimately positive global impacts.  Simply stated, trust is transparency.

David LePage
David LePage

Manager of Sales Engineering Forcepoint

View

David LePage
David van Schravendijk
David van Schravendijk

Product Marketing Manager Cisco Meraki

View

David van Schravendijk
Jared Phipps
Jared Phipps

VP Worldwide Sales Engineering SentinelOne

View

Jared Phipps
Jeremy Batterman
Jeremy Batterman

SpiderLabs Global Lead Intel Fusion TrustWave

View

Jeremy Batterman
Jon Bottarini
Jon Bottarini

Hacker and Technical Program Manager HackerOne

View

Jon Bottarini
Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Nick Espinosa
Nick Espinosa

Chief Security Fanatic/CIO Security Fanatics

View

Nick Espinosa

An expert in cybersecurity and network infrastructure, Nick Espinosa has consulted with clients ranging from the small business owners up to Fortune 100 level companies. Since the age of 9 he’s been on a first name basis with technology, building computers and programming in multiple languages. Nick founded Windy City Networks, Inc at 19 and joined forces in 2013 with BSSi2. In 2015 Security Fanatics, the Cybersecurity/Cyberwarfare division of BSSi2 dedicated to designing custom Cyberdefense strategies for medium to enterprise corporations, was launched.

Regular columnist, member of the Forbes Technology Council, on the Board of Advisors for both Roosevelt University's Center for Cyber and Information Security as well as Bits N’ Bytes Cybersecurity Education, award winning co-author of a bestselling book, and host of The Deep Dive radio show, Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers. Nick is an accomplished speaker and regularly speaks to audiences about Cybersecurity, technology and business management

Steven Aiello
Steven Aiello

Chief Security and Compliance Architect AHEAD

View

Steven Aiello

Steven Aiello is a chief security and compliance architect with AHEAD; a technology firm based out of Chicago. At AHEAD, Steven works closely with client’s infrastructure and security teams as well as critical infrastructure teams across security, storage and virtualization silos.
 
Steven previously was an enterprise architect at Online Tech in Ann Arbor, MI, a local managed service provider. At Online Tech, Steven was responsible for designing the company’s critical infrastructure including virtualization, storage and security initiatives across five data centers. Designs were in line with client needs, which included primarily banking and healthcare verticals. Steven holds a Bachelor of Arts in technology management, and a Master of Science with a concentration in information assurance from Eastern Michigan University.
 
His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, SANS GSEC, SANS GCIH, VMware VCP (VMware Certified Professional), VMware VCAP-DCD (VMware Certified Advanced Professional – Data Center Design), and Cisco CCNA (Cisco certified Network Associate).

Syed Alam
Syed Alam

Founder and CEO Accentedge

View

Syed Alam

Syed Alam is Founder & CEO of accentedge, a leading digital transformation company headquartered in Chicago.  He brings over 30 years of proven leadership in the fields of information technology, cloud computing, analytics and content protection.

Prior to founding Accentedge, Syed served as the Global Leader for Cloud Computing & Digital Workspace for Abbvie, Inc. overseeing global collaboration, cloud infrastructure, and solution architecture programs for this $28-Billion pharmaceutical company. He planned and lead digital transformation efforts, digital workspace, cloud computing, search, analytics, and content protection transformation initiatives.

Mr. Alam was Managing Director of Alam & Company, a consulting company he founded that specialized in design, implementation, and management of on-premise and cloud-based technology solutions for a wide range of markets, including health care, agriculture, sustainability, professional services, and media.  He also served as a Program Manager for Miller Brewing Company, and was the Founder and President of SoftGear Corporation, an award-winning technology company.

Syed holds an M.B.A. from Marquette University in Milwaukee, WI and received his B.B.A in Management Information Systems & Finance from the University of Wisconsin-Milwaukee. He has completed Strategy & Innovation programs from MIT (Massachusetts Institute of Technology.).

Cyber Hack Seminars

  • Wed 26th Sep 09:30 - 10:20
  • How to Build Effective Defensive Strategies Against Privileged Attacks Morey J. Haber  |   BeyondTrust  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 09:30 to 10:20

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.

    Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Wed 26th Sep 10:30 - 11:20
  • Preparing for the Unthinkable David van Schravendijk  |   Cisco Meraki   |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 10:30 to 11:20

    Preparing for the Unthinkable

    Past performance is no guarantee of future results. There are many trends in the cybersecurity landscape, that will be different tomorrow. Security professionals can effectively prepare themselves for unknown future events by delivering high-power Cisco security technologies via an all-inclusive, unique cloud-managed platform. This session will show you how new threats can be prevented dynamically without needing to configure or modify a network.

    Speaker

    Photo Speaker Name Profile
    David van Schravendijk David van Schravendijk View Profile
  • Wed 26th Sep 11:30 - 12:10
  • Threats Don’t Kill Networks – People Do David LePage  |   Forcepoint   |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 11:30 to 12:10

    Threats Don’t Kill Networks – People Do

    Network security technology can often feel like it’s a hamster wheel, constantly turning just to keep up with the latest attacks. But, chasing after each threat, piling signatures into endpoint detection and response systems, and other archaic approaches just doesn’t cut it any more. And, with the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently. Advances in behavioral monitoring, analytics and machine learning are converging, enabling security to go beyond the old black-and-white, threat-centric approach of separating activities into “good” and “bad.” Now, security is becoming context-based, addressing the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.

    Speaker

    Photo Speaker Name Profile
    David LePage David LePage View Profile
  • Wed 26th Sep 01:00 - 01:50
  • Cybersecurity KPIs to Secure Your IT Environment Steven Aiello  |   AHEAD  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 01:00 to 01:50

    Cybersecurity KPIs to Secure Your IT Environment

    Organizations spend an exceptional amount of time and money to keep their data secure, but the outcomes are less than exceptional. In the presentation, AHEAD security expert Steven Aiello will focus on simple KPIs that organizations can use to secure their environments. This will not be a theoretical approach to security; it will be an analysis of the most common attack vectors and patterns that are used to compromise IT assets.

    Speaker

    Photo Speaker Name Profile
    Steven Aiello Steven Aiello View Profile
  • Wed 26th Sep 02:00 - 02:50
  • It's the little things Ben Sadeghipour  |   HackerOne  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 02:00 to 02:50

    It's the little things

    Reconnaissance plays a huge role while hacking. While there are 100s of different tools available to make this process easier, you may not be maximizing your recon process without a working methodology. In this session attendees will learn how the best hackers use recon to size up their targets. This methodology helps create an automated process that will actively look for vulnerabilities using OSINT and other well known recon tools.

    Speaker

    Photo Speaker Name Profile
    Ben Sadeghipour Ben Sadeghipour View Profile
  • Wed 26th Sep 03:00 - 03:50
  • Pitch it! by 1871 Tech Leaders  |  Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 03:00 to 03:50

    Pitch it! by 1871

    1871

    This unique presentation will see start-ups from 1871 sharing their latest cyber security innovations…

    1871 is the home of nearly 500 early-stage, high-growth digital startups and more than 1,500 members supported by an entire ecosystem focused on accelerating their growth and creating jobs in the Chicagoland area. Visit www.1871.com for more information. Located in a 150,000 square-foot space over four floors in The Merchandise Mart, 1871 has more than 600 current mentors available to its members, as well as more than 80 partner corporations, universities, education programs, accelerators, venture funds and other organizations that make its extensive matrix of resources possible.

    COMPANIES TAKING PART INCLUDE:

    accentedge

    Syed Alam, Founder & CEO, accentedge

    Securing Your Future: Using AI to Stop Cyber Criminals in Their Tracks
    In the ever-evolving digital landscape, your company’s data is exposed to internal and external threats every day. At Accentedge we use a world-wide network of sensors and software, including Machine Learning and AI, to detect patterns of potential problems and stop them in their tracks.

    Our information security platform is a comprehensive solution to defend against any kind of security theft, breaches or misuse of data and is continuously learning and improving over time. As a result, we can not only safeguard your corporate information, but also deliver major cost reductions, streamline workflows, automate processes and improve compliance.

    One-Me

    Brad Arlen, CEO, OneMe PBC

    Transforming Data Privacy From an Expense into an Asset
    Organizations willing to make a cultural shift that respects individual data privacy thru transparency, integrity, and self-sovereignty in the use of their data, will uncover entirely new product and service opportunities that transform the expense of data privacy into an asset.

    seamless_logo

    Anil Saldanha, Founder and CEO, Seamless Technologies Inc

    Cyber Risk Management made easy
    Cyber Risk Management has become a critical need for companies that deal with sensitive data primarily in regulated industries such as Healthcare, Finance and HR. The session will focus on the elements of a successful cyber risk management strategy and a roadmap to adopt one. The session will highlight some critical use cases that the startup has successfully worked on.

    Speakers

    Photo Speaker Name Profile
    Anil Saldanha Anil Saldanha View Profile
    Brad Arlen Brad Arlen View Profile
    Syed Alam Syed Alam View Profile
  • Thu 27th Sep 09:30 - 10:20
  • The Cyber Hack with SentinelOne Jared Phipps  |   SentinelOne   |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Sep 09:30 to 10:20

    The Cyber Hack with SentinelOne

    Ransomware attacks continue to be popular among cyber criminals looking to compromise unsuspecting corporate networks. And it all happens at the endpoint. In a recent Enterprise Risk Index, fileless attacks rose 94% in the first half of the year, including exponential growth in PowerShell attacks.
    Learn how to defend your businesses where traditional AVs could not. SentinelOne's next-generation AV behavioral engines will help you understand and respond if there is ever a threat.

    Speaker

    Photo Speaker Name Profile
    Jared Phipps Jared Phipps View Profile
  • Thu 27th Sep 10:30 - 11:20
  • Measuring Security With A Bug Bounty Program - A Hackers Perspective Jon Bottarini  |   HackerOne   |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Sep 10:30 to 11:20

    Measuring Security With A Bug Bounty Program - A Hackers Perspective

    In this session, Jon Bottarini, hacker and technical program manager at HackerOne will discuss the key factors influencing relationships between hackers and corporate security teams by unpacking hacker motives, internal security challenges, risks associated with working with hackers, competitive vulnerability pricing, and managing a mutually beneficial transaction.

    Speaker

    Photo Speaker Name Profile
    Jon Bottarini Jon Bottarini View Profile
  • Thu 27th Sep 11:30 - 12:10
  • The Five Laws of Cybersecurity Nick Espinosa  |   Security Fanatics  |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Sep 11:30 to 12:10

    The Five Laws of Cybersecurity

    Based off Nick Espinosa's TEDx Talk and Forbes article of the same name, this presentation will dive into issues that non-technical users face and how we, as the technical community, can help create an easy framework of understanding for those we help in order to ensure their security. The Five Laws of Cybersecurity are designed to make everyone think and challenge that technology they use every day!

    Speaker

    Photo Speaker Name Profile
    Nick Espinosa Nick Espinosa View Profile
  • Thu 27th Sep 01:00 - 01:50
  • Brought to you by Trustwave Jeremy Batterman  |   TrustWave  |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Sep 01:00 to 01:50

    Speaker

    Speaker Name Profile
    Jeremy Batterman View Profile
Top