Cyber Hack

Cyber Hack

The Cyber Hack is a LIVE security lab dedicated to demonstrating the techniques used by cyber criminals to break into your company’s corporate network and the steps you can take to prevent them.

Cyber Hack Speakers

Ben Sadeghipour
Ben Sadeghipour

Hacker Operations Lead HackerOne

View

Ben Sadeghipour

Ben is a the Hacker Operations Lead at HackerOne, the #1 most popular bug bounty platform by day, and a hacker by night. Prior to joining HackerOne, he has helped identify and exploit over 500 security vulnerabilities across 100s of web and mobile applications for companies such as Yahoo, Airbnb, Snapchat, The US Department of Defense, Yelp, Github, and more. He also invested time in the security community, by creating a community of 200+ active hackers who share ideas and their experience. He has also held a few free workshops  and trainings to teach others about security and web application hacking.
 

David van Schravendijk
David van Schravendijk

Product Marketing Manager Cisco Meraki

View

David van Schravendijk
Jared Phipps
Jared Phipps

VP Worldwide Sales Engineering SentinelOne

View

Jared Phipps
Jon Bottarini
Jon Bottarini

Hacker and Technical Program Manager HackerOne

View

Jon Bottarini
Michael Knapp
Michael Knapp

Director of Sales Engineering Forcepoint

View

Michael Knapp
Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Steven Aiello
Steven Aiello

Chief Security and Compliance Architect AHEAD

View

Steven Aiello

Steven Aiello is a chief security and compliance architect with AHEAD; a technology firm based out of Chicago. At AHEAD, Steven works closely with client’s infrastructure and security teams as well as critical infrastructure teams across security, storage and virtualization silos.
 
Steven previously was an enterprise architect at Online Tech in Ann Arbor, MI, a local managed service provider. At Online Tech, Steven was responsible for designing the company’s critical infrastructure including virtualization, storage and security initiatives across five data centers. Designs were in line with client needs, which included primarily banking and healthcare verticals. Steven holds a Bachelor of Arts in technology management, and a Master of Science with a concentration in information assurance from Eastern Michigan University.
 
His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, SANS GSEC, SANS GCIH, VMware VCP (VMware Certified Professional), VMware VCAP-DCD (VMware Certified Advanced Professional – Data Center Design), and Cisco CCNA (Cisco certified Network Associate).

Cyber Hack Seminars

  • Wed 26th Sep 09:30 - 10:20
  • How to Build Effective Defensive Strategies Against Privileged Attacks Morey J. Haber  |   BeyondTrust  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 09:30 to 10:20

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.

    Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Wed 26th Sep 10:30 - 11:20
  • Preparing for the Unthinkable by Cisco Meraki David van Schravendijk  |   Cisco Meraki   |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 10:30 to 11:20

    Preparing for the Unthinkable by Cisco Meraki

    Past performance is no guarantee of future results. There are many trends in the cybersecurity landscape, that will be different tomorrow. Security professionals can effectively prepare themselves for unknown future events by delivering high-power Cisco security technologies via an all-inclusive, unique cloud-managed platform. This session will show you how new threats can be prevented dynamically without needing to configure or modify a network.

    Speaker

    Speaker Name Profile
    David van Schravendijk View Profile
  • Wed 26th Sep 11:30 - 12:10
  • Threats Don’t Kill Networks – People Do Michael Knapp  |   Forcepoint   |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 11:30 to 12:10

    Threats Don’t Kill Networks – People Do

    Network security technology can often feel like it’s a hamster wheel, constantly turning just to keep up with the latest attacks. But, chasing after each threat, piling signatures into endpoint detection and response systems, and other archaic approaches just doesn’t cut it any more. And, with the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently. Advances in behavioral monitoring, analytics and machine learning are converging, enabling security to go beyond the old black-and-white, threat-centric approach of separating activities into “good” and “bad.” Now, security is becoming context-based, addressing the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.

    Speaker

    Photo Speaker Name Profile
    Michael Knapp Michael Knapp View Profile
  • Wed 26th Sep 13:00 - 13:50
  • Cybersecurity KPIs to Secure Your IT Environment Steven Aiello  |   AHEAD  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 13:00 to 13:50

    Cybersecurity KPIs to Secure Your IT Environment

    Organizations spend an exceptional amount of time and money to keep their data secure, but the outcomes are less than exceptional. In the presentation, AHEAD security expert Steven Aiello will focus on simple KPIs that organizations can use to secure their environments. This will not be a theoretical approach to security; it will be an analysis of the most common attack vectors and patterns that are used to compromise IT assets.

    Speaker

    Photo Speaker Name Profile
    Steven Aiello Steven Aiello View Profile
  • Wed 26th Sep 14:00 - 14:50
  • It's the little things Ben Sadeghipour  |   HackerOne  |   Cyber Hack

    Cyber Hack Theatre

    Wed 26th Sep 14:00 to 14:50

    It's the little things

    Reconnaissance plays a huge role while hacking. While there are 100s of different tools available to make this process easier, you may not be maximizing your recon process without a working methodology. In this session attendees will learn how the best hackers use recon to size up their targets. This methodology helps create an automated process that will actively look for vulnerabilities using OSINT and other well known recon tools.

    Speaker

    Photo Speaker Name Profile
    Ben Sadeghipour Ben Sadeghipour View Profile
  • Thu 27th Sep 09:30 - 10:20
  • Cyber Hack with SentinelOne Jared Phipps  |   SentinelOne   |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Sep 09:30 to 10:20

    Speaker

    Photo Speaker Name Profile
    Jared Phipps Jared Phipps View Profile
  • Thu 27th Sep 10:30 - 11:20
  • Measuring Security With A Bug Bounty Program - A Hackers Perspective Jon Bottarini  |   HackerOne   |   Cyber Hack

    Cyber Hack Theatre

    Thu 27th Sep 10:30 to 11:20

    Measuring Security With A Bug Bounty Program - A Hackers Perspective

    In this session, Jon Bottarini, hacker and technical program manager at HackerOne will discuss the key factors influencing relationships between hackers and corporate security teams by unpacking hacker motives, internal security challenges, risks associated with working with hackers, competitive vulnerability pricing, and managing a mutually beneficial transaction.

    Speaker

    Photo Speaker Name Profile
    Jon Bottarini Jon Bottarini View Profile
Top