Hack Red Con 2024
-
Doors, Cameras, and Mantraps: Oh, my!
Dylan "The Magician" Baklor
-
End the Burnout - 3 things your CISO wishes you knew.
Mark Thacker
-
Registration Opens
Oct. 25
-
Opening Ceremony
Oct. 25
-
Keynote Round Table - Ed Skoudis, Dave Kennedy, Ken Nevers, Amanda Berlin
Oct. 25
-
Intro to Infrastructure Automation for Offensive Security
Alex MartirosyanOct. 25
-
Securing Derby 150
Jason PaytonOct. 25
-
CISO Roundtable
Oct. 25
-
Tough Adversary? Don’t Blame Sun Tzu
Dr. Gregory CarpenterOct. 25
-
Reframing the “Success” of an Offensive Test: Taking a Risk-Based Approach
Celina StewartOct. 25
Jon “Wally” Prather is an Engagement Manager and Team Leader with Trellix Threat Intelligence Group. With 21 years of experience in everything from Counterintelligence and Targeting to Cyber Threat Intelligence and Data Dumps, Wally is undoubtedly a well-rounded and active member of the cyber community.
Wally's goal is to inform the audience and conference attendees that an entire world of intelligence analysis has yet to be tapped into.
Jeff Smeal
Jeff Smeal is a cybersecurity threat analyst and senior intelligence professional with 14 years of combined expertise across multiple intelligence disciplines and cybersecurity operations, specializing in malware behavioral forensics. He has front-line incident response SOC experience, provided timely initial triage / behavior malware analysis and technical expertise to decision makers and key stakeholders during, but not limited to, high-profile cyber-attacks to include: Solar Winds supply-chain backdoor compromise / Kaseya supply-chain ransomware attack / Colonial Pipeline and JBS ransomware attack / ‘Log4Shell’ exploit / Russia/Ukraine conflict – Pro-Russian hacktivist destructive malware. Additionally, Jeff has 10 experience as a US Navy Intelligence Specialist, with 7 year of all-source kinetic warfare intelligence support while operating overseas or at sea, and 3 years as a cyber warfare specialist.
Utilizing Cyber Threat Intelligence Methodologies with Reverse Malware Engineering, especially Static and Dynamic Analysis to create an entire threat picture from limited data.