Closing Keynote: 2024 Cybersecurity Recapitulation |
Critical Infrastructure Summit 2024 |
2024-11-08 |
The Weaponization of AI, Its Impact on Organizations, and How to Respond. |
Portland ISACA Spring Training |
2024-05-14 |
Keynote: The Evolution of Cyber Attacks on Critical Infrastructure: Impact and Adaptation in the Age of Artificial Intelligence |
Critical Infrastructure Cybersecurity Summit 2023 |
2023-11-28 |
The Weaponization of AI, Its Impact on Financial Institutions, and How to Respond |
Private Financial Institution |
2023-10-02 |
CISO panel discussion: Data and Risk at the Edge |
ISACA Portland Spring Training |
2023-05-25 |
CISO panel discussion on Threat Intelligence |
SIM Seattle |
2023-02-15 |
Critical Security Gaps and Unique Solutions for Vendor Assessments |
ISACA Puget Sound |
2022-05-17 |
The Changing Threat Landscape and How Organizations Need to Respond |
Portland PMI Spring Conference |
2022-05-06 |
Changes in Ransomware Attacks, Why Companies Are Still Failing to Respond, and What You Need to Do Now |
INTERFACE Portland |
2022-03-17 |
Deepfakes, Voice Cloning, Synthetic Identities, and the Future of Fraud |
ISC2 Seattle Chapter |
2022-03-03 |
The Changing Threat Landscape and How Organizations Need to Respond |
SIM Portland |
2022-01-12 |
Critical Steps for Protecting Organizations from Ransomware |
ISSA Puget Sound |
2021-10-21 |
Defending Organizations from Ransomware Attacks and Advanced Persistent Threats |
Private Financial Institution |
2021-10-05 |
The Changing Threat Landscape and How Organizations Need to Respond |
SIM Seattle |
2021-06-16 |
Keynote: The Changing Threat Landscape and How Organizations Need to Respond |
ISACA Portland |
2021-05-24 |
Small segment on Colonial Pipeline Ransomware |
KOMO News Seattle |
2021-05-12 |
Deep Dive into Emerging Threats and How to Defend Against Them. |
ISACA Puget Sound |
2021-04-27 |
Segment on Cyber Hacking: State report finds growing threat to local businesses, individuals |
KOMO News Seattle |
2020-11-11 |
Why Advanced Persistent Threats have Changed the Economics of Security |
ISC2 Seattle Chapter |
2020-11-05 |
Emerging Threats, Tools, and Technologies Your Organization needs to be aware of now. |
ISACA Puget Sound |
2020-10-23 |
How Attackers are leveraging Coronavirus-19 and what this means for the future of workforce security |
Private Financial Institution |
2020-10-08 |
The second of two TV segments on hackers taking advantage of Covid-19 |
KOMO News Seattle |
2020-04-28 |
The first of two TV segments on hackers taking advantage of Covid-19 |
KOMO News Seattle |
2020-04-27 |
Two TV segments on Voice Cloning |
KOMO News Seattle |
2020-02-03 |
Why APT's have Changed the Economics of Security |
Seattle University |
2019-12-02 |
Automating defenses, incident response, and forensics |
GSLUG |
2019-11-09 |
Building Stronger Security Teams with Threat Modeling |
Private Financial Institution |
2019-10-21 |
Attacking and Defending Industries at Scale |
ISACA Puget Sound |
2019-10-15 |
Why external reconnaissance is critical for your organization's security |
Private Financial Institution |
2019-05-23 |
Leveraging Threat Modeling Techniques to Find Compliance Gaps, Prevent Data Leakage, and Protect your Organization’s Assets |
ISACA 2019 Spring Conference Puget Sound |
2019-04-29 |
What your auditing process is missing by not including threat modeling and reconnaissance techniques. |
ISACA 2019 Spring Conference Puget Sound |
2019-04-29 |
Leveraging Reconnaissance Techniques to Find Compliance Gaps, Prevent Data Leakage and Rrotect your Organization's Assets |
ISACA 2019 Spring Conference Puget Sound |
2019-04-29 |
Attacking and Defending Financial Networks at Scale (Fintech version) |
Mojaloop Conference, Arusha Tanzania |
2019-01-31 |
Using Automation to Build an Effective Security Response Strategy |
ISACA Willamette Valley Chapter |
2018-11-09 |
Attacking and Defending Financial Networks at Scale (client-specific version) |
Private Financial Institution |
2018-10-19 |
Security in Software Design and Implementation |
North Seattle College |
2018-10-15 |
Attacking and Defending Financial Networks at Scale (client-specific version) |
Private Telecommunications Company, Paris France |
2018-07-24 |
Automating defenses, incident response, and forensics |
ISACA 2018 Spring Conference Puget Sound |
2018-04-23 |
Reconnaissance - What attackers do to prepare for an attack |
ISACA 2018 Spring Conference Puget Sound |
2018-04-23 |
Introduction to Linux Performance Tuning |
GSLUG |
2018-04-16 |
Automating Linux Defenses with Fail2Ban |
Linux Open Source Meetup |
2018-02-19 |
Security Automation with IPTables |
GSLUG |
2018-01-13 |
Asymmetric Warfare and Why FOSS is so Important |
Linux Open Source Meetup |
2017-08-21 |
WireShark in 5-Minutes (lightning talk) |
Linux Open Source Meetup |
2017-08-21 |
Security Automation: How security at scale is destroying traditional security tools |
BSides Boise 2016 |
2016-11-12 |
Revocation, the Frailty of PKI, Mat Caughron and Trey Blalock |
DefCon 24 Crypto and Privacy Village |
2016-08-03 |
Securing Big Data |
DataDay Texas 2016 |
2016-01-16 |
Penetration Testing Big Data |
Data Day Texas 2015 |
2015-01-10 |
Protecting Your Company Against Cyber Security Attacks (Panel) |
NCTA Emerging Tech + Trends 2013 |
2013-11-12 |
A Socratic Dialogue on the Risks of Mobile Devices |
CISO Summit Atlanta 2012 |
2012-01-24 |