Trey Blalock, founder of Verification Labs, is a renowned CISO, Forensic Expert, Red Team Lead, and keynote speaker on the Weaponization of AI, Emerging Threats, Ransomware Prevention, and Supply Chain Security.
For event organizers, podcast hosts, and executive audiences, these are the topics most closely associated with Trey’s current public speaking and media work.
How attackers are using AI to automate and scale their operations, better analyze targets, create new exploits, and what defenders need to do now.
What modern ransomware operations reveal about today’s threat landscape, response failures, and practical organizational readiness.
Board-ready and leadership-focused threat updates that connect adversary behavior to business risk, operations, and strategic decisions.
Voice cloning, synthetic identities, fraud acceleration, and the changing economics of trust in a rapidly shifting threat environment.
Trey can speak credibly to highly technical audiences while translating threats into language executives, boards, and business leaders can act on.
His recent appearances show continued focus on AI weaponization, ransomware, deepfakes, fraud, and changing attacker tradecraft.
As founder of Verification Labs, Trey brings practitioner-level perspective shaped by hands-on work in penetration testing, security architecture, and high-risk environments.
Suitable for conferences, leadership briefings, professional associations, financial institutions, technology audiences, and security communities.
Visitors who want full speaking information should start with TreyBlalock.com. The resources in this section go into different aspects of his background and how to learn more.
The primary destination for keynote information, speaking positioning, and booking-related next steps.
A concise speaker-focused biography suitable for organizers, event teams, and media contacts.
Background information for audiences focused on penetration testing, technical depth, and security operations.
Supporting material for executive audiences interested in leadership, advisory, and strategic security positioning.
Additional public technical credibility and history in the broader security community.
An additional way to connect for discussion, questions, and select follow-up conversations.
This archive shows the breadth and consistency of Trey’s speaking and media appearances. For current speaking positioning and booking, visit treyblalock.com.
| Talk / Media | Event | Date |
|---|---|---|
| Weaponization of AI (DDTX version) + Sunday AMA session | Data Day Texas 2026 | 2026-01-24 |
| Podcast: Deepfakes and the AI Arms Race with Trey Blalock also on Spotify and YouTube | Data & Confused Podcast | 2025-11-17 |
| Podcast: Weaponized AI and the End of Attribution also on Spotify and YouTube | Data & Confused Podcast | 2025-11-03 |
| Assess and Address Practical Limitations of ATT&CK and ATLAS in Artificial Intelligence (AI) Risk Managementi | MITRE ATT&CKcon 6 McLean, VA | 2025-10-15 |
| The Weaponization of AI: A 2025 Cyber Threat Briefing | Private Financial Institution | 2025-07-16 |
| Cyber Threats & AI Weapons: The Shifting 2025 Landscape | ISACA Portland Spring Training | 2025-05-15 |
| The Importance of Linux for the Future of Internet Security | LinuxFest Northwest | 2025-04-27 |
| The Weaponization of AI, Its Impact on Organizations, and How to Respond. | AI Governance Day by Portland AWS Users Group | 2025-03-26 |
| 2025 Threat Landscape Dynamics | ISSA Rainier | 2025-02-27 |
| Closing Keynote: 2024 Cybersecurity Recapitulation | Critical Infrastructure Summit 2024 | 2024-11-08 |
| The Weaponization of AI, Its Impact on Organizations, and How to Respond. | Portland ISACA Spring Training | 2024-05-14 |
| Keynote: The Evolution of Cyber Attacks on Critical Infrastructure: Impact and Adaptation in the Age of Artificial Intelligence | Critical Infrastructure Cybersecurity Summit 2023 | 2023-11-28 |
| The Weaponization of AI, Its Impact on Financial Institutions, and How to Respond | Private Financial Institution | 2023-10-02 |
| CISO panel discussion: Data and Risk at the Edge | ISACA Portland Spring Training | 2023-05-25 |
| CISO panel discussion on Threat Intelligence | SIM Seattle | 2023-02-15 |
| Critical Security Gaps and Unique Solutions for Vendor Assessments | ISACA Puget Sound | 2022-05-17 |
| The Changing Threat Landscape and How Organizations Need to Respond | Portland PMI Spring Conference | 2022-05-06 |
| Changes in Ransomware Attacks, Why Companies Are Still Failing to Respond, and What You Need to Do Now | INTERFACE Portland | 2022-03-17 |
| Deepfakes, Voice Cloning, Synthetic Identities, and the Future of Fraud | ISC2 Seattle Chapter | 2022-03-03 |
| The Changing Threat Landscape and How Organizations Need to Respond | SIM Portland | 2022-01-12 |
| Critical Steps for Protecting Organizations from Ransomware | ISSA Puget Sound | 2021-10-21 |
| Defending Organizations from Ransomware Attacks and Advanced Persistent Threats | Private Financial Institution | 2021-10-05 |
| The Changing Threat Landscape and How Organizations Need to Respond | SIM Seattle | 2021-06-16 |
| Keynote: The Changing Threat Landscape and How Organizations Need to Respond | ISACA Portland | 2021-05-24 |
| Small segment on Colonial Pipeline Ransomware | KOMO News Seattle | 2021-05-12 |
| Deep Dive into Emerging Threats and How to Defend Against Them. | ISACA Puget Sound | 2021-04-27 |
| Segment on Cyber Hacking: State report finds growing threat to local businesses, individuals | KOMO News Seattle | 2020-11-11 |
| Why Advanced Persistent Threats have Changed the Economics of Security | ISC2 Seattle Chapter | 2020-11-05 |
| Emerging Threats, Tools, and Technologies Your Organization needs to be aware of now. | ISACA Puget Sound | 2020-10-23 |
| How Attackers are leveraging Coronavirus-19 and what this means for the future of workforce security | Private Financial Institution | 2020-10-08 |
| The second of two TV segments on hackers taking advantage of Covid-19 | KOMO News Seattle | 2020-04-28 |
| The first of two TV segments on hackers taking advantage of Covid-19 | KOMO News Seattle | 2020-04-27 |
| Two TV segments on Voice Cloning | KOMO News Seattle | 2020-02-03 |
| Why APT's have Changed the Economics of Security | Seattle University | 2019-12-02 |
| Automating defenses, incident response, and forensics | GSLUG | 2019-11-09 |
| Building Stronger Security Teams with Threat Modeling | Private Financial Institution | 2019-10-21 |
| Attacking and Defending Industries at Scale | ISACA Puget Sound | 2019-10-15 |
| Why external reconnaissance is critical for your organization's security | Private Financial Institution | 2019-05-23 |
| Leveraging Threat Modeling Techniques to Find Compliance Gaps, Prevent Data Leakage, and Protect your Organization’s Assets | ISACA 2019 Spring Conference Puget Sound | 2019-04-29 |
| What your auditing process is missing by not including threat modeling and reconnaissance techniques. | ISACA 2019 Spring Conference Puget Sound | 2019-04-29 |
| Leveraging Reconnaissance Techniques to Find Compliance Gaps, Prevent Data Leakage and Rrotect your Organization's Assets | ISACA 2019 Spring Conference Puget Sound | 2019-04-29 |
| Attacking and Defending Financial Networks at Scale (Fintech version) | Mojaloop Conference, Arusha Tanzania | 2019-01-31 |
| Using Automation to Build an Effective Security Response Strategy | ISACA Willamette Valley Chapter | 2018-11-09 |
| Attacking and Defending Financial Networks at Scale (client-specific version) | Private Financial Institution | 2018-10-19 |
| Security in Software Design and Implementation | North Seattle College | 2018-10-15 |
| Attacking and Defending Financial Networks at Scale (client-specific version) | Private Telecommunications Company, Paris France | 2018-07-24 |
| Automating defenses, incident response, and forensics | ISACA 2018 Spring Conference Puget Sound | 2018-04-23 |
| Reconnaissance - What attackers do to prepare for an attack | ISACA 2018 Spring Conference Puget Sound | 2018-04-23 |
| Introduction to Linux Performance Tuning | GSLUG | 2018-04-16 |
| Automating Linux Defenses with Fail2Ban | Linux Open Source Meetup | 2018-02-19 |
| Security Automation with IPTables | GSLUG | 2018-01-13 |
| Asymmetric Warfare and Why FOSS is so Important | Linux Open Source Meetup | 2017-08-21 |
| WireShark in 5-Minutes (lightning talk) | Linux Open Source Meetup | 2017-08-21 |
| Security Automation: How security at scale is destroying traditional security tools | BSides Boise 2016 | 2016-11-12 |
| Revocation, the Frailty of PKI, Mat Caughron and Trey Blalock | DefCon 24 Crypto and Privacy Village | 2016-08-03 |
| Securing Big Data | DataDay Texas 2016 | 2016-01-16 |
| Penetration Testing Big Data | Data Day Texas 2015 | 2015-01-10 |
| Protecting Your Company Against Cyber Security Attacks (Panel) | NCTA Emerging Tech + Trends 2013 | 2013-11-12 |
| A Socratic Dialogue on the Risks of Mobile Devices | CISO Summit Atlanta 2012 | 2012-01-24 |
A curated sample of technical talks, media appearances, and podcast/video conversations. Each video also includes a direct YouTube link in case embedded playback is restricted by the browser or local preview environment.
For speaking topics, media positioning, and keynote inquiries, the primary destination is treyblalock.com.