Trey Blalock

Trey Blalock
Founder of Verification Labs • Keynote Speaker

Emerging Threats, The Weaponization of AI, Ransomware, and Supply Chain Security.

Trey Blalock, founder of Verification Labs, is a renowned CISO, Forensic Expert, Red Team Lead, and keynote speaker on the Weaponization of AI, Emerging Threats, Ransomware Prevention, and Supply Chain Security.

Speaking Topics

For event organizers, podcast hosts, and executive audiences, these are the topics most closely associated with Trey’s current public speaking and media work.

The Weaponization of AI

How attackers are using AI to automate and scale their operations, better analyze targets, create new exploits, and what defenders need to do now.

Ransomware & Resilience

What modern ransomware operations reveal about today’s threat landscape, response failures, and practical organizational readiness.

Executive Threat Briefings

Board-ready and leadership-focused threat updates that connect adversary behavior to business risk, operations, and strategic decisions.

Deepfakes, Fraud & Emerging Threats

Voice cloning, synthetic identities, fraud acceleration, and the changing economics of trust in a rapidly shifting threat environment.

Why Organizers Book Trey

Technical depth with executive clarity

Trey can speak credibly to highly technical audiences while translating threats into language executives, boards, and business leaders can act on.

Current, real-world threat relevance

His recent appearances show continued focus on AI weaponization, ransomware, deepfakes, fraud, and changing attacker tradecraft.

Operator credibility

As founder of Verification Labs, Trey brings practitioner-level perspective shaped by hands-on work in penetration testing, security architecture, and high-risk environments.

Broad audience fit

Suitable for conferences, leadership briefings, professional associations, financial institutions, technology audiences, and security communities.

Key Resources

Visitors who want full speaking information should start with TreyBlalock.com. The resources in this section go into different aspects of his background and how to learn more.

Speaker Website & Booking

The primary destination for keynote information, speaking positioning, and booking-related next steps.

Speaker Bio

A concise speaker-focused biography suitable for organizers, event teams, and media contacts.

Pentest Bullet Points

Background information for audiences focused on penetration testing, technical depth, and security operations.

CISO Bullet Points

Supporting material for executive audiences interested in leadership, advisory, and strategic security positioning.

StackExchange

Additional public technical credibility and history in the broader security community.

Open Office Hours

An additional way to connect for discussion, questions, and select follow-up conversations.

Selected Talks & Media

This archive shows the breadth and consistency of Trey’s speaking and media appearances. For current speaking positioning and booking, visit treyblalock.com.

Talk / Media Event Date
Weaponization of AI (DDTX version) + Sunday AMA session Data Day Texas 2026 2026-01-24
Podcast: Deepfakes and the AI Arms Race with Trey Blalock also on Spotify and YouTube Data & Confused Podcast 2025-11-17
Podcast: Weaponized AI and the End of Attribution also on Spotify and YouTube Data & Confused Podcast 2025-11-03
Assess and Address Practical Limitations of ATT&CK and ATLAS in Artificial Intelligence (AI) Risk Managementi MITRE ATT&CKcon 6 McLean, VA 2025-10-15
The Weaponization of AI: A 2025 Cyber Threat Briefing Private Financial Institution 2025-07-16
Cyber Threats & AI Weapons: The Shifting 2025 Landscape ISACA Portland Spring Training 2025-05-15
The Importance of Linux for the Future of Internet Security LinuxFest Northwest 2025-04-27
The Weaponization of AI, Its Impact on Organizations, and How to Respond. AI Governance Day by Portland AWS Users Group 2025-03-26
2025 Threat Landscape Dynamics ISSA Rainier 2025-02-27
Closing Keynote: 2024 Cybersecurity Recapitulation Critical Infrastructure Summit 2024 2024-11-08
The Weaponization of AI, Its Impact on Organizations, and How to Respond. Portland ISACA Spring Training 2024-05-14
Keynote: The Evolution of Cyber Attacks on Critical Infrastructure: Impact and Adaptation in the Age of Artificial Intelligence Critical Infrastructure Cybersecurity Summit 2023 2023-11-28
The Weaponization of AI, Its Impact on Financial Institutions, and How to Respond Private Financial Institution 2023-10-02
CISO panel discussion: Data and Risk at the Edge ISACA Portland Spring Training 2023-05-25
CISO panel discussion on Threat Intelligence SIM Seattle 2023-02-15
Critical Security Gaps and Unique Solutions for Vendor Assessments ISACA Puget Sound 2022-05-17
The Changing Threat Landscape and How Organizations Need to Respond Portland PMI Spring Conference 2022-05-06
Changes in Ransomware Attacks, Why Companies Are Still Failing to Respond, and What You Need to Do Now INTERFACE Portland 2022-03-17
Deepfakes, Voice Cloning, Synthetic Identities, and the Future of Fraud ISC2 Seattle Chapter 2022-03-03
The Changing Threat Landscape and How Organizations Need to Respond SIM Portland 2022-01-12
Critical Steps for Protecting Organizations from Ransomware ISSA Puget Sound 2021-10-21
Defending Organizations from Ransomware Attacks and Advanced Persistent Threats Private Financial Institution 2021-10-05
The Changing Threat Landscape and How Organizations Need to Respond SIM Seattle 2021-06-16
Keynote: The Changing Threat Landscape and How Organizations Need to Respond ISACA Portland 2021-05-24
Small segment on Colonial Pipeline Ransomware KOMO News Seattle 2021-05-12
Deep Dive into Emerging Threats and How to Defend Against Them. ISACA Puget Sound 2021-04-27
Segment on Cyber Hacking: State report finds growing threat to local businesses, individuals KOMO News Seattle 2020-11-11
Why Advanced Persistent Threats have Changed the Economics of Security ISC2 Seattle Chapter 2020-11-05
Emerging Threats, Tools, and Technologies Your Organization needs to be aware of now. ISACA Puget Sound 2020-10-23
How Attackers are leveraging Coronavirus-19 and what this means for the future of workforce security Private Financial Institution 2020-10-08
The second of two TV segments on hackers taking advantage of Covid-19 KOMO News Seattle 2020-04-28
The first of two TV segments on hackers taking advantage of Covid-19 KOMO News Seattle 2020-04-27
Two TV segments on Voice Cloning KOMO News Seattle 2020-02-03
Why APT's have Changed the Economics of Security Seattle University 2019-12-02
Automating defenses, incident response, and forensics GSLUG 2019-11-09
Building Stronger Security Teams with Threat Modeling Private Financial Institution 2019-10-21
Attacking and Defending Industries at Scale ISACA Puget Sound 2019-10-15
Why external reconnaissance is critical for your organization's security Private Financial Institution 2019-05-23
Leveraging Threat Modeling Techniques to Find Compliance Gaps, Prevent Data Leakage, and Protect your Organization’s Assets ISACA 2019 Spring Conference Puget Sound 2019-04-29
What your auditing process is missing by not including threat modeling and reconnaissance techniques. ISACA 2019 Spring Conference Puget Sound 2019-04-29
Leveraging Reconnaissance Techniques to Find Compliance Gaps, Prevent Data Leakage and Rrotect your Organization's Assets ISACA 2019 Spring Conference Puget Sound 2019-04-29
Attacking and Defending Financial Networks at Scale (Fintech version) Mojaloop Conference, Arusha Tanzania 2019-01-31
Using Automation to Build an Effective Security Response Strategy ISACA Willamette Valley Chapter 2018-11-09
Attacking and Defending Financial Networks at Scale (client-specific version) Private Financial Institution 2018-10-19
Security in Software Design and Implementation North Seattle College 2018-10-15
Attacking and Defending Financial Networks at Scale (client-specific version) Private Telecommunications Company, Paris France 2018-07-24
Automating defenses, incident response, and forensics ISACA 2018 Spring Conference Puget Sound 2018-04-23
Reconnaissance - What attackers do to prepare for an attack ISACA 2018 Spring Conference Puget Sound 2018-04-23
Introduction to Linux Performance Tuning GSLUG 2018-04-16
Automating Linux Defenses with Fail2Ban Linux Open Source Meetup 2018-02-19
Security Automation with IPTables GSLUG 2018-01-13
Asymmetric Warfare and Why FOSS is so Important Linux Open Source Meetup 2017-08-21
WireShark in 5-Minutes (lightning talk) Linux Open Source Meetup 2017-08-21
Security Automation: How security at scale is destroying traditional security tools BSides Boise 2016 2016-11-12
Revocation, the Frailty of PKI, Mat Caughron and Trey Blalock DefCon 24 Crypto and Privacy Village 2016-08-03
Securing Big Data DataDay Texas 2016 2016-01-16
Penetration Testing Big Data Data Day Texas 2015 2015-01-10
Protecting Your Company Against Cyber Security Attacks (Panel) NCTA Emerging Tech + Trends 2013 2013-11-12
A Socratic Dialogue on the Risks of Mobile Devices CISO Summit Atlanta 2012 2012-01-24

Featured Media

A curated sample of technical talks, media appearances, and podcast/video conversations. Each video also includes a direct YouTube link in case embedded playback is restricted by the browser or local preview environment.

Deepfakes and the AI arms race

A recent podcast/video discussion focused on deepfakes, AI-enabled deception, and the changing economics of cyber threats.

Watch on YouTube

Weaponized AI and the end of attribution

A recent discussion on how AI is changing attacker tradecraft, speed, scale, and the future of attribution.

Watch on YouTube

Linux and the future of internet security

A recent conference session showing the technical depth behind the broader keynote and threat-briefing work.

Watch on YouTube

Threat landscape briefing

A representative talk focused on how organizations should respond to changing attacker behavior and rising operational risk.

Watch on YouTube

Media segment on fraud and synthetic identity risk

Example of public-facing commentary on deepfakes, voice cloning, and the broader future of fraud.

Watch on YouTube

Technical conference presentation

An example of deeper technical material for security practitioners and technical conference audiences.

Watch on YouTube

For speaking topics, media positioning, and keynote inquiries, the primary destination is treyblalock.com.