Trey Blalock

Speaker Bio

Pentest Bullet Points

CISO Bullet Points

Trey Blalock on StackExchange

Open Office Hours

Trey on LinkedIn

Recent Talks and Media

Closing Keynote: 2024 Cybersecurity Recapitulation Critical Infrastructure Summit 2024 2024-11-08
The Weaponization of AI, Its Impact on Organizations, and How to Respond. Portland ISACA Spring Training 2024-05-14
Keynote: The Evolution of Cyber Attacks on Critical Infrastructure: Impact and Adaptation in the Age of Artificial Intelligence Critical Infrastructure Cybersecurity Summit 2023 2023-11-28
The Weaponization of AI, Its Impact on Financial Institutions, and How to Respond Private Financial Institution 2023-10-02
CISO panel discussion: Data and Risk at the Edge ISACA Portland Spring Training 2023-05-25
CISO panel discussion on Threat Intelligence SIM Seattle 2023-02-15
Critical Security Gaps and Unique Solutions for Vendor Assessments ISACA Puget Sound 2022-05-17
The Changing Threat Landscape and How Organizations Need to Respond Portland PMI Spring Conference 2022-05-06
Changes in Ransomware Attacks, Why Companies Are Still Failing to Respond, and What You Need to Do Now INTERFACE Portland 2022-03-17
Deepfakes, Voice Cloning, Synthetic Identities, and the Future of Fraud ISC2 Seattle Chapter 2022-03-03
The Changing Threat Landscape and How Organizations Need to Respond SIM Portland 2022-01-12
Critical Steps for Protecting Organizations from Ransomware ISSA Puget Sound 2021-10-21
Defending Organizations from Ransomware Attacks and Advanced Persistent Threats Private Financial Institution 2021-10-05
The Changing Threat Landscape and How Organizations Need to Respond SIM Seattle 2021-06-16
Keynote: The Changing Threat Landscape and How Organizations Need to Respond ISACA Portland 2021-05-24
Small segment on Colonial Pipeline Ransomware KOMO News Seattle 2021-05-12
Deep Dive into Emerging Threats and How to Defend Against Them. ISACA Puget Sound 2021-04-27
Segment on Cyber Hacking: State report finds growing threat to local businesses, individuals KOMO News Seattle 2020-11-11
Why Advanced Persistent Threats have Changed the Economics of Security ISC2 Seattle Chapter 2020-11-05
Emerging Threats, Tools, and Technologies Your Organization needs to be aware of now. ISACA Puget Sound 2020-10-23
How Attackers are leveraging Coronavirus-19 and what this means for the future of workforce security Private Financial Institution 2020-10-08
The second of two TV segments on hackers taking advantage of Covid-19 KOMO News Seattle 2020-04-28
The first of two TV segments on hackers taking advantage of Covid-19 KOMO News Seattle 2020-04-27
Two TV segments on Voice Cloning KOMO News Seattle 2020-02-03
Why APT's have Changed the Economics of Security Seattle University 2019-12-02
Automating defenses, incident response, and forensics GSLUG 2019-11-09
Building Stronger Security Teams with Threat Modeling Private Financial Institution 2019-10-21
Attacking and Defending Industries at Scale ISACA Puget Sound 2019-10-15
Why external reconnaissance is critical for your organization's security Private Financial Institution 2019-05-23
Leveraging Threat Modeling Techniques to Find Compliance Gaps, Prevent Data Leakage, and Protect your Organization’s Assets ISACA 2019 Spring Conference Puget Sound 2019-04-29
What your auditing process is missing by not including threat modeling and reconnaissance techniques. ISACA 2019 Spring Conference Puget Sound 2019-04-29
Leveraging Reconnaissance Techniques to Find Compliance Gaps, Prevent Data Leakage and Rrotect your Organization's Assets ISACA 2019 Spring Conference Puget Sound 2019-04-29
Attacking and Defending Financial Networks at Scale (Fintech version) Mojaloop Conference, Arusha Tanzania 2019-01-31
Using Automation to Build an Effective Security Response Strategy ISACA Willamette Valley Chapter 2018-11-09
Attacking and Defending Financial Networks at Scale (client-specific version) Private Financial Institution 2018-10-19
Security in Software Design and Implementation North Seattle College 2018-10-15
Attacking and Defending Financial Networks at Scale (client-specific version) Private Telecommunications Company, Paris France 2018-07-24
Automating defenses, incident response, and forensics ISACA 2018 Spring Conference Puget Sound 2018-04-23
Reconnaissance - What attackers do to prepare for an attack ISACA 2018 Spring Conference Puget Sound 2018-04-23
Introduction to Linux Performance Tuning GSLUG 2018-04-16
Automating Linux Defenses with Fail2Ban Linux Open Source Meetup 2018-02-19
Security Automation with IPTables GSLUG 2018-01-13
Asymmetric Warfare and Why FOSS is so Important Linux Open Source Meetup 2017-08-21
WireShark in 5-Minutes (lightning talk) Linux Open Source Meetup 2017-08-21
Security Automation: How security at scale is destroying traditional security tools BSides Boise 2016 2016-11-12
Revocation, the Frailty of PKI, Mat Caughron and Trey Blalock DefCon 24 Crypto and Privacy Village 2016-08-03
Securing Big Data DataDay Texas 2016 2016-01-16
Penetration Testing Big Data Data Day Texas 2015 2015-01-10
Protecting Your Company Against Cyber Security Attacks (Panel) NCTA Emerging Tech + Trends 2013 2013-11-12
A Socratic Dialogue on the Risks of Mobile Devices CISO Summit Atlanta 2012 2012-01-24