A Decade of Exploitation Evolution

Logo
Presented by

Luke Willadsen, Sr. Security Consultant, EmberSec

About this talk

Enterprise tech has transformed over the past decade, bringing improvements not only in elasticity & efficiency but especially security. Ten years ago, vulnerabilities were the easiest path into systems, but operating systems and software have become more secure through better practices, consistent updates, & leading-edge security solutions. As tech evolved, so have the exploits, which now leverage human error more than ever; capitalizing on misconfigurations or leveraging tactics like social engineering - as a primary path to compromise. In this presentation, Luke will chronicle the evolution of malicious attacks over the last ten years and demonstrate how the security industry has responded through the implementation solutions that address the ever-changing nature of data breaches. The presentation will address: · Lessons learned from ten years of exploitation evolution · Why modern threats are effective even though there are more security tools on the market than ever before · Changes companies can make now to build stronger defenses Luke began his cybersecurity career in the US Navy, where he trained to conduct offensive security operations for the Department of Defense. He participated in daily computer network exploitation missions in support of national intelligence requirements and in support of protection against foreign nation-state sponsored hackers. After separating from the United States Navy, he joined the start-up company, IronNet Cybersecurity. Luke conducted penetration tests and vulnerability assessments, while also providing product development support and threat hunting capabilities. Following his time at IronNet, Luke worked as a Director in security consulting at Ankura Consulting Group, where he specialized in red teaming, penetration testing, intelligence gathering, threat hunting, digital forensics, and technical writing. Luke has a M.S. degree from Eastern Michigan University and is CISSP, OSCP, and CEH certified.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (784)
Subscribers (198257)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.