SIN-ACK INDUSTRIES
~/talks

TALKS

Beyond The Hype: Zero Trust From An Attacker's Perspective
Beyond The Hype: Zero Trust From An Attacker's Perspective
Identiverse · 2019-06-25
Washington, DC
Cutting through the zero trust marketing hype by examining what actually changes from an attacker's point of view.
Building Security Through Culture
Building Security Through Culture
Craft Conf · 2016-04-29
Budapest, HU
Security as a cultural practice, not just a technical one. Co-presented with Destiny Montague.
The Art and Craft of a Meaningful Security Culture
The Art and Craft of a Meaningful Security Culture
UTMessan · 2016-03-10
Reykjavik, IS
Why security culture matters more than security tools, and how to cultivate it meaningfully.
Crafting an Effective Security Organisation
Crafting an Effective Security Organisation
QCon NYC · 2015-06-11
New York, NY
Updated version of the KiwiCon talk on building effective security teams, delivered as Director of Security at Etsy.
Crafting an Effective Security Organisation
Crafting an Effective Security Organisation
KiwiCon 8 · 2014-12-11
Wellington, NZ
How to build a security team that works — hiring, culture, trust, and the 'don't hire assholes' rule.
Continuously Deploying Culture 2.0
Continuously Deploying Culture 2.0
Agile Island · 2014-11-08
Reykjavik, IS
Deploying security culture at Etsy — building trust and collaboration between security and engineering teams.
</CLOUD>
</CLOUD>
Financial Services Security Group · 2013-09-19
Reykjavik, IS
Cloud security considerations for financial services. Co-presented with Ymir Vigfusson.
Hinn blakaldi sannleikur madur er alltaf ooruggur
Hinn blakaldi sannleikur madur er alltaf ooruggur
UTMessan · 2013-02-08
Reykjavik, IS
Offensive techniques that inform defensive strategies. Analysis of CVE-2012-4792 and ROP-based DEP bypass on fully patched Windows 7.
Modern Post-Exploitation Strategies
Modern Post-Exploitation Strategies
44Con / Nordic Security Con · 2012-09-07
London, UK
Scalable post-exploitation strategies and a cross-platform RPC-based Python post-exploitation framework.
Pragmatic Approach to Breaking Mobile Apps
Pragmatic Approach to Breaking Mobile Apps
Icelandic Computer Society · 2012-01-12
Reykjavik, IS
Rapidly validating mobile app security against a threat model. Case study: Nasdaq DirectorsDesk crypto flaws.
VAASeline: VNC Attack Automation Suite
VAASeline: VNC Attack Automation Suite
Black Hat Europe · 2009-04-17
Amsterdam, NL
Automating post-exploitation actions against VNC servers at scale.
Phlashdance: Discovering Permanent Denial of Service Attacks Against Embedded Systems
Phlashdance: Discovering Permanent Denial of Service Attacks Against Embedded Systems
EUSecWest · 2008-05-21
London, UK
Permanent denial of service via firmware update vulnerabilities in embedded systems. Introduced the concept of 'phlashing'.
12 talks
F1:HelpF5:LCD~:Console↑↓:NavEnter:Select/:SearchR:RSSSIN-ACK Shell v1.0.3
[~/home]