Hunting Cyber Criminals
Based on Troia's new book, this talk provides an inside look at cyber criminal organizations and the techniques they are using to bypass advanced organization defenses.
This talk will provide insight into modern threat groups like The Dark Overlord, MABNA, and Gnostic Players. The discussion will detail the formation of the groups, information on their structure, their core members, and the tactics behind their attacks. This talk also looks at how the criminals are able to make money, the companies they have breached, and they clues they leave behind.
PRIVACY IN A SOCIAL (DARK WEB) WORLD
How Private is your Identity? How easily can someone infiltrate using information discovered on social media?
This talk looks at the different types of information freely available about any person online, and shows how cyber criminals are able to harvest that data and use it to develop ultimately hack into someone’s account. This talk also provides things all users can be doing, at home and at work, to protect themselves against these types of hackers.
KNOW YOUR ADVERSARY
Tactics used by cyber criminals with a Live Hack Simulation using NSA's Stolen digital weapons
When NSA’s digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. What do these tools mean for the average user? How can they protect themselves? This talk aims to educate the audience by providing a history of these digital weapons, a demonstration of how they are used, and a demonstration a how these tools can easily hack through a live network.
STRATEGIES TO SECURING YOUR ORGANIZATION
How you can secure your organization against modern cyber criminals.
This presentation highlights modern threats like ransomware and malware, and provides ways your organization can implement a successful cybersecurity program by looking at techniques designed to stop criminals from gaining access to your network.
Interested in Booking
Vinny Troia to Speak at
Your Next Event?
A Live network hack demonstrating tools and social engineering techniques used by hackers to infiltrate fully secure networks.
Understand how your organization can implement a successful cybersecurity program by learning more about Social Engineering, and the various methods used by modern cyber criminals to gain access to your company’s network and critical files.
INFORMATION SECURITY 3.0
You Can't know where you are going if you don't know where you've been.
This presentation focuses on the successes and failures of previous security practices, and will show how the future of our industry can be defined through detection and response capabilities built on top of behavioral endpoint analysis and user behavior analytics (UBA).