- Montreal 2024
Attackers write crafty code to compromise apps, steal data, and cover their tracks. To protect against them, you must understand them.
Learn from our real-world ecommerce breach investigations as we demonstrate weaknesses & exploit techniques.
See code used to create hidden persistent backdoors, covertly capture & exfiltrate credit card data, and hide evidence of attacks.
Leave with new protection strategies along with a top 10 cheat sheet.
View all 168 sessions
Kevin is a director of cybersecurity consulting, responsible for penetration testing, risk assessments, compliance audits, incident response, and cybersecurity advisory services. Kevin holds the CISSP, CISA, PMP, GIAC GSE, GX-CS, GX-IA, GX-IH, GCIA, GPPA, GCFA, GAWN, CEH and ISO 27001 LA certifications. Kevin’s research interests include hardware and embedded systems, and supporting the community by hosting hardware hacking villages at conferences including CypherCon, THOTCON, and SecretCon.