1 minute read

ABOUTTHETALK SPEAKER BIO

For years Social Engineers have clung to Phishing as the focus for orgs to defend against and we’ve seen the email control stack improving every year. For Red Teams, there’s a myriad of other ways to employ SE during an attack in initial access, lateral movement,privescanddefenderevasion.

Tom has been working in InfoSec for over 15 years, with the second half of that predominantly spent on the Offensive side, with focuses on Red Team operations, Physical Security and Social Engineering and loves nothing more than breaking systems, buildings and people in order to help the GoodGuys(tm)getbetter.

Advertisement

Outside of work, Tom is a Dad of 4, Psychology and Language nerd, prolific gamer, enthusiast for all types of tech and sometimes manages to find time tosleep!

Socials&Links

@pretechst

This article is from: