-
Continue reading →: So You Want to Learn ICS Security…Folks often approach me with a question along the lines of, “How do I learn ICS security?” I’ve already talked about the question with regards to general cybersecurity, so let me take a crack at it. There are a lot of parallels between that question and, “How do I get…
-
Continue reading →: PancakesCon 2020: Quarantine EditionThis page is archived from PancakesCon 2020. If you are resolving to this page, please clear your DNS cache and visit https://pancakescon.wordpress.com/ PancakesCon 2020 Thank you for your attendance and support; see you next time! Media coverage: https://www.csoonline.com/article/3533422/virtual-security-conferences-fill-void-left-by-canceled-face-to-face-events.html Info and CFP #PancakesCon is an impromptu, virtual hacker con which occurred…
-
Avant Technology Insights Podcast: A Mindshift in IT Security
Published by
on
Continue reading →: Avant Technology Insights Podcast: A Mindshift in IT SecurityJan 23, 2020 SCADA vulnerabilities, nation/state actors, and a host of other IT security issues factor heavily in the role of Principal Incident Responder Lesley Carhart. Episode 6 of “AVANT Technology Insights with Ken Presti” shows you where the IT Security “puck” is going.
-
Continue reading →: Derbycon 2019 – Confessions of an IT OT Marriage Counselor
I discuss the trials and tribulations of trying to bring IT cybersecurity and Operational Technology (ICS) teams together to tackle new threats.
-
Continue reading →: KringleCon 2019 – Over 90,000: Ups and Downs of my InfoSec Twitter Journey
I chat about what it’s like to be an infosec “influencer” on social media – the cost, upsides, downsides, and what I’ve learned.
-
Continue reading →: BSidesKC 2019 Keynote – Choose Your Own Cyberpunk Dystopia
I discuss the saga of my apartment migrating to “smart apartment” technology. Why I was concerned about the system’s cybersecurity and privacy policy, what I found, and what came of my research.
-
Continue reading →: Bad, Good, and Super-Cringey Infosec Lab EnvironmentsI’ve had the (dubious) honor and privilege of witnessing a couple decades of IT educational lab environments. Even after well over a decade of full-time cybersecurity work, I often still have to re-certify on various tasks which require I complete a live lab or CTF (capture the flag). I build…
-
Continue reading →: Human Honeypots: I Make Friends (and So Should You)I recently ran across a tweet by the very insightful Fernando Montenegro in which he makes an interesting point about a phenomenon we occasionally run into while examining social media profiles associated with a business: Do people also find it creepy/sleazy coming across fake LinkedIn profiles when researching a company/vendor?…
-
Continue reading →: Life Moves Fast, Smart-Apartment Style
I had no idea when I got the initial email about my apartment going “smart” how much my life would change in the course of a month. At the time I was speaking in front of a room of cybersecurity journalists, and it was all I could do to keep…




