Hacker Hotshots

Presentations From Influential CEO, CTO’s, CISO’s & CMO’s from Leading Cybersecurity Companies

Since 2012 we’ve been inviting Cybersecurity Professionals to present their subject-matter expertize.


Our Latest Presentations

Every month we will be showcasing some of the world’s most pioneering Cybersecurity companies through our “Hacker Hotshows” web show. If you’d like to take part please send us a message here.

Q4 2020

Brandshield

Presentation

Itai Galmor

November 19th 2020

Cobwebs Technologies

Presentation

Udi Levy

November 23rd 2020

Next event coming Wednesday 26th – we will publish this ASAP

Some Of Our Favorite Past Presentations

Sophos

CrowdSource Security

Joshua Saxe

Cloudflare

DOS Attacks!

Matthew Prince

CrowdStrike

Free Tools to Monitor and Secure Your Wi-Fi Network

Jason Wood

Ponemon Institute

CISOs’s….The Good, The Bad & The Ugly

Dr. Larry Ponemon

FireEye

OWASP Broken Web Applications VM

Chuck Willis

Rapid7

Introduction to Network Traffic Analysis

Jonathan Chipp

Oracle

Multi-Factor Authentication

Abby Porter

Splunk

Penetrating the Cloud Opportunities and Challenges for Business

Andi Mann

Forcepoint

Evading Deep Inspection For Fun And Shell

Antti Levomaki

Dragos Security

Smart Nest Thermostat: A Smart Spy in Your Home

Daniel Buentello

Palo Alto Networks

UnVeiling LTE Cloud Security

Dr. Galina Pildush

SANS Institute

Hacking as an Act of War

G Mark Hardy

TrustArc

Are Your Audience-Building Efforts Suffering Due to Consumer Privacy Concerns?

Joanne Furtsch

F-Secure Corporation

Eliminate Corporate Reputation Threat

Joonas Kuorilehto

SimpleRisk

The SimpleRisk Solution

Josh Sokol

Cure53

HTML5 Security Cheat Sheet

Mario Heiderich

Contrast Security

Looking For A Simple Tool To Test Web Apps? Contrast Security Scanner Explained

Jeff Williams

Intel Corporation

Mobility in the Cloud

Steve Orrin

Atlassian

Passive Bluetooth Monitoring in Scapy

Ryan Holeman

Facebook

Investigating Powershell Attacks

Ryan Kazanciyan

Amazon

Distributed File Storage Using JavaScript Botnets (HiveMind)

Sean Malone

Cisco

Eyes on IZON Surveilling IP Camera Security

Mark Stanislav

Agarri

Attacking XML Processing

Nicolas Gregoire

Alert Logic

Hidden Risks of Component-Based Software Development

Ryan Berg

KPMG

Identity and Access Management for the Cloud — The Hybrid Reality

Michael Hatjiyannis

Cyber Defense Magazine

Bulletproof IT Security

Gary Miliefsky

Alert Farsight Security

Abuse of CPE Devices and Recommended Fixes

Dr. Paul Vixie

Booz Allen Hamilton

CCTV Setup, Attack Vectors, and Laws

Joshua Schroeder

InGuardians

Hacking Survival (IT for Preppers)

Larry Pesce

Herjavec Group

Secrets Of Running An InfoSec Consulting Business

Dr. Larry Ponemon

Denim Group

The Magic of Symbiotic Security Creating an Ecosystem of Security Systems

Dan Cornell

Imperva

Take the Guesswork Out of Your Network Security Investments

Don Shin

Fortinet

“Bring Your Own Destruction” BYOD

Aamir Lakhani

Awake Security

How To Crack SIP Authentication & Listen To VoIP Calls In 15-Minutes!

Eric DeShetler

Barracuda MSP

The Annihilation of Usernames and Passwords (For Real)

Gerry Texeira

IOActive

How To Security Audit iPhone and iPad Applications

Ilja van Sprundel

Absolute Software

This Is I.T.

Guy Helmer

Clearpath

Cloudstack Rapid Fire Vendor Responses

Jay Judkowitz

Raytheon

How To Perform A Basic System Scan And Exploit XSS

Jeremy Faircloth