Ask the X-Force Red Hackers Anything 

Wed February 12, 2020 12:08 PM

Have you ever considered what you’d ask if you had a chance to pick the brains of some of the industry’s top hackers? If not, you better start thinking — because the next IBM Security Community Ask Me Anything (AMA) webinar will feature 6 hackers from X-Force Red!

X-Force Red is an autonomous team of hackers, within IBM Security, hired to break into organizations and uncover vulnerabilities before criminals have a chance to exploit them. Though their methods may parallel the techniques used by criminal attackers, the goal for X-Force Red is always to help clients harden their defenses and protect their most important assets.

In the past you may have seen the X-Force Red team present at a conference or in a webinar – but in those cases the presenters controlled the content. Now, for the very first time, we’re turning that model upside down and putting YOU in the driver’s seat.

Join us on Feb. 6 at 11:00 a.m. ET for an “Ask Our Hackers Anything” webinar, featuring six of the top X-Force Red hackers.

The X-Force Red hackers participating in our AMA are:

Charles Henderson, Global Managing Partner and Head of X-Force Red, @angus_tx
Stephanie Carruthers (a.k.a. Snow), Global Social Engineering Expert
, @_sn0ww
Jared Haight, Red Team Hacker
, @jaredhaight
Dustin Heywood (a.k.a. Evil Mog), Hacker
, @evil_mog
Adam Laurie (a.k.a. Major Malfunction), Hardware Hacking Expert
, @rfidiot
Steve Ocepek, Hacking CTO
, @nosteve

Watch the on-demand webinar now

Meet our hackers:

Charles Henderson is a business executive, hacker and vulnerability researcher who uses his unique perspective to build valuable security programs for clients. He has more than two decades of experience leading hacking and vulnerability research teams. Charles is frequently interviewed by CNN, Fox Business, NBC and other major television and print media outlets due to his vast hacking experience and ability to translate technical concepts into a language that all audiences – security and non-security – can understand. Charles has been hacking since he was nine years old.

Stephanie Carruthers leads the social engineering practice, focusing on open-source intelligence gathering, phishing, vishing and physical security assessments for X-Force Red clients. In 2014, after practicing social engineering techniques for only two years, Stephanie won the Def Con social engineering competition. She has been building social engineering practices and engagements from the ground up ever since.

Jared Haight is a member of the X-Force Red Adversary Simulation team. He brings over 15 years of IT experience covering development, systems administration, and information security. This background allows him to quickly assess environments and provide effective and practical guidance on security issues. He is a developer behind several open source projects including PS>Attack and the Faction C2 Framework. Jared holds the Offensive Security Certified Professional (OSCP) certification and has presented and provided training at several prominent industry conferences. Jared has been hacking since he was 15 years old.

For more than a decade, Dustin Heywood has honed his expertise as a strategic information security professional. As a senior X-Force Red hacker, he serves as a trusted consultant to clients and peers, specializing in password assessments and password security research. Dustin has managed in-house security "blue teams," red teams, security controls and has performed countless penetration tests. He was also a glider pilot, air cadet and glider familiarization pilot in the Canadian forces and a civilian contractor and is currently a senior pyrotechnician, restricted locksmith tools license holder and a certified scuba diver. Dustin has been hacking since he was nine years old.

With four decades of information technology and security experience, Adam Laurie is a founding father of hacking. Adam and his brother wrote a plug in for Apache, called Apache-SSL. It became the first secure, open source web server, and was used by 70 percent of the world's web server market.He also built and integrated systems for enterprise telecommunication companies and banks and transformed an underground nuclear bunker into his own data center. Adam is a Def Con quartermaster, meaning he is responsible for all of the equipment used at the conference. Over the years, Adam has watched the conference grow from 150 to 40,000 attendees. Adam has been hacking since he was 16 years old.

Steve Ocepek has received five patents in network security in the past 15-plus years. With extensive experience in both penetration testing and network defense, Steve builds, manages, delivers security services to IBM's global client base. While Steve's expertise spans across network, application, IoT and every other type of security, he particularly has an advanced hacking skillset for cloud environments and has built cloud infrastructures from the ground up. Steve has been hacking since he was four years old.


0 Favorited
0 Files