ºÝºÝߣshows by User: StevenHatfield1 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: StevenHatfield1 / Sat, 03 Oct 2015 21:06:20 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: StevenHatfield1 How I Hacked The Government And Got Away With It /StevenHatfield1/how-i-hacked-the-government-and-got-away-with-it ntxissacsc3steven-hatfield-how-i-hacked-thegovernment-151003210620-lva1-app6891
In this presentation I spoke about how I found an information disclosure vulnerability within a Federal CyberSecurity training website, was able to report it responsibly, and the issues that came up as I attempted to do so.]]>

In this presentation I spoke about how I found an information disclosure vulnerability within a Federal CyberSecurity training website, was able to report it responsibly, and the issues that came up as I attempted to do so.]]>
Sat, 03 Oct 2015 21:06:20 GMT /StevenHatfield1/how-i-hacked-the-government-and-got-away-with-it StevenHatfield1@slideshare.net(StevenHatfield1) How I Hacked The Government And Got Away With It StevenHatfield1 In this presentation I spoke about how I found an information disclosure vulnerability within a Federal CyberSecurity training website, was able to report it responsibly, and the issues that came up as I attempted to do so. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ntxissacsc3steven-hatfield-how-i-hacked-thegovernment-151003210620-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation I spoke about how I found an information disclosure vulnerability within a Federal CyberSecurity training website, was able to report it responsibly, and the issues that came up as I attempted to do so.
How I Hacked The Government And Got Away With It from Steven Hatfield
]]>
639 7 https://cdn.slidesharecdn.com/ss_thumbnails/ntxissacsc3steven-hatfield-how-i-hacked-thegovernment-151003210620-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger /slideshow/social-engineering-101-or-the-art-of-how-you-got-owned-by-that/47196747 stevenhatfield-se101-150420090400-conversion-gate01
My presentation that was given at North Texas ISSA Second Annual Cyber Security Conference on 4/25/2015. This presentation covers the basics of Social Engineering and provides a good base of knowledge for anyone looking to understand more about this skill, along with where to learn more.]]>

My presentation that was given at North Texas ISSA Second Annual Cyber Security Conference on 4/25/2015. This presentation covers the basics of Social Engineering and provides a good base of knowledge for anyone looking to understand more about this skill, along with where to learn more.]]>
Mon, 20 Apr 2015 09:04:00 GMT /slideshow/social-engineering-101-or-the-art-of-how-you-got-owned-by-that/47196747 StevenHatfield1@slideshare.net(StevenHatfield1) Social Engineering 101 or The Art of How You Got Owned by That Random Stranger StevenHatfield1 My presentation that was given at North Texas ISSA Second Annual Cyber Security Conference on 4/25/2015. This presentation covers the basics of Social Engineering and provides a good base of knowledge for anyone looking to understand more about this skill, along with where to learn more. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stevenhatfield-se101-150420090400-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My presentation that was given at North Texas ISSA Second Annual Cyber Security Conference on 4/25/2015. This presentation covers the basics of Social Engineering and provides a good base of knowledge for anyone looking to understand more about this skill, along with where to learn more.
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger from Steven Hatfield
]]>
794 4 https://cdn.slidesharecdn.com/ss_thumbnails/stevenhatfield-se101-150420090400-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social engineering 101 or The Art of How You Got Owned by That Random Stranger /slideshow/social-engineering-101-or-how-that-total-stranger-just-owned-you/45233937 yy8dmnxrlkryawwrjbxd-signature-730117c55aa706c5f58748cc96934639af0bcda8d27757b311f1b3890b1c944a-poli-150227120321-conversion-gate01
This covers the basics of Social Engineering, different attack vectors that have worked with real world examples from friends currently conducting such tests, provide different sources to gather information on this topic, and present ways to prevent such attacks from happening in the future.]]>

This covers the basics of Social Engineering, different attack vectors that have worked with real world examples from friends currently conducting such tests, provide different sources to gather information on this topic, and present ways to prevent such attacks from happening in the future.]]>
Fri, 27 Feb 2015 12:03:21 GMT /slideshow/social-engineering-101-or-how-that-total-stranger-just-owned-you/45233937 StevenHatfield1@slideshare.net(StevenHatfield1) Social engineering 101 or The Art of How You Got Owned by That Random Stranger StevenHatfield1 This covers the basics of Social Engineering, different attack vectors that have worked with real world examples from friends currently conducting such tests, provide different sources to gather information on this topic, and present ways to prevent such attacks from happening in the future. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/yy8dmnxrlkryawwrjbxd-signature-730117c55aa706c5f58748cc96934639af0bcda8d27757b311f1b3890b1c944a-poli-150227120321-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This covers the basics of Social Engineering, different attack vectors that have worked with real world examples from friends currently conducting such tests, provide different sources to gather information on this topic, and present ways to prevent such attacks from happening in the future.
Social engineering 101 or The Art of How You Got Owned by That Random Stranger from Steven Hatfield
]]>
1165 8 https://cdn.slidesharecdn.com/ss_thumbnails/yy8dmnxrlkryawwrjbxd-signature-730117c55aa706c5f58748cc96934639af0bcda8d27757b311f1b3890b1c944a-poli-150227120321-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-StevenHatfield1-48x48.jpg?cb=1523521955 • Client dedicated Vulnerability Manager for Fortune 500 companies • Worked with nCircle ensuring Vulnerability Management of over 50,000 systems across the Globe • Worked with Qualys ensuring Vulnerability Management of over 2,000 systems across the Globe • Assisted Information Security Manager in rebuilding a Vulnerability Management program as required for client's needs • Created Vulnerability Remediation tracking spreadsheets as necessary for client's requirements • Monitored multiple outlets for conducting Threat Intel http://drb0n3z.wordpress.com/ https://cdn.slidesharecdn.com/ss_thumbnails/ntxissacsc3steven-hatfield-how-i-hacked-thegovernment-151003210620-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds StevenHatfield1/how-i-hacked-the-government-and-got-away-with-it How I Hacked The Gover... https://cdn.slidesharecdn.com/ss_thumbnails/stevenhatfield-se101-150420090400-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/social-engineering-101-or-the-art-of-how-you-got-owned-by-that/47196747 Social Engineering 101... https://cdn.slidesharecdn.com/ss_thumbnails/yy8dmnxrlkryawwrjbxd-signature-730117c55aa706c5f58748cc96934639af0bcda8d27757b311f1b3890b1c944a-poli-150227120321-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/social-engineering-101-or-how-that-total-stranger-just-owned-you/45233937 Social engineering 101...