Join Our Newsletter [Over 50K Subscribers]
Let us send you information on ticket discounts, speaking opportunities and a ton more!
We’ve got a real winner here – Hacker Hotshot web show: August 1st at 1200 EST titled: “Website Impersonation Attacks Who is REALLY Behind That Mask?” with Jason Mortensen.
We are very excited about all our events this July and August and Jason is an excellent example of the talent and expertise that we are bringing into the show.
A few words on Jason Mortensen and Motorola Mobility
Jason is a Senior IT Security Architect at Motorola Mobility. As most of our audience will know, Motorola Mobility LLC is a US telecomms corporation owned by Google (since 2011), and are behind the wildly popular Atrix 4G, Droid Bionic, XOOM, & Droid RAZR Android Phones. To hear from a security architect from within this legendary organization is a privilege and we warmly welcome Jason to the show. If you are an Android user then you really ought to be on the show; you can ask question live and direct during the stream.
Jason Mortensen has been involved within the information security space for more than a decade. He has demonstrated technical leadership in numerous areas including web application security, risk assessment control and management, end-user authentication, identity management, and security standards development.
About the Web Show: Website Impersonation Attacks Who is REALLY Behind That Mask?
Jason will be presenting several issues within his talk, but in summary here are three main points that you will learn by attending our Hacker Hotshot show:
Firstly, you’ll learn how web applications are one of the most popular methods that business-critical data is transmitted to end-users, and subsequently, how these unfortunately represent one of the easiest attack profiles for a hacker.
Secondly, Jason will outline how authentication weaknesses within web sites platforms can be particularly vulnerable to cyber attacks that, in his own words:
‘…essentially allow attackers to walk through your virtual front door to steal your critical information….’
Thirdly, this Concise Courses Hacker Hotshots show will expose key hacking techniques that are deployed towards vulnerable web site authentication systems. He will also (time permitting!) suggest provide countermeasures to protect against such threats.
We all know that enterprises are facing, on a daily basis, a wide range of cyber-security threats that specifically target their networks, web applications and even their employees (through social engineering). With the increase of private and competitive data being pushed to the Cloud (and online) by business organizations comes a broader attack surface for hackers and cyber criminals. Said simply, there has never been as great an opportunity for hackers looking to breach vulnerable company Websites and IT networks. More systems, hardware, networks and processes mean more potential holes and places to launch and coordinate an attack.
Don’t take it personally!
Advanced Persistent Threats seem to intensify, mature and spawn every week – most likely as a result of the ease of automating cyber attacks. Scanning networks, servers etc for vulnerabilities is highly efficient and effective. Once a hacker finds an open door then he or she will see what can be gleaned. If there is anything of value then sure, a competitor can be contacted but that will prove highly risky, alternatively the attack will in most cases transform your compromised box into an additional bot, or for nefarious marketing reasons and spew out tons of spam (or backlinks or SEO purposes). The point here is that they (the hacker) did not likely target you and your web site simply ‘because they don’t like you‘ but rather because their automated bot found a hole in your security.
We are really excited to have Jason share his expertise with us and gain an insight into how and why websites can be hacked – and for what gain. We have outlined only a few reasons why a web site (or computer network) might be hacked but there are likely dozens of reasons, stemming from hacktivism through to a desire to fuel a hackers ego. The question is – who is behind the attack, or better said, who is behind the mask! Find out August 1st at 1200 EST.
The link and show will forever be on the same page so if you are reading this post August 1st then have no fear, the web show along with transcribed questions and answers will be there.
Please don’t forget to ask questions either on this page or the sign-up/ web show page.