CINXE.COM
Speakers - Hacker Halted 2024
<!DOCTYPE html> <html dir="ltr" lang="en-US" prefix="og: https://ogp.me/ns#" prefix="og: http://ogp.me/ns# fb: http://ogp.me/ns/fb#" class="no-js no-svg"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="http://gmpg.org/xfn/11"> <!-- All in One SEO 4.7.3.1 - aioseo.com --> <meta name="robots" content="max-image-preview:large" /> <link rel="canonical" href="https://hackerhalted.com/speakers/" /> <meta name="generator" content="All in One SEO (AIOSEO) 4.7.3.1" /> <meta property="og:locale" content="en_US" /> <meta property="og:site_name" content="Hacker Halted 2024 - Cybersecurity Training and Conference" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Speakers - Hacker Halted 2024" /> <meta property="og:url" content="https://hackerhalted.com/speakers/" /> <meta property="article:published_time" content="2020-07-08T17:09:11+00:00" /> <meta property="article:modified_time" content="2024-10-30T16:22:35+00:00" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="Speakers - Hacker Halted 2024" /> <script type="application/ld+json" class="aioseo-schema"> {"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/hackerhalted.com\/speakers\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/hackerhalted.com\/#listItem","position":1,"name":"Home","item":"https:\/\/hackerhalted.com\/","nextItem":"https:\/\/hackerhalted.com\/speakers\/#listItem"},{"@type":"ListItem","@id":"https:\/\/hackerhalted.com\/speakers\/#listItem","position":2,"name":"Speakers","previousItem":"https:\/\/hackerhalted.com\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/hackerhalted.com\/#organization","name":"Hacker Halted 2024","description":"Cybersecurity Training and Conference","url":"https:\/\/hackerhalted.com\/"},{"@type":"WebPage","@id":"https:\/\/hackerhalted.com\/speakers\/#webpage","url":"https:\/\/hackerhalted.com\/speakers\/","name":"Speakers - Hacker Halted 2024","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/hackerhalted.com\/#website"},"breadcrumb":{"@id":"https:\/\/hackerhalted.com\/speakers\/#breadcrumblist"},"datePublished":"2020-07-08T11:09:11-06:00","dateModified":"2024-10-30T10:22:35-06:00"},{"@type":"WebSite","@id":"https:\/\/hackerhalted.com\/#website","url":"https:\/\/hackerhalted.com\/","name":"Hacker Halted 2024","description":"Cybersecurity Training and Conference","inLanguage":"en-US","publisher":{"@id":"https:\/\/hackerhalted.com\/#organization"}}]} </script> <!-- All in One SEO --> <script>window._wca = window._wca || [];</script> <!-- This site is optimized with the Yoast SEO Premium plugin v23.7 (Yoast SEO v23.7) - https://yoast.com/wordpress/plugins/seo/ --> <title>Speakers - Hacker Halted 2024</title> <link rel="canonical" href="https://hackerhalted.com/speakers/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Speakers" /> <meta property="og:url" content="https://hackerhalted.com/speakers/" /> <meta property="og:site_name" content="Hacker Halted 2024" /> <meta property="article:publisher" content="https://www.facebook.com/hackerhalted" /> <meta property="article:modified_time" content="2024-10-30T16:22:35+00:00" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:site" content="@hackerhalted" /> <meta name="twitter:label1" content="Est. reading time" /> <meta name="twitter:data1" content="49 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://hackerhalted.com/speakers/","url":"https://hackerhalted.com/speakers/","name":"Speakers - Hacker Halted 2024","isPartOf":{"@id":"https://hackerhalted.com/#website"},"datePublished":"2020-07-08T17:09:11+00:00","dateModified":"2024-10-30T16:22:35+00:00","breadcrumb":{"@id":"https://hackerhalted.com/speakers/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://hackerhalted.com/speakers/"]}]},{"@type":"BreadcrumbList","@id":"https://hackerhalted.com/speakers/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://hackerhalted.com/"},{"@type":"ListItem","position":2,"name":"Speakers"}]},{"@type":"WebSite","@id":"https://hackerhalted.com/#website","url":"https://hackerhalted.com/","name":"Hacker Halted 2024","description":"Cybersecurity Training and Conference","publisher":{"@id":"https://hackerhalted.com/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://hackerhalted.com/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://hackerhalted.com/#organization","name":"Hacker Halted 2024","url":"https://hackerhalted.com/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://hackerhalted.com/#/schema/logo/image/","url":"https://hackerhalted.com/wp-content/uploads/2017/10/HH-apple-icon.png","contentUrl":"https://hackerhalted.com/wp-content/uploads/2017/10/HH-apple-icon.png","width":144,"height":144,"caption":"Hacker Halted 2024"},"image":{"@id":"https://hackerhalted.com/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/hackerhalted","https://x.com/hackerhalted"]}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//www.googletagmanager.com' /> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel='preconnect' href='https://fonts.gstatic.com' crossorigin /> <link rel="alternate" type="application/rss+xml" title="Hacker Halted 2024 » Feed" href="https://hackerhalted.com/feed/" /> <link rel="alternate" type="application/rss+xml" title="Hacker Halted 2024 » Comments Feed" href="https://hackerhalted.com/comments/feed/" /> <meta property="og:title" content="Speakers"/> <meta property="og:type" content="article"/> <meta property="og:url" content="https://hackerhalted.com/speakers/"/> <meta property="og:site_name" content="Hacker Halted 2024"/> <meta property="og:description" content="Hacker Halted 2024 Speakers Elizabeth Stephens CEO, DBS Cyber LLC Bio Elizabeth is the CEO of DBS Cyber LLC, a company whose mission is to protect American families. She is a cybersecurity expert with a distinguished background leading intelligence teams in high-stakes environments. Formerly the Director of Data Center Cyber Risk Intelligence at Microsoft, Elizabeth’s"/> <!-- This site uses the Google Analytics by MonsterInsights plugin v9.2.2 - Using Analytics tracking - https://www.monsterinsights.com/ --> <script src="//www.googletagmanager.com/gtag/js?id=G-XV3P9T82TM" data-cfasync="false" data-wpfc-render="false" type="text/javascript" async></script> <script data-cfasync="false" data-wpfc-render="false" type="text/plain" data-cli-class="cli-blocker-script" data-cli-script-type="analytics" data-cli-block="true" data-cli-element-position="head"> var mi_version = '9.2.2'; var mi_track_user = true; var mi_no_track_reason = ''; var MonsterInsightsDefaultLocations = {"page_location":"https:\/\/hackerhalted.com\/speakers\/"}; if ( typeof MonsterInsightsPrivacyGuardFilter === 'function' ) { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsPrivacyGuardFilter( MonsterInsightsExcludeQuery ) : MonsterInsightsPrivacyGuardFilter( MonsterInsightsDefaultLocations ); } else { var MonsterInsightsLocations = (typeof MonsterInsightsExcludeQuery === 'object') ? MonsterInsightsExcludeQuery : MonsterInsightsDefaultLocations; } var disableStrs = [ 'ga-disable-G-XV3P9T82TM', ]; /* Function to detect opted out users */ function __gtagTrackerIsOptedOut() { for (var index = 0; index < disableStrs.length; index++) { if (document.cookie.indexOf(disableStrs[index] + '=true') > -1) { return true; } } return false; } /* Disable tracking if the opt-out cookie exists. */ if (__gtagTrackerIsOptedOut()) { for (var index = 0; index < disableStrs.length; index++) { window[disableStrs[index]] = true; } } /* Opt-out function */ function __gtagTrackerOptout() { for (var index = 0; index < disableStrs.length; index++) { document.cookie = disableStrs[index] + '=true; expires=Thu, 31 Dec 2099 23:59:59 UTC; path=/'; window[disableStrs[index]] = true; } } if ('undefined' === typeof gaOptout) { function gaOptout() { __gtagTrackerOptout(); } } window.dataLayer = window.dataLayer || []; window.MonsterInsightsDualTracker = { helpers: {}, trackers: {}, }; if (mi_track_user) { function __gtagDataLayer() { dataLayer.push(arguments); } function __gtagTracker(type, name, parameters) { if (!parameters) { parameters = {}; } if (parameters.send_to) { __gtagDataLayer.apply(null, arguments); return; } if (type === 'event') { parameters.send_to = monsterinsights_frontend.v4_id; var hookName = name; if (typeof parameters['event_category'] !== 'undefined') { hookName = parameters['event_category'] + ':' + name; } if (typeof MonsterInsightsDualTracker.trackers[hookName] !== 'undefined') { MonsterInsightsDualTracker.trackers[hookName](parameters); } else { __gtagDataLayer('event', name, parameters); } } else { __gtagDataLayer.apply(null, arguments); } } __gtagTracker('js', new Date()); __gtagTracker('set', { 'developer_id.dZGIzZG': true, }); if ( MonsterInsightsLocations.page_location ) { __gtagTracker('set', MonsterInsightsLocations); } __gtagTracker('config', 'G-XV3P9T82TM', {"forceSSL":"true","link_attribution":"true"} ); window.gtag = __gtagTracker; (function () { /* https://developers.google.com/analytics/devguides/collection/analyticsjs/ */ /* ga and __gaTracker compatibility shim. */ var noopfn = function () { return null; }; var newtracker = function () { return new Tracker(); }; var Tracker = function () { return null; }; var p = Tracker.prototype; p.get = noopfn; p.set = noopfn; p.send = function () { var args = Array.prototype.slice.call(arguments); args.unshift('send'); __gaTracker.apply(null, args); }; var __gaTracker = function () { var len = arguments.length; if (len === 0) { return; } var f = arguments[len - 1]; if (typeof f !== 'object' || f === null || typeof f.hitCallback !== 'function') { if ('send' === arguments[0]) { var hitConverted, hitObject = false, action; if ('event' === arguments[1]) { if ('undefined' !== typeof arguments[3]) { hitObject = { 'eventAction': arguments[3], 'eventCategory': arguments[2], 'eventLabel': arguments[4], 'value': arguments[5] ? arguments[5] : 1, } } } if ('pageview' === arguments[1]) { if ('undefined' !== typeof arguments[2]) { hitObject = { 'eventAction': 'page_view', 'page_path': arguments[2], } } } if (typeof arguments[2] === 'object') { hitObject = arguments[2]; } if (typeof arguments[5] === 'object') { Object.assign(hitObject, arguments[5]); } if ('undefined' !== typeof arguments[1].hitType) { hitObject = arguments[1]; if ('pageview' === hitObject.hitType) { hitObject.eventAction = 'page_view'; } } if (hitObject) { action = 'timing' === arguments[1].hitType ? 'timing_complete' : hitObject.eventAction; hitConverted = mapArgs(hitObject); __gtagTracker('event', action, hitConverted); } } return; } function mapArgs(args) { var arg, hit = {}; var gaMap = { 'eventCategory': 'event_category', 'eventAction': 'event_action', 'eventLabel': 'event_label', 'eventValue': 'event_value', 'nonInteraction': 'non_interaction', 'timingCategory': 'event_category', 'timingVar': 'name', 'timingValue': 'value', 'timingLabel': 'event_label', 'page': 'page_path', 'location': 'page_location', 'title': 'page_title', 'referrer' : 'page_referrer', }; for (arg in args) { if (!(!args.hasOwnProperty(arg) || !gaMap.hasOwnProperty(arg))) { hit[gaMap[arg]] = args[arg]; } else { hit[arg] = args[arg]; } } return hit; } try { f.hitCallback(); } catch (ex) { } }; __gaTracker.create = newtracker; __gaTracker.getByName = newtracker; __gaTracker.getAll = function () { return []; }; __gaTracker.remove = noopfn; __gaTracker.loaded = true; window['__gaTracker'] = __gaTracker; })(); } else { console.log(""); (function () { function __gtagTracker() { return null; } window['__gtagTracker'] = __gtagTracker; window['gtag'] = __gtagTracker; })(); } </script> <!-- / Google Analytics by MonsterInsights --> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/hackerhalted.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.2"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='wc-stripe-blocks-checkout-style-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce-gateway-stripe/build/upe_blocks.css?ver=ea3067b73e6a4f7274ba45dd9c3b9b8c' type='text/css' media='all' /> <link rel='stylesheet' id='layerslider-css' href='https://hackerhalted.com/wp-content/plugins/LayerSlider/assets/static/layerslider/css/layerslider.css?ver=7.14.0' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://hackerhalted.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.2' type='text/css' media='all' /> <style id='wp-block-library-theme-inline-css' type='text/css'> .wp-block-audio :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-audio :where(figcaption){color:#ffffffa6}.wp-block-audio{margin:0 0 1em}.wp-block-code{border:1px solid #ccc;border-radius:4px;font-family:Menlo,Consolas,monaco,monospace;padding:.8em 1em}.wp-block-embed :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-embed :where(figcaption){color:#ffffffa6}.wp-block-embed{margin:0 0 1em}.blocks-gallery-caption{color:#555;font-size:13px;text-align:center}.is-dark-theme .blocks-gallery-caption{color:#ffffffa6}:root :where(.wp-block-image figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme :root :where(.wp-block-image figcaption){color:#ffffffa6}.wp-block-image{margin:0 0 1em}.wp-block-pullquote{border-bottom:4px solid;border-top:4px solid;color:currentColor;margin-bottom:1.75em}.wp-block-pullquote cite,.wp-block-pullquote footer,.wp-block-pullquote__citation{color:currentColor;font-size:.8125em;font-style:normal;text-transform:uppercase}.wp-block-quote{border-left:.25em solid;margin:0 0 1.75em;padding-left:1em}.wp-block-quote cite,.wp-block-quote footer{color:currentColor;font-size:.8125em;font-style:normal;position:relative}.wp-block-quote.has-text-align-right{border-left:none;border-right:.25em solid;padding-left:0;padding-right:1em}.wp-block-quote.has-text-align-center{border:none;padding-left:0}.wp-block-quote.is-large,.wp-block-quote.is-style-large,.wp-block-quote.is-style-plain{border:none}.wp-block-search .wp-block-search__label{font-weight:700}.wp-block-search__button{border:1px solid #ccc;padding:.375em .625em}:where(.wp-block-group.has-background){padding:1.25em 2.375em}.wp-block-separator.has-css-opacity{opacity:.4}.wp-block-separator{border:none;border-bottom:2px solid;margin-left:auto;margin-right:auto}.wp-block-separator.has-alpha-channel-opacity{opacity:1}.wp-block-separator:not(.is-style-wide):not(.is-style-dots){width:100px}.wp-block-separator.has-background:not(.is-style-dots){border-bottom:none;height:1px}.wp-block-separator.has-background:not(.is-style-wide):not(.is-style-dots){height:2px}.wp-block-table{margin:0 0 1em}.wp-block-table td,.wp-block-table th{word-break:normal}.wp-block-table :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-table :where(figcaption){color:#ffffffa6}.wp-block-video :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-video :where(figcaption){color:#ffffffa6}.wp-block-video{margin:0 0 1em}:root :where(.wp-block-template-part.has-background){margin-bottom:0;margin-top:0;padding:1.25em 2.375em} </style> <link rel='stylesheet' id='mediaelement-css' href='https://hackerhalted.com/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17' type='text/css' media='all' /> <link rel='stylesheet' id='wp-mediaelement-css' href='https://hackerhalted.com/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=6.6.2' type='text/css' media='all' /> <style id='jetpack-sharing-buttons-style-inline-css' type='text/css'> .jetpack-sharing-buttons__services-list{display:flex;flex-direction:row;flex-wrap:wrap;gap:0;list-style-type:none;margin:5px;padding:0}.jetpack-sharing-buttons__services-list.has-small-icon-size{font-size:12px}.jetpack-sharing-buttons__services-list.has-normal-icon-size{font-size:16px}.jetpack-sharing-buttons__services-list.has-large-icon-size{font-size:24px}.jetpack-sharing-buttons__services-list.has-huge-icon-size{font-size:36px}@media print{.jetpack-sharing-buttons__services-list{display:none!important}}.editor-styles-wrapper .wp-block-jetpack-sharing-buttons{gap:0;padding-inline-start:0}ul.jetpack-sharing-buttons__services-list.has-background{padding:1.25em 2.375em} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #FFF;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--dark-gray: #111;--wp--preset--color--light-gray: #767676;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--font-family--inter: "Inter", sans-serif;--wp--preset--font-family--cardo: Cardo;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='cookie-law-info-css' href='https://hackerhalted.com/wp-content/plugins/cookie-law-info/legacy/public/css/cookie-law-info-public.css?ver=3.2.7' type='text/css' media='all' /> <link rel='stylesheet' id='cookie-law-info-gdpr-css' href='https://hackerhalted.com/wp-content/plugins/cookie-law-info/legacy/public/css/cookie-law-info-gdpr.css?ver=3.2.7' type='text/css' media='all' /> <link rel='stylesheet' id='redux-extendify-styles-css' href='https://hackerhalted.com/wp-content/plugins/induzy-core/admin/ReduxCore/assets/css/extendify-utilities.css?ver=4.4.4' type='text/css' media='all' /> <link rel='stylesheet' id='dashicons-css' href='https://hackerhalted.com/wp-includes/css/dashicons.min.css?ver=6.6.2' type='text/css' media='all' /> <link rel='stylesheet' id='pewc-style-css' href='https://hackerhalted.com/wp-content/plugins/product-extras-for-woocommerce/assets/css/style.css?ver=3.19.1' type='text/css' media='all' /> <style id='pewc-style-inline-css' type='text/css'> ul.pewc-product-extra-groups label { font-weight: normal !important } .pewc-preset-style .child-product-wrapper { -webkit-justify-content: space-around; justify-content: space-around } .pewc-item-field-wrapper label { cursor: pointer } .pewc-preset-style .pewc-radio-images-wrapper, .pewc-preset-style .pewc-checkboxes-images-wrapper { -webkit-justify-content: space-between; justify-content: space-between } .pewc-preset-style .pewc-radio-list-wrapper .pewc-radio-wrapper, .pewc-preset-style .pewc-checkboxes-list-wrapper .pewc-checkbox-wrapper { position: relative; } .pewc-preset-style .pewc-item-products input[type=number].pewc-child-quantity-field.pewc-independent-quantity-field { margin-top: 0 } .pewc-preset-style input[type=number].pewc-child-quantity-field { margin-left: 0 } .pewc-product-extra-groups .dd-options li { margin-bottom: 0 } .pewc-product-extra-groups .dd-options li a, .pewc-product-extra-groups .dd-selected { padding: 1em } .pewc-product-extra-groups .dd-pointer { right: 1em } .pewc-product-extra-groups .dd-pointer:after { content: ""; width: 0.8em; height: 0.5em; background-color: var(--select-arrow); clip-path: polygon(100% 0%, 0 0%, 50% 100%); } p.pewc-description { margin-top: 1em } .pewc-style-shadow .pewc-item { padding: 2em; margin-bottom: 3em; box-shadow: 0px 23px 56px #f1f1f1; background: transparent; border: 2px solid #f7f7f7; border-radius: 0.5em; transition: 0.3s box-shadow } .pewc-style-shadow .pewc-groups-standard .pewc-item { width: 95%; } .pewc-preset-style .pewc-checkbox-form-label, .pewc-preset-style .pewc-radio-form-label, .pewc-preset-style .pewc-item-field-wrapper, .pewc-preset-style .pewc-item-checkbox label { display: block; position: relative; margin-bottom: 12px; cursor: pointer; -webkit-user-select: none; -moz-user-select: none; -ms-user-select: none; user-select: none; } .pewc-preset-style .pewc-checkbox-form-label label, .pewc-preset-style .pewc-radio-form-label label, .pewc-preset-style .pewc-option-list .pewc-item-field-wrapper label, .pewc-preset-style .pewc-checkboxes-list-desc-wrapper, .pewc-preset-style .pewc-radio-list-desc-wrapper, .pewc-preset-style .pewc-option-list td label { padding-left: 35px; } .pewc-preset-style label.pewc-field-label { padding-left: 0 } .pewc-preset-style .pewc-checkbox-form-label input, .pewc-preset-style .pewc-radio-form-label input, .pewc-preset-style .pewc-item-field-wrapper input[type="checkbox"], .pewc-preset-style .pewc-item-field-wrapper input[type="radio"], .pewc-preset-style input[type="checkbox"].pewc-form-field, .pewc-preset-style input[type="checkbox"].pewc-checkbox-form-field, .pewc-preset-style input[type="radio"].pewc-radio-form-field { position: absolute; opacity: 0; cursor: pointer; height: 0; width: 0; } .pewc-preset-style .pewc-checkbox-form-label span.pewc-theme-element, .pewc-preset-style .pewc-radio-form-label span.pewc-theme-element, .pewc-preset-style .pewc-item-field-wrapper span.pewc-theme-element, .pewc-preset-style .pewc-item-checkbox span.pewc-theme-element, .pewc-preset-style .pewc-checkbox-wrapper span.pewc-theme-element, .pewc-preset-style .pewc-radio-wrapper span.pewc-theme-element { content: ""; position: absolute; top: 0; left: 0; height: 25px; width: 25px; background: #eee; cursor: pointer } .pewc-style-colour .pewc-checkbox-form-label span.pewc-theme-element, .pewc-style-colour .pewc-radio-form-label span.pewc-theme-element, .pewc-style-colour .pewc-item-field-wrapper span.pewc-theme-element, .pewc-style-colour .pewc-item-checkbox span.pewc-theme-element, .pewc-style-colour .pewc-checkbox-wrapper span.pewc-theme-element, .pewc-style-colour .pewc-radio-wrapper span.pewc-theme-element { background: rgba( 33,150,243, 0.2 ); } .pewc-preset-style .pewc-item-field-wrapper .pewc-checkboxes-list-wrapper span.pewc-theme-element, .pewc-preset-style .pewc-item-field-wrapper .pewc-radio-list-wrapper span.pewc-theme-element, .pewc-style-colour .pewc-checkbox-wrapper span.pewc-theme-element { top: 50%; transform: translateY( -50% ) } .pewc-preset-style .pewc-radio-form-label span.pewc-theme-element, .pewc-preset-style .pewc-radio-list-label-wrapper span.pewc-theme-element, .pewc-preset-style .pewc-radio-wrapper span.pewc-theme-element { border-radius: 50% } .pewc-preset-style .pewc-checkbox-form-label span.pewc-theme-element:hover, .pewc-preset-style .pewc-radio-form-label span.pewc-theme-element:hover, .pewc-preset-style .pewc-item-field-wrapper span.pewc-theme-element:hover, .pewc-preset-style .pewc-item-checkbox span.pewc-theme-element:hover, .pewc-style-colour .pewc-checkbox-wrapper span.pewc-theme-element:hover, .pewc-style-colour .pewc-radio-wrapper span.pewc-theme-element:hover { background: #ddd; transition: background 0.2s; } .pewc-style-colour .pewc-checkbox-form-label span.pewc-theme-element:hover, .pewc-style-colour .pewc-radio-form-label span.pewc-theme-element:hover, .pewc-style-colour .pewc-item-field-wrapper span.pewc-theme-element:hover, .pewc-style-colour .pewc-item-checkbox span.pewc-theme-element:hover, .pewc-style-colour .pewc-checkbox-wrapper span.pewc-theme-element:hover, .pewc-style-colour .pewc-radio-wrapper span.pewc-theme-element:hover { background: rgba( 33,150,243, 0.4 ); } .pewc-preset-style .pewc-checkbox-form-label input:checked ~ span.pewc-theme-element, .pewc-preset-style .pewc-radio-form-label input:checked ~ span.pewc-theme-element, .pewc-preset-style .pewc-item-field-wrapper input:checked ~ span.pewc-theme-element, .pewc-preset-style .pewc-item-checkbox input:checked ~ span.pewc-theme-element, .pewc-preset-style .pewc-checkbox-wrapper input:checked ~ span.pewc-theme-element, .pewc-preset-style .pewc-radio-wrapper input:checked ~ span.pewc-theme-element { background: #2196F3; } .pewc-preset-style span.pewc-theme-element:after { content: ""; position: absolute; display: none; } .pewc-preset-style .pewc-checkbox-form-label input:checked ~ span.pewc-theme-element:after, .pewc-preset-style .pewc-radio-form-label input:checked ~ span.pewc-theme-element:after, .pewc-preset-style .pewc-item-field-wrapper input:checked ~ span.pewc-theme-element:after, .pewc-preset-style .pewc-item-checkbox input:checked ~ span.pewc-theme-element:after, .pewc-preset-style .pewc-checkbox-wrapper input:checked ~ span.pewc-theme-element:after, .pewc-preset-style .pewc-radio-wrapper input:checked ~ span.pewc-theme-element:after { display: block; } .pewc-preset-style .pewc-checkbox-form-label span.pewc-theme-element:after, .pewc-preset-style .pewc-item-field-wrapper span.pewc-theme-element:after, .pewc-preset-style .pewc-item-checkbox span.pewc-theme-element:after, .pewc-preset-style .pewc-checkbox-wrapper span.pewc-theme-element:after, .pewc-preset-style .pewc-radio-wrapper span.pewc-theme-element:after { left: 9px; top: 5px; width: 5px; height: 10px; border: solid white; border-width: 0 3px 3px 0; -webkit-transform: rotate(45deg); -ms-transform: rotate(45deg); transform: rotate(45deg); } .pewc-preset-style .pewc-radio-form-label span.pewc-theme-element:after, .pewc-preset-style .pewc-radio-list-label-wrapper span.pewc-theme-element:after { top: 7px; left: 7px; width: 8px; height: 8px; border-radius: 50%; background: white; } .pewc-preset-style .pewc-radio-image-wrapper, .pewc-preset-style .pewc-checkbox-image-wrapper { border: 2px solid #eee; padding: 0.5em; position: relative } .pewc-preset-style .pewc-item-products-radio .pewc-theme-element, .pewc-preset-style .pewc-item-products-checkboxes .pewc-theme-element { display: none } .pewc-preset-style.pewc-show-inputs .pewc-item-products-radio .checked .pewc-theme-element, .pewc-preset-style.pewc-show-inputs .pewc-item-products-checkboxes .checked .pewc-theme-element { display: block; top: 2px; left: 2px } .pewc-preset-style.pewc-show-inputs .pewc-radio-image-wrapper, .pewc-preset-style.pewc-show-inputs .pewc-checkbox-image-wrapper { border-width: 4px } .pewc-preset-style .pewc-item[not:.pewc-circular-swatches] .pewc-radio-image-wrapper.checked, .pewc-preset-style .pewc-item[not:.pewc-circular-swatches] .pewc-radio-image-wrapper:not(.pewc-checkbox-disabled):hover, .pewc-preset-style .pewc-item[not:.pewc-circular-swatches] .pewc-checkbox-image-wrapper.checked, .pewc-preset-style .child-product-wrapper:not(.pewc-column-wrapper) .pewc-checkbox-image-wrapper:not(.pewc-checkbox-disabled):hover { border: 2px solid #2196F3 } .pewc-preset-style .pewc-radio-image-wrapper label input:checked + img, .pewc-preset-style .pewc-checkbox-image-wrapper label input:checked + img { border: 0 } .pewc-preset-style .pewc-item-image_swatch .pewc-checkboxes-images-wrapper .pewc-checkbox-image-wrapper, .pewc-preset-style ul.pewc-product-extra-groups .pewc-item-image_swatch.pewc-item label, .pewc-preset-style .pewc-item-products .child-product-wrapper:not(.pewc-column-wrapper) .pewc-checkbox-image-wrapper, .pewc-preset-style .pewc-item-products .child-product-wrapper .pewc-radio-image-wrapper, .pewc-preset-style ul.pewc-product-extra-groups .pewc-item-products.pewc-item label { display: -webkit-flex !important; display: flex !important; -webkit-flex-direction: column; flex-direction: column; } .pewc-preset-style .pewc-checkbox-desc-wrapper, .pewc-preset-style .pewc-radio-desc-wrapper { margin-top: auto; } .pewc-preset-style .products-quantities-independent:not(.pewc-column-wrapper) .pewc-checkbox-desc-wrapper, .pewc-preset-style .products-quantities-independent:not(.pewc-column-wrapper) .pewc-radio-desc-wrapper { display: grid; grid-template-columns: 80px 1fr; -webkit-align-items: center; align-items: center } .pewc-preset-style .pewc-text-swatch .pewc-checkbox-form-label:hover, .pewc-preset-style .pewc-text-swatch .pewc-radio-form-label:hover { border-color: #2196F3; } .pewc-preset-style .pewc-text-swatch .pewc-checkbox-form-label.active-swatch, .pewc-preset-style .pewc-text-swatch .pewc-radio-form-label.active-swatch { border-color: #2196F3; background: #2196F3; color: #fff; } .pewc-range-slider { color: #2196F3; } .pewc-preset-style .wp-color-result-text { background-color: #f1f1f1; padding: 0.5em 1em; } .pewc-preset-style .pewc-item-field-wrapper .wp-color-result { padding-left: 3em !important; font-size: inherit !important; } .pewc-preset-style .pewc-item input[type=number], .pewc-preset-style .pewc-item input[type=text], .pewc-preset-style .pewc-item textarea { padding: 0.5em 1em; background-color: #f7f7f7; outline: 0; border: 0; -webkit-appearance: none; box-sizing: border-box; font-weight: normal; box-shadow: none; } .pewc-style-simple .pewc-item input[type=number], .pewc-style-simple .pewc-item input[type=text], .pewc-style-simple .pewc-item textarea { background: none; border: 1px solid #ccc } .pewc-style-colour .pewc-item input[type=number], .pewc-style-colour .pewc-item input[type=text], .pewc-style-colour .pewc-item textarea { background: rgba( 33,150,243, 0.1 ); } .pewc-preset-style input[type=number]:focus, .pewc-preset-style input[type=text]:focus, .pewc-preset-style textarea:focus { border: 1px solid rgba( 33,150,243, 0.2 ); } .pewc-style-colour .dropzone { border-color: #2196F3; background: rgba( 33,150,243, 0.1 ) } .pewc-select-wrapper select { background-color: transparent; border: none; padding: 0 1em 0 0; margin: 0; width: 100%; font-family: inherit; font-size: inherit; cursor: inherit; line-height: inherit; outline: none } .pewc-select-wrapper { width: 100%; border: 2px solid #eee; border-radius: 0; padding: 0.75em 0.75em; cursor: pointer; line-height: 1.1; background-color: #fff } .pewc-preset-style .select2-container--default .select2-selection--single { border: 2px solid #eee; border-radius: 0; } .pewc-preset-style .select2-container .select2-selection--single { height: auto; padding: 0.5em; } .pewc-preset-style .select2-container--default .select2-selection--single .select2-selection__arrow { top: 50%; transform: translateY(-50%); } .pewc-preset-style .dd-select { border: 2px solid #eee; background: white !important } .pewc-style-rounded .pewc-item-field-wrapper span.pewc-theme-element { border-radius: 0.5em } .pewc-preset-style.pewc-style-rounded .pewc-radio-form-label span.pewc-theme-element, .pewc-preset-style.pewc-style-rounded .pewc-radio-list-label-wrapper span.pewc-theme-element { border-radius: 50% } .pewc-style-rounded input[type=number], .pewc-style-rounded input[type=text], .pewc-style-rounded textarea, .pewc-style-rounded .pewc-radio-image-wrapper, .pewc-style-rounded .pewc-checkbox-image-wrapper, .pewc-style-rounded .pewc-select-wrapper, .pewc-style-rounded .dd-select, .pewc-style-rounded .dd-options, .pewc-style-rounded .dropzone { border-radius: 1em } .pewc-preset-style .pewc-groups-tabs .pewc-group-wrap { background: none; padding: 2em; border: 1px solid #eee } .pewc-style-colour .pewc-groups-tabs .pewc-group-wrap { border: 1px solid rgba( 33,150,243, 0.1 ); } .pewc-style-rounded .pewc-groups-tabs .pewc-group-wrap { border-radius: 1em; border-top-left-radius: 0 } .pewc-preset-style .pewc-tabs-wrapper .pewc-tab { background: #f1f1f1; border: 1px solid #f1f1f1; border-bottom: 1px solid #fff; margin-bottom: -1px; transition: 0.3s background } .pewc-style-rounded .pewc-tabs-wrapper .pewc-tab { border-top-right-radius: 0.5em; border-top-left-radius: 0.5em; } .pewc-preset-style .pewc-tabs-wrapper .pewc-tab:hover { background: #ddd; } .pewc-style-colour .pewc-tabs-wrapper .pewc-tab { background: rgba( 33,150,243, 0.1 ); border: 1px solid rgba( 33,150,243, 0.1 ); border-bottom: 0; } .pewc-style-colour .pewc-tabs-wrapper .pewc-tab:hover { background: rgba( 33,150,243, 0.2 ); } .pewc-preset-style .pewc-tabs-wrapper .pewc-tab.active-tab, .pewc-style-colour .pewc-tabs-wrapper .pewc-tab.active-tab { background: #fff; border-bottom-color: #fff } .pewc-preset-style .pewc-groups-accordion .pewc-group-wrap.group-active .pewc-group-content-wrapper { padding: 2em 0; background: none } .pewc-preset-style .pewc-groups-accordion .pewc-group-wrap h3 { background: #eee; } .pewc-style-colour .pewc-groups-accordion .pewc-group-wrap h3 { background: rgba( 33,150,243, 0.1 ); } .pewc-style-colour .pewc-steps-wrapper .pewc-tab, .pewc-style-colour .pewc-groups-accordion .pewc-group-wrap h3 { background: rgba( 33,150,243, 0.1 ); } .pewc-style-colour .pewc-steps-wrapper .pewc-tab:after, .pewc-style-colour .pewc-groups-accordion .pewc-group-wrap h3 { border-left-color: rgba( 33,150,243, 0.1 ); } .pewc-style-colour .pewc-steps-wrapper .pewc-tab.active-tab, .pewc-style-colour .pewc-groups-accordion .pewc-group-wrap.group-active h3 { background: rgba( 33,150,243, 0.2 ); } .pewc-style-colour .pewc-steps-wrapper .pewc-tab.active-tab:after, .pewc-style-colour .pewc-groups-accordion .pewc-group-wrap.group-active h3 { border-left-color: rgba( 33,150,243, 0.2 ); } /* Add-Ons Ultimate character counter */ .pewc-text-counter-container {float:right; margin-top: 1em;} .pewc-text-counter-container .pewc-current-count.error { color:#ff0000; } </style> <link rel='stylesheet' id='woocommerce-layout-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce/assets/css/woocommerce-layout.css?ver=9.3.3' type='text/css' media='all' /> <style id='woocommerce-layout-inline-css' type='text/css'> .infinite-scroll .woocommerce-pagination { display: none; } </style> <link rel='stylesheet' id='woocommerce-smallscreen-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce/assets/css/woocommerce-smallscreen.css?ver=9.3.3' type='text/css' media='only screen and (max-width: 768px)' /> <link rel='stylesheet' id='woocommerce-general-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce/assets/css/woocommerce.css?ver=9.3.3' type='text/css' media='all' /> <style id='woocommerce-inline-inline-css' type='text/css'> .woocommerce form .form-row .required { visibility: visible; } </style> <link rel='stylesheet' id='metorik-css-css' href='https://hackerhalted.com/wp-content/plugins/metorik-helper/assets/css/metorik.css?ver=2.0.7' type='text/css' media='all' /> <link rel='stylesheet' id='wc-avatax-frontend-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce-avatax/assets/css/frontend/wc-avatax-frontend.min.css?ver=2.8.2' type='text/css' media='all' /> <link rel='stylesheet' id='js_composer_front-css' href='https://hackerhalted.com/wp-content/plugins/js_composer/assets/css/js_composer.min.css?ver=7.5' type='text/css' media='all' /> <link rel='stylesheet' id='induzy-min-css' href='https://hackerhalted.com/wp-content/themes/induzy/assets/css/theme.min.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='induzy-style-css' href='https://hackerhalted.com/wp-content/themes/induzy/style.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='induzy-shortcode-css' href='https://hackerhalted.com/wp-content/themes/induzy/assets/css/shortcode.css?ver=1.0' type='text/css' media='all' /> <link rel='stylesheet' id='induzy-theme-style-css' href='https://hackerhalted.com/wp-content/uploads/induzy/theme_1.css?ver=1.1.8' type='text/css' media='all' /> <style id='induzy-theme-style-inline-css' type='text/css'> /* * Induzy Theme Page Style */ body { } </style> <link rel='stylesheet' id='wc-pb-checkout-blocks-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce-product-bundles/assets/css/frontend/checkout-blocks.css?ver=7.1.0' type='text/css' media='all' /> <link rel='stylesheet' id='woo_discount_pro_style-css' href='https://hackerhalted.com/wp-content/plugins/woo-discount-rules-pro/Assets/Css/awdr_style.css?ver=2.6.5' type='text/css' media='all' /> <link rel='stylesheet' id='wc-bundle-style-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce-product-bundles/assets/css/frontend/woocommerce.css?ver=7.1.0' type='text/css' media='all' /> <link rel="preload" as="style" href="https://fonts.googleapis.com/css?family=Hind:400,500%7CMontserrat:700&subset=latin&display=swap&ver=1730389057" /><link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Hind:400,500%7CMontserrat:700&subset=latin&display=swap&ver=1730389057" media="print" onload="this.media='all'"><noscript><link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Hind:400,500%7CMontserrat:700&subset=latin&display=swap&ver=1730389057" /></noscript><script type="text/javascript" id="woocommerce-google-analytics-integration-gtag-js-after"> /* <![CDATA[ */ /* Google Analytics for WooCommerce (gtag.js) */ window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} // Set up default consent state. for ( const mode of [{"analytics_storage":"denied","ad_storage":"denied","ad_user_data":"denied","ad_personalization":"denied","region":["AT","BE","BG","HR","CY","CZ","DK","EE","FI","FR","DE","GR","HU","IS","IE","IT","LV","LI","LT","LU","MT","NL","NO","PL","PT","RO","SK","SI","ES","SE","GB","CH"]}] || [] ) { gtag( "consent", "default", { "wait_for_update": 500, ...mode } ); } gtag("js", new Date()); gtag("set", "developer_id.dOGY3NW", true); gtag("config", "G-XV3P9T82TM", {"track_404":true,"allow_google_signals":true,"logged_in":false,"linker":{"domains":[],"allow_incoming":true},"custom_map":{"dimension1":"logged_in"}}); /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" id="layerslider-utils-js-extra"> /* <![CDATA[ */ var LS_Meta = {"v":"7.14.0","fixGSAP":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/LayerSlider/assets/static/layerslider/js/layerslider.utils.js?ver=7.14.0" id="layerslider-utils-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/LayerSlider/assets/static/layerslider/js/layerslider.kreaturamedia.jquery.js?ver=7.14.0" id="layerslider-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/LayerSlider/assets/static/layerslider/js/layerslider.transitions.js?ver=7.14.0" id="layerslider-transitions-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/google-analytics-premium/assets/js/frontend-gtag.js?ver=9.2.2" id="monsterinsights-frontend-script-js" async="async" data-wp-strategy="async"></script> <script data-cfasync="false" data-wpfc-render="false" type="text/javascript" id='monsterinsights-frontend-script-js-extra'>/* <![CDATA[ */ var monsterinsights_frontend = {"js_events_tracking":"true","download_extensions":"doc,pdf,ppt,zip,xls,docx,pptx,xlsx","inbound_paths":"[{\"path\":\"\\\/go\\\/\",\"label\":\"affiliate\"},{\"path\":\"\\\/recommend\\\/\",\"label\":\"affiliate\"}]","home_url":"https:\/\/hackerhalted.com","hash_tracking":"false","v4_id":"G-XV3P9T82TM"};/* ]]> */ </script> <script type="text/javascript" id="cookie-law-info-js-extra"> /* <![CDATA[ */ var Cli_Data = {"nn_cookie_ids":[],"cookielist":[],"non_necessary_cookies":[],"ccpaEnabled":"1","ccpaRegionBased":"","ccpaBarEnabled":"1","strictlyEnabled":["necessary","obligatoire"],"ccpaType":"ccpa_gdpr","js_blocking":"1","custom_integration":"","triggerDomRefresh":"","secure_cookies":""}; var cli_cookiebar_settings = {"animate_speed_hide":"500","animate_speed_show":"500","background":"#000000","border":"#b1a6a6c2","border_on":"","button_1_button_colour":"#61a229","button_1_button_hover":"#4e8221","button_1_link_colour":"#fff","button_1_as_button":"1","button_1_new_win":"","button_2_button_colour":"#333","button_2_button_hover":"#292929","button_2_link_colour":"#444","button_2_as_button":"","button_2_hidebar":"","button_3_button_colour":"#dedfe0","button_3_button_hover":"#b2b2b3","button_3_link_colour":"#333333","button_3_as_button":"1","button_3_new_win":"","button_4_button_colour":"#dedfe0","button_4_button_hover":"#b2b2b3","button_4_link_colour":"#333333","button_4_as_button":"1","button_7_button_colour":"#61a229","button_7_button_hover":"#4e8221","button_7_link_colour":"#fff","button_7_as_button":"1","button_7_new_win":"","font_family":"inherit","header_fix":"","notify_animate_hide":"1","notify_animate_show":"","notify_div_id":"#cookie-law-info-bar","notify_position_horizontal":"right","notify_position_vertical":"bottom","scroll_close":"1","scroll_close_reload":"","accept_close_reload":"","reject_close_reload":"","showagain_tab":"","showagain_background":"#fff","showagain_border":"#000","showagain_div_id":"#cookie-law-info-again","showagain_x_position":"100px","text":"#ffffff","show_once_yn":"","show_once":"10000","logging_on":"","as_popup":"","popup_overlay":"1","bar_heading_text":"We Care","cookie_bar_as":"banner","popup_showagain_position":"bottom-right","widget_position":"left"}; var log_object = {"ajax_url":"https:\/\/hackerhalted.com\/wp-admin\/admin-ajax.php"}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/cookie-law-info/legacy/public/js/cookie-law-info-public.js?ver=3.2.7" id="cookie-law-info-js"></script> <script type="text/javascript" id="cookie-law-info-ccpa-js-extra"> /* <![CDATA[ */ var ccpa_data = {"opt_out_prompt":"Do you really wish to opt out?","opt_out_confirm":"Confirm","opt_out_cancel":"Cancel"}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/cookie-law-info/legacy/admin/modules/ccpa/assets/js/cookie-law-info-ccpa.js?ver=3.2.7" id="cookie-law-info-ccpa-js"></script> <script type="text/javascript" src="https://stats.wp.com/s-202448.js" id="woocommerce-analytics-js" defer="defer" data-wp-strategy="defer"></script> <!--[if lt IE 9]> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/html5.js?ver=3.7.3" id="html5-js"></script> <![endif]--> <script></script><meta name="generator" content="Powered by LayerSlider 7.14.0 - Build Heros, Sliders, and Popups. Create Animations and Beautiful, Rich Web Content as Easy as Never Before on WordPress." /> <!-- LayerSlider updates and docs at: https://layerslider.com --> <link rel="https://api.w.org/" href="https://hackerhalted.com/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://hackerhalted.com/wp-json/wp/v2/pages/2259" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://hackerhalted.com/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://hackerhalted.com/?p=2259' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://hackerhalted.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fhackerhalted.com%2Fspeakers%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://hackerhalted.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fhackerhalted.com%2Fspeakers%2F&format=xml" /> <meta name="generator" content="Site Kit by Google 1.138.0" /><meta name="generator" content="Redux 4.4.4" /><!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KWSWWVM');</script> <!-- End Google Tag Manager --> <style type="text/css"> .pewc-group-content-wrapper { background-color: !important; } ul.pewc-product-extra-groups { margin-left: px; margin-bottom: px; padding: px; background-color: ; } .pewc-product-extra-groups > li { margin-left: px; margin-bottom: px; padding-top: px; padding-bottom: px; padding-left: px; padding-right: px; background-color: ; color: 0; } textarea.pewc-form-field { height: em; } </style> <script> if ('undefined' === typeof _affirm_config) { var _affirm_config = { public_api_key: "N2M1398F1J7AG8VJ", script: "https://www.affirm.com/js/v2/affirm.js", locale: "en_US", country_code: "USA", }; (function(l, g, m, e, a, f, b) { var d, c = l[m] || {}, h = document.createElement(f), n = document.getElementsByTagName(f)[0], k = function(a, b, c) { return function() { a[b]._.push([c, arguments]) } }; c[e] = k(c, e, "set"); d = c[e]; c[a] = {}; c[a]._ = []; d._ = []; c[a][b] = k(c, a, b); a = 0; for ( b = "set add save post open " + "empty reset on off trigger ready setProduct" .split(" "); a < b.length; a++ ) d[b[a]] = k(c, e, b[a]); a = 0; for (b = ["get", "token", "url", "items"]; a < b.length; a++) d[b[a]] = function() {}; h.async = !0; h.src = g[f]; n.parentNode.insertBefore(h, n); delete g[f]; d(g); l[m] = c })( window, _affirm_config, "affirm", "checkout", "ui", "script", "ready" ); } </script> <style>img#wpstats{display:none}</style> <noscript><style>.woocommerce-product-gallery{ opacity: 1 !important; }</style></noscript> <meta name="generator" content="Powered by WPBakery Page Builder - drag and drop page builder for WordPress."/> <style id='wp-fonts-local' type='text/css'> @font-face{font-family:Inter;font-style:normal;font-weight:300 900;font-display:fallback;src:url('https://hackerhalted.com/wp-content/plugins/woocommerce/assets/fonts/Inter-VariableFont_slnt,wght.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:Cardo;font-style:normal;font-weight:400;font-display:fallback;src:url('https://hackerhalted.com/wp-content/plugins/woocommerce/assets/fonts/cardo_normal_400.woff2') format('woff2');} </style> <style type="text/css" id="wp-custom-css"> .woocommerce div.product div.images, .woocommerce-page #content div.product div.images, .woocommerce-page div.product div.images { float: left; width: 30% !important; } .woocommerce #content div.product div.summary, .woocommerce div.product div.summary, .woocommerce-page #content div.product div.summary, .woocommerce-page div.product div.summary { float: right; width: 65% !important; clear: none; } .related.products { display: none; } </style> <style type="text/css" data-type="vc_shortcodes-custom-css">.vc_custom_1729101117533{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101131953{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}.vc_custom_1729101144762{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}</style><noscript><style> .wpb_animate_when_almost_visible { opacity: 1; }</style></noscript></head> <body class="page-template-default page page-id-2259 page-parent wp-embed-responsive theme-induzy pewc-preset-style pewc-style-simple woocommerce-no-js wpb-js-composer js-comp-ver-7.5 vc_responsive" data-scroll-time="" data-scroll-distance=""> <div class="mobile-header"> <div class="mobile-header-inner hidden-lg-up hidden-lg-land-up"> <div class="container"> <ul class="mobile-header-items nav pull-left"> <li class="nav-item"> <div class="nav-item-inner"> <a class="mobile-bar-toggle" href="#"><i class="fa fa-bars"></i></a> </div> </li> </ul> <ul class="mobile-header-items nav pull-center"> <li class="nav-item"> <div class="nav-item-inner"> <div class="mobile-logo"><a class="site-title" href="https://hackerhalted.com/" title="Hacker Halted 2024" >Hacker Halted 2024</a></div> </div> </li> </ul> <ul class="mobile-header-items nav pull-right"> <li class="nav-item"> <div class="nav-item-inner"> <a class="full-search-toggle" href="#"><i class="fa fa-search"></i></a> </div> </li> </ul> </div><!-- container --> </div> </div> <div class="mobile-bar animate-from-left"> <a class="mobile-bar-toggle close" href="#"></a> <div class="mobile-bar-inner"> <div class="container"> <ul class="mobile-bar-items nav flex-column mobile-bar-top"> <li class="nav-item"> <div class="nav-item-inner"> <div class="mobile-logo"><a class="site-title" href="https://hackerhalted.com/" title="Hacker Halted 2024" >Hacker Halted 2024</a></div> </div> </li> </ul> <ul class="mobile-bar-items nav flex-column mobile-bar-middle"> <li class="nav-item"> <div class="nav-item-inner"> <div class="induzy-mobile-main-menu"></div> </div> </li> </ul> <ul class="mobile-bar-items nav flex-column mobile-bar-bottom"> <li class="nav-item"> <div class="nav-item-inner"> <form method="get" class="search-form" action="https://hackerhalted.com/"> <div class="input-group"> <input type="text" class="form-control" name="s" value="" placeholder="Search for.."> <span class="input-group-btn"> <button class="btn btn-secondary" type="submit"><i class="fa fa-search"></i></button> </span> </div> </form> </div> </li> </ul> </div><!-- container --> </div> </div> <div class="full-search-wrapper"> <a class="full-search-toggle close" href="#"></a> <form method="get" class="search-form" action="https://hackerhalted.com/"> <div class="input-group"> <input type="text" class="form-control" name="s" value="" placeholder="Search for.."> <span class="input-group-btn"> <button class="btn btn-secondary" type="submit"><i class="fa fa-search"></i></button> </span> </div> </form> </div> <div id="page" class="induzy-wrapper"> <header class="induzy-header"> <div class="header-inner hidden-md-down hidden-md-land-down"> <div class="topbar clearfix"> <div class="custom-container topbar-inner"> <ul class="topbar-items nav pull-left"> <li class="nav-item"> <div class="nav-item-inner"> Cybersecurity Training and Conference | Atlanta, GA </div> </li> </ul> <ul class="topbar-items nav pull-right"> <li class="nav-item"> <div class="nav-item-inner"> <ul class="nav social-icons social-transparent social-white social-h-white social- social-"><li class="nav-item"> <a href="https://www.facebook.com/HackerHalted" class="nav-link social-fb" target="_self"> <i class=" fa fa-facebook"></i> </a> </li><li class="nav-item"> <a href="https://twitter.com/hackerhalted" class="nav-link social-twitter" target="_self"> <i class=" fa-brands fa-x-twitter"></i> </a> </li><li class="nav-item"> <a href="https://www.linkedin.com/company/ec-council" class="nav-link social-linkedin" target="_self"> <i class=" fa fa-linkedin"></i> </a> </li></ul> </div> </li> </ul> </div> </div> <div class="logobar clearfix"> <div class="custom-container logobar-inner"> <ul class="logobar-items nav pull-center text-center"> <li class="nav-item"> <div class="nav-item-inner"> <div class="main-logo"> <a href="https://hackerhalted.com/" title="Hacker Halted 2024" ><img class="custom-logo img-responsive" src="https://hackerhalted.com/wp-content/uploads/2024/04/HH-Logo-Red.png" alt="Hacker Halted 2024" title="Hacker Halted 2024" /></a> </div> </div> </li> </ul> </div> </div> <div class="sticky-outer"> <div class="sticky-head"> <nav class="navbar clearfix"> <div class="custom-container navbar-inner"> <ul class="navbar-items nav pull-center text-center"> <li class="nav-item"> <div class="nav-item-inner"> <ul id="induzy-main-menu" class="nav induzy-main-menu"><li id="menu-item-3020" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children nav-item menu-item-3020 dropdown"><a href="#" class="nav-link dropdown-toggle">Register</a> <ul role="menu" class=" dropdown-menu"> <li id="menu-item-3021" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3021"><a href="https://hackerhalted.com/product/hacker-halted-in-person/" class="nav-link">Hacker Halted</a></li> <li id="menu-item-3022" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3022"><a href="https://hackerhalted.com/product/global-ciso-forum-live-in-person/" class="nav-link">Global CISO Forum</a></li> </ul></li> <li id="menu-item-2828" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children nav-item menu-item-2828 dropdown"><a href="https://hackerhalted.com/training/" class="nav-link dropdown-toggle">Training</a> <ul role="menu" class=" dropdown-menu"> <li id="menu-item-2838" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-2838"><a href="https://hackerhalted.com/product/certified-chief-information-security-officer-cciso-live-online-or-in-person/" class="nav-link">CCISO</a></li> <li id="menu-item-2836" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-2836"><a href="https://hackerhalted.com/product/certified-ethical-hacker-ceh-live-online-or-in-person/" class="nav-link">CEH</a></li> <li id="menu-item-2837" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-2837"><a href="https://hackerhalted.com/product/certified-network-defender-cnd-live-online-or-in-person/" class="nav-link">CND</a></li> <li id="menu-item-2891" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-2891"><a href="https://hackerhalted.com/product/computer-hacking-forensic-investigator-chfi/" class="nav-link">CHFI</a></li> <li id="menu-item-2892" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-2892"><a href="https://hackerhalted.com/product/certified-penetration-testing-professional-cpent-live-online-or-in-person/" class="nav-link">CPENT</a></li> <li id="menu-item-2893" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-2893"><a href="https://hackerhalted.com/product/certified-cloud-security-engineer-ccse-live-online-or-in-person/" class="nav-link">CCSE</a></li> </ul></li> <li id="menu-item-3397" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children nav-item menu-item-3397 dropdown"><a href="https://hackerhalted.com/agenda/" class="nav-link dropdown-toggle">Agenda</a> <ul role="menu" class=" dropdown-menu"> <li id="menu-item-3454" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3454"><a href="https://hackerhalted.com/agenda/" class="nav-link">Schedule</a></li> <li id="menu-item-3310" class="menu-item menu-item-type-post_type menu-item-object-page nav-item menu-item-3310"><a href="https://hackerhalted.com/hacking-villages/" class="nav-link">Hacking Villages</a></li> </ul></li> <li id="menu-item-2894" class="menu-item menu-item-type-post_type menu-item-object-page nav-item menu-item-2894"><a href="https://hackerhalted.com/venue/" class="nav-link">Venue</a></li> <li id="menu-item-3019" class="menu-item menu-item-type-custom menu-item-object-custom current-menu-item current-menu-ancestor current-menu-parent menu-item-has-children nav-item menu-item-3019 dropdown"><a href="https://hackerhalted.com/speakers/" class="nav-link dropdown-toggle">Speakers</a> <ul role="menu" class=" dropdown-menu"> <li id="menu-item-3385" class="menu-item menu-item-type-custom menu-item-object-custom current-menu-item nav-item menu-item-3385"><a href="https://hackerhalted.com/speakers/" class="nav-link">2024 Speakers</a></li> </ul></li> <li id="menu-item-2899" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children nav-item menu-item-2899 dropdown"><a href="https://hackerhalted.com/sponsors/" class="nav-link dropdown-toggle">Sponsors</a> <ul role="menu" class=" dropdown-menu"> <li id="menu-item-2909" class="menu-item menu-item-type-post_type menu-item-object-page nav-item menu-item-2909"><a href="https://hackerhalted.com/how-to-sponsor/" class="nav-link">Sponsorship Options</a></li> <li id="menu-item-2900" class="menu-item menu-item-type-post_type menu-item-object-page nav-item menu-item-2900"><a href="https://hackerhalted.com/become-a-sponsor/" class="nav-link">Become a Sponsor</a></li> </ul></li> <li id="menu-item-3033" class="menu-item menu-item-type-post_type menu-item-object-page nav-item menu-item-3033"><a href="https://hackerhalted.com/global-ciso-forum-2024/" class="nav-link">Global CISO Forum</a></li> <li id="menu-item-3456" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children nav-item menu-item-3456 dropdown"><a href="#" class="nav-link dropdown-toggle">Past Events</a> <ul role="menu" class=" dropdown-menu"> <li id="menu-item-3463" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3463"><a href="https://hackerhalted.com/hacker-halted-2021-recap/" class="nav-link">2021 Hacker Halted</a></li> <li id="menu-item-3462" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3462"><a href="https://hackerhalted.com/hacker-halted-2020-recap/" class="nav-link">2020 Hacker Halted</a></li> <li id="menu-item-3461" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3461"><a href="https://hackerhalted.com/hacker-halted-2019-recap/" class="nav-link">2019 Hacker Halted</a></li> <li id="menu-item-3460" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3460"><a href="https://hackerhalted.com/hacker-halted-2018-recap/" class="nav-link">2018 Hacker Halted</a></li> <li id="menu-item-3459" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3459"><a href="https://hackerhalted.com/hacker-halted-2017-recap/" class="nav-link">2017 Hacker Halted</a></li> <li id="menu-item-3458" class="menu-item menu-item-type-custom menu-item-object-custom nav-item menu-item-3458"><a href="https://hackerhalted.com/photo-gallery/2016-hacker-halted-photo-gallery/" class="nav-link">2016 Hacker Halted</a></li> </ul></li> <li id="menu-item-3083" class="menu-item menu-item-type-post_type menu-item-object-page nav-item menu-item-3083"><a href="https://hackerhalted.com/contact-us/" class="nav-link">Contact Us</a></li> <li id="menu-item-3005" class="menu-item menu-item-type-post_type menu-item-object-page nav-item menu-item-3005"><a href="https://hackerhalted.com/cart/" class="nav-link">Cart</a></li> </ul> </div> </li> </ul> <ul class="navbar-items nav pull-right"> <li class="nav-item"> <div class="nav-item-inner"> <div class="search-toggle-wrap"> <div class="textbox-search-wrap"> <form method="get" class="search-form" action="https://hackerhalted.com/"> <div class="input-group"> <input type="text" name="s" class="form-control" value="" placeholder="Search for.."> </div> </form> </div> <a class="textbox-search-toggle" href="#"><i class="fa fa-search"></i></a> </div> </div> </li> </ul> </div> </nav> </div><!--stikcy outer--> </div><!-- sticky-head or sticky-scroll --> </div> </header> <div class="induzy-content-wrapper"> <div class="induzy-content induzy-page"> <header id="page-title" class="page-title-wrap"> <div class="page-title-wrap-inner parallax-item" data-stellar-background-ratio="0.5" data-property="no-video"> <span class="page-title-overlay"></span> <div class="container"> <div class="row"> <div class="col-md-12"> <div class="page-title-inner"> <div class="pull-left"> <h1 class="page-title">Speakers</h1> </div> <div class="pull-right"> <div id="breadcrumb" class="breadcrumb"><a href="https://hackerhalted.com/">Home</a> <span class="current">Speakers</span></div> </div> </div> </div> </div> </div> </div> <!-- .page-title-wrap-inner --> </header> <div class="induzy-content-inner"> <div class="container"> <div class="row"> <div class="col-md-12 page-has-no-sidebar"> <div id="primary" class="content-area clearfix"> <div id="page-2259" class="post-2259 page type-page status-publish hentry"> <div class="entry-content"><div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101117533"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <h1 style="text-align:center;">Hacker Halted 2024 Speakers</h1> </div> </div> <div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Elizabeth-Stephens.png" class="vc_single_image-img attachment-full" alt="" title="Elizabeth Stephens" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Elizabeth-Stephens.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Elizabeth-Stephens-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Elizabeth-Stephens-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Elizabeth-Stephens-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="elizabethstephens"></a></p> <h3>Elizabeth Stephens</h3> <p>CEO, DBS Cyber LLC</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Elizabeth is the CEO of DBS Cyber LLC, a company whose mission is to protect American families. She is a cybersecurity expert with a distinguished background leading intelligence teams in high-stakes environments. Formerly the Director of Data Center Cyber Risk Intelligence at Microsoft, Elizabeth’s work focused on the safety of critical digital infrastructure. Her experience includes evaluating cyber risks, providing actionable intelligence, and developing best practices to secure cloud operations.</p> <p>A Nashville native and Memphis born retired United States Marine Corps veteran, Elizabeth completed three combat deployments to Iraq. Following her graduation from the United States Naval Academy, she earned an MS in Business Administration and Management from Boston University. She is also capstone pending in the Masters in Cybersecurity Program at California State University and has completed a MS in Public Leadership from USF.</p> <p>Elizabeth’s career is marked by a trailblazing spirit. She holds the distinction of being the first black female graduate of the Naval Academy to become a selected Fleet Naval Aviator in the Marine Corps. Her other firsts include piloting the CH-46E, attaining tactical aircraft commander status, and becoming the first woman to fly the MV-22 Osprey. Elizabeth’s courage and leadership earned her an Individual Air Medal for her exceptional actions during a critical period in the first democratic elections in Iraq’s history.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>The cyber threat landscape is a battlefield. Outdated defenses leave us vulnerable. This manifesto unveils strategies for proactive risk management, intelligence-driven action, and a culture of cyber vigilance; it’s the modern survival guide for individuals and organizations.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Solomon-Sonya.png" class="vc_single_image-img attachment-full" alt="" title="Solomon Sonya" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Solomon-Sonya.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Solomon-Sonya-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Solomon-Sonya-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Solomon-Sonya-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="solomonsonya"></a></p> <h3>Solomon Sonya</h3> <p>Computer Science Graduate Student, Purdue University</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Solomon Sonya (@0xSolomonSonya) is a Computer Science Graduate Student at Purdue University. He earned his undergraduate degree in Computer Science and Masters Degrees in Computer Science, Information Systems Engineering, and Operational Art and Strategy. Solomon routinely develops new cybersecurity tools and presents his research, leads workshops, and delivers keynote addresses at cyber security conferences around the world.</p> <p>Prior to attending Purdue, Solomon was the Director of Cyber Operations Training . Prior to that position, Solomon was a Distinguished Computer Science Instructor at the United States Air Force Academy, Research Scholar at the University of Southern California, Los Angeles, and an Adjunct Faculty Instructor with the Advanced Course in Engineering Cyberspace Security (ACE) at the Air Force Research Lab in Rome, NY.</p> <p>Solomon’s previous keynote and conference engagements include: DEFCON and BlackHat USA in Las Vegas, NV, SecTor Canada, Hack in Paris and LeHack, France, HackCon Norway, ICSIS ‚Äì Toronto, ICORES Italy, BruCon Belgium, CyberCentral ‚Äì Prague and Slovakia, Hack.Lu Luxembourg, Shmoocon DC, BotConf – France, CyberSecuritySummit Texas, SANS Digital Forensics Summit, DerbyCon Kentucky, SkyDogCon Tennessee, HackerHalted Georgia, Day-Con Ohio, TakeDownCon Connecticut, Maryland, and Alabama, and AFCEA ‚Äì Colorado Springs and Indianapolis.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Malware continues to increase in prevalence and sophistication. Traditional detection mechanisms fail to adequately detect new and varied malware. This talk teaches how to use AI and delivers a new Machine Learning framework to analyze malware classify malicious samples into malware families.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/MarissaDavis.png" class="vc_single_image-img attachment-full" alt="" title="MarissaDavis" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/MarissaDavis.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/MarissaDavis-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/MarissaDavis-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/MarissaDavis-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="marissadavis"></a></p> <h3>Marissa Davis</h3> <p>Information Security Analyst</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>With over five years of hands-on experience as an Information Security Analyst, I safeguard critical systems, networks, and data from sophisticated cyber threats. My expertise encompasses malware research and analysis, threat hunting, security operation center (SOC), and incident response activities, utilizing industry-leading tools and technologies. I’ve successfully identified and mitigated high-risk vulnerabilities, bolstering the company’s security posture.</p> <p>I hold both a bachelor’s and Master’s degree in Cybersecurity. Additionally, I’ve earned certifications including Security+, eJPT, CySA+, and CSAP, showcasing proficiency across diverse cybersecurity domains. My professional journey spans various sectors, including roles at Maximus, Flashpoint, Synovus, and Columbus State University. Passionate about staying abreast of cybersecurity trends, I’m dedicated to fortifying digital defenses and fostering a secure online environment.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>In an age of relentless cyber threats, businesses teeter on the edge of a cyber dystopia. Join me for “Navigating the Cyber Dystopia: Proactive Incident Response,” where I’ll unveil strategies to outsmart hackers, fortify defenses, and secure your digital future. Stay ahead, stay protected!</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Chris-Esquire.png" class="vc_single_image-img attachment-full" alt="" title="Chris Esquire" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Chris-Esquire.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Chris-Esquire-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Chris-Esquire-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Chris-Esquire-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="chrisesquire"></a></p> <h3>Chris Esquire</h3> <p>The Esquire Group, LLC</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Dr. Chris Esquire, esq. is a US Army veteran who served in the Signal Corps. Since 1996 he has worked in Information Technology for all industry sectors including public, private, military, and federal government. That also includes being a security analyst for one of the largest power companies in the world. For over 20 of those years he has operated in the security part of the field. Since 2017 he has focused his energy on educating individuals in cyber security having worked for over 5 universities. He has presented research internationally on various topics such as data breaches, cloud security, GDPR, cyber terrorism, and critical infrastructure protection. Lastly, he is also a licensed attorney who has focused his energy on education, community and public service with hopes on helping various industries and government bodies stay one step ahead of those who wish to do harm.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>What if I told you that for around $1,000 you can compromise and intercept satellite communications? Still not intrigued yet? What if I told you that all communication signals transmit under the bandwidth of satellite and microwave communications? These signals are always around us, remember that.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Jim-West.png" class="vc_single_image-img attachment-full" alt="" title="Jim West" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Jim-West.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Jim-West-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Jim-West-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Jim-West-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="jimwest"></a></p> <h3>Jim West</h3> <p>TopCyberPro.com</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Jim West possesses more than 32 years’ experience in the Information Technology field with over 20 years focused within Cybersecurity. He has worked in the IT and Security industry across many sectors of commercial, space, federal, and defense with expertise in Biometrics, Risk Management, Security Analysis, and Network and Systems Auditing. Jim holds multiple certifications which include; CISSP-ISSEP, ISSMP, GSLC, GCIH, GSNA, GPEN, G2700, PMP, C-CISO, S-CISO and many others. Jim has been invited to speak at Cyber Security conferences and events worldwide to include the NSA IA Symposium, Texas Technology Summit, CSfC Tech Day, TechNet Korea, Global CISO Forum, Cyber Bowl, Best Cyber Ranger, and many others. He was shortlisted as a finalist for Personality of the Year for the 2018, 2019, and 2020 Cyber Security Awards, and won in 2021. Jim was recently awarded the 2024 Cyber Leader of the Year award by Cyber First. West is also an award-winning author and writer. Jim’s “Cyber Security and Test Tips” eBook placed in the “100 Best Cyber Security Books of All Time” list by Bookauthority.org. For years he has developed and overseen IT and Cybersecurity strategy and solutions which solve complex problems for National Security systems and networks. West possesses a wide range of IT specialization to include systems integration, enterprise-wide and cloud security, network engineering, penetration testing, and more.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Quantum Computing is soon to become a major advancement for the world, but with this huge step forward in compute power comes a real and serious threat to security for everyone. Threats that we will face in our near future.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Mauro-Eldritch-1.png" class="vc_single_image-img attachment-full" alt="" title="Mauro Eldritch" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Mauro-Eldritch-1.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Mauro-Eldritch-1-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Mauro-Eldritch-1-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Mauro-Eldritch-1-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="mauroeldritch"></a></p> <h3>Mauro Eldritch</h3> <p>Bitso Quetzal Team Leader<br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Mauro Eldritch is an Uruguayan-Argentine hacker, founder of Birmingham Cyber Arms LTD and DC5411 (Argentina / Uruguay). He has spoken at various events, including DEF CON (10 times). He is passionate about Threat Intelligence and Biohacking.</p> <p>Currently, he leads Bitso’s Quetzal Team, the first in Latin America dedicated to Web3 Threats Research.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>What if the North Korean government stumbled upon your LinkedIn profile and decided to offer you a job interview? It’s more common than you think…</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Kevin-Cardwell.png" class="vc_single_image-img attachment-full" alt="" title="Kevin-Cardwell" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Kevin-Cardwell.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Kevin-Cardwell-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Kevin-Cardwell-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Kevin-Cardwell-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="kevincardwell"></a></p> <h3>Kevin Cardwell</h3> <p>Cyber2 Labs</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Kevin Cardwell served as the leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.</p> <p>He spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations and Security Center (NOSC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean . He served as the Leading Chief of Information Security at the NOSC for six years. While there he created a Strategy and Training plan for the development of an expert team that took personnel with little or no experience and built them into expert team members for manning of the NOSC.</p> <p>He currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US, Middle East, Africa, Asia and the UK . He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences as well as many others. He has chaired the Cybercrime and Cyberdefense Summit in Oman and was Executive Chairman of the Oil and Gas Cyberdefense Summit. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman that recently was rated as the top CERT for the Middle East. He serves as a professional training consultant to the Oman Information Technology Authority, and developed the team to man the first Commercial Security Operations Center in the country of Oman. He has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK in the planning of a robust and secure architecture and implementing requirements to meet compliance. He currently provides consultancy to Commercial companies, governments, federal agencies, major banks and financial institutions throughout the globe. Some of his recent consulting projects include the Muscat Securities Market (MSM), Petroleum Development Oman and the Central Bank of Oman. He designed and implemented the custom security baseline for the Oman Airport Management Company (OAMC) airports. He created custom security baselines for all of the Microsoft Operating Systems, Cisco devices as well as applications. Additionally, he provides training and consultancy to the Oman CERT and the SOC team in monitoring and incident identification of intrusions and incidents within the Gulf region. He holds the CEH, ECSA. LPT, APT, CHFI and a number of other certifications.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p><b>Shattered Security: The Need for a Cybersecurity Overhaul</b></p> <p>In the ever-evolving landscape of cybersecurity, organizations face unprecedented challenges. The current approaches have failed miserably!</p> <p>I will underscore the urgency for a paradigm shift towards proactive resilience and detection. The increasing frequency and sophistication of cyber-attacks have exposed vulnerabilities in traditional reactive security measures. This emphasizes the need for a comprehensive overhaul that prioritizes the anticipation of threats and the implementation of robust defense mechanisms that deploy deception concepts.</p> <p>The sad thing is, we are spending billions on products that are not going to fix this problem. It is time to stop the insanity! The presentation calls for a collaborative effort among industry stakeholders to foster a culture of security awareness and to invest in cutting-edge solutions that can adapt to the dynamic nature of cyber threats. By embracing proactive resilience and detection, organizations will not only protect their assets but also gain a competitive edge in an increasingly digital world.</p> <p>We’ll move beyond reactive patching and the practice of chasing the latest vulnerability, instead focusing on strategies that anticipate and mitigate threats. This includes building robust detection and response capabilities, as well as employing deception techniques to mislead attackers and disrupt their operations using tried and true practices that offer solid results. By adopting a proactive, layered and multi-faceted approach, organizations can build resilience and emerge stronger in the face of the ever-evolving cyber threat landscape.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Georgia-Weidman.png" class="vc_single_image-img attachment-full" alt="" title="Georgia Weidman" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Georgia-Weidman.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Georgia-Weidman-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Georgia-Weidman-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Georgia-Weidman-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="georgiaweidman"></a></p> <h3>Georgia Weidman</h3> <p>Founder, Shevirah, Bulb Security</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Georgia Weidman is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, mentor, angel investor, and the author of Penetration Testing: A Hands-On Introduction to Hacking. Her work in the field of smartphone exploitation received a DARPA Cyber Fast Track grant and she has been featured internationally in print and on national television including ABC, BBC, Fox, NBC, and in the PBS documentary Roadtrip Nation: Life Hackers. She has presented and trained around the world including venues such as Black Hat, DEF CON, NSA, Oxford, RSA, and West Point.</p> <p>Georgia founded Shevirah to create products for assessing and managing the risk of mobile devices in the enterprise and testing the effectiveness of enterprise mobility management solutions. She is also the founder of the security consulting firm Bulb Security.</p> <p>She received the 2015 Women’s Society of CyberJutsu Pentest Ninja award and is a Professor at the University of Maryland Global Campus. She holds U.S. Patents #10,432,656 and #11,089,044 which are foundational to simulated phishing; as well as CISSP, Pentest+, and OSCP certifications. She has served as a subject matter expert with the CyberWatch Center’s National Visiting Committee, FTC’s Home Inspector IoT security challenge, and as a New America Cybersecurity Policy Fellow.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Mobility has disrupted the enterprise network on the scale that PCs disrupted mainframes. Yet most enterprises continue to approach security as if though there is still a hard perimeter with nothing but corporate-owned end points and apps. We look at practical solutions to this ubiquitous problem.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/LucasRocha-1.png" class="vc_single_image-img attachment-full" alt="" title="LucasRocha" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/LucasRocha-1.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/LucasRocha-1-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/LucasRocha-1-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/LucasRocha-1-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="lucasrocha"></a></p> <h3>Lucas Teixeira Rocha</h3> <p>Oracle / University of Beira Interior</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>As a passionate full-stack web developer with a deep enthusiasm for technology, I have cultivated a diverse and extensive skill set in software development, contributing to a variety of projects across different industries. My technical expertise encompasses a wide spectrum of programming languages and solution platforms, making me adept at navigating complex technological landscapes.</p> <p>Since embarking on my programming career in 2011, I have developed proficiency in an array of programming languages and frameworks. My repertoire includes JavaScript with its various frameworks and libraries (Express, NestJS, AdonisJS, loopback.io, React, Angular), C# with .NET Core, PHP with popular frameworks (Laravel, Symfony, Yii), Python using Flask, and Java with Spring. This broad skill set enables me to effectively tackle unique project requirements, ensuring that each solution I deliver is not only tailored to specific needs but also upholds the highest standards of quality and innovation. My commitment to each project goes beyond just meeting specifications; it’s about creating solutions that drive progress and make a meaningful impact.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <ul> <li>Get introduced on my Open-Source Laravel localization project and what made it to achieve 1M+ downloads.</li> <li>Learn about the experience of being a Open Source package maintainer, get advised (dos and don’ts).</li> <li>End the presentation inspired to do the same I did (or even better).</li> </ul> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/DariusDavis.png" class="vc_single_image-img attachment-full" alt="" title="DariusDavis" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/DariusDavis.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/DariusDavis-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/DariusDavis-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/DariusDavis-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="dariusdavis"></a></p> <h3>Darius Davis</h3> <p>Southside CHI Solutions</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Darius J Davis is a Senior Security Engineer at CircleCI and the leader of Southside CHI Solutions, where he enhances the security of small businesses on the southside of Chicago. With a comprehensive background in system administration and product engineering, Darius has built and secured large-scale systems, specializing in cloud security, IAM, and incident response. As a security engineer, he is committed to educating the public on IT security risks. He has spoken at both major conferences like BITCON and smaller, local events in Chicago. Follow his insights on YouTube and TikTok at @talkingtechwithd.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Imagine the water you drink, cook with, and bathe in being at risk due to cyber threats. This talk dives into the challenges faced by water facilities and how they mirror those in other sectors. We’ll explore real-world incidents and provide actionable solutions to protect our essential resources.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Inna-Vasilyeva.png" class="vc_single_image-img attachment-full" alt="" title="Inna Vasilyeva" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Inna-Vasilyeva.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Inna-Vasilyeva-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Inna-Vasilyeva-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Inna-Vasilyeva-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="innavasilyeva"></a></p> <h3>Inna Vasilyeva</h3> <p>Senior Threat Intel Analyst & Reverse Engineer, HUMAN Security<br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Inna Vasilyeva is a Senior Threat Intel Analyst and Reverse Engineer at HUMAN Security. She has worked in advanced cyber intelligence analysis, reverse engineering, malware analysis and ethical hacking for the last 13+ years. Inna also actively tracks cybercrime and dark web activity including targeted malware. She has spoken at many worldwide conferences such as DEFCON, Black Hat US, Botconf, DCC, Underground Economy, FIRST, including winning or placing in multiple hacking competitions. In her time at HUMAN, Inna has contributed to a number of disruptions and takedowns, including the PARETO, Scylla, VASTFLUX and BADBOX/PEACHPIT operations.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Demystify how malware infiltrates your device, disguises itself as legitimate apps and leverages social engineering techniques. While exploring basic techniques to analyze the app’s code and how malicious apps behave when running.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Georgios-Diamantopoulos.png" class="vc_single_image-img attachment-full" alt="" title="Georgios Diamantopoulos" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Georgios-Diamantopoulos.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Georgios-Diamantopoulos-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Georgios-Diamantopoulos-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Georgios-Diamantopoulos-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="georgiosdiamantopoulos"></a></p> <h3>Georgios Diamantopoulos</h3> <p>Zero to MVP</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>As an engineer, Georgios prides himself for being pragmatic and a generalist – engineering at its best is meant to bring an intention to life. To build a system that fulfills specific requirements over time. With over 12 years of experience working with or for startup organizations, he really knows what it takes to kickstart a project without sacrificing long-term goals like maintainability or scalability. Since he co-founded Zero to MVP in 2019, Georgios and his team have built over 25 systems that can pivot and scale.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p><b>Human and machine: the impact of living a tech-native life</b></p> <p>I got my first computer when I was 11. After 29 years of 8+ hours/day of sitting, a journey through several fitness systems, a live dissection and my fair share of challenges, I am beginning to understand the impact.</p> <p>“How can I invest in a lifetime of ability, free of pain and injuries?”</p> <p>This is the question we’ll begin to unfold in this presentation. Drawing from anatomy, scientific research and my own practice, we’ll cover:</p> <ul> <li>The direct and long-term effects of sitting to our bodies</li> <li>Important but less popular truths about posture and ergonomics</li> <li>Practical ways to get started, from the moment you leave the room</li> </ul> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/06/Chuck-Easttom.png" class="vc_single_image-img attachment-full" alt="" title="Chuck Easttom" srcset="https://hackerhalted.com/wp-content/uploads/2024/06/Chuck-Easttom.png 450w, https://hackerhalted.com/wp-content/uploads/2024/06/Chuck-Easttom-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/06/Chuck-Easttom-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/06/Chuck-Easttom-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="chuckeasttom"></a></p> <h3>Dr. Chuck Easttom, M.Ed., MBA, MS, MSSE, Ph.D2., D.Sc.</h3> <p>Scientist, Author, Professor</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Dr. Chuck Easttom is currently in his own consulting practice both consulting and conducting research. He is also an adjunct lecturer at Georgetown University, adjunct professor at Vanderbilt University, and an adjunct professor at University of Dallas. He is the author of 43 books, including several on computer security, forensics, and cryptography. His books are used at over 60 universities. He has also authored scientific papers (over 70 so far) on digital forensics, machine learning/AI, cyber warfare, cryptography, bio-engineering, and applied mathematics. He is an inventor with 26 computer science patents. He holds a Doctor of Science (D.Sc.) in cyber security (dissertation topic: “A Comparative Study of Lattice Based Algorithms for Post Quantum Computing”) and a Ph.D. in Technology focused on nanotechnology (dissertation topic:“The Effects of Complexity on Carbon Nanotube Failures”), and a Ph.D. in computer science with emphasis on applied mathematics (dissertation topic “A Systematic Framework for Network Forensics Using Graph Theory”), as well as four master’s degrees (one in applied computer science, one in education, one in strategic and defense studies, and one in systems engineering).. He is a Senior Member of the IEEE and a Senior Member of the ACM as well as a member of IACR (International Association of Cryptological Research)a member of APS (American Physical Society), and INCOSE (International Council on Systems Engineering). He is also a Distinguished Speaker of the ACM (Association of Computing Machinery). and a Distinguished Visitor of the IEEE Computer Society, and a frequent speaker at conferences. He also currently holds 80 industry certifications (CISSP, CASP, CEH, etc.) He is a member of IEEE Software & Systems Engineering Standards Committee. Worked on the DevOps 2675 IEEE standards group 2017 to 2019 and currently a member of the IEEE Engineering in Medicine and Biology Standards Committee Standard for a Unified Terminology for Brain-Computer Interfaces P2731. He is also Vice Chair of IEEE P23026 – Systems and Software Engineering — Engineering and Management of Websites for Systems, Software, and Services Information. Chair of IEEE P3123 Standard for Artificial Intelligence and Machine Learning (AI/ML) Terminology and Data Formats. He frequently serves as an expert witness in computer related court cases. You can get more details at <a href="https://www.chuckeasttom.com/">www.ChuckEasttom.com</a></p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>AI including large language models has already been used by terrorists as well as cyber attackers and even child predators. And all current data suggests this will increase dramatically in coming years.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Allie-Heeter.png" class="vc_single_image-img attachment-full" alt="" title="Allie-Heeter" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Allie-Heeter.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Allie-Heeter-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Allie-Heeter-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Allie-Heeter-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="alliehunter"></a></p> <h3>Allie Hunter</h3> <p>Cybersecurity Awareness Strategist | Author | Advisory Board Member</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Allie Hunter is a Cybersecurity Awareness Manager and Advisory Board Member with experience in promoting cybersecurity best practices and awareness. She is dedicated to ensuring organizations understand and implement effective cybersecurity measures. Allie also volunteers as a Marketing Manager/Moderator for Fireside Chat with IT/Cyber Leaders and contributes to quality assurance initiatives with Women in Technology (WIT). Her diverse educational background includes degrees and certificates in Marketing Management, Fine Arts, and Psychology, along with IT and Cybersecurity from Kennesaw State University, College of Coastal Georgia and Emory University.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Learn how to revolutionize your cybersecurity awareness training with Allie Hunter’s groundbreaking “Hunter Method.” Utilizing relatable stories, employees become captivated while internalizing crucial lessons needed to protect themselves, their families, the organization and its customers.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Pallavi-Deshmukh.png" class="vc_single_image-img attachment-full" alt="" title="Pallavi Deshmukh" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Pallavi-Deshmukh.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Pallavi-Deshmukh-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Pallavi-Deshmukh-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Pallavi-Deshmukh-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="pallavideshmukh"></a></p> <h3>Pallavi Deshmukh</h3> <p>Cloud Security Manager, Coupa Software</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Pallavi is working as a Cloud Security Manager with over 14 years of experience, excelling in managing cloud security teams and passionate about penetration testing. As a dedicated advocate for application security and accomplished security researcher, Pallavi’s expertise extends to diverse domains, making her a valuable asset in fighting cyber threats. Her commitment to cybersecurity and pioneering work as a woman in application security promise to ignite lively discussions at the conference. Presented for the VulnCon conference.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Web apps often utilize template systems FreeMarker for embedding dynamic content. However, unsafely embedding user input can lead to Template Injection vulnerabilities. This paper explores an issue discovered in the Alfresco Community Edition, allowing attackers to perform SSTI, resulting in RCE.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Andrea-Amico.png" class="vc_single_image-img attachment-full" alt="" title="Andrea Amico" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Andrea-Amico.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Andrea-Amico-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Andrea-Amico-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Andrea-Amico-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="andreaamico"></a></p> <h3>Andrea Amico</h3> <p>Privacy4Cars</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Andrea Amico’s 1000+ media mentions (TV, radio, podcasts, articles) and his signature blue hair make him one of the most recognizable and vocal experts on vehicle privacy and security. As the founder & CEO of Privacy4Cars, the first privacy-tech focused on automotive, Andrea brings a hacker mindset to the auto industry: disclosing vulnerabilities, authoring novel research, and creating solutions that are redefining the role of privacy for cars. He holds several patents, including for AutoCleared; a mobile tool used in 1,500,000+ vehicles to efficiently manage, execute, and log the deletion of Personal Information from cars. His https://VehiclePrivacyReport.com is a first-of-its-kind privacy disclosure tool that consumers can use to learn what their car collects, shares, and sells, and how to take action to reduce your vehicle’s data footprint: with manufacturers, auto finance companies, insurance companies, and more.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Cybersecurity podcast host and book author Carey Parker of Firewalls Don’t Stop Dragons and vehicle privacy expert Andrea Amico of Privacy4Cars get together by that dumpster fire that is vehicle privacy. They’ll share their stories and knowledge. You’ll never look at a car the same way again.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/BenHalpert.png" class="vc_single_image-img attachment-full" alt="" title="BenHalpert" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/BenHalpert.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/BenHalpert-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/BenHalpert-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/BenHalpert-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="benhalpert"></a></p> <h3>Ben Halpert</h3> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Ben Halpert is a man on a mission: to educate and empower today’s digital citizens in the workplace, at schools, and at home.</p> <p>By day, he is the CSO at The Cyber Health Company providing individuals cybersecurity, online privacy, and digital hygiene services with 24/7 human support.</p> <p>By night, he champions cyber ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded in 2007.</p> <p>Ben enjoys being on boards of organizations looking to enhance value and organizational resilience for the stakeholders they serve.</p> <p>Ben is honored to speak and keynote at conferences and events worldwide. He has presented at the World Economic Forum, NACD directorship training, RSA Security Conference, GISEC Global, InfoSec World, SecureWorld, Cyber Future Foundation, IEEE, ACM, CSO50, CIO/CISO Summits and many other events over his career.</p> <p>Ben was invited to present at TEDxKids@Vilnius (Raising Savvy Cyber Kids) and TEDxSaintThomas (Technology addiction and what you can do about it).</p> <p>Based on his early research and experience in the then emerging field of Cloud Computing, Ben was invited to publish Auditing Cloud Computing: A Security and Privacy Guide through John Wiley & Sons. Ben was a contributing author to Readings and Cases in the Management of Information Security and the Encyclopedia of Information Ethics & Security, wrote the security column for Mobile Enterprise Magazine and has contributed to seven NIST special publications.</p> <p>Through Savvy Cyber Kids, Ben provides cyber ethics educational and awareness sessions for parents, teachers, and students from preschool through high school. Ben is the award-winning author of The Savvy Cyber Kids at Home children’s book series (The Family Gets a Computer, The Defeat of the Cyber Bully, and Adventures Beyond the Screen).</p> <p>As a trusted voice on a variety of cyber security issues, Ben has made numerous TV and radio appearances and has been featured in newspapers and magazines such as The New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, RTVI, 11 Alive, WSB-TV, among others.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Learn how to revolutionize your cybersecurity awareness training with Allie Hunter’s groundbreaking “Hunter Method.” Utilizing relatable stories, employees become captivated while internalizing crucial lessons needed to protect themselves, their families, the organization and its customers.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Alexandre-Horvath.png" class="vc_single_image-img attachment-full" alt="" title="Alexandre Horvath" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Alexandre-Horvath.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Alexandre-Horvath-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Alexandre-Horvath-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Alexandre-Horvath-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="alexandrehorvath"></a></p> <h3>Alexandre Horvath</h3> <p>CISO at Cryptix AG</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Alexandre Horvath has over 20 years of experience in multinational organizations on a global level. A motivator, innovator, leader, and security enthusiast, he has solid knowledge of privacy, data protection, and cybersecurity. He has successfully managed international cross-functional teams and major IT security and risk programs. He has over a decade of strategic, operational, and project management leadership expertise in IT security and risk management. Alexandre specializes in service management, risk remediation, and delivery of global projects. In his role as a leader, he manages the triangle of cost, quality, and speed to market while considering strategy as well as emerging security needs.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>On their 1st day, a deepfake remote hire will steal your secrets, plans, data, and install ransomware.</p> <p>This expensive and soon-to-be widespread scam is designed to fool interviewers into believing that a “electronic caricature” is actually a highly qualified real candidate.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Himanshu-Sharma.png" class="vc_single_image-img attachment-full" alt="" title="Himanshu Sharma" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Himanshu-Sharma.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Himanshu-Sharma-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Himanshu-Sharma-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Himanshu-Sharma-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="himanshusharma"></a></p> <h3>Himanshu Sharma</h3> <p>5ire</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Himanshu Sharma, has been in the field of bug bounty since 2009 and has been listed in Apple, Google, Microsoft, Facebook, Adobe, Uber, AT&T, Avira, and many more with hall of fame listings as proofs. He was a speaker Botconf ’13, held in Nantes, France, RSA 2018 held in Singapore. He also spoke at the IEEE Conference in California and Malaysia as well as for TedX. Currently, he is the co-founder of BugsBounty, and consults various businesses . He also authored multiple books titled “Kali Linux – An Ethical Hacker’s Cookbook”, ” Hands-On Red Team Tactics” and others.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>This talk covers how modern endpoint protection solutions like EDRs and XDRs detect malware with static, dynamic and behavioral analysis and then dives deep into our novel techniques used to bypass such solutions during real world red team engagements in sophisticated corporate IT ecosystems.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Carey-Parker.png" class="vc_single_image-img attachment-full" alt="" title="Carey Parker" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Carey-Parker.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Carey-Parker-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Carey-Parker-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Carey-Parker-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="careyparker"></a></p> <h3>Carey Parker</h3> <p>Founder & CEO at Privacy4Cars</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Carey Parker is an author, podcast host, speaker and retired software engineer. Carey’s early interests in computers and electronics culminated in a masters degree in Electrical Engineering from Purdue University and a 28-year career in software engineering. After working for large and small telecom firms, Carey retired from the rat race in 2020. Deeply disturbed by the Snowden revelations, Carey wrote a comprehensive book on cybersecurity and privacy aimed squarely at non-technical readers. Now in it’s 5th edition, the book Firewalls Don’t Stop Dragons spawned a successful podcast of the same name, which combines important cyber news with interviews of security and privacy experts. In retirement, Carey’s mission is teaching everyday people how to defend their digital devices and protect their personal data.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Cybersecurity podcast host and book author Carey Parker of Firewalls Don’t Stop Dragons and vehicle privacy expert Andrea Amico of Privacy4Cars get together by that dumpster fire that is vehicle privacy. They’ll share their stories and knowledge. You’ll never look at a car the same way again.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Omkar.png" class="vc_single_image-img attachment-full" alt="" title="Omkar" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Omkar.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Omkar-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Omkar-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Omkar-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="omkarjoshi"></a></p> <h3>Omkar Joshi</h3> <p>Lead Security Engineer, Coupa Software</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <ul> <li>More than 11 years of experience in Security domain especially Pentest, Application Security, Forensics Investigation</li> <li>Currently Leading OffSec team @ Coupa Software</li> <li>Passionate Red teamer, Security researcher</li> <li>Reported multiple vulnerabilities in products, applications and acknowledged with CVE’s</li> <li>Holds prestigious certifications that testify to his expertise and commitment to the cybersecurity industry, including Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP), Certified Red Team Operator (CRTO) and much more.</li> <li>Presented across conferences such as Bsides Budapest, Bsides Milano, Hacktivity, VulnCon</li> </ul> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Web apps often utilize template systems FreeMarker for embedding dynamic content. However, unsafely embedding user input can lead to Template Injection vulnerabilities. This paper explores an issue discovered in the Alfresco Community Edition, allowing attackers to perform SSTI, resulting in RCE.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Wayne-Burke.png" class="vc_single_image-img attachment-full" alt="" title="Wayne Burke" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Wayne-Burke.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Wayne-Burke-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Wayne-Burke-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Wayne-Burke-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="wayneburke"></a></p> <h3>Wayne Burke</h3> <p>Vice President Co-Founder at Cyber2 Labs LLC</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Wayne Burke is internationally recognized for his commitment and work experience, achievements and contributions to the IT and Cyber Security Industry. Currently specializing in many offensive and defensive Ai technologies for Robotics such as Drones, building and managing new high-tech security tools, custom hardware solutions for Bio-Medical products, Digital Forensics, Penetration Testing, Mobile Security and radio frequency using specialized SDR’s.</p> <p>Wayne and team have delivered Security assessments, Penetration Test assignments and customized training for International Corporations and many Government Agencies such as: EPA, FAA, DOJ, DOE, DOD, Air Force, Army, Navy, Marines, FBI, NSA and many more USA Gov bodies.<br /> In Europe: United Nations, NATO, Europol, MOD (Military of Defense UK) various EU Law Enforcement, Dutch Ministry of Defense, Ministry of Justice, local European Law Enforcement: UK, Ireland, Switzerland, Belgium, Holland, Denmark.</p> <p>ASIA: Singapore Gov, Philippines’ Presidential Office, the Undersecretary, and Cyber Crime Police Specialist Unit. Jakarta, Tax Investigations Office. Various Malaysian Gov agencies. His experience in the public / defense sector is equally complemented by assignments undertaken for heavyweight world renowned corporations.</p> <p>Imminently qualified in his field in that he holds a string of professional qualifications in Networking to name a few (MCT, MCSE, Cisco, Network+) and Cyber Security (CPENT, CEH Master, ECSA, CPTS, LPT, CHFI, CTIA, CSA, Security+ and CCE) besides a bachelor’s degree in science.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p><b>Navigating the Double-Edged Sword: The Risks and Benefits of AI/ML in Computer Security</b></p> <p>In 2024, Artificial Intelligence (AI) stands as a pivotal technology in the realm of computer security, presenting both unparalleled benefits and significant risks. This presentation will delve into how AI is transforming security practices, enhancing threat detection, and automating responses to cyber threats. We will explore the advanced capabilities AI brings to predictive analytics, allowing for proactive defense strategies against emerging threats.</p> <p>However, the integration of AI in cybersecurity also introduces new vulnerabilities. Malicious actors are increasingly leveraging AI to create sophisticated attacks, including automated phishing schemes and AI-driven malware that can adapt and evolve. The presentation will discuss the potential for AI to be used in adversarial attacks, where attackers manipulate AI systems to bypass security measures.</p> <p>Moreover, ethical considerations and the need for robust AI governance frameworks will be highlighted, emphasizing the importance of ensuring AI systems are transparent, accountable, and secure. We will also examine case studies of AI-driven security in action and the lessons learned from their implementation.<br /> By balancing the discussion on both the promise and peril of AI in cybersecurity, this presentation aims to provide a comprehensive understanding of how to harness AI’s potential while mitigating its risks, ensuring a secure digital future.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Keith-Turpin.png" class="vc_single_image-img attachment-full" alt="" title="Keith Turpin" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Keith-Turpin.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Keith-Turpin-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Keith-Turpin-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Keith-Turpin-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="keithturpin"></a></p> <h3>Keith Turpin</h3> <p>The Friedkin Group</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Chief Information Security Officer (CISO) at The Friedkin Group, a multibillion-dollar international consortium of automotive, hospitality, entertainment, sports, and adventure companies.</p> <p>Recent accomplishments while leading cyber security at The Friedkin Group:</p> <ul> <li>2024 Orbie Award – Houston Large Enterprise CISO of the Year</li> <li>2023 Forbes 20 Best Security Programs in the U.S.</li> <li>2023 CSO Online CSO50 Award</li> <li>2023 Cyber Defense Magazine Top 100 CISOs</li> </ul> <p>Former Chief Information Security Officer (CISO) and Head of Global Infrastructure at Universal Weather and Aviation, an international aviation logistics company operating more than 50 locations in 20 countries.</p> <p>Former Technical Fellow at The Boeing Company leading:</p> <ul> <li>International IT Security Operations</li> <li>Supply Chain Security</li> <li>Enterprise IT Risk</li> <li>Software Security</li> </ul> <p>Former U.S. delegate to the International Standards Organization’s (ISO) Cyber Security Sub-Committee<br /> Former OWASP Global Projects Committee Member<br /> Former Transportation Sector Chief for the Houston FBI InfraGard program</p> <p>Graduate of the FBI CISO Academy at Quantico<br /> BS in Mechanical Engineer and MS in Computer Systems</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Doing your job is not the same as managing your career. Your job is what you do today, but your career is what you will be doing 5 years from now. Getting what you want in the future is about laying down the right ground work for success today. Find out what that means in this candid conversation.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Tom-Updegrove.png" class="vc_single_image-img attachment-full" alt="" title="Tom Updegrove" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Tom-Updegrove.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Tom-Updegrove-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Tom-Updegrove-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Tom-Updegrove-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="tomupdegrove"></a></p> <h3>Tom Updegrove</h3> <p>Internetwork Service LLC</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>I cut my teeth on a Tandy Coco, made toast with a Commodore Amiga 2500 in the 80′. Became a Microsoft Systems Engineer & Cisco Network Associate in the 2000′. If I am not researching the trend in Cyber you will find me in the park doing Tai Chi or at Martial Posture the Martial Arts school I founded slugging it out with my Amigos. Self Defense has many levels.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>In this presentation, we explore the integration of shellGPT, an advanced AI model, into ethical hacking practices. As cyber threats evolve, so must our tools and methodologies. We’ll demonstrate how shellGPT can be utilized in various stages of ethical hacking</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Todd-Renner.png" class="vc_single_image-img attachment-full" alt="" title="Todd Renner" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Todd-Renner.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Todd-Renner-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Todd-Renner-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Todd-Renner-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="toddrenner"></a></p> <h3>Todd Renner</h3> <p>FTI Consulting</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Mr. Renner is a senior cybersecurity expert with more than 25 years of experience leading complex global investigations, cyber intrusion response, digital asset tracing, cryptocurrency theft recovery, preparedness and crisis management. Mr. Renner advises clients on cybersecurity and data privacy topics including third-party risks, insider threats, counterintelligence risks, forensic investigations, cross-segment risk management, cyber fraud protection, regulatory compliance including CFIUS and NYDFS, assessorships and monitorships, and international cyber incidents. He leverages a technical background and strategic perspective when dealing with complex cyber challenges and the associated risks businesses are facing.</p> <p>Prior to joining FTI Consulting, Mr. Renner was a Federal Bureau of Investigation (FBI) Supervisory Special Agent, leading high-profile international cyber investigations that resulted in increased corporate protection, risk mitigation, prevention techniques, and actor attribution.</p> <p>While at the FBI, Mr. Renner advised victims of cyber events, from informing corporate board rooms and C-Suites on cyber risk to handling ransomware, business email compromise, advanced persistent threats (APT), cryptocurrency thefts, counterintelligence threats, and other investigations. In recent years, Mr. Renner led multiple efforts to successfully recover over $100 million in stolen proceeds from cyber criminals.</p> <p>Mr. Renner served in a diplomatic role as an FBI Supervisor in the United Kingdom, working daily with the UK’s‚ National Cyber Security Centre and Ireland’s‚ National Cyber Security Center. He was directly responsible for increasing global collaboration between industry and government partners, leveraging his extensive international operations experience, and applying geo-political visibility to ongoing cyber events.</p> <p>Mr. Renner also served in a leadership role at the National Security Agency (NSA), leading enterprise-wide national security cyber operations. He led collaborative efforts across business units and field offices to develop and implement technical solutions to prevent, protect, and defend against some of the world’s‚ most advanced threats.</p> <p>A highly decorated cybersecurity expert, Mr. Renner has been awarded multiple awards for his contributions to the cybersecurity community, including the FBI Director’s Award and the Director of National Intelligence Meritorious Unit award. Mr. Renner was selected as a member and supervisor of the FBI’s Cyber Action Team (CAT), a team of forensically trained cyber experts who deploy globally for incident response and threat hunting during the most critical cyber incidents, on behalf of the US government.</p> <p>Mr. Renner has been retained as a cybersecurity expert in various cases, providing his expertise in legal proceedings. He has authored multiple expert reports and has testified in federal court cases, sharing his opinion on the topics of digital forensics and the cybersecurity industry.</p> <p>Mr. Renner is committed to improving the cyber security talent pipeline and giving back to the community. He served as an Adjunct Professor of Cybersecurity at Mercer University and created ongoing programs at the high school-level to promote STEM awareness, recruiting and training tomorrow’s cyber leaders.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Following a career as an FBI Agent, pursuing justice for those who were victimized by threat actors, the speaker will share his experiences of chasing threats from nation state and criminal actors to now, his work with companies facing a different threat: from litigation and regulatory actions.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Sergey-Chubarov.png" class="vc_single_image-img attachment-full" alt="" title="Sergey Chubarov" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Sergey-Chubarov.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Sergey-Chubarov-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Sergey-Chubarov-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Sergey-Chubarov-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="sergeychubarov"></a></p> <h3>Sergey Chubarov</h3> <p>Chubarov, Freelance</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Sergey Chubarov is a Security and Cloud Expert, Instructor with 15+ years’ experience on Microsoft technologies.</p> <p>His day-to-day job is to help companies securely embrace cloud technologies.</p> <p>He has certifications and recognitions such as Microsoft MVP: Security, OSCP, OSEP, eCPPT, eCPTX, MCT Regional Lead, EC Council CEH, CPENT, LPT, CCSE, CEI, CREST CPSA, CRT and more.</p> <p>Frequent speaker at local and international conferences like Global Azure, DEF CON, Black Hat Europe, Wild West Hackin’ Fest, Security BSides, Workplace Ninja, Midwest Management Summit, Hack in the Box etc.</p> <p>Prefers live demos and cyberattacks simulations.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Session explores a world where security analysts have an AI-powered sidekick that not only assists but also enhances their capabilities.</p> <p>Attendees will see how OpenAI, GPT-4 and Microsoft Copilot for Security empower security professionals to catch threats others miss and strengthen their expertise.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Justin-Varner.png" class="vc_single_image-img attachment-full" alt="" title="Justin Varner" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Justin-Varner.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Justin-Varner-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Justin-Varner-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Justin-Varner-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="justinvarner"></a></p> <h3>Justin Varner</h3> <p>Chief of Innovation @ RadZen Inc</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Justin Varner is a seasoned and passionate security professional with over 18 years of experience in the industry across a variety of security domains and disciplines.</p> <p>His career started as a cryptographer at NASA where he spent time redesigning the cryptographic messaging system used to communicate from the mission control center to the International Space Station. During a focused and driven career, he has had the opportunity to work across a multitude of different industries in various roles that have ranged from security architecture to offensive security to DevSecOps and everything in between.</p> <p>His most recent endeavors have been focused on helping others improve their ability to rapidly detect breaches and generally bolster their overall security posture with simple and pragmatic means and methods.</p> <p>Justin embraces any opportunity to teach fundamental security concepts to those who need help but have no idea where to look, and he prides himself on being able to break down and articulate complex topics in a fun, interesting, and engaging manner that appeals to people from all backgrounds.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Breaches continue happening at unprecedented levels with huge financial impact to the global economy year after year.</p> <p>This talk discusses a different way of thinking about breach detection that is intended to improve alert fidelity, reduce time-to-detection, and mitigate the impact of a breach.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Andrew-Amaro.png" class="vc_single_image-img attachment-full" alt="" title="Andrew Amaro" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Andrew-Amaro.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Andrew-Amaro-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Andrew-Amaro-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Andrew-Amaro-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="andrewamaro"></a></p> <h3>Andrew Amaro</h3> <p>klavansecurity.com</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Andrew is a highly skilled engineer and a former member of the Canadian Armed Forces.</p> <p>With close to 20 years of experience in security and threat intelligence, he has an impressive track record.</p> <p>As a former Technical Operations Agent and Senior Manager of the Counter Terrorism\Proliferation Technology Group at the Canadian Security Intelligence Service (CSIS), Andrew continued to excel in his security career at the National Head Quarters (NHQ) and the Ottawa Regional office.</p> <p>He has a wealth of experience leading and coordinating technical teams on data exploitation, physical access, online anonymity, and digital surveillance operations, in support of Canadian national security investigations.</p> <p>In 2019, Andrew transitioned to the private sector, where he specializes in social engineering, dark web navigation, online privacy, risk management, and cyber attack incident response planning.</p> <p>Andrew is a seasoned physical and cyber security operator, advisor, and consultant. He has recently collaborated with other industry experts from the Intelligence and Cyber Security community to establish Klavan.</p> <p>*CSIS (Canadian Security Intelligence Service)<br /> *Physical access includes: Perimeter breach and TSCM assessments (Technical Surveillance Countermeasures)</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Step into cyber warfare’s shadows with firsthand intelligence insights. Explore critical infrastructure’s vulnerability and strategic cyber attack maneuvers. Together, let’s fortify defenses and shape a safer digital future.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/07/Jeremy-Straub.png" class="vc_single_image-img attachment-full" alt="" title="Jeremy Straub" srcset="https://hackerhalted.com/wp-content/uploads/2024/07/Jeremy-Straub.png 450w, https://hackerhalted.com/wp-content/uploads/2024/07/Jeremy-Straub-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/07/Jeremy-Straub-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/07/Jeremy-Straub-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="jeremystraub"></a></p> <h3>Jeremy Straub</h3> <p>North Dakota State University</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Jeremy Straub is the director of the North Dakota State University Cybersecurity Institute and an Associate Professor in the North Dakota State University Computer Science Department. His research spans a continuum from autonomous technology development to technology commercialization to asking questions of technology use ethics and national and international policy. He has published more than 60 articles in academic journals and more than 100 peer-reviewed conference papers. Straub serves on multiple editorial boards and conference committees. He is also lead inventor on two U.S. patents and a member of multiple technical societies.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Autonomous cyber attack and defense capabilities were science fiction and are now very real threats and weapons in the next generation of cyber (and conventional) warfare. This talk discusses the state of these capabilities and how explainable AI and the cyber kill chain concept can enable them.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/08/Len-Noe.png" class="vc_single_image-img attachment-full" alt="" title="Len-Noe" srcset="https://hackerhalted.com/wp-content/uploads/2024/08/Len-Noe.png 450w, https://hackerhalted.com/wp-content/uploads/2024/08/Len-Noe-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/08/Len-Noe-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/08/Len-Noe-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="lennoe"></a></p> <h3>Len Noe</h3> <p>CyberArk Technical Evangelist</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Len Noe, a Technical Evangelist, White Hat Hacker, and Transhuman at CyberArk Software, is a dynamic and influential speaker on the international security circuit. With an impressive track record of delivering impactful presentations in over 50 countries and at renowned security conferences worldwide, Noe’s expertise leaves a lasting impression. Notably, he has graced the stage at the prestigious World Conference in The Hague, C.E.R.T. EU, and has been invited to address multiple governments.</p> <p>Len is the author of Human Hacked: My life and lessons as the worlds first augmented ethical hacker. With his first book Len exposes the subculture of Transhumans and the capabilities available to this new breed of human, along with the cyber security risks they pose.</p> <p>Len is a co-host of the Cyber Cognition Podcast and a thought leader in the field of Transhumanism. With his upcoming book, he shares a captivating narrative of his personal evolution, solidifying his position as one of the world’s foremost authorities in this transformative movement. As a futurist, Len’s insights and expertise are highly sought after.</p> <p>Len’s passion for the Transhuman/Human+ movement is unparalleled, and he actively employs microchip implants to pioneer advancements in cyber security and enhance the human experience. His groundbreaking research has garnered global recognition, appearing in multiple global news outlets, while his regular appearances on top-tier security podcasts showcase his ongoing contributions to the field.</p> <p>With a rich history as a Black/Grey Hat Hacker, Noe’s extensive practical experience has shaped his skills. Over the course of 30 years, he has honed his expertise in web development, system engineering/administration, architecture, and coding. For the past ten years, Len has devoted his focus to information security from an attacker’s perspective Actively engaging with the Texas information security communities and organizations like the Autism Society, Len continuously demonstrates his commitment to making a positive impact beyond the realm of technology.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Transhumans, individuals enhanced with technological augmentations, are no longer just a concept from science fiction—they exist and walk among us today. Historically, these individuals have been perceived either from a medical standpoint, with enhancements designed to aid those with disabilities, or as full cyborgs, a notion confined to the realms of speculative fiction. However, with the advent of Brain-Computer Interfaces (BCI), SMART technologies, and consumer products, the boundary between the physical and biological is rapidly disappearing, transforming the landscape of human capability and interaction.</p> <p>Today’s headlines increasingly reflect scenarios reminiscent of science fiction movies, highlighting the profound implications of these advancements for cybersecurity. Augmented humans, with their integrated technological enhancements, pose a significant cyber threat to modern security controls. These transhumans can perform sophisticated cyber attacks such as URL redirections, phishing, smishing, and even man-in-the-middle (MiTM) attacks, all executed from technology embedded beneath their skin. The integration of such advanced tech within the human body renders traditional security measures inadequate, necessitating a rethinking of our defensive strategies.</p> <p>We are living in a future world today, and it is crucial to recognize and acknowledge this reality to ensure our security. The presence of transhumans necessitates a paradigm shift in our approach to cybersecurity, calling for the development of new strategies and technologies to defend against the unique and evolving threats they present. This presentation aims to illuminate with multiple demonstrations including implant initiated MiTM attacks, Phishing, Smishing, and full automated Linux attacks. The expanding landscape of cyber threats posed by transhumans is a real. The urgent need for complimentary and layered security solutions to safeguard our society in this new era of human evolution is already here.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/09/Brad-Dixon.png" class="vc_single_image-img attachment-full" alt="" title="Brad Dixon" srcset="https://hackerhalted.com/wp-content/uploads/2024/09/Brad-Dixon.png 450w, https://hackerhalted.com/wp-content/uploads/2024/09/Brad-Dixon-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/09/Brad-Dixon-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/09/Brad-Dixon-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="braddixon"></a></p> <h3>Brad Dixon</h3> <p>Principal Information Security Consultant at ivision</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Brad Dixon is a principal consultant in cybersecurity at ivision. His primary practice areas are IoT, embedded, Linux systems, threat modeling, and web applications. As a secondary focus he is a software developer responsible for creating REST API test automation tools and production tools used on all ivision engagements. He is a two time DEF CON presenter (2016, 2019) most recently for his work on how to cheat at the Zwift virtual cycling application.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p><b>They Tried to Halt Us… But it Didn’t Work</b></p> <p>So, why aren’t all the hackers halted? Lots of reasons, but there is one word which makes the all difference. Know what it is? We’ve learned a lot from our experiences performing adversarial testing of networks, applications, and devices and want to share the techniques that worked and the lessons you can learn from them. You’ll get some practical advice on what you can do to better defend your organization and maybe next time you’ll be the one halting the hackers.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Laura-Samso-Pericon.png" class="vc_single_image-img attachment-full" alt="" title="Laura Samso Pericon" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Laura-Samso-Pericon.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Laura-Samso-Pericon-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Laura-Samso-Pericon-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Laura-Samso-Pericon-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="laurapericon"></a></p> <h3>Laura Samsó Pericón</h3> <p>Researcher bridging the gap between Drones and Cyber</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Laura Samsó Pericón is a researcher bridging the gap between Cyber and Drone technology. She is a subject matter expert with 15+ years of civil-defense international experience in the fields of Earth Observation and Cyber areas. Her background is Electronics and Aerospace and Science Technology marinated with sports and nonprofit activities. She defines herself as “curiosity hungry” and with an entrepreneur mindset, ready to explore the world and co create.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p><b>Hacking the AI: Can you trust the decision making process?</b></p> <p>Artificial Intelligence (AI) synergy with decision making processes is growing across commercial and military applications; and the moment when machines will surpass human intelligence is getting closer.</p> <p>Events such black swans together with a combination of digitalization, AI, cyberwarfare and other exponential technologies could proliferate and accelerate the adoption of new concepts and technologies creating new dystopian horizons.</p> <p>An example of this are System of Systems in the uncrewed vehicle’s realm, the so-called Manned-Unmanned Teaming (MUM-T). This is reshaping cross-domain systems, missions, and decisions and how wars are fought.</p> <p>Autonomy is propelling those interconnected systems, while AI merges human-machine capabilities through AI-powered MUM-T decision making processes. As humans and machines collaborate more and more, new challenges such as trust and transparency issues in AI will rise. How to ensure a decision taken by Human-Machine is not result of hacking event? How AI supported decision making processes could be better trusted? The research delves into the challenges, vulnerabilities and new capabilities.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Gregory-Carpenter.png" class="vc_single_image-img attachment-full" alt="" title="Gregory Carpenter" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Gregory-Carpenter.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Gregory-Carpenter-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Gregory-Carpenter-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Gregory-Carpenter-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="gregorycarpenter"></a></p> <h3>Gregory Carpenter</h3> <p>Chief Security Officer at KnowledgeBridge International</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Gregory Carpenter is Chief Security Officer of KnowledgeBridge International. He manages corporate security including information technology, information security, and data and analytics solutions to a broad customer base.</p> <p>Gregory is a Fellow at the Royal Society for the Arts and was selected the National Security Agency’s Operations Officer of the Year. He serves on the Board of Directors for ATNA Systems, is a Senior Advisor for ARIC, Inc., and formerly sat on the Board of Advisors for EC-Council University and the International Board of Advisors for the Mackenzie Institute.</p> <p>He served 27 years in the military. Before joining KBI, Gregory served as Vice President for Cyber Operations of NSLT Consulting, Chief of Security Testing for Titania Solutions Group and Chief Operations Officer of PragmatikIO. Gregory also worked as the Counterintelligence Division Chief for the Army Research Labs and was Chief of Special Space Operations, Functional Team Lead for Electronic Warfare, and Chief of the Global Team at the National Security Agency.</p> <p>Gregory holds a Bachelor of Science degree, a Master of Science degree, and a Doctorate in Public Health. He is a Certified Information Security Manager, LEAN Six Sigma Black Belt, and ISO-9000 lead auditor.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p><b>Navigating the Shadows: A Beginner’s Guide to the Dark Web</b></p> <p>Curious about the dark web but unsure where to start? Scared of the doom and gloom stories? “Navigating the Shadows” is your gateway to understanding the hidden corners of the internet. This comprehensive workshop introduces newcomers to the dark web’s landscape, exploring its diverse content and the tools required to access it safely. Using a free Linux distribution and essential software, you’ll learn how to browse securely while gaining insights into this often-misunderstood part of the web. Bring a thumb drive and join us for a hands-on experience that demystifies the dark web and equips you with the knowledge to safely explore with confidence.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Brian-Nmezi.png" class="vc_single_image-img attachment-full" alt="" title="Brian Nmezi" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Brian-Nmezi.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Brian-Nmezi-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Brian-Nmezi-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Brian-Nmezi-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="briannmezi"></a></p> <h3>Brian Nmezi</h3> <p>Director, Cyber Security at Beyond, Inc.</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Brian Nmezi is a highly accomplished cybersecurity professional with a proven track record of leadership and expertise in securing critical infrastructures.</p> <p>Throughout his career, Brian has held pivotal roles in prominent organizations, driving security operations, engineering, and risk management initiatives.</p> <p>His educational background in computer science combined with advanced studies in cyber security and a comprehensive array of certifications underscores his dedication to maintaining the highest standards of information security and compliance.</p> <p>He is excited to deliver this talk with Justin at Hacker Halted to highlight real-world examples where deception technology provided valuable insight into adversarial behavior as it was happening that allowed him to quickly engage his defenders to mitigate the impact of a breach and protect the organization from catastrophe</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Breaches continue happening at unprecedented levels with huge financial impact to the global economy year after year.</p> <p>This talk discusses a different way of thinking about breach detection that is intended to improve alert fidelity, reduce time-to-detection, and mitigate the impact of a breach.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Paige-Needling.png" class="vc_single_image-img attachment-full" alt="" title="Paige Needling" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Paige-Needling.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Paige-Needling-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Paige-Needling-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Paige-Needling-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="paigeneedling"></a></p> <h3>Paige Needling</h3> <p>President and CEO of Needling Worldwide LLC</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim">Qualified leader with solid ability to develop/implement strategies and relationships, resulting in a strong connection with the customer and business. Proven ability to build enterprise connectivity firmly aligned with business initiatives and global goals to support sales growth. Over 20 years of IT project/program management, information security, and data privacy protection experience. Expertise in planning, organizing, CRM and negotiations experience with proven track record in the ability to build, lead, and motivate teams. Experience and skill in performing interpretive analysis and synthesis of information insights and key takeaways on critical projects.</div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim">Coming Soon</div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Erdal-Ozkaya.png" class="vc_single_image-img attachment-full" alt="" title="Erdal Ozkaya" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Erdal-Ozkaya.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Erdal-Ozkaya-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Erdal-Ozkaya-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Erdal-Ozkaya-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="erdalozkaya"></a></p> <h3>Erdal Ozkaya</h3> <p>Chief Cybersecurity Strategist – Group CISO at MAVeCap</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>With an impressive tenure exceeding over 25 years in IT and security, Dr. Erdal Ozkaya is a distinguished figure in the global cybersecurity landscape, dedicated to defending organizations from virtual perils.</p> <p>Serving as the CISO for MAVeCap, a Venture Capital firm that invests in and fosters cutting-edge concepts, including cybersecurity advancements, Dr. Ozkaya is at the vanguard, crafting cybersecurity strategies and guiding the information security risk management for a portfolio of 15 companies.</p> <p>Dr. Ozkaya’s commitment extends across a spectrum of revered cybersecurity forums and scholastic bodies, where he contributes his expertise as a board member, consultant, educator, and author.</p> <p>Equipped with a doctoral degree in information technology and esteemed credentials such as CCISO and MCSE, Dr. Ozkaya is zealous about navigating cybersecurity quandaries and propelling digital innovation across the corporate realm and society at large.</p> <p>His extraordinary leadership and acumen have not gone unnoticed, garnering recognition as a top 50 tech luminary by IDC and CIO Online, and earning the prestigious title of Global Cybersecurity Influencer of the Year from the InfoSec Awards.</p> <p></div></div><br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>On their 1st day, a deepfake remote hire will steal your secrets, plans, data, and install ransomware.</p> <p>This expensive and soon-to-be widespread scam is designed to fool interviewers into believing that a “electronic caricature” is actually a highly qualified real candidate.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Russ-Ollis.png" class="vc_single_image-img attachment-full" alt="" title="Russ Ollis" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Russ-Ollis.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Russ-Ollis-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Russ-Ollis-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Russ-Ollis-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name=" russollis"></a></p> <h3>Russ Ollis</h3> <p>Principal Solutions Engineer, Trend Micro</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>Russ Ollis is a Principal Solutions Engineer at Trend Micro, where he focuses on Security Operations and Cyber Risk. With more than 25 years of experience in Security and Information Technology, Russ has a proven track record in helping customers improve operational and cybersecurity outcomes through modernization, tool rationalization, and platform adoption.</p> <p>Throughout his career, Russ has held a variety of roles in both public and private organizations and brings an interesting perspective to security operations and risk management. Russ has contributed to numerous industry panels and has held a variety of roles.</p> <p>A veteran of the US Navy and father of three, Russ was an on-again, off-again student for many years while raising his family and working professionally, ultimately completing his under-grad at Limestone University. Russ holds a variety of industry certifications and, when time allows, is an adjunct professor in the NC Community College System.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p><b>Navigating the Evolution of Cybersecurity: AI’s Role in Securing Your Infrastructure from Past to Future</b></p> <p>In the ever-evolving landscape of cybersecurity, staying ahead of threats is imperative. As we reflect on the past, embrace the present, and prepare for the future, the integration of artificial intelligence (AI) into security infrastructure has emerged as a disruptive technology in safeguarding digital assets. Join us at this exclusive event led by Trend Micro as we delve into the dynamic journey of AI’s impact on cybersecurity. From historical insights to current advancements and future projections, discover how AI is reshaping the defense mechanisms against cyber threats, fortifying your infrastructure, and empowering organizations to navigate the digital frontier with confidence.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Rahul-Vashista.png" class="vc_single_image-img attachment-full" alt="" title="Rahul Vashista" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Rahul-Vashista.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Rahul-Vashista-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Rahul-Vashista-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Rahul-Vashista-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="rahulvashista"></a></p> <h3>Rahul Vashista</h3> <p>Offensive Security Consultant at Emirates NBD</p> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"> <p>At the forefront of cybersecurity at Emirates NBD, my role as an Offensive Security Consultant is underpinned by a robust foundation in network security, cultivated through rigorous academics and hands-on challenges like the Dante and Rasta Pro Labs. Our team’s strategy hinges on proactive defense, leveraging cutting-edge research and red team assessments to fortify digital assets against evolving threats.</p> <p>My technical prowess in computing is matched only by a commitment to continuous learning and improvement, evidenced by a suite of advanced certifications including CRTO. The analytical skills honed at NorthCap University and during previous tenure with Deloitte and the Government of India are critical in navigating the complexities of offensive cybersecurity, ensuring the safeguarding of critical infrastructures and client trust.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>This talk covers how modern endpoint protection solutions like EDRs and XDRs detect malware with static, dynamic and behavioral analysis and then dives deep into our novel techniques used to bypass such solutions during real world red team engagements in sophisticated corporate IT ecosystems.</p> <p></div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Chris-Roberts.png" class="vc_single_image-img attachment-full" alt="" title="Chris Roberts" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Chris-Roberts.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Chris-Roberts-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Chris-Roberts-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Chris-Roberts-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="chrisroberts"></a></p> <h3>Chris Roberts</h3> <p>Deepfake Cyber Strategist at World Wide Technology<br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Chris has been in our industry since before its inception (the lack of hair helping to identify this). His most recent projects have been focused within the aerospace, deception, deepfake, identity, cryptography, AI/AdversarialAI, and services sectors. Over the years, he’s founded or worked with numerous organizations specializing in human research, data intelligence, transportation, cryptography, and deception technologies. These days he’s working on spreading risk, maturity, collaboration, and communication messaging across the industry. (Likely while coding his augmented EEG driven digital clone that’s monitoring his Internet usage, and tea and biscuit consumption!) When not working he can be found in Eureka, Missouri charging round the countryside on a mountain bike, or hunkered down with the kids experimenting on ways to take over the planet. From an observability perspective he’s large, hairy, often wears a kilt, and can be found on stage with a cuppa tea in hand trying to explain to audiences why they must ask more questions before clicking life’s big red button.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim">Coming Soon!</div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101131953"><div class="wpb_column vc_column_container vc_col-sm-2"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_single_image wpb_content_element vc_align_left"> <figure class="wpb_wrapper vc_figure"> <div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" width="450" height="450" src="https://hackerhalted.com/wp-content/uploads/2024/10/Steve-Graham.png" class="vc_single_image-img attachment-full" alt="" title="Steve Graham" srcset="https://hackerhalted.com/wp-content/uploads/2024/10/Steve-Graham.png 450w, https://hackerhalted.com/wp-content/uploads/2024/10/Steve-Graham-80x80.png 80w, https://hackerhalted.com/wp-content/uploads/2024/10/Steve-Graham-300x300.png 300w, https://hackerhalted.com/wp-content/uploads/2024/10/Steve-Graham-100x100.png 100w" sizes="(max-width: 450px) 100vw, 450px" /></div> </figure> </div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-10"><div class="vc_column-inner"><div class="wpb_wrapper"> <div class="wpb_text_column wpb_content_element " > <div class="wpb_wrapper"> <p><a name="stevengraham"></a></p> <h3>Steve Graham</h3> <p>SVP, EC-Council<br /> <div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Bio</div><div class="su-spoiler-content su-u-clearfix su-u-trim"></p> <p>Steven Graham serves as Senior Vice President of EC-Council | Global reporting directly to the CEO. Steve joined the company in 2005 as a strategic consultant and accepted a full-time position in 2006 tasked with building the North American business of the organization. Dissatisfied with traditional education deficiencies, Steven has focused on the use of technology in the transfer of knowledge and skills for 15+ years. Spanning his time at EC-Council, Steven has led the development of multiple divisions for the company including iClass (EC-Councils online learning division), iLabs (EC-Councils Education Technology/Cyber Range division), Academia (EC-Council’s tailored education division for k-12, 2 and 4 year institutions), as well as EC-Councils US Government business units serving our armed forces. Steven regularly serves on various boards and committees dedicated to the development of the cyber security profession and is passionate about the use of advanced technologies in the classroom and in support of the continuous development of tactical cyber security skills. Steve is an active member of a variety of committees within EC-Council including the Executive Committee (EXCO) responsible for top executive leadership and direction for the global organization, EC-Council’s management committee, Product Council, Security Council, Technology Council, and the Academia Leadership Committee. Steve’s most notable achievements at EC-Council include the listing of three certifications from EC-Council into Department of Defense Directive 8570/8140, Mapping of programs to over 300 Job roles spanning the US NAVY, US ARMY, US AIR FORCE, and US MARINE CORPS. Steve also led the development of EC-Council’s Academia division resulting in the successful publication of nearly 40 books in cyber security currently used at more than 3,000 partner schools including community colleges, 2, and 4 year institutions including a variety of large US Academic brands and their accredited degree programs. Academia currently influences the education of over 60 thousand students each year in North America. Lastly, Steve was a key strategist in the concept and strategic development of a fully asynchronous Cyber Range solution that has influenced hands-on training capability for cyber security students across the globe and led to EC-Council’s current Performance Based Training and Performance Based assessment platforms. This asynchronous cyber environment has had over 1,000,000 unique launches since its initial launch and has been the cornerstone for training and education programs across the globe utilizing EC-Council content. Steve resides in Tampa, Florida and in his off-time is an avid fisherman, master’s level classical and flamenco guitarist, husband, and father of four young children.</p> <p></div></div><div class="su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus su-spoiler-closed" data-scroll-offset="0" data-anchor-in-url="no"><div class="su-spoiler-title" tabindex="0" role="button"><span class="su-spoiler-icon"></span>Abstract</div><div class="su-spoiler-content su-u-clearfix su-u-trim">Coming Soon!</div></div> </div> </div> </div></div></div></div><div class="vc_row wpb_row vc_row-fluid vc_custom_1729101144762"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text" ><span class="vc_sep_holder vc_sep_holder_l"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span style="border-color:#ce152d;" class="vc_sep_line"></span></span> </div><div class="vc_empty_space" style="height: 32px"><span class="vc_empty_space_inner"></span></div></div></div></div></div> </div></div><!-- .entry-content --> </div><!-- #post-## --> </div><!-- #primary --> </div><!-- main col --> </div><!-- row --> </div><!-- .container --> </div><!-- .induzy-content-inner --> </div><!-- .induzy-content --> </div><!-- .induzy-content-wrapper --> <footer class="site-footer"> <div class="footer-bottom"> <div class="footer-bottom-inner container"> <div class="row"> <div class="col-md-12"> <ul class="footer-bottom-items nav pull-center"> <li class="nav-item"> <div class="nav-item-inner"> © Copyright 2024. All Rights Reserved. EC-Council </div> </li> </ul> </div> </div> </div> </div> <a href="#" class="back-to-top" id="back-to-top"><i class="fa fa-angle-up"></i></a> </footer><!-- #colophon --> </div><!-- #page --> <!--googleoff: all--><div id="cookie-law-info-bar" data-nosnippet="true"><h5 class="cli_messagebar_head">We Care</h5><span><div class="cli-bar-container cli-style-v2"><div class="cli-bar-message">Ensuring that you get the best experience is our only purpose for using cookies. If you wish to continue, please accept. You are welcome to provide a controlled consent by visiting the cookie settings. For any further queries or information, please see our <a href="https://hackerhalted.com/privacy-policy/">privacy policy</a>. </br><div class="wt-cli-ccpa-element"> <a style="color:#333333" class="wt-cli-ccpa-opt-out">Do not sell my personal information</a>.</div></div><div class="cli-bar-btn_container"><a role='button' class="medium cli-plugin-button cli-plugin-main-button cli_settings_button" style="margin:0px 10px 0px 5px">Cookie Settings</a><a role='button' data-cli_action="accept" id="cookie_action_close_header" class="medium cli-plugin-button cli-plugin-main-button cookie_action_close_header cli_action_button wt-cli-accept-btn">Accept</a></div></div></span></div><div id="cookie-law-info-again" data-nosnippet="true"><span id="cookie_hdr_showagain">Manage consent</span></div><div class="cli-modal" data-nosnippet="true" id="cliSettingsPopup" tabindex="-1" role="dialog" aria-labelledby="cliSettingsPopup" aria-hidden="true"> <div class="cli-modal-dialog" role="document"> <div class="cli-modal-content cli-bar-popup"> <button type="button" class="cli-modal-close" id="cliModalClose"> <svg class="" viewBox="0 0 24 24"><path d="M19 6.41l-1.41-1.41-5.59 5.59-5.59-5.59-1.41 1.41 5.59 5.59-5.59 5.59 1.41 1.41 5.59-5.59 5.59 5.59 1.41-1.41-5.59-5.59z"></path><path d="M0 0h24v24h-24z" fill="none"></path></svg> <span class="wt-cli-sr-only">Close</span> </button> <div class="cli-modal-body"> <div class="cli-container-fluid cli-tab-container"> <div class="cli-row"> <div class="cli-col-12 cli-align-items-stretch cli-px-0"> <div class="cli-privacy-overview"> <h4>Privacy Overview</h4> <div class="cli-privacy-content"> <div class="cli-privacy-content-text">This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.</div> </div> <a class="cli-privacy-readmore" aria-label="Show more" role="button" data-readmore-text="Show more" data-readless-text="Show less"></a> </div> </div> <div class="cli-col-12 cli-align-items-stretch cli-px-0 cli-tab-section-container"> <div class="cli-tab-section"> <div class="cli-tab-header"> <a role="button" tabindex="0" class="cli-nav-link cli-settings-mobile" data-target="necessary" data-toggle="cli-toggle-tab"> Necessary </a> <div class="wt-cli-necessary-checkbox"> <input type="checkbox" class="cli-user-preference-checkbox" id="wt-cli-checkbox-necessary" data-id="checkbox-necessary" checked="checked" /> <label class="form-check-label" for="wt-cli-checkbox-necessary">Necessary</label> </div> <span class="cli-necessary-caption">Always Enabled</span> </div> <div class="cli-tab-content"> <div class="cli-tab-pane cli-fade" data-id="necessary"> <div class="wt-cli-cookie-description"> Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. <table class="cookielawinfo-row-cat-table cookielawinfo-winter"><thead><tr><th class="cookielawinfo-column-1">Cookie</th><th class="cookielawinfo-column-3">Duration</th><th class="cookielawinfo-column-4">Description</th></tr></thead><tbody><tr class="cookielawinfo-row"><td class="cookielawinfo-column-1">cookielawinfo-checkbox-analytics</td><td class="cookielawinfo-column-3">11 months</td><td class="cookielawinfo-column-4">This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".</td></tr><tr class="cookielawinfo-row"><td class="cookielawinfo-column-1">cookielawinfo-checkbox-functional</td><td class="cookielawinfo-column-3">11 months</td><td class="cookielawinfo-column-4">The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".</td></tr><tr class="cookielawinfo-row"><td class="cookielawinfo-column-1">cookielawinfo-checkbox-necessary</td><td class="cookielawinfo-column-3">11 months</td><td class="cookielawinfo-column-4">This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".</td></tr><tr class="cookielawinfo-row"><td class="cookielawinfo-column-1">cookielawinfo-checkbox-others</td><td class="cookielawinfo-column-3">11 months</td><td class="cookielawinfo-column-4">This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.</td></tr><tr class="cookielawinfo-row"><td class="cookielawinfo-column-1">cookielawinfo-checkbox-performance</td><td class="cookielawinfo-column-3">11 months</td><td class="cookielawinfo-column-4">This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".</td></tr><tr class="cookielawinfo-row"><td class="cookielawinfo-column-1">viewed_cookie_policy</td><td class="cookielawinfo-column-3">11 months</td><td class="cookielawinfo-column-4">The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.</td></tr></tbody></table> </div> </div> </div> </div> <div class="cli-tab-section"> <div class="cli-tab-header"> <a role="button" tabindex="0" class="cli-nav-link cli-settings-mobile" data-target="functional" data-toggle="cli-toggle-tab"> Functional </a> <div class="cli-switch"> <input type="checkbox" id="wt-cli-checkbox-functional" class="cli-user-preference-checkbox" data-id="checkbox-functional" /> <label for="wt-cli-checkbox-functional" class="cli-slider" data-cli-enable="Enabled" data-cli-disable="Disabled"><span class="wt-cli-sr-only">Functional</span></label> </div> </div> <div class="cli-tab-content"> <div class="cli-tab-pane cli-fade" data-id="functional"> <div class="wt-cli-cookie-description"> Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. </div> </div> </div> </div> <div class="cli-tab-section"> <div class="cli-tab-header"> <a role="button" tabindex="0" class="cli-nav-link cli-settings-mobile" data-target="performance" data-toggle="cli-toggle-tab"> Performance </a> <div class="cli-switch"> <input type="checkbox" id="wt-cli-checkbox-performance" class="cli-user-preference-checkbox" data-id="checkbox-performance" /> <label for="wt-cli-checkbox-performance" class="cli-slider" data-cli-enable="Enabled" data-cli-disable="Disabled"><span class="wt-cli-sr-only">Performance</span></label> </div> </div> <div class="cli-tab-content"> <div class="cli-tab-pane cli-fade" data-id="performance"> <div class="wt-cli-cookie-description"> Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. </div> </div> </div> </div> <div class="cli-tab-section"> <div class="cli-tab-header"> <a role="button" tabindex="0" class="cli-nav-link cli-settings-mobile" data-target="analytics" data-toggle="cli-toggle-tab"> Analytics </a> <div class="cli-switch"> <input type="checkbox" id="wt-cli-checkbox-analytics" class="cli-user-preference-checkbox" data-id="checkbox-analytics" /> <label for="wt-cli-checkbox-analytics" class="cli-slider" data-cli-enable="Enabled" data-cli-disable="Disabled"><span class="wt-cli-sr-only">Analytics</span></label> </div> </div> <div class="cli-tab-content"> <div class="cli-tab-pane cli-fade" data-id="analytics"> <div class="wt-cli-cookie-description"> Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. </div> </div> </div> </div> <div class="cli-tab-section"> <div class="cli-tab-header"> <a role="button" tabindex="0" class="cli-nav-link cli-settings-mobile" data-target="advertisement" data-toggle="cli-toggle-tab"> Advertisement </a> <div class="cli-switch"> <input type="checkbox" id="wt-cli-checkbox-advertisement" class="cli-user-preference-checkbox" data-id="checkbox-advertisement" /> <label for="wt-cli-checkbox-advertisement" class="cli-slider" data-cli-enable="Enabled" data-cli-disable="Disabled"><span class="wt-cli-sr-only">Advertisement</span></label> </div> </div> <div class="cli-tab-content"> <div class="cli-tab-pane cli-fade" data-id="advertisement"> <div class="wt-cli-cookie-description"> Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. </div> </div> </div> </div> <div class="cli-tab-section"> <div class="cli-tab-header"> <a role="button" tabindex="0" class="cli-nav-link cli-settings-mobile" data-target="others" data-toggle="cli-toggle-tab"> Others </a> <div class="cli-switch"> <input type="checkbox" id="wt-cli-checkbox-others" class="cli-user-preference-checkbox" data-id="checkbox-others" /> <label for="wt-cli-checkbox-others" class="cli-slider" data-cli-enable="Enabled" data-cli-disable="Disabled"><span class="wt-cli-sr-only">Others</span></label> </div> </div> <div class="cli-tab-content"> <div class="cli-tab-pane cli-fade" data-id="others"> <div class="wt-cli-cookie-description"> Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. </div> </div> </div> </div> </div> </div> </div> </div> <div class="cli-modal-footer"> <div class="wt-cli-element cli-container-fluid cli-tab-container"> <div class="cli-row"> <div class="cli-col-12 cli-align-items-stretch cli-px-0"> <div class="cli-tab-footer wt-cli-privacy-overview-actions"> <a id="wt-cli-privacy-save-btn" role="button" tabindex="0" data-cli-action="accept" class="wt-cli-privacy-btn cli_setting_save_button wt-cli-privacy-accept-btn cli-btn">SAVE & ACCEPT</a> </div> </div> </div> </div> </div> </div> </div> </div> <div class="cli-modal-backdrop cli-fade cli-settings-overlay"></div> <div class="cli-modal-backdrop cli-fade cli-popupbar-overlay"></div> <!--googleon: all--><script type="text/html" id="wpb-modifications"> window.wpbCustomElement = 1; </script> <script type='text/javascript'> (function () { var c = document.body.className; c = c.replace(/woocommerce-no-js/, 'woocommerce-js'); document.body.className = c; })(); </script> <script type="text/javascript"> /* MonsterInsights Scroll Tracking */ if ( typeof(jQuery) !== 'undefined' ) { jQuery( document ).ready(function(){ function monsterinsights_scroll_tracking_load() { if ( ( typeof(__gaTracker) !== 'undefined' && __gaTracker && __gaTracker.hasOwnProperty( "loaded" ) && __gaTracker.loaded == true ) || ( typeof(__gtagTracker) !== 'undefined' && __gtagTracker ) ) { (function(factory) { factory(jQuery); }(function($) { /* Scroll Depth */ "use strict"; var defaults = { percentage: true }; var $window = $(window), cache = [], scrollEventBound = false, lastPixelDepth = 0; /* * Plugin */ $.scrollDepth = function(options) { var startTime = +new Date(); options = $.extend({}, defaults, options); /* * Functions */ function sendEvent(action, label, scrollDistance, timing) { if ( 'undefined' === typeof MonsterInsightsObject || 'undefined' === typeof MonsterInsightsObject.sendEvent ) { return; } var paramName = action.toLowerCase(); var fieldsArray = { send_to: 'G-XV3P9T82TM', non_interaction: true }; fieldsArray[paramName] = label; if (arguments.length > 3) { fieldsArray.scroll_timing = timing MonsterInsightsObject.sendEvent('event', 'scroll_depth', fieldsArray); } else { MonsterInsightsObject.sendEvent('event', 'scroll_depth', fieldsArray); } } function calculateMarks(docHeight) { return { '25%' : parseInt(docHeight * 0.25, 10), '50%' : parseInt(docHeight * 0.50, 10), '75%' : parseInt(docHeight * 0.75, 10), /* Cushion to trigger 100% event in iOS */ '100%': docHeight - 5 }; } function checkMarks(marks, scrollDistance, timing) { /* Check each active mark */ $.each(marks, function(key, val) { if ( $.inArray(key, cache) === -1 && scrollDistance >= val ) { sendEvent('Percentage', key, scrollDistance, timing); cache.push(key); } }); } function rounded(scrollDistance) { /* Returns String */ return (Math.floor(scrollDistance/250) * 250).toString(); } function init() { bindScrollDepth(); } /* * Public Methods */ /* Reset Scroll Depth with the originally initialized options */ $.scrollDepth.reset = function() { cache = []; lastPixelDepth = 0; $window.off('scroll.scrollDepth'); bindScrollDepth(); }; /* Add DOM elements to be tracked */ $.scrollDepth.addElements = function(elems) { if (typeof elems == "undefined" || !$.isArray(elems)) { return; } $.merge(options.elements, elems); /* If scroll event has been unbound from window, rebind */ if (!scrollEventBound) { bindScrollDepth(); } }; /* Remove DOM elements currently tracked */ $.scrollDepth.removeElements = function(elems) { if (typeof elems == "undefined" || !$.isArray(elems)) { return; } $.each(elems, function(index, elem) { var inElementsArray = $.inArray(elem, options.elements); var inCacheArray = $.inArray(elem, cache); if (inElementsArray != -1) { options.elements.splice(inElementsArray, 1); } if (inCacheArray != -1) { cache.splice(inCacheArray, 1); } }); }; /* * Throttle function borrowed from: * Underscore.js 1.5.2 * http://underscorejs.org * (c) 2009-2013 Jeremy Ashkenas, DocumentCloud and Investigative Reporters & Editors * Underscore may be freely distributed under the MIT license. */ function throttle(func, wait) { var context, args, result; var timeout = null; var previous = 0; var later = function() { previous = new Date; timeout = null; result = func.apply(context, args); }; return function() { var now = new Date; if (!previous) previous = now; var remaining = wait - (now - previous); context = this; args = arguments; if (remaining <= 0) { clearTimeout(timeout); timeout = null; previous = now; result = func.apply(context, args); } else if (!timeout) { timeout = setTimeout(later, remaining); } return result; }; } /* * Scroll Event */ function bindScrollDepth() { scrollEventBound = true; $window.on('scroll.scrollDepth', throttle(function() { /* * We calculate document and window height on each scroll event to * account for dynamic DOM changes. */ var docHeight = $(document).height(), winHeight = window.innerHeight ? window.innerHeight : $window.height(), scrollDistance = $window.scrollTop() + winHeight, /* Recalculate percentage marks */ marks = calculateMarks(docHeight), /* Timing */ timing = +new Date - startTime; checkMarks(marks, scrollDistance, timing); }, 500)); } init(); }; /* UMD export */ return $.scrollDepth; })); jQuery.scrollDepth(); } else { setTimeout(monsterinsights_scroll_tracking_load, 200); } } monsterinsights_scroll_tracking_load(); }); } /* End MonsterInsights Scroll Tracking */ </script><link rel='stylesheet' id='wc-blocks-style-css' href='https://hackerhalted.com/wp-content/plugins/woocommerce/assets/client/blocks/wc-blocks.css?ver=wc-9.3.3' type='text/css' media='all' /> <link rel='stylesheet' id='redux-custom-fonts-css' href='//hackerhalted.com/wp-content/uploads/redux/custom-fonts/fonts.css?ver=1732670826' type='text/css' media='all' /> <link rel='stylesheet' id='cookie-law-info-table-css' href='https://hackerhalted.com/wp-content/plugins/cookie-law-info/legacy/public/css/cookie-law-info-table.css?ver=3.2.7' type='text/css' media='all' /> <link rel='stylesheet' id='su-icons-css' href='https://hackerhalted.com/wp-content/plugins/shortcodes-ultimate/includes/css/icons.css?ver=1.1.5' type='text/css' media='all' /> <link rel='stylesheet' id='su-shortcodes-css' href='https://hackerhalted.com/wp-content/plugins/shortcodes-ultimate/includes/css/shortcodes.css?ver=7.3.0' type='text/css' media='all' /> <script type="text/javascript" src="https://www.googletagmanager.com/gtag/js?id=G-XV3P9T82TM" id="google-tag-manager-js" data-wp-strategy="async"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-includes/js/dist/hooks.min.js?ver=2810c76e705dd1a53b18" id="wp-hooks-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-includes/js/dist/i18n.min.js?ver=5e580eb46a90c2b997e6" id="wp-i18n-js"></script> <script type="text/javascript" id="wp-i18n-js-after"> /* <![CDATA[ */ wp.i18n.setLocaleData( { 'text direction\u0004ltr': [ 'ltr' ] } ); /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woocommerce-google-analytics-integration/assets/js/build/main.js?ver=50c6d17d67ef40d67991" id="woocommerce-google-analytics-integration-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woocommerce/assets/js/jquery-blockui/jquery.blockUI.min.js?ver=2.7.0-wc.9.3.3" id="jquery-blockui-js" data-wp-strategy="defer"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-includes/js/jquery/ui/datepicker.min.js?ver=1.13.3" id="jquery-ui-datepicker-js"></script> <script type="text/javascript" id="jquery-ui-datepicker-js-after"> /* <![CDATA[ */ jQuery(function(jQuery){jQuery.datepicker.setDefaults({"closeText":"Close","currentText":"Today","monthNames":["January","February","March","April","May","June","July","August","September","October","November","December"],"monthNamesShort":["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],"nextText":"Next","prevText":"Previous","dayNames":["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"dayNamesShort":["Sun","Mon","Tue","Wed","Thu","Fri","Sat"],"dayNamesMin":["S","M","T","W","T","F","S"],"dateFormat":"MM d, yy","firstDay":0,"isRTL":false});}); /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/product-extras-for-woocommerce/assets/js/conditions.js?ver=3.19.1" id="pewc-conditions-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/product-extras-for-woocommerce/assets/js/select-box.js?ver=3.19.1" id="dd-slick-js"></script> <script type="text/javascript" id="wc-single-product-js-extra"> /* <![CDATA[ */ var wc_single_product_params = {"i18n_required_rating_text":"Please select a rating","review_rating_required":"yes","flexslider":{"rtl":false,"animation":"slide","smoothHeight":true,"directionNav":false,"controlNav":"thumbnails","slideshow":false,"animationSpeed":500,"animationLoop":false,"allowOneSlide":false},"zoom_enabled":"1","zoom_options":[],"photoswipe_enabled":"1","photoswipe_options":{"shareEl":false,"closeOnScroll":false,"history":false,"hideAnimationDuration":0,"showAnimationDuration":0},"flexslider_enabled":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woocommerce/assets/js/frontend/single-product.min.js?ver=9.3.3" id="wc-single-product-js" data-wp-strategy="defer"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woocommerce/assets/js/accounting/accounting.min.js?ver=0.4.2" id="accounting-js"></script> <script type="text/javascript" id="pewc-script-js-extra"> /* <![CDATA[ */ var pewc_vars = {"ajaxurl":"https:\/\/hackerhalted.com\/wp-admin\/admin-ajax.php","currency_symbol":"$","decimal_separator":".","thousand_separator":",","decimals":"2","price_format":"%1$s%2$s","currency_pos":"left","variable_1":"0","variable_2":"0","variable_3":"0","enable_tooltips":"no","dequeue_tooltips":"","separator":" ","update_price":"no","disable_qty":"1","product_gallery":".images","product_img_wrap":".woocommerce-product-gallery__image, .woocommerce-product-gallery__image--placeholder","calculations_timer":"0","conditions_timer":"0","remove_spaces":"no","math_round":"no","disable_button_calcs":"no","disable_button_uploads":"no","null_signifier":"*","disable_wcfad_label":"no","zero_missing_field":"no","set_initial_key":"no","pdf_count":"no","layer_parent":"woocommerce-product-gallery__wrapper","exclude_field_types":"[ \"calculation\", \"information\" ]","exclude_groups":"[]","required_fields_only":"","complete_by_groups":"","progress_bar_log":"","progress_bar_timeout":"150","progress_text":"\"\"","group_progress":"","post_id":"2259","accordion_toggle":"","close_accordion":"no","reset_fields":"no","set_child_quantity_default":"no"}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/product-extras-for-woocommerce/assets/js/pewc.js?ver=3.19.1" id="pewc-script-js"></script> <script type="text/javascript" id="awdr-main-js-extra"> /* <![CDATA[ */ var awdr_params = {"ajaxurl":"https:\/\/hackerhalted.com\/wp-admin\/admin-ajax.php","nonce":"981f6ece46","enable_update_price_with_qty":"show_when_matched","refresh_order_review":"0","custom_target_simple_product":"","custom_target_variable_product":"","js_init_trigger":"","awdr_opacity_to_bulk_table":"","awdr_dynamic_bulk_table_status":"0","awdr_dynamic_bulk_table_off":"on","custom_simple_product_id_selector":"","custom_variable_product_id_selector":""}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woo-discount-rules/v2/Assets/Js/site_main.js?ver=2.6.6" id="awdr-main-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woo-discount-rules/v2/Assets/Js/awdr-dynamic-price.js?ver=2.6.6" id="awdr-dynamic-price-js"></script> <script type="text/javascript" id="metorik-js-js-extra"> /* <![CDATA[ */ var metorik_params = {"source_tracking":{"enabled":true,"cookie_lifetime":6,"session_length":30,"sbjs_domain":false,"cookie_name":"mtk_src_trk"},"cart_tracking":{"enabled":true,"cart_items_count":0,"item_was_added_to_cart":false,"wc_ajax_capture_customer_data_url":"\/?wc-ajax=metorik_capture_customer_data","wc_ajax_email_opt_out_url":"\/?wc-ajax=metorik_email_opt_out","wc_ajax_email_opt_in_url":"\/?wc-ajax=metorik_email_opt_in","wc_ajax_seen_add_to_cart_form_url":"\/?wc-ajax=metorik_seen_add_to_cart_form","add_cart_popup_should_scroll_to":true,"add_cart_popup_placement":"bottom","add_to_cart_should_mark_as_seen":true,"add_to_cart_form_selectors":[".ajax_add_to_cart",".single_add_to_cart_button"]},"nonce":"70b6c221ba"}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/metorik-helper/assets/js/metorik.min.js?ver=2.0.7" id="metorik-js-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woocommerce-avatax/assets/js/frontend/wc-avatax-frontend.min.js?ver=2.8.2" id="wc-avatax-frontend-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/popper.min.js?ver=1.0" id="pooper-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/bootstrap.min.js?ver=5.1.3" id="bootstrap-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/smart-resize.min.js?ver=1.0" id="smart-resize-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/owl.carousel.min.js?ver=2.2.1" id="owl-carousel-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/js_composer/assets/lib/bower/isotope/dist/isotope.pkgd.min.js?ver=7.5" id="isotope-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/infinite-scroll.pkgd.min.js?ver=2.0" id="infinite-scroll-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-includes/js/imagesloaded.min.js?ver=5.0.0" id="imagesloaded-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.stellar.min.js?ver=0.6.2" id="jquery-stellar-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/sticky-kit.min.js?ver=1.1.3" id="sticky-kit-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.mb.YTPlayer.min.js?ver=1.0" id="jquery-mb-YTPlayer-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.magnific.popup.min.js?ver=1.1.0" id="jquery-magnific-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.easy.ticker.min.js?ver=2.0" id="jquery-easy-ticker-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.easing.min.js?ver=1.0" id="jquery-easing-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.countdown.min.js?ver=2.2.0" id="jquery-countdown-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.circle.progress.min.js?ver=1.0" id="jquery-circle-progress-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/jquery.appear.min.js?ver=1.0" id="jquery-appear-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/smoothscroll.min.js?ver=1.20.2" id="smoothscroll-js"></script> <script type="text/javascript" id="induzy-theme-js-extra"> /* <![CDATA[ */ var induzy_ajax_var = {"admin_ajax_url":"https:\/\/hackerhalted.com\/wp-admin\/admin-ajax.php","like_nonce":"1e84a12e7b","fav_nonce":"b9cdf55b22","infinite_loader":"https:\/\/hackerhalted.com\/wp-content\/themes\/induzy\/assets\/images\/infinite-loder.gif","load_posts":"Loading next set of posts.","no_posts":"No more posts to load.","cmt_nonce":"0dddb24a54","mc_nounce":"0d23d97d5c","wait":"Wait..","must_fill":"Must Fill Required Details.","valid_email":"Enter Valid Email ID.","cart_update_pbm":"Cart Update Problem.","google_stat":""}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/themes/induzy/assets/js/theme.js?ver=1.0" id="induzy-theme-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woocommerce/assets/js/sourcebuster/sourcebuster.min.js?ver=9.3.3" id="sourcebuster-js-js"></script> <script type="text/javascript" id="wc-order-attribution-js-extra"> /* <![CDATA[ */ var wc_order_attribution = {"params":{"lifetime":1.0e-5,"session":30,"base64":false,"ajaxurl":"https:\/\/hackerhalted.com\/wp-admin\/admin-ajax.php","prefix":"wc_order_attribution_","allowTracking":true},"fields":{"source_type":"current.typ","referrer":"current_add.rf","utm_campaign":"current.cmp","utm_source":"current.src","utm_medium":"current.mdm","utm_content":"current.cnt","utm_id":"current.id","utm_term":"current.trm","utm_source_platform":"current.plt","utm_creative_format":"current.fmt","utm_marketing_tactic":"current.tct","session_entry":"current_add.ep","session_start_time":"current_add.fd","session_pages":"session.pgs","session_count":"udata.vst","user_agent":"udata.uag"}}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woocommerce/assets/js/frontend/order-attribution.min.js?ver=9.3.3" id="wc-order-attribution-js"></script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/woo-discount-rules-pro/Assets/Js/awdr_pro.js?ver=2.6.5" id="woo_discount_pro_script-js"></script> <script type="text/javascript" src="https://stats.wp.com/e-202448.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script type="text/javascript" id="jetpack-stats-js-after"> /* <![CDATA[ */ _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"205900284\",\"post\":\"2259\",\"tz\":\"-7\",\"srv\":\"hackerhalted.com\",\"j\":\"1:13.9.1\"}") ]); _stq.push([ "clickTrackerInit", "205900284", "2259" ]); /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=7.5" id="wpb_composer_front_js-js"></script> <script type="text/javascript" id="su-shortcodes-js-extra"> /* <![CDATA[ */ var SUShortcodesL10n = {"noPreview":"This shortcode doesn't work in live preview. Please insert it into editor and preview on the site.","magnificPopup":{"close":"Close (Esc)","loading":"Loading...","prev":"Previous (Left arrow key)","next":"Next (Right arrow key)","counter":"%curr% of %total%","error":"Failed to load content. <a href=\"%url%\" target=\"_blank\"><u>Open link<\/u><\/a>"}}; /* ]]> */ </script> <script type="text/javascript" src="https://hackerhalted.com/wp-content/plugins/shortcodes-ultimate/includes/js/shortcodes/index.js?ver=7.3.0" id="su-shortcodes-js"></script> <script type="text/javascript" id="woocommerce-google-analytics-integration-data-js-after"> /* <![CDATA[ */ window.ga4w = { data: {"cart":{"items":[],"coupons":[],"totals":{"currency_code":"USD","total_price":0,"currency_minor_unit":2}}}, settings: {"tracker_function_name":"gtag","events":["purchase","add_to_cart","remove_from_cart","view_item_list","select_content","view_item","begin_checkout"],"identifier":"product_id"} }; document.dispatchEvent(new Event("ga4w:ready")); /* ]]> */ </script> <script></script><!-- WooCommerce JavaScript --> <script type="text/javascript"> jQuery(function($) { jQuery('form.checkout').on('change', 'input[name=payment_method]', function(){ setTimeout(function(){ jQuery(document.body).trigger('update_checkout'); },1000); }) }); </script> </body> </html>