Understanding an attack surface is a necessary first-step to for cyber-defenders looking to protect an organization. With this hands-on workshop you’ll be able to use open-source tools and data and a repeatable process to build an exhaustive list list of an organization’s assets exposed on the Internet – whether your own organization or someone else’s.
James worked in systems and networks for a decade before finally succumbing to the destiny of nominative determinism. After briefly flirting with pen-testing he got a job as a security architect in the financial sector. He then became Head of the CERT team for a number of years but his hair had already fallen out at that point. He joined ONYPHE in 2023 as Deputy CTO and now dreams in Perl.
https://x.com/jamesatack / https://www.linkedin.com/in/jatack/ / https://infosec.exchange/@jamesatack/
leHACK website: https://www.lehack.org
leHACK's twitter: https://twitter.com/_lehack_
leHACK instagram : https://www.instagram.com/_lehack_/