Speaker

Dr. Fatou Sankare

Dr. Fatou Sankare

Cyber Engineer/Researcher

New York City, New York, United States

Actions

Dr. Fatou is a cybersecurity researcher and offensive security engineer with over a years of experience dissecting advanced threats at the boundary between real-world operations and experimental research. Her background spans advanced penetration testing, digital forensics, and low-level malware reverse engineering, with a primary research focus on polymorphic and self-evolving malware, adversarial AI, and detection-evasion at scale. Her work examines how modern threats weaponize automation, learning systems, and system internals to persist undetected in hostile environments.
In parallel to her work, Dr. Fatou also teaches undergraduate and graduate-level courses in penetration testing, malware analysis, digital forensics, data science, and applied AI for cybersecurity, designing curricula that emphasize attacker emulation, behavioral analysis, and research-grade experimentation. Her talks deliver a rare fusion of lab-validated research and field-tested tradecraft, offering audiences a clear view into how advanced adversaries think, build, and adapt—and what it actually takes to stop them.

Area of Expertise

  • Information & Communications Technology
  • Manufacturing & Industrial Materials
  • Media & Information

Topics

  • Cybersecuirty
  • AI and Cybersecurity
  • Cybersecurity Threats and Trends
  • Artificial Intelligence and Machine Learning for Cybersecurity
  • cyber security
  • Cyberthreats
  • Emerging Cybersecurity Topics
  • Women in Cyber
  • cybercrime
  • Information Security
  • cyber forensics
  • Information Systems

CTRL + ALT + HACK: AI-ronically Breaking the Rules

In this session, we’ll take a look at how new techniques are transforming the way red teamers simulate real-world cyber attacks. As a red teamer and former data scientist, I’ll show you how we can replicate the tactics of highly sophisticated adversaries, like APT groups or nation-state attackers, to make our simulations more realistic and harder to defend against.

We’ll explore how these tactics can change during an engagement, adapting on the fly to stay one step ahead of blue teams. From creating malware that evolves to avoid detection to using clever evasion techniques, I’ll show you how we keep blue teams guessing and unable to catch us with traditional defenses. We’ll also dive into how we can teach malware to adjust to new detection methods, making it harder to spot.

You’ll learn how automation can streamline routine red team tasks, like scanning for vulnerabilities or deploying exploits, leaving more time to focus on high-level strategy. And I’ll show you how we can build malware that adjusts its behavior in response to blue team efforts, keeping attacks fresh and elusive.

Dr. Fatou Sankare

Cyber Engineer/Researcher

New York City, New York, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top