Speaker

Hasain Alshakarti

Hasain Alshakarti

The Wolf - Principal Cybersecurity Advisor

Stockholm, Sweden

Actions

Hasain, also known as "The Wolf", is an industry-leading cyber security expert with more than 26 years of experience.

He has extensive and deep expertise from numerous design projects, security audits, advanced implementation projects, incident response, digital forensic, threat hunting and penetration testing. He helps customers understand and build solutions to protect, detect and respond to cyber threats for enterprises, government agencies, banks, military organizations among others.

Due to his expertise, he is a sought-after advisor, speaker and a popular instructor. For his many achievements over the years, Hasain has been awarded recognition as “Sweden’s leading IT security expert” and Microsoft MVP in Enterprise Security and Cloud & Datacenter.

Area of Expertise

  • Information & Communications Technology

Topics

  • Security & Compliance
  • cyber security
  • Incident Response
  • Infrastructure
  • Cloud & Infrastructure
  • Azure
  • Azure Security
  • Active Directory
  • cybercrime
  • Cyberthreats
  • cyber attacks
  • Women in Cyber
  • cyber forensics
  • network security
  • Network Infrastructure
  • Security
  • Microsoft 365 Security
  • IT Security
  • DevSecOps
  • Cloud Security
  • Application Security
  • Information Security
  • Cloud App Security
  • Cloud Security Architecture
  • Office 365 Security
  • AWS Security
  • web security
  • Enterprise Security

Tales from Incident Response: Unmasking the Threat Actor’s Inner Sanctum

Imagine if You Could Watch Every Step They Take…

Unmasking a threat actor activities is sometime like deciphering an ancient manuscript, but what if you can see every move and control when to strike the pause.

This session is not about log analysis, or following the breadcrumbs left by an elusive adversary. It is about having a full timeline of the threat actors machine and knowing exactly what was done without assumptions or guessing!

The Cyber Threat Landscape 2024

The continued growth of cybercrime is a challenge to our entire society. Cybercriminals are becoming more and more efficient at exploiting vulnerabilities to gain access to environments. In the past years, threat actors also shifted tactics to accelerate the speed and rate of cyberattacks.

This session is based on insights from the Truesec Incident Response & Recovery teams. Discussing real-world attacks and why attackers succeed, and key weaknesses exploited by threat actors by examples from incident investigations.

We believe there are immediate steps that be taken to reduce risk and dramatically improve your current cybersecurity posture. This session will provide you with the most important cybersecurity priorities, solid advice, and recommendations to help you cope with cybersecurity challenges today and in the future.

Exposing Ransomware Threat Actors: AKIRA

Throughout 2023 and into early 2024, Akira became one of the fastest growing ransomware variant focusing on both Windows, Linux, and VMware ESXi. The group targeted a wide range of businesses and critical infrastructure entities in North America, Europe, and Australia.

In this session we will present insights from the Truesec CSIRT team investigations of ransomware incidents linked to the Akira RaaS group. Discussing the techniques used by threat actors and describing how they successfully compromise and cripple their victims including details based on our special research about the abuse of CVE-2020-3259 on Cisco AnyConnect to gain initial access.

A Hacker just logged in...

We have never seen this many incidents where the adversary literally just walks in as during the last year!

Many think we are exaggerating when saying that "Hackers don’t HACK in, they LOG IN". But It has never been easier to just log in to a lot of enterprises.

Why and how is this possible at all? What can we do to stop it?

When the Red Team Goes Passwordless

Modern IT environments offer passwordless authentication to improve security and improves user experience. Certificate and key-based authentication does not only makes the user's life easier, it also gives the offensive side an excellent opportunity to obtain versatile credentials and be more stealthy.

This technical session will provide detailed demos and discussions about the different attacks using certificate- and key-based authentication in a Windows environment ranging from certificate services misconfigurations and abuse to Windows Hello for Business keys and sessions.

Hasain Alshakarti

The Wolf - Principal Cybersecurity Advisor

Stockholm, Sweden

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top