Tomiwa Falade
Offensive Security Engineer
Lagos, Nigeria
Actions
Tomiwa is an Offensive Security Engineer with a passion for exploring how attackers think, build, and operate. His work spans red teaming, adversary simulation, and security research, where he experiments with modern techniques for bypassing defenses and uncovering real-world attack paths.
With experience designing custom tools, running offensive security labs, and translating complex concepts into clear insights, he helps both technical and non-technical audiences understand the evolving threat landscape. He has spoken on topics ranging from ethical hacking and malware trends to practical steps for building resilient applications and infrastructure.
Beyond offensive security, he is a strong advocate for knowledge-sharing across the wider tech community whether mentoring aspiring security professionals, engaging with developers on secure coding practices, or contributing to open discussions on the future of cybersecurity.
Links
Area of Expertise
Topics
Hacking 101 for Developers: Break & Fix a Web App in 45 Minutes
What happens when you look at your code through an attacker’s eyes?
In this workshop, we’ll build a small web application together — then break it using common attack techniques. Along the way, I’ll show how small shortcuts in code can turn into serious vulnerabilities, and more importantly, how to fix them quickly.
You’ll see:
How insecure input handling leads to bugs like XSS (and how to stop it).
Why broken authentication and access controls are developer landmines.
How APIs often leak more than intended — and how to secure them.
This is a demo-driven session, designed to give developers practical experience with both sides: writing insecure code, exploiting it, and patching it the right way.
You’ll leave with a hacker’s perspective on your applications, a simple checklist for secure development, and a starter repo you can use to practice after the event.
Adversarial AI: Testing Your Models Like a Pentester Would
As African tech companies rapidly adopt AI, we're building systems that think and make decisions. But are we testing them like the critical infrastructure they're becoming?
While QA teams excel at testing functionality and performance, AI systems face threats that traditional testing misses entirely. Pentesters have been breaking AI models for years using prompt injection, model poisoning, and adversarial inputs - but this knowledge rarely reaches QA teams.
In this session, you'll learn to think like an attacker when testing AI systems. We'll explore real examples of AI vulnerabilities in production systems and discover how simple prompts can bypass filters, corrupt model behavior, and leak sensitive data.
You'll learn:
Common AI attack vectors QA should test for
Practical adversarial testing techniques
How to integrate AI security into existing workflows
Real case studies from African startups
Takeaways:
AI security testing checklist
Understanding how attackers target AI
Actionable techniques you can implement immediately
This session bridges traditional QA and AI security, ensuring your systems are functional AND resilient against attack. Perfect for QA practitioners future-proofing their skills as AI becomes central to African tech.
Tomiwa Falade
Offensive Security Engineer
Lagos, Nigeria
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top