2025 Panel
Fiesta 6
3 pm - 3:30 pm, Monday, October 27
Behind Enemy Lines: How Hackers Weaponize Your Security Vulnerabilities
About

Our talk is a deep dive into the out-of-box tactics, tools, and strategies hackers use to exploit defense weaknesses. We go Behind Enemy Lines and give insight into how attackers think, plan, and execute their strategies. Key points include how hackers exploit supply chain vulnerabilities, compromise IoT devices, and leverage machine learning to automate attacks. We also explore how attackers bypass defenses by weaponizing insider threats, shadow IT, and poorly managed patching, along with advanced topics like AI-generated malware, low-and-slow tactics, and exploitation of default configurations. What sets this presentation apart is its technical and psychological focus on tools and strategies often overlooked, even by seasoned security professionals. It addresses how hackers use machine learning to automate breaches, reverse-engineer security tools, use code-obfuscation-as-a-service to reconfigure known malware, abuse native tools "living off the land", and why they pick specific times to attack. We move beyond common cyber hygiene into cutting-edge threats, such as the growing role of AI-enhanced evasion and HTML smuggling. We also explore how hackers exploit technological and human weaknesses, offering new insights into modern cyber warfare's technical and psychological aspects. We reference real-world examples, like the SolarWinds supply chain attack and other high-profile breaches where hackers exploited IoT vulnerabilities, shadow IT, and insider threats. We use case studies and decades of real-world experience to illustrate how even sophisticated organizations can be at risk if they ignore these weak points, showing how hackers think strategically about long-term infiltration. Attendees will gain actionable takeaways, including "how to steps" for improving patch management, use zero-trust design, establish multiple choke points defenses, secure IoT devices using firmware integrity check and micro-segmentation, address BYOD and shadow IT risks using containerization, and close compliance roadmap gaps through targeted risk-analysis. We also provide insights into identifying and defending against AI-driven attacks and low-and-slow intrusions. Attendees will leave with a deeper understanding of how attackers think and strategies to better counter evolving threats.

Get in touch
Get in touch
Customer Service
For any and all inquiries please click the button below
Speaking Opportunities

Kris Tanaka
VP, Event Programming

InfoSec World
Stay Informed
Join our mailing list for the latest news on InfoSec World 2025.