
Iftach (Ian) Amit
VP Consulting Security & Innovation
Social
Biography
Information Security expert with vast experience ranging from low level technical expertise and up to corporate security policy, regulatory compliance and strategy. BlackHat and DefCon speaker, with vast experience in public speaking and private customer focused seminars.
Linux & Unix expertise including large scale deployments in datacenter, Enterprise database management and implementation (Oracle) on Unix & Linux systems. Networking in a secure environment.
My goals are to keep leading innovation - both from the technology side, as well as from the sales and marketing aspects. Increasing revenues and general value through these activities are my expertise and passion.
Industry Expertise
Areas of Expertise
Education
The Interdisciplinary Center
BA
Computer Science & Business Administration
2001
Affiliations
- DC9723
- IDC Alumni
- DefCon Speakers
- BlackHat Speakers
- NYLUG
- Board Member - CSA Israel
Event Appearances
Advanced data exfiltration - the way Q would have done it
GovcertNT Rotterdam, Netherlands
Advanced Data Exfiltration
SOURCE Barcelona Barcelona, Spain
Pushing in, and pulling out slowly without anyone paying attention
Hashdays Security Conference Lucern, Switzerland
Advanced data exfiltration, APT and red-team testing
Brucon Brussels, Belgium
VoIP botnets and data exfiltration
DefCon 19 Las Vegas, NV, USA
Advanced Data Exfltration
23rd Annual FIRST Conference Vienna, Austria
Cyber[Crime|War] - Connecting the Dots
SOURCE Boston Boston, MA, USA
CyberWar, Terrorism, and Crime - a view from the trenches
International Conference on Cyber Terrorism Herzlya, Israel
Sample Talks
Cyber[Crime|War] - Connecting the Dots
In this talk we will explore the uncharted waters between CyberCrime and CyberWarfare, while mapping out the key players (mostly on the state side) and how past events can be linked to the use of syndicated CyberCrime organization when carrying out attacks on the opposition. We will discuss the connections between standard warfare (kinetic) and how modern campaigns use cyber security to its advantage and as an integral part of it.
Style
Availability
- Keynote
- Moderator
- Panelist
- Workshop Leader
- Corporate Training