Vinny Troia has been hacking his way around systems since he was 9 years old, back when 2400 baud modems and were considered cutting-edge technology. Troia has since refined his underground IT skills to include a breadth of knowledge that spans his expertise across security, management, development, and administration of inter-connected systems.
Having spent nearly a decade engineering and architecting security systems for the U.S. Department of Defense, Troia has become one of the media’s top go-to experts on cyber-related controversies. Troia was first recognized by the national news media following his discovery of information pertaining to tape-backups as part of the Lois Lerner IRS scandal.
Now, global news networks including Fox News, CNBC, ABC, CNN and Fox Business, regularly invite Troia to participate in on-air discussions pertaining to major corporate data breaches, cyber law and legislation, airline and automobile hacking, and cyber-related scandals. In 2014, Troia used his ever-increasing national media presence as a platform to establish and launch his company, Night Lion Security. Troia’s unconventional approach to identifying risk within an organization, combined with his ability to interact and work directly with business leaders, has allowed him to become one of the most sought-after IT security professionals in the industry.
To that end, John McAfee, the world-renowned cyber security expert, and CEO of McAfee Global Technologies (MGT) announced Troia’s recent appointment to MGT’s prestigious Hacker Advisory Board. “There is no greater cyber security talent pool in any company on the planet," McAfee said, regarding Troia’s addition to the board.
HUNTING CYBER CRIMINALS
Based On Troia's New Book, This Talk Provides An Inside Look At Cyber Criminal Organizations And The Techniques They Are Using To Bypass Advanced Organization Defenses.
This talk will provide insight into modern threat groups like The Dark Overlord, MABNA, and Gnostic Players. The discussion will detail the formation of the groups, information on their structure, their core members, and the tactics behind their attacks. This talk also looks at how the criminals are able to make money, the companies they have breached, and they clues they leave behind.
PRIVACY IN A SOCIAL (DARK WEB) WORLD
How Private Is Your Identity? How Easily Can Someone Infiltrate Using Information Discovered On Social Media?
This talk looks at the different types of information freely available about any person online, and shows how cyber criminals are able to harvest that data and use it to develop ultimately hack into someone’s account. This talk also provides things all users can be doing, at home and at work, to protect themselves against these types of hackers.
KNOW YOUR ADVERSARY
Tactics Used By Cyber Criminals With A Live Hack Simulation Using NSA's Stolen Digital Weapons
When NSA’s digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. What do these tools mean for the average user? How can they protect themselves? This talk aims to educate the audience by providing a history of these digital weapons, a demonstration of how they are used, and a demonstration a how these tools can easily hack through a live network.
STRATEGIES TO SECURING YOUR ORGANIZATION
How You Can Secure Your Organization Against Modern Cyber Criminals.
This presentation highlights modern threats like ransomware and malware, and provides ways your organization can implement a successful cybersecurity program by looking at techniques designed to stop criminals from gaining access to your network.
© 2022 Executive Speakers Bureau. All Rights Reserved.
Design and Developed by eBiz Solutions
Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.
Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.