
| Podcast: Weaponized AI and the End of Attribution also on Spotify and YouTube | Data & Confused Podcast | 2025-11-03 |
| Assess and Address Practical Limitations of ATT&CK and ATLAS in Artificial Intelligence (AI) Risk Managementi | MITRE ATT&CKcon 6 McLean, VA | 2025-10-15 |
| The Weaponization of AI: A 2025 Cyber Threat Briefing | Private Financial Institution | 2025-07-16 |
| Cyber Threats & AI Weapons: The Shifting 2025 Landscape | ISACA Portland Spring Training | 2025-05-15 |
| The Importance of Linux for the Future of Internet Security | LinuxFest Northwest | 2025-04-27 |
| The Weaponization of AI, Its Impact on Organizations, and How to Respond. | AI Governance Day by Portland AWS Users Group | 2025-03-26 |
| 2025 Threat Landscape Dynamics | ISSA Rainier | 2025-02-27 |
| Closing Keynote: 2024 Cybersecurity Recapitulation | Critical Infrastructure Summit 2024 | 2024-11-08 |
| The Weaponization of AI, Its Impact on Organizations, and How to Respond. | Portland ISACA Spring Training | 2024-05-14 |
| Keynote: The Evolution of Cyber Attacks on Critical Infrastructure: Impact and Adaptation in the Age of Artificial Intelligence | Critical Infrastructure Cybersecurity Summit 2023 | 2023-11-28 |
| The Weaponization of AI, Its Impact on Financial Institutions, and How to Respond | Private Financial Institution | 2023-10-02 |
| CISO panel discussion: Data and Risk at the Edge | ISACA Portland Spring Training | 2023-05-25 |
| CISO panel discussion on Threat Intelligence | SIM Seattle | 2023-02-15 |
| Critical Security Gaps and Unique Solutions for Vendor Assessments | ISACA Puget Sound | 2022-05-17 |
| The Changing Threat Landscape and How Organizations Need to Respond | Portland PMI Spring Conference | 2022-05-06 |
| Changes in Ransomware Attacks, Why Companies Are Still Failing to Respond, and What You Need to Do Now | INTERFACE Portland | 2022-03-17 |
| Deepfakes, Voice Cloning, Synthetic Identities, and the Future of Fraud | ISC2 Seattle Chapter | 2022-03-03 |
| The Changing Threat Landscape and How Organizations Need to Respond | SIM Portland | 2022-01-12 |
| Critical Steps for Protecting Organizations from Ransomware | ISSA Puget Sound | 2021-10-21 |
| Defending Organizations from Ransomware Attacks and Advanced Persistent Threats | Private Financial Institution | 2021-10-05 |
| The Changing Threat Landscape and How Organizations Need to Respond | SIM Seattle | 2021-06-16 |
| Keynote: The Changing Threat Landscape and How Organizations Need to Respond | ISACA Portland | 2021-05-24 |
| Small segment on Colonial Pipeline Ransomware | KOMO News Seattle | 2021-05-12 |
| Deep Dive into Emerging Threats and How to Defend Against Them. | ISACA Puget Sound | 2021-04-27 |
| Segment on Cyber Hacking: State report finds growing threat to local businesses, individuals | KOMO News Seattle | 2020-11-11 |
| Why Advanced Persistent Threats have Changed the Economics of Security | ISC2 Seattle Chapter | 2020-11-05 |
| Emerging Threats, Tools, and Technologies Your Organization needs to be aware of now. | ISACA Puget Sound | 2020-10-23 |
| How Attackers are leveraging Coronavirus-19 and what this means for the future of workforce security | Private Financial Institution | 2020-10-08 |
| The second of two TV segments on hackers taking advantage of Covid-19 | KOMO News Seattle | 2020-04-28 |
| The first of two TV segments on hackers taking advantage of Covid-19 | KOMO News Seattle | 2020-04-27 |
| Two TV segments on Voice Cloning | KOMO News Seattle | 2020-02-03 |
| Why APT's have Changed the Economics of Security | Seattle University | 2019-12-02 |
| Automating defenses, incident response, and forensics | GSLUG | 2019-11-09 |
| Building Stronger Security Teams with Threat Modeling | Private Financial Institution | 2019-10-21 |
| Attacking and Defending Industries at Scale | ISACA Puget Sound | 2019-10-15 |
| Why external reconnaissance is critical for your organization's security | Private Financial Institution | 2019-05-23 |
| Leveraging Threat Modeling Techniques to Find Compliance Gaps, Prevent Data Leakage, and Protect your Organization’s Assets | ISACA 2019 Spring Conference Puget Sound | 2019-04-29 |
| What your auditing process is missing by not including threat modeling and reconnaissance techniques. | ISACA 2019 Spring Conference Puget Sound | 2019-04-29 |
| Leveraging Reconnaissance Techniques to Find Compliance Gaps, Prevent Data Leakage and Rrotect your Organization's Assets | ISACA 2019 Spring Conference Puget Sound | 2019-04-29 |
| Attacking and Defending Financial Networks at Scale (Fintech version) | Mojaloop Conference, Arusha Tanzania | 2019-01-31 |
| Using Automation to Build an Effective Security Response Strategy | ISACA Willamette Valley Chapter | 2018-11-09 |
| Attacking and Defending Financial Networks at Scale (client-specific version) | Private Financial Institution | 2018-10-19 |
| Security in Software Design and Implementation | North Seattle College | 2018-10-15 |
| Attacking and Defending Financial Networks at Scale (client-specific version) | Private Telecommunications Company, Paris France | 2018-07-24 |
| Automating defenses, incident response, and forensics | ISACA 2018 Spring Conference Puget Sound | 2018-04-23 |
| Reconnaissance - What attackers do to prepare for an attack | ISACA 2018 Spring Conference Puget Sound | 2018-04-23 |
| Introduction to Linux Performance Tuning | GSLUG | 2018-04-16 |
| Automating Linux Defenses with Fail2Ban | Linux Open Source Meetup | 2018-02-19 |
| Security Automation with IPTables | GSLUG | 2018-01-13 |
| Asymmetric Warfare and Why FOSS is so Important | Linux Open Source Meetup | 2017-08-21 |
| WireShark in 5-Minutes (lightning talk) | Linux Open Source Meetup | 2017-08-21 |
| Security Automation: How security at scale is destroying traditional security tools | BSides Boise 2016 | 2016-11-12 |
| Revocation, the Frailty of PKI, Mat Caughron and Trey Blalock | DefCon 24 Crypto and Privacy Village | 2016-08-03 |
| Securing Big Data | DataDay Texas 2016 | 2016-01-16 |
| Penetration Testing Big Data | Data Day Texas 2015 | 2015-01-10 |
| Protecting Your Company Against Cyber Security Attacks (Panel) | NCTA Emerging Tech + Trends 2013 | 2013-11-12 |
| A Socratic Dialogue on the Risks of Mobile Devices | CISO Summit Atlanta 2012 | 2012-01-24 |