Trey Blalock

Speaker Bio

Pentest Bullet Points

CISO Bullet Points

Trey Blalock on StackExchange

Open Office Hours



Recent Talks and Media

The Weaponization of AI, Its Impact on Organizations, and How to Respond. Portland ISACA Spring Training 2024-05-14
Keynote: The Evolution of Cyber Attacks on Critical Infrastructure: Impact and Adaptation in the Age of Artifical Intelligence Critical Infrastructure Cybersecurity Summit 2023 2023-11-28
The Weaponization of AI, Its Impact on Financial Institutions, and How to Respond Private Financial Institution 2023-10-02
CISO panel discussion: Data and Risk at the Edge ISACA Portland Spring Training 2023-05-25
CISO panel discussion on Threat Intelligence SIM Seattle 2023-02-15
Critical Security Gaps and Unique Solutions for Vendor Assessments ISACA Puget Sound 2022-05-17
The Changing Threat Landscape and How Organizations Need to Respond Portland PMI Spring Conference 2022-05-06
Changes in Ransomware Attacks, Why Companies Are Still Failing to Respond, and What You Need to Do Now INTERFACE Portland 2022-03-17
Deepfakes, Voice Cloning, Synthetic Identities, and the Future of Fraud ISC2 Seattle Chapter 2022-03-03
The Changing Threat Landscape and How Organizations Need to Respond SIM Portland 2022-01-12
Critical Steps for Protecting Organizations from Ransomware ISSA Puget Sound 2021-10-21
Defending Organizations from Ransomware Attacks and Advanced Persistent Threats Private Financial Institution 2021-10-05
The Changing Threat Landscape and How Organizations Need to Respond SIM Seattle 2021-06-16
Keynote: The Changing Threat Landscape and How Organizations Need to Respond ISACA Portland 2021-05-24
Small segment on Colonial Pipeline Ransomware KOMO News Seattle 2021-05-12
Deep Dive into Emerging Threats and How to Defend Against Them. ISACA Puget Sound 2021-04-27
Segment on Cyber Hacking: State report finds growing threat to local businesses, individuals KOMO News Seattle 2020-11-11
Why Advanced Persistent Threats have Changed the Economics of Security ISC2 Seattle Chapter 2020-11-05
Emerging Threats, Tools, and Technologies Your Organization needs to be aware of now. ISACA Puget Sound 2020-10-23
How Attackers are leveraging Coronavirus-19 and what this means for the future of workforce security Private Financial Institution 2020-10-08
The second of two TV segments on hackers taking advantage of Covid-19 KOMO News Seattle 2020-04-28
The first of two TV segments on hackers taking advantage of Covid-19 KOMO News Seattle 2020-04-27
Two TV segments on Voice Cloning KOMO News Seattle 2020-02-03
Why APT's have Changed the Economics of Security Seattle University 2019-12-02
Automating defenses, incident response, and forensics GSLUG 2019-11-09
Building Stronger Security Teams with Threat Modeling Private Financial Institution 2019-10-21
Attacking and Defending Industries at Scale ISACA Puget Sound 2019-10-15
Why external reconnaissance is critical for your organization's security Private Financial Institution 2019-05-23
Leveraging Threat Modeling Techniques to Find Compliance Gaps, Prevent Data Leakage, and Protect your Organization’s Assets ISACA 2019 Spring Conference Puget Sound 2019-04-29
What your auditing process is missing by not including threat modeling and reconnaissance techniques. ISACA 2019 Spring Conference Puget Sound 2019-04-29
Leveraging Reconnaissance Techniques to Find Compliance Gaps, Prevent Data Leakage and Rrotect your Organization's Assets ISACA 2019 Spring Conference Puget Sound 2019-04-29
Attacking and Defending Financial Networks at Scale (Fintech version) Mojaloop Conference, Arusha Tanzania 2019-01-31
Using Automation to Build an Effective Security Response Strategy ISACA Willamette Valley Chapter 2018-11-09
Attacking and Defending Financial Networks at Scale (client-specific version) Private Financial Institution 2018-10-19
Security in Software Design and Implementation North Seattle College 2018-10-15
Attacking and Defending Financial Networks at Scale (client-specific version) Private Telecommunications Company, Paris France 2018-07-24
Automating defenses, incident response, and forensics ISACA 2018 Spring Conference Puget Sound 2018-04-23
Reconnaissance - What attackers do to prepare for an attack ISACA 2018 Spring Conference Puget Sound 2018-04-23
Introduction to Linux Performance Tuning GSLUG 2018-04-16
Automating Linux Defenses with Fail2Ban Linux Open Source Meetup 2018-02-19
Security Automation with IPTables GSLUG 2018-01-13
Asymmetric Warfare and Why FOSS is so Important Linux Open Source Meetup 2017-08-21
WireShark in 5-Minutes (lightning talk) Linux Open Source Meetup 2017-08-21
Security Automation: How security at scale is destroying traditional security tools BSides Boise 2016 2016-11-12
Revocation, the Frailty of PKI, Mat Caughron and Trey Blalock DefCon 24 Crypto and Privacy Village 2016-08-03
Securing Big Data DataDay Texas 2016 2016-01-16
Penetration Testing Big Data Data Day Texas 2015 2015-01-10
Protecting Your Company Against Cyber Security Attacks (Panel) NCTA Emerging Tech + Trends 2013 2013-11-12
A Socratic Dialogue on the Risks of Mobile Devices CISO Summit Atlanta 2012 2012-01-24