I like to entertain people with hacks and shortcuts while conveying a much bigger message. My hands-on nature likes to test the limits of technology by breaking things in order to learn how to secure them.
I've spent my career in the corporate world building complex networks and helping organizations secure them.
It helps to have a computer engineering degree and a strong passion in cybersecurity while hold a long list of technical certifications including CCIE R&S, Certified Ethical Hacker, Certified Social Engineer Pentester.
Focus: Entertaining | Engaging | Awareness
The Power of Social Engineering
Get into the mind of a person who get’s into your minds.
This advanced and powerful techinique is best understoood by demonstrating it live with interactions and examples. As Mishaal is a very hands-on person and uses these techniques in penetration testing, he will show you how the bad guys use the power of influence and maniputation to breach the human firewall and acheive their purpose.
This presentation is sure to keep you thinking and question the motives of any similar interactions that you may come across.
Outsmart the Hacker
Advanced Cyber Safety Awareness
Enjoy live, interactive hacking techniques while you learn how it’s done in the real world.
As an experienced penetration tester, ethical hacker and certified social engineer, Mishaal will take you behind the scenes to show you how hackers hack and what you can do to counter their techniques.
The presentation engages both technical and non-technical groups and will keep them on the edge of their seats.
Everyone goes home being more aware and motivated to altering their lives to become more private and secure.
Your organization from the eyes of a hacker
As an organization, what information do you expose to a potential hacker?
This short session will explore the vast amount of publicly accessible information about your company scattered all over the internet, the darknet and other not so obvious sources using advanced Open Source Intelligence (OSINT) techniques.
This presentation will highlight how this information can be used against you by malicious entities whether your competitors, nation state attackers, disgruntled employees, insider threats, hacktivists or wannabe hackers.
This presentation is sure to keep you awake at night!
IoT: The Insecurity of Things
You probably have more things talking to the internet in your house than you can count off the top of your head, I know I do (I'll show you)!
- Let's talk about what IoT means to you and to organizations.
- Are you thinking "security" when you design and engineer your projects or are you only thinking "functionality".
- Why is securting IoT important?
- What are some of the horror stories of insecure devices?
Let's get hands on with hacking IoT, what could go wrong? We'll scratch the surface and get you thinking.
Some of things we'll demo: Raspberry Pi, Arduino, connected home devices, WiFi Jamming devices, Pi-Hole, Mirai Botnet...
Please reach out for inquires. Topics can be customized to the audience. They can be solo, interview or panel style discussion.