Skip to main content
Notifications
  • Use them to connect with your audience
    ×
  • The Future of Public Speaking
    ×
  • How it can help build your online brand as a speaker
    ×
  • How to be one?
    ×
  • That Require Public Speaking Skills
    ×
  • Upgrade
  • Blog
  • Login
  • Sign up
  • Speakers
  • Organizers
  • Agencies
  • Events
  • How it works
  • SkillCamp
  1. Home
  2. Find a speaker
  3. Aaron Riley
Aaron Riley's picture

Aaron Riley

GCFE
Intelligence Analyst
Cofense
Country or state 
United States (Missouri)
Available to 
Global
Fee 
Ask for pricing
Languages 
English
Volunteer
Yes

Personal Details

Bio

Aaron Riley is an Intelligence Analyst with the Cofense Intelligence team. His responsibilities within this team include incident and malware research which require extensive analytical and technical skills. He is formerly an employee of the State of Missouri Cyber Security department and understands local and government issues. Aaron is an avid proponent of cyber security. He has degrees in networking and programming. Aaron shows great insight within all domains of the cyber security realm and presents regularly on multiple security topics. He is a member of many local and national cyber security groups, and enjoys connecting with other peers in the industry.

Current position (1)

Intelligence Analyst

Cofense

Achievements (2)
Comptia A+ ce Certification
Comptia Network ce Certification
Degrees (2)
Networking
Moberly Area Community College
2011 to 2013
Programming
Moberly Area Community College
2016 to 2017

Presentations

Presentations (7)
Finding Benedict Arnold in your Network!

This presentation talks about logging and monitoring. This subject is backed with real world scenarios and technical details. We will discuss how to set up a network logging program as well as how to parse the logs. After discussing how to parse the logs we will need to monitor for any unusual or malicious activity. We will discuss how to set up alerts for any unusual criteria we have set. By doing this you will easily be more capable of finding the bad actor/actors within your network.

INJECTIONS!!!!!

This session will focus on web injections and how they can give a malicious actor insight into your network. We will cover cross site scripting (XSS), Structured Query Language (SQL) injections, and Local File Inclusion (LFI) injections. We will show real world examples as well as a live demonstration of the injections and techniques used. This will be a basic informational session on how these techniques work and how to avoid them with your internal web page code.

All the Different Ways....

The theme of the talk is to show how to be effective doing the basics within cyber security. We will cover the NIST framework as well as the OWASP top ten. The audience should walk away with a better understanding of what they can do for a cyber security program within any size business. This presentation is also for people who already understand the basics of cyber security by giving them confirmation they are covering the basics within their established programs. The goal of this session is to give a better insight of what the basics of cyber security are and how they can be accomplished.

A Phishing Ecosystem

Phishing remains to be the #1 way of entry into an entities network. We will discuss how to spot phishing campaigns, how to learn from them, and how to educate the users who face them. In this presentation we will show how to bolster and improve your phishing and end user education programs. Defense against and common phishing trends will also be demonstrated. In the end the audience should understand phishing and how to be better aware.

IoT and The Bot Wars to Come.

In this presentation we will look at what IoT is and how these devices can be used for malicious intent. We will talk about how the IoT devices form together to make botnets and how they are controlled. We will discuss the current botnet wars and how researchers see the future of this technology. Understanding the IoT threat landscape is imperative to being able to fight against it. We will show you tips on how to secure your IoT devices and not get caught up in a botnet.

Playing the Odds with Email Attachments

Business's are being targeted everyday with phishing campaigns containing malicious attachments that evade network defenses and attempt to gain access to sensitive information. There isn't just one simple fix, organizations cannot stop ingesting email attachments. In this presentation we will show how malicious email attachments are being used to gain footholds within networks and how to spot them in an inbox. We will walk through how these attachments can be weaponized and how they are used in the wild. This talk will show the audience a technical understanding of how these attachments are targeting vulnerabilities for exploitation and how to mitigate them. By educating end users on procedures and standards you can cultivate a robust phishing defense within an organization that will be helped by technology.

Pulling at the Strand of the Botnet Web.

Botnets are becoming more sophisticated in their techniques to evade network and endpoint detection and their capabilities to harvest sensitive information from an infected target. This in depth analysis will show how the botnets are formed and their tactics to propagate, as well as their information stealing capabilities. We will go through an example of the Geodo/Emotet botnet malware to visually explain these concepts. Mitigating these botnet infection attempts and techniques will be paramount to limiting your attack surface. The evolution of these botnets leave older mitigation technique obsolete while newer mitigation techniques are struggling to keep up. This discussion will show how to intertwine education and technology together to harden your network and defend against these attacks.

Past talks (14)
Finding Benedict Arnold in your Network!
MOREnet Conference
STL Missouri
2014
INJECTIONS!
MOREnet Conference
Lake of the Ozarks, Missouri
2015
Dont Take the Bait!
MOREnet Conference
Lake of the Ozarks, Missouri
2016
State of the State of Missouri
Secure World KC
Kansas City Missouri
2016
IoT and the Bot Wars to Come.
MOREnet Conference
Lake of the Ozarks, Missouri
2017
A Phishing Ecosystem.
PhishMe Submerge Conference
National Harbor, Maryland
2017
The State of the State of Missouri
Columbia Hacker's Luncheon
Columbia, Mo
2017
When It Comes to Cybersecurity, Closed Networks Are Not Closed
IWCE 2018
Orlando, FL.
January 10, 2018
Hack-a-Mole: Preparing for a Data Breach
IWCE 2018
Orlando, FL.
January 10, 2018
IoT and the Bot Wars to Come
Enfuse 2018
Las Vegas, NV
January 10, 2018
A Phishing Ecosystem
Enfuse 2018
Las Vegas, NV
January 10, 2018
The IoT Bot Wars.
MOREnet Conference
Lake of the Ozarks, Missouri
October 12, 2017
The IoT Bot Wars.
MOREnet Conference
Lake of the Ozarks, Missouri
October 4, 2018
Botnet Breakdown
RCET-SW
Missouri State University
March 6, 2019
  • All (2)
  • Videos
  • Photos (1)
  • Press information (1)
This speaker hasn't uploaded any videos yet.
GCFE Certified
GCFE Certified
This speaker hasn't uploaded any slides yet.
This speaker hasn't uploaded any one sheet yet.
GIAC Certified Forensic Examiner (GCFE) was issued by Global Information Assurance Certification (GIAC) to Aaron Riley.

Books & Articles (4)

The Vjw0rm Malware Does It All. Here’s What to Watch For.
Domain Fronting, Phishing Attacks, and What CISOs Need to Know
Microsoft Office Macros: Still Your Leader in Malware Delivery
AZORult Malware Finds a New Ride with Recent Stealer Phishing Campaign

Expertise (39)

Technology
Computer Networking Cybersecurity Infragard .NET JavaScript MVC PHP Development Computer and Network Security Switches/Routers Windows Node.js Harnessing Social Media HTML & CSS Digital Forensics MySQL Data Analysis SIEM Network Access Control C++ Network Traffic Analysis IDS IPS Databases Vulnerability Assesment Incident Mitigation SOC Analyst Browser Forensics Device Profiling Information Security Governance Information Security Standards Log Analytics Log Analysis DFIR Cloud Security and Cyber security Computer Hardware App and desktop virtualization Linux platforms

Awards & certifications (1)

GIAC Certified Forensic Examiner
SANS
2017
Recommendations
Why choose me? 

Aaron shows you a view from inside the technical security trenches in the war of digital privacy.

Social media
Similar to Aaron
  • Katherine Isaac's picture
    Katherine
    Isaac
    VP, Customer Success
    Carbide
  • Kylie Stewart's picture
    Kylie
    Stewart
    Software Engineer
    Formidable Labs
  • Lesley Carhart's picture
    Lesley
    Carhart
    Director of Incident Response
    Dragos Inc
  • Shaquanah Robinson, Ed.D's picture
    Shaquanah
    Robinson, Ed.D
    ARI Reading Specialist
    MCPSS
  • Gene Marks's picture
    Gene
    Marks
    President and CEO
    The Marks Group P.C.
  • Speakers
  • Agencies
  • Events
  • How it works
  • Blog
  • Upgrade
  • Podcast
  • About us
  • Organizers
  • Terms of use
  • Privacy policy
  • FAQ
  • API
  • White Label Terms
  • Contact
  • Corporate Speakers Bureau & CRM
  • Motivational speakers
  • Leadership speakers
  • Business speakers
  • Inspirational speakers
  • Keynote speakers
  • Corporate speakers
  • Celebrity speakers
  • Top 50 Business Speakers
  • Top 50 Leadership Speakers
  • Top 50 Motivational Speakers
  • Top 50 Technology Speakers

Get speaking tips & so much more!

Twice a month we send you speaking tips, training ideas and lots of useful updates.

© 2023 SpeakerHub
All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
  • SoundCloud
Developed by Integral Vision