Aug. 25, 2023, 11 a.m. | Wild West Hackin' Fest

Wild West Hackin' Fest www.youtube.com

Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

Explaining common ways an attacker could bypass physical controls using technology and bypass tools. Misconfigurations in Physical Security enabling an attacker to perform Cyber Attacks.

Joseph Kingstone joined Black Hills Information Security (BHIS) in Fall 2021 as a Security Analyst. In this role, Joseph performs external and internal penetration tests, C2 pivots, and red teams. He’s had a desire to …

analyst attacks bypass controls cyber cyber attacks external hills information information security internal joined misconfigurations penetration penetration tests physical physical security red teams role security security analyst teams technology tests tools

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Threat Analysis Engineer

@ Gen | IND - Tamil Nadu, Chennai

Head of Security

@ Hippocratic AI | Palo Alto

IT Security Vulnerability Management Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Security Engineer - Netskope/Proofpoint

@ Sainsbury's | Coventry, West Midlands, United Kingdom

Journeyman Cybersecurity Analyst

@ ISYS Technologies | Kirtland AFB, NM, United States