Iftach Ian Amit

Iftach Ian Amit

New York, New York, United States
11K followers 500+ connections

About

At Gomboc, we've built a platform specifically designed to tackle one of the biggest…

Articles by Iftach Ian

Activity

Join now to see all activity

Experience

  • Gomboc.ai Graphic

    Gomboc.ai

    New York, New York, United States

  • -

  • -

    New York, New York, United States

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Cleveland/Akron, Ohio Area

  • -

    Greater New York City Area

  • -

    Israel

  • -

Education

Licenses & Certifications

Volunteer Experience

  • OWASP Foundation Graphic

    Chapter Leader

    OWASP Foundation

    - 2 years 1 month

    Science and Technology

    Joined as a chapter lead to the NYC OWASP crew.

  • General Director

    BSides Las Vegas

    - Present 10 years 8 months

    Science and Technology

    A General Director on the Board of Directors.
    President of the Board from 2018 to 2020.

    BSides Las Vegas is an Information / Security conference that’s different. We’re a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free.
    There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting…

    A General Director on the Board of Directors.
    President of the Board from 2018 to 2020.

    BSides Las Vegas is an Information / Security conference that’s different. We’re a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free.
    There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting more potent and the “TALK AT YOU” conferences are starting to realize they have to change. BSidesLV is making this happen by shaking-up the format.

Publications

  • Sexy Defense - Maximizing the home field advantage

    BlackHat USA 2012

    This paper discusses the ways to improve on the defensive information security strategy for organizations by taking more initiative, covering additional aspects of the intelligence spectrum in order to preemptively identify potential attackers and their capabilities, and act on intelligence in a way that would maximize the defensive posture.

    See publication
  • Advanced Data Exfiltration

    In this paper the premise of advanced and non-standard ways for exfiltrating data from a secure network are covered.
    The paper shows that a methodology that takes into account the different capabilities and processes that organizations possess as part of their information asset management.

    See publication
  • Cyber[Crime|War] - Linking State Governed Cyber Warfare with Online Criminal Groups

    Defcon

    This paper explores the links between the political activities of national governments, and cybercrime activities, through events that included substantial cyber-warfare characteristics. We will also outline a mechanism by which cybercrime is often connected with cyber warfare - to the benefit of both governments and cyber criminals.

    See publication
  • Cybercrime on the Net - Behind the scenes of the underground web economy

    Defcon

    Crimeware has been around for a long time. The reason why it deserves an in-depth look now is based on its rapid advancements in malicious Web technology in recent years.
    The Web has become the no.1 attack vector for spreading and controlling Crimeware and the attacks performed through it have coined the term Malweb as the malicious part of the web.
    This paper covers the economy that has evolved on the Internet which thrives on identity theft, financial fraud and general abuse of…

    Crimeware has been around for a long time. The reason why it deserves an in-depth look now is based on its rapid advancements in malicious Web technology in recent years.
    The Web has become the no.1 attack vector for spreading and controlling Crimeware and the attacks performed through it have coined the term Malweb as the malicious part of the web.
    This paper covers the economy that has evolved on the Internet which thrives on identity theft, financial fraud and general abuse of legitimate websites.

    See publication

Patents

  • Automated application security maturity modeling

    Issued US 10,810,106

    A security and maturity service is provided to generate a security score for an application. A set of data points are obtained, the data points indicating application information for an application. The data points may be associated with a particular axis of a plurality of axes defined by a scoring model. Furthermore, the scoring model may define a score for each axes based at least in part on the data points. A security score for the application may then be determined based at least in part on…

    A security and maturity service is provided to generate a security score for an application. A set of data points are obtained, the data points indicating application information for an application. The data points may be associated with a particular axis of a plurality of axes defined by a scoring model. Furthermore, the scoring model may define a score for each axes based at least in part on the data points. A security score for the application may then be determined based at least in part on the score for the plurality of axes.

    See patent

Projects

  • DC9723

    - Present

    The Tel-Aviv, Israel DEFCON group (essentially Israel, as it's the only group here) was set up to provide the hacking and information security communities (and general geeks) in Israel a place to meet, learn, practice and hang out together.
    We feature two talks at each of the monthly meetings, and have extra-curricular activities such as Hackathons, and guest speakers when appropriate.
    The DC9723 hosts an average of 70-80 participants at each meeting, and can accommodate up to 200…

    The Tel-Aviv, Israel DEFCON group (essentially Israel, as it's the only group here) was set up to provide the hacking and information security communities (and general geeks) in Israel a place to meet, learn, practice and hang out together.
    We feature two talks at each of the monthly meetings, and have extra-curricular activities such as Hackathons, and guest speakers when appropriate.
    The DC9723 hosts an average of 70-80 participants at each meeting, and can accommodate up to 200 participants during special events.

    Other creators
    See project
  • PTES

    - Present

    The Penetration Testing execution Standard (PTES) is a new standard designed to provide both businesses and security service providers with a common language and scope for performing penetration testing (i.e. Security evaluations).
    It aims to create an actual standard so that businesses can have a baseline of what is needed when they get a pentest as well as an understanding of what type of testing they require or would provide value to their business. The lack of standardization now is…

    The Penetration Testing execution Standard (PTES) is a new standard designed to provide both businesses and security service providers with a common language and scope for performing penetration testing (i.e. Security evaluations).
    It aims to create an actual standard so that businesses can have a baseline of what is needed when they get a pentest as well as an understanding of what type of testing they require or would provide value to their business. The lack of standardization now is only hurting the industry as businesses are getting low-quality work done, and practitioners lack guidance in terms of what is needed to provide quality service.
    It is a community effort that brings in vendors, consultants and corporations in order to solve one of the most abused practices in information security and weed out the bad practice that started to give a bad name to penetration testing.

    Other creators
    See project

Honors & Awards

  • Red Team Trainer

    BlackHat, Derbycon, Brucon, Source

    Created and delivered an industry leading training on red team testing.

    Training covered full scope red team engagement including physical testing, social engineering through multiple channels (including the fundamental psychological, physical and sociological elements of social engineering), electronic and digital that a red team needs to cover.

    working through a thorough methodology of red teaming that evolves through threat modeling, intelligence gathering, vulnerability…

    Created and delivered an industry leading training on red team testing.

    Training covered full scope red team engagement including physical testing, social engineering through multiple channels (including the fundamental psychological, physical and sociological elements of social engineering), electronic and digital that a red team needs to cover.

    working through a thorough methodology of red teaming that evolves through threat modeling, intelligence gathering, vulnerability analysis and research, exploitation, establishing persistence and communication channels to exfiltration and covering tracks.

Languages

  • English

    -

  • Hebrew

    -

Recommendations received

19 people have recommended Iftach Ian

Join now to view

More activity by Iftach Ian

View Iftach Ian’s full profile

  • See who you know in common
  • Get introduced
  • Contact Iftach Ian directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses