About
At Gomboc, we've built a platform specifically designed to tackle one of the biggest…
Articles by Iftach Ian
Activity
-
Excited to attend the Annual Mindfluence Leadership Event in Napa, May 3–5, 2026. Looking forward to hosting the panel: How CISOs Translate Cyber…
Excited to attend the Annual Mindfluence Leadership Event in Napa, May 3–5, 2026. Looking forward to hosting the panel: How CISOs Translate Cyber…
Liked by Iftach Ian Amit
-
🎉 Celebrating two years of John Kamenik at Gomboc! As our Chief Architect, John is the kind of person who thinks in systems whether he is designing…
🎉 Celebrating two years of John Kamenik at Gomboc! As our Chief Architect, John is the kind of person who thinks in systems whether he is designing…
Liked by Iftach Ian Amit
-
I had an excellent experience this past weekend at #BSidesCharm. I would like to extend my sincere thanks to the BSides Charm organizing committee…
I had an excellent experience this past weekend at #BSidesCharm. I would like to extend my sincere thanks to the BSides Charm organizing committee…
Liked by Iftach Ian Amit
Experience
Education
Licenses & Certifications
-
-
-
-
An Introduction to Operations Management
Coursera Verified Certificates
-
Certified FAIR Analyst
CXOWARE inc.
Issued
Volunteer Experience
-
Chapter Leader
OWASP Foundation
- 2 years 1 month
Science and Technology
Joined as a chapter lead to the NYC OWASP crew.
-
General Director
BSides Las Vegas
- Present 10 years 8 months
Science and Technology
A General Director on the Board of Directors.
President of the Board from 2018 to 2020.
BSides Las Vegas is an Information / Security conference that’s different. We’re a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free.
There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting…A General Director on the Board of Directors.
President of the Board from 2018 to 2020.
BSides Las Vegas is an Information / Security conference that’s different. We’re a 100% volunteer organized event, put on by and for the community, and we truly strive to keep information free.
There is no charge to the public to attend BSidesLV. Our costs are covered by our generous donors and sponsors, who share our vision of free dissemination of information. The conversations are getting more potent and the “TALK AT YOU” conferences are starting to realize they have to change. BSidesLV is making this happen by shaking-up the format.
Publications
-
Sexy Defense - Maximizing the home field advantage
BlackHat USA 2012
See publicationThis paper discusses the ways to improve on the defensive information security strategy for organizations by taking more initiative, covering additional aspects of the intelligence spectrum in order to preemptively identify potential attackers and their capabilities, and act on intelligence in a way that would maximize the defensive posture.
-
Advanced Data Exfiltration
See publicationIn this paper the premise of advanced and non-standard ways for exfiltrating data from a secure network are covered.
The paper shows that a methodology that takes into account the different capabilities and processes that organizations possess as part of their information asset management. -
Cyber[Crime|War] - Linking State Governed Cyber Warfare with Online Criminal Groups
Defcon
See publicationThis paper explores the links between the political activities of national governments, and cybercrime activities, through events that included substantial cyber-warfare characteristics. We will also outline a mechanism by which cybercrime is often connected with cyber warfare - to the benefit of both governments and cyber criminals.
-
Cybercrime on the Net - Behind the scenes of the underground web economy
Defcon
See publicationCrimeware has been around for a long time. The reason why it deserves an in-depth look now is based on its rapid advancements in malicious Web technology in recent years.
The Web has become the no.1 attack vector for spreading and controlling Crimeware and the attacks performed through it have coined the term Malweb as the malicious part of the web.
This paper covers the economy that has evolved on the Internet which thrives on identity theft, financial fraud and general abuse of…Crimeware has been around for a long time. The reason why it deserves an in-depth look now is based on its rapid advancements in malicious Web technology in recent years.
The Web has become the no.1 attack vector for spreading and controlling Crimeware and the attacks performed through it have coined the term Malweb as the malicious part of the web.
This paper covers the economy that has evolved on the Internet which thrives on identity theft, financial fraud and general abuse of legitimate websites.
Patents
-
Automated application security maturity modeling
Issued US 10,810,106
See patentA security and maturity service is provided to generate a security score for an application. A set of data points are obtained, the data points indicating application information for an application. The data points may be associated with a particular axis of a plurality of axes defined by a scoring model. Furthermore, the scoring model may define a score for each axes based at least in part on the data points. A security score for the application may then be determined based at least in part on…
A security and maturity service is provided to generate a security score for an application. A set of data points are obtained, the data points indicating application information for an application. The data points may be associated with a particular axis of a plurality of axes defined by a scoring model. Furthermore, the scoring model may define a score for each axes based at least in part on the data points. A security score for the application may then be determined based at least in part on the score for the plurality of axes.
Projects
-
DC9723
- Present
The Tel-Aviv, Israel DEFCON group (essentially Israel, as it's the only group here) was set up to provide the hacking and information security communities (and general geeks) in Israel a place to meet, learn, practice and hang out together.
We feature two talks at each of the monthly meetings, and have extra-curricular activities such as Hackathons, and guest speakers when appropriate.
The DC9723 hosts an average of 70-80 participants at each meeting, and can accommodate up to 200…The Tel-Aviv, Israel DEFCON group (essentially Israel, as it's the only group here) was set up to provide the hacking and information security communities (and general geeks) in Israel a place to meet, learn, practice and hang out together.
We feature two talks at each of the monthly meetings, and have extra-curricular activities such as Hackathons, and guest speakers when appropriate.
The DC9723 hosts an average of 70-80 participants at each meeting, and can accommodate up to 200 participants during special events.Other creatorsSee project -
PTES
- Present
The Penetration Testing execution Standard (PTES) is a new standard designed to provide both businesses and security service providers with a common language and scope for performing penetration testing (i.e. Security evaluations).
It aims to create an actual standard so that businesses can have a baseline of what is needed when they get a pentest as well as an understanding of what type of testing they require or would provide value to their business. The lack of standardization now is…The Penetration Testing execution Standard (PTES) is a new standard designed to provide both businesses and security service providers with a common language and scope for performing penetration testing (i.e. Security evaluations).
It aims to create an actual standard so that businesses can have a baseline of what is needed when they get a pentest as well as an understanding of what type of testing they require or would provide value to their business. The lack of standardization now is only hurting the industry as businesses are getting low-quality work done, and practitioners lack guidance in terms of what is needed to provide quality service.
It is a community effort that brings in vendors, consultants and corporations in order to solve one of the most abused practices in information security and weed out the bad practice that started to give a bad name to penetration testing.Other creatorsSee project
Honors & Awards
-
Red Team Trainer
BlackHat, Derbycon, Brucon, Source
Created and delivered an industry leading training on red team testing.
Training covered full scope red team engagement including physical testing, social engineering through multiple channels (including the fundamental psychological, physical and sociological elements of social engineering), electronic and digital that a red team needs to cover.
working through a thorough methodology of red teaming that evolves through threat modeling, intelligence gathering, vulnerability…Created and delivered an industry leading training on red team testing.
Training covered full scope red team engagement including physical testing, social engineering through multiple channels (including the fundamental psychological, physical and sociological elements of social engineering), electronic and digital that a red team needs to cover.
working through a thorough methodology of red teaming that evolves through threat modeling, intelligence gathering, vulnerability analysis and research, exploitation, establishing persistence and communication channels to exfiltration and covering tracks.
Languages
-
English
-
-
Hebrew
-
Recommendations received
-
LinkedIn User
19 people have recommended Iftach Ian
Join now to viewMore activity by Iftach Ian
-
Adoption ≠ Readiness. The "Probabilistic Tax" is real; if your team has to spend 30 minutes verifying an AI-generated security fix, you haven't…
Adoption ≠ Readiness. The "Probabilistic Tax" is real; if your team has to spend 30 minutes verifying an AI-generated security fix, you haven't…
Liked by Iftach Ian Amit
-
Every security team builds guardrails. Almost none of them give developers a way through. So developers do what makes sense to them. They bypass the…
Every security team builds guardrails. Almost none of them give developers a way through. So developers do what makes sense to them. They bypass the…
Liked by Iftach Ian Amit
-
יש דברים שעושים מהלב ❤️ חגיגות יום העצמאות 🇮🇱 לקהילת הטק הישראלית בניו יורק עם 500 משתתפים- אנרגיה מטורפת!! גאים להוביל ולתמוך בקהילה הישראלית בניו…
יש דברים שעושים מהלב ❤️ חגיגות יום העצמאות 🇮🇱 לקהילת הטק הישראלית בניו יורק עם 500 משתתפים- אנרגיה מטורפת!! גאים להוביל ולתמוך בקהילה הישראלית בניו…
Liked by Iftach Ian Amit
-
After five and a half incredible years at Aiven, I’ve decided it’s time to step away. In my time here, we’ve seen the company scale from $20M to…
After five and a half incredible years at Aiven, I’ve decided it’s time to step away. In my time here, we’ve seen the company scale from $20M to…
Liked by Iftach Ian Amit
-
Week 10 of our Community Edition testimonials. This week we have two reviews from engineers using Gomboc for Terraform code review in their day to…
Week 10 of our Community Edition testimonials. This week we have two reviews from engineers using Gomboc for Terraform code review in their day to…
Liked by Iftach Ian Amit
-
That workshop was amazing! Issues that would have taken hours to fix with Claude/Codex (after debugging their non-deterministic code, and removing…
That workshop was amazing! Issues that would have taken hours to fix with Claude/Codex (after debugging their non-deterministic code, and removing…
Shared by Iftach Ian Amit
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content