Personal Information
Organization / Workplace
Greater Atlanta Area United States
Occupation
Principal Researcher
Industry
Technology / Software / Internet
About
Rob focuses on pragmatic solutions for clients and technology. He oversees strategy for continuous security automation. Rob has presented at Black Hat, DEF CON, and RSA. He is also a contributing author to Hacking Exposed Web Applications 3rd Edition. His writing has appeared in Dark Reading and he has been quoted in publications such as Wired. He has more than a decade of security experience and once worked as a Software Engineer at Hewlett-Packard’s Application Security Center. Rob was also with SPI Dynam
Tags
security
penetration testing
cyber security
information security
application security
infosec
phishing
information gathering
blackhat
google hacking
google
web
red team
physical security
risk
social engineering
cloud
search engine
hacking
vulnerability
black hat
bing
adversary
counterpoint
debate
devsecops
breach
aws
dns
drone
rfid
osint
technical controls
cyber
email
compromise
defense
policies
enterprisesecurity
socialengineering
impersonation
interop
threat
bishopfox
mitigation
incidentresponse
vishing
opsec
operational security
bsides
pittsburgh
threats
cryptography
botnet
python
automation
bitcoin
anti-automation
cloud computing
defcon20
defcon
attack chaining
apt
pentest
pentesting
exploit
advanced exploit
vulnerability assessment
intelligence gathering
intelligence
web application security
black hat 2011
data loss
data loss prevention
malware
microsoft
passive analysis
filter
evasion
staticanalysis
information
See more
Presentations
(14)Likes
(3)Better watch your apps - MJ Keith
m j
•
13 years ago
Threat modeling librarian freedom conference
evacide
•
8 years ago
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Rob Ragan
•
8 years ago
Personal Information
Organization / Workplace
Greater Atlanta Area United States
Occupation
Principal Researcher
Industry
Technology / Software / Internet
About
Rob focuses on pragmatic solutions for clients and technology. He oversees strategy for continuous security automation. Rob has presented at Black Hat, DEF CON, and RSA. He is also a contributing author to Hacking Exposed Web Applications 3rd Edition. His writing has appeared in Dark Reading and he has been quoted in publications such as Wired. He has more than a decade of security experience and once worked as a Software Engineer at Hewlett-Packard’s Application Security Center. Rob was also with SPI Dynam
Tags
security
penetration testing
cyber security
information security
application security
infosec
phishing
information gathering
blackhat
google hacking
google
web
red team
physical security
risk
social engineering
cloud
search engine
hacking
vulnerability
black hat
bing
adversary
counterpoint
debate
devsecops
breach
aws
dns
drone
rfid
osint
technical controls
cyber
email
compromise
defense
policies
enterprisesecurity
socialengineering
impersonation
interop
threat
bishopfox
mitigation
incidentresponse
vishing
opsec
operational security
bsides
pittsburgh
threats
cryptography
botnet
python
automation
bitcoin
anti-automation
cloud computing
defcon20
defcon
attack chaining
apt
pentest
pentesting
exploit
advanced exploit
vulnerability assessment
intelligence gathering
intelligence
web application security
black hat 2011
data loss
data loss prevention
malware
microsoft
passive analysis
filter
evasion
staticanalysis
information
See more