Smarter Pen Testing with Threat Intel

Smarter Pen Testing with Threat Intel

Traditional penetration tests often miss the mark, failing to replicate the real-world tactics of today's sophisticated threat actors. In this session, Alex Holden, CISO of Hold Security, cuts through the noise and reveals how to transform your pen testing program with actionable threat intelligence.

 

You'll discover the latest attack trends and learn practical methods to simulate realistic cyber threats against your own defenses. From vulnerability exploitation to ransomware and social engineering, this session provides a hands-on guide to assessing your security readiness against the attacks that matter most right now. Leave with a clear roadmap to build a more resilient and threat-informed security posture.

 

Key Takeaways

 

- Understand the limitations of traditional pen testing and why threat intelligence is crucial

- Learn practical techniques for incorporating real-world attack simulations into your security assessments

- Gain a framework for building a more resilient and proactive security posture based on actionable threat intelligence

Alex Holden | June 3, 2025 | 59 min
Watch Webinar
Smarter App Security Strategies to Enhance Today’s Cyber Defense

Smarter App Security Strategies to Enhance Today’s Cyber Defense

Application security remains one of the most complex challenges in cybersecurity. Unlike traditional infrastructure, applications are difficult to test across all possible attack vectors, and security failures can lead to devastating breaches.

 

In this session, we will explore emerging threats based on insights from the dark web and real-world incident response cases. We’ll dive into vulnerabilities in various application environments, flaws in business logic, next-generation penetration testing scenarios, and the evolving risks of AI manipulation by threat actors.

Alex Holden | May 28, 2025 | 58 min
Threat Actor Psychology: Using Social Engineering and Other Jedi Tricks

Threat Actor Psychology: Using Social Engineering and Other Jedi Tricks

Forget textbook phishing templates and generic vishing scripts. This talk dives deep into the psychology, culture, and behavior of real-world threat actors and shows how we turn their own tactics against them. We’ve been successfully using social engineering techniques against cyber threat actors for decades, and in this presentation, I’ll share some of the key techniques and approaches that have made this possible.

Alex Holden | May 13, 2025 | 32 min
Your Cybersecurity Career and You

Your Cybersecurity Career and You

The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place to start or continue your career and reach the top.
Alex Holden | April 15, 2025 | 17 min
Getting ROI From Monitoring the Dark Web. CIO Summit

Getting ROI From Monitoring the Dark Web. CIO Summit

Monitoring the Dark Web for threats targeting your organization or industry will enhance your ability to understand the real and ever-changing threat landscape to prevent breaches. Learn the practical approach of deriving value from Threat Intelligence and Dark Web monitoring.

Alex Holden | March 6, 2025 | 60 min
Exploring Visual Threat Intelligence

Exploring Visual Threat Intelligence

 

Search for patterns within images and videos allows identification of many threats including corporate data leaks, ransomware attacks, fake news, and disclosures. Companies are re-envisioning new ways to derive cyber threat signals from effective image and video processing with a focus to detect and stop threats hidden in largely disregarded as sources of threat intelligence.

Alex Holden | Feb. 26, 2025 | 54 min
Price of Our Stolen Identities on the Dark Web

Price of Our Stolen Identities on the Dark Web

To strengthen our identity and access protection, it’s crucial to understand the current threat landscape and how sophisticated attackers exploit stolen data or intelligence signals. Let’s explore what’s circulating on the Dark Web and how malicious actors are using this information to target our systems—and what we can do to defend against them.

Alex Holden | Feb. 6, 2025 | 58 min
Ransomware Negotiations: Everything You Need to Know

Ransomware Negotiations: Everything You Need to Know

Ransomware attacks are one of the most terrible outcomes of cyber breach. Whether you believe in paying ransom demands or not, you must understand the need for a negotiator in such difficult situation. We will discuss challenges, pitfalls, and factors of success that a ransomware negotiator can bring to crisis.

 

Key Takeaways:

  • - Understand components of a ransomware attack.
  • - Recognize intricacies of ransomware negotiations.
  • - Avoid mistakes frequently made during ransomware attacks.
  • - Recognize red flags common during ransomware attacks.
 
Alex Holden | Jan. 14, 2025 | 61 min
Cyber Threat Intelligence 2025

Cyber Threat Intelligence 2025

With all the improvements in cyber security, we still struggle with threat actors' advances and breaches. At the beginning of this year, it is important to reflect on wins and losses in cyber security for the past year and draw our conclusions on what we should expect this year to bring us.

Alex Holden | Jan. 7, 2025 | 62 min
CTRL-ALT-Pen Test: Game-Changing Moves for Pen Testing Success

CTRL-ALT-Pen Test: Game-Changing Moves for Pen Testing Success

Penetration testers and red teamers often rely on a variety of tricks and tips to gain an advantage, but only a few share the truly game-changing insights. In our pen testing and red teaming practice we do not take these techniques from classrooms; we develop them through field experience and enrich them by observing real threat actors while adapting their methods. In this presentation, we’ll cover five such techniques that can produce critical findings and significantly enhance your pen testing and red teaming efforts.

Alex Holden | Nov. 14, 2024 | 60 min
Cyber Security - Aware != Ready

Cyber Security - Aware != Ready

Cybersecurity awareness programs play a crucial role in mitigating cyber threats by educating employees about best practices and potential risks. However, many organizations struggle to measure the effectiveness of these programs. This talk will delve into the challenges of making cybersecurity awareness programs practical, focusing on equipping employees with skills rather than simply testing their knowledge. By understanding the factors that contribute to program effectiveness, organizations can partner with employees in addressing cyber security challenges rather than blaming them for security gaps and errors.

Alex Holden | Oct. 22, 2024 | 60 min
1 2 3

Logo
Solutions Threat Intelligence Services Credential Integrity Service Domain Integrity Service Information Security Assessment Services Incident Response and Investigation
Call
1 (414) 678 1414
Mail
info@holdsecurity.com
Social
twitter linkedin
Our offices
Copyright © 2025 Hold Security