Imago Techmedia Ltd is registered in England and Wales under Company No. 04865455.
Registered Office: Bedford House, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Business Address: The Malt House, 25-29 High Street, Kingston upon Thames, Surrey, KT1 1LL, United Kingdom
Imago Techmedia is a subsidiary of Clarion Events Limited
Rob Shapland manages the penetration testing team at First Base Technologies. He has over 7 years' experience conducting penetration tests for hundreds of organisations, from small businesses to major international conglomerates. He specialises in simulating advanced cyber attacks against corporate networks, combining social engineering techniques with technical attacks. He is also a regular speaker at events and conferences around Europe, and recently ran a social engineering and penetration testing workshop at ISACA EuroCACS in Copenhagen.
Rob's background is strongly founded in penetration testing, vulnerability assessment and quality assurance of applications. Before joining First Base, he undertook system testing of key financial systems for a major high street bank.
He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
Rob Shapland Seminars
Major Real World Red Team Exercise - The story you are about to hear is true... Thu 6th Oct 13:40 - 14:40
Major Real World Red Team Exercise - The story you are about to hear is true...
This presentation describes a red team exercise for a large organisation, simulating a real-world criminal attack against both IT and OT environments under controlled conditions. Rob will introduce his talk with the words “The story you are about to hear is true; only the names have been changed to protect the vulnerable”.
Ethical hackers from First Base Technologies conduct open source intelligence and red team tests to help organisations understand where they are vulnerable to cyber attacks. This presentation describes each step of an exercise informed by threat-based scenarios: planning and recon, spear phishing, telephone social engineering, building access, network exploitation and data exfiltration. As the story develops, you will discover how an attacker thinks, why they choose a particular strategy and what you can do to minimise your organisation’s vulnerability to cyber threats.
Time / Place
Thu 6th Oct 13:40 to 14:40