John Hammond is a cybersecurity instructor, content creator, red teamer, and Capture the Flag enthusiast. As a previous Department of Defense Cyber Training Academy curriculum developer and teacher for the Cyber Threat Emulation course, he educated both civilian and military members on offensive Python, PowerShell, and other scripting languages as well as the adversarial mindset. He personally developed training material and infosec challenges for events such as PicoCTF, the “Capture the Packet” competition at DEFCON US, and the HacktivityCon CTF with HackerOne. John speaks at security conferences such as BsideDC, to students at colleges such as Clemson University and the US Coast Guard Academy, and other events like the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality showcasing programming tutorials, cyber security guides, and CTF video walkthroughs. John currently holds the following certifications: Security+, eJPT, eCPPT, CEH, PCAP, OSWP, OSCP, OSCE, and OSWE.
How Hackers Attack MSPs—And How to Fight Back
Today’s MSPs are squarely in the crosshairs of cybercriminals—and for good reason. Hackers know that MSPs hold the keys to dozens (or hundreds) of SMB environments, and with the right access bad actors can do some serious damage.
In this session, Huntress CEO Kyle Hanslovan and Senior Security Researcher John Hammond will discuss the anatomy of cyberattacks designed specifically to penetrate MSP systems. Attendees will get the chance to experience live hacking demonstrations and analysis, and will walk away with tactical advice to help them better protect their own infrastructure.