Ethical Hacking – Tactics, Techniques, and Procedures


Organizations hire ethical hackers to break into their company, steal their sensitive data, and help ensure the real bad guys don’t do the same. Join us for an interactive talk by Mike Walker (with plenty of stories along the way!) about hacker motives, methods and mindset. We’ll walk through how ethical hackers emulate the tactics, techniques, and procedures (TTPs) of the real bad guys in order to demonstrate the risk to a company’s assets.

Food and drinks provided courtesy of Networks Group!

Mr. Walker has over 25 years of Information Technology experience, including 15 years of computer programming and 10 years of network security experience. He spent four years as a senior team member with the US Air Force’s Red Team, and another six providing network security expertise across multiple sectors, including government, legal, medical, financial, industrial, and others. Mr. Walker has a Bachelor’s of Science in Cybersecurity and holds a Offensive Security Certified Professional (OSCP) certification.

QUESTIONS? We’re here to help! If you have additional questions or would like to talk further before signing up for a class, please contact us at [masked]

NetWorks Group:
Founded in 1997, we have over 20 years of experience delivering security services aligned with your business and compliance needs. Our team is comprised of some of the most experienced, passionate, and security-conscious people in the industry. Our offensive services provide an attacker’s view of the environment and mimics the TTP’s (tactics, techniques & procedures) of today’s hackers. This service provides a practical demonstration of risk across a variety of attack vectors. Our defensive services leverage big data tools to apply threat intelligence and advanced analytics to detect security incidents. The ability to actively hunt through logs to identify indicators of compromise has helped us achieve one of the fastest time to detect and lowest false positive rates in the industry. The close collaboration between our offensive and defensive service delivery teams has enabled us to help customers stay one step ahead of cyber criminals.

All attendees are expected to abide by the Girl Develop It Code of Conduct (

Comments are closed.