SlideShare a Scribd company logo
Personal Information
Organization / Workplace
Greater Minneapolis-St. Paul Area United States
Occupation
Principal Security Consultant - CISSP, QSA
Industry
Technology / Software / Internet
About
Industry Experience Scott has been working with medium and large companies in the information security space for over 10 years. He is currently responsible for the development, and execution of penetration testing at NetSPI. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. As part of that experience Scott has had the opportunity to provide technical and compliance security services for financial, healthcare, retail, nuclear, manufacturing, pharmaceutical, and educational organizations. Community Activities As an active participant in the information security community Scott performs security resear...
Contact Details

Presentations(26

See all
Hunting SMB Shares with Data, Graphs, Charts, and LLMs (SO-CON 2025)
Hunting SMB Shares with Data, Graphs, Charts, and LLMs (SO-CON 2025)Hunting SMB Shares with Data, Graphs, Charts, and LLMs (SO-CON 2025)
Hunting SMB Shares with Data, Graphs, Charts, and LLMs (SO-CON 2025)
 
Into the Abyss: Evaluating Active Directory SMB Shares on Scale (Secure360)
Into the Abyss: Evaluating Active Directory SMB Shares on Scale (Secure360)Into the Abyss: Evaluating Active Directory SMB Shares on Scale (Secure360)
Into the Abyss: Evaluating Active Directory SMB Shares on Scale (Secure360)
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)