Personal Information
Organization / Workplace
Greater Denver Area United States
Occupation
Principal Cloud Security Researcher
Industry
Technology / Software / Internet
Website
gregfoss.com
About
Greg Foss is a Principal Cloud Security Researcher with Lacework Labs, where he focuses on large-scale data science and threat research intending to help secure customer's cloud environments. Foss has led a threat research team, built and ran a global security operations program, consulted in red teaming, and worked as a security analyst for the Federal Government in previous roles. He is a seasoned public speaker, having been interviewed across media outlets, delivering presentations at conferences globally, and has had his research published in various news outlets. In his free time, Foss spends time with his wife and two children and is an avid triathlete.
Tags
hacking
security
information security
phishing
powershell
siem
webbug
automation
active defense
cyber
honeypot
attack
security operations
incident response
virus
malware
logrhythm
case management
social engineering
hacker
deception
logging
honeytoken
apt
blue team
honeydrive
drupal
technology
criminals
reverse phishing
pwn
security automation and orchestration
são
derbycon
defense
content management
joomla
pwned
honey token
hacked
wordpress
rootz
scripts
web
tracing
development
cybercrime
php
honeyport
honeybadger
system
owned
greg
foss
labs
family
hotspot
wifi
wireless
cms
portals
infosec
captive portal
client
clone
access point
own
ap
office 365
forensics
api
bluehat
integration
trolling
proxy
bsides
vancouver
canada
bitcoin
blockchain
coin
crypto
cryptocurrency
ethereum
exploit
gamification
mining
solidity
web development
nation state
destruction
cloud computing
cloning
tracking
kippo
adhd
active
lateral movement
pivoting
enterprise defense
diversion
warfare
pcap
social media
packet capture
threat intelligence
osint
document bugging
operations
business intelligence
threat
carbon black
endpoint
hue
email
orchestration
cloud security
See more
Presentations
(16)Likes
(5)The Seven Habits of the Highly Effective DevSecOp
James Wickett
•
5 years ago
Ace Up the Sleeve
Will Schroeder
•
7 years ago
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Michael Gough
•
9 years ago
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on the Cheap
Andrew Morris
•
9 years ago
Ask a Malware Archaeologist
Michael Gough
•
9 years ago
Personal Information
Organization / Workplace
Greater Denver Area United States
Occupation
Principal Cloud Security Researcher
Industry
Technology / Software / Internet
Website
gregfoss.com
About
Greg Foss is a Principal Cloud Security Researcher with Lacework Labs, where he focuses on large-scale data science and threat research intending to help secure customer's cloud environments. Foss has led a threat research team, built and ran a global security operations program, consulted in red teaming, and worked as a security analyst for the Federal Government in previous roles. He is a seasoned public speaker, having been interviewed across media outlets, delivering presentations at conferences globally, and has had his research published in various news outlets. In his free time, Foss spends time with his wife and two children and is an avid triathlete.
Tags
hacking
security
information security
phishing
powershell
siem
webbug
automation
active defense
cyber
honeypot
attack
security operations
incident response
virus
malware
logrhythm
case management
social engineering
hacker
deception
logging
honeytoken
apt
blue team
honeydrive
drupal
technology
criminals
reverse phishing
pwn
security automation and orchestration
são
derbycon
defense
content management
joomla
pwned
honey token
hacked
wordpress
rootz
scripts
web
tracing
development
cybercrime
php
honeyport
honeybadger
system
owned
greg
foss
labs
family
hotspot
wifi
wireless
cms
portals
infosec
captive portal
client
clone
access point
own
ap
office 365
forensics
api
bluehat
integration
trolling
proxy
bsides
vancouver
canada
bitcoin
blockchain
coin
crypto
cryptocurrency
ethereum
exploit
gamification
mining
solidity
web development
nation state
destruction
cloud computing
cloning
tracking
kippo
adhd
active
lateral movement
pivoting
enterprise defense
diversion
warfare
pcap
social media
packet capture
threat intelligence
osint
document bugging
operations
business intelligence
threat
carbon black
endpoint
hue
email
orchestration
cloud security
See more