I Am Travis Yeargan.
Cybersecurity Consultant & Whitehat
A white hat hacker is a computer security specialist who is hired & contracted to break into protected systems and networks to test and assess their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.
Travis has been working in the field of Information Technology,
Security Auditing and Consulting for more than 14 years.
Travis leads the Cybersecurity & Information Intelligence services
of Graylock Defense in the United States.
He is an active bug hunter on many public & private platforms disclosing vulnerabilities to some of the largest brands and government organizations.
He also created Graylock's D-FENS1 Vulnerability Management Platform.
Travis is also a member of several Chamber of Commerce
branches globally including Dubai International.
He has been involved in a range of cybersecurity engagement teams, involving the organizational and technical aspects of Information Security.
He is also a proud BOARD MEMBER of the FBI's Infragard Program in the Kansas City & Central MO Alliance, also a member of the Cyber Health Working Group, & the participating member of the United States Secret Service’s Kansas City Electronic Crimes Task Force events.
Why you should encourage attacks on your organization?
Why should we hack ourselves?
It sounds crazy to the uninformed but I'm here to clear up your thoughts on the process,
organizations across the globe pay people to break into their systems and find sensitive information and vulnerabilities.
The reason they do this is simple: to stop a criminal (blackhat) hacker, you must think like one. Organizations hire ethical hackers to make sure they have someone who’s one step ahead of the tactics that crooks use. With the vulnerabilities the ethical hacker discovers, organizations can implement defenses to stop criminals before they’ve had a chance to target the organization.
What does an ethical hacker do?
Ethical hackers identify and exploit vulnerabilities using the same methods as a criminal hacker. The only difference is that ethical hackers operate within the law, and don’t use any of the information they’ve discovered maliciously.
Attacks may involve exploiting system misconfigurations, sending the organization’s staff phishing emails, with the intention of gathering their login credentials or breaching the physical perimeter.
As the threat landscape has evolved, ethical hackers are sometimes commissioned to commit long-term cons. They will watch and analyze an organization, looking for patterns that can be exploited. One method they might use is to leave removable devices containing malware in a public area to see if an employee plugs it into one of the organization’s computers.
Can I trust ethical hackers?
You might be unnerved at the prospect of allowing an ethical hacker to root around in your organization,
but there’s nothing to fear as long as you hire a qualified & proven ethical hacker.