Skip to Main Content

Shane Hartman

Principal Security Consultant

EXPERIENCE
Shane has been working in computer technology and information security for over 20 years. Some of his recent work includes performing specialized incident analysis on the latest cybercrime activities, producing actionable threat intelligence.

EDUCATION & CERTIFICATIONS

  • BA, Business and E-Commerce, University of Phoenix
  • MS, Digital Forensics, University of Central Florida
  • Certified Information Security Professional (CISSP)

PROFESSIONAL AFFILIATIONS

  • Tampa Bay Chapter of (ISC)²

INDUSTRY CONTRIBUTIONS

  • Author, Android Malware and Analysis – 2014
  • BSides Tampa Presentation – Android Malware and Analysis – 2015
  • BSides Tampa Presentation – NFC Your Smart Phone’s Best Friend or Worst Nightmare – 2017
  • Video Course – Metasploit Unleashed – 2020
  • BSides Tampa Presentation – IOT Insecurities – 2022

PASSION FOR SECURITY
Shane continually shares his industry knowledge through publications and public presentations. Additionally, he is a part-time adjunct professor at the University of South Florida, teaching classes such as Ethical Hacking and Digital Forensics.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars July 27 2022

Adding Value to a Traditional Penetration Test

Leaders from TrustedSec's Advisory, Remediation, and Incident Response teams discuss how to optimize penetration testing, revealing common security challenges,…

Read about this article
Blog July 25 2023

Prefetch: The Little Snitch That Tells on You

Investigators can use prefetch file contents to identify malicious directory paths, binaries, and data files, aiding in exfiltration and malware analysis.

Read about this article
Blog February 07 2023

ESXiArgs: What you need to know and how to protect your data

Vulnerable ESXi servers are at risk from the ESXiArgs ransomware campaign; patch or upgrade immediately to prevent data loss.

Read about this article
Blog October 11 2022

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene—Part 2

In the first Back to Basics blog we discussed cyber hygiene and some fundamental security practices one can take to quickly assess their current cybersecurity…

Read about this article
Blog April 16 2026

Dungeons and Daemons

Play Roll for Initiative. Hack the Planet.Dungeons & Daemons is a cybersecurity RPG that drops you into the boots of a Red Team operator on a live…

Read about this article
Webinars April 15 2026

You Had Us at the First Alert: A Guide to Finding Frequently Missed Detections

Join us for this webinar to get a clearer picture of where your detection coverage has blind spots and a practical roadmap for closing them before a real…

Read about this article
Blog April 14 2026

Benchmarking Self-Hosted LLMs for Offensive Security

We put LLMs to the test—let's find out how good AI is at hacking! We walk through six simple challenges with intentionally naïve setups to test how capable…

Read about this article
Events April 09 2026

TrustedSec Livestream - AMA: Detection Engineering in 2026 and Beyond with John Dwyer

Come prepared with your questions and walk away with actionable knowledge to sharpen your detection capabilities.

Read about this article
Blog April 09 2026

IAM the Captain Now – Hijacking Azure Identity Access

I decided to spend some research time diving in depth into Identity and Access Management (IAM) within Microsoft Azure. I am going to show you within this blog…

Read about this article
Blog April 07 2026

Building a Detection Foundation: Part 5 - Correlation in Practice

From Data Sources to DetectionWe've covered a lot of ground in this series: Windows Security events for logon tracking and process execution; PowerShell…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.