Skip to Main Content

Shane Hartman

Principal Security Consultant

EXPERIENCE
Shane has been working in computer technology and information security for over 20 years. Some of his recent work includes performing specialized incident analysis on the latest cybercrime activities, producing actionable threat intelligence.

EDUCATION & CERTIFICATIONS

  • BA, Business and E-Commerce, University of Phoenix
  • MS, Digital Forensics, University of Central Florida
  • Certified Information Security Professional (CISSP)

PROFESSIONAL AFFILIATIONS

  • Tampa Bay Chapter of (ISC)²

INDUSTRY CONTRIBUTIONS

  • Author, Android Malware and Analysis – 2014
  • BSides Tampa Presentation – Android Malware and Analysis – 2015
  • BSides Tampa Presentation – NFC Your Smart Phone’s Best Friend or Worst Nightmare – 2017
  • Video Course – Metasploit Unleashed – 2020
  • BSides Tampa Presentation – IOT Insecurities – 2022

PASSION FOR SECURITY
Shane continually shares his industry knowledge through publications and public presentations. Additionally, he is a part-time adjunct professor at the University of South Florida, teaching classes such as Ethical Hacking and Digital Forensics.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars July 27 2022

Adding Value to a Traditional Penetration Test

Join leaders from TrustedSec’s Advisory, Remediation, and Incident Response teams as they discuss where many programs go wrong, the consequences, and how to…

Read about this article
Blog July 25 2023

Prefetch: The Little Snitch That Tells on You

Incident Response and forensic analysts use the contents of prefetch files in investigations to gather information, such as the source from which an executable…

Read about this article
Blog February 07 2023

ESXiArgs: What you need to know and how to protect your data

Threat Overview Around February 03, 2023, a ransomware campaign called “ESXiArgs” emerged that targeted Internet-facing VMware ESXi servers running versions…

Read about this article
Blog October 11 2022

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene—Part 2

In the first Back to Basics blog we discussed cyber hygiene and some fundamental security practices one can take to quickly assess their current cybersecurity…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars August 07 2024

Ask Me Anything: Proactive Threat Hunting

As threat actors become more sophisticated, organizations' approaches to finding malicious activity must become more proactive and refined. Dive into the…

Read about this article
Training Resources August 03 2024

Black Hat USA Training - Applied Threat Hunting and Detection Engineering

Registration is now open for our Black Hat training on August 3-6, 2024

Read about this article
Blog August 01 2024

Lapse of Control: Applauding PCI SSC for FAQ 1572

I want to applaud the PCI Security Standards Council (PCI SSC) for FAQ 1572 published in March of 2024 for simply and effectively answering a question asked by…

Read about this article
Events TrustedSec HQ | July 30 2024

ISC2 Cleveland Chapter Member Meeting July 2024

ISC2 Cleveland Chapter July MeetupCome join us for our monthly meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Webinars July 29 2024

Specula: A Red Team Chronicle

Microsoft Outlook is often used as the primary email client in corporate environments, making it a high-value target for threat actors. Any potential to…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.