Skip to Main Content

Shane Hartman

Principal Security Consultant

EXPERIENCE
Shane has been working in computer technology and information security for over 20 years. Some of his recent work includes performing specialized incident analysis on the latest cybercrime activities, producing actionable threat intelligence.

EDUCATION & CERTIFICATIONS

  • BA, Business and E-Commerce, University of Phoenix
  • MS, Digital Forensics, University of Central Florida
  • Certified Information Security Professional (CISSP)

PROFESSIONAL AFFILIATIONS

  • Tampa Bay Chapter of (ISC)²

INDUSTRY CONTRIBUTIONS

  • Author, Android Malware and Analysis – 2014
  • BSides Tampa Presentation – Android Malware and Analysis – 2015
  • BSides Tampa Presentation – NFC Your Smart Phone’s Best Friend or Worst Nightmare – 2017
  • Video Course – Metasploit Unleashed – 2020
  • BSides Tampa Presentation – IOT Insecurities – 2022

PASSION FOR SECURITY
Shane continually shares his industry knowledge through publications and public presentations. Additionally, he is a part-time adjunct professor at the University of South Florida, teaching classes such as Ethical Hacking and Digital Forensics.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars July 27 2022

Adding Value to a Traditional Penetration Test

Join leaders from TrustedSec’s Advisory, Remediation, and Incident Response teams as they discuss where many programs go wrong, the consequences, and how to…

Read about this article
Blog July 25 2023

Prefetch: The Little Snitch That Tells on You

Incident Response and forensic analysts use the contents of prefetch files in investigations to gather information, such as the source from which an executable…

Read about this article
Blog February 07 2023

ESXiArgs: What you need to know and how to protect your data

Threat Overview Around February 03, 2023, a ransomware campaign called “ESXiArgs” emerged that targeted Internet-facing VMware ESXi servers running versions…

Read about this article
Blog October 11 2022

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene—Part 2

In the first Back to Basics blog we discussed cyber hygiene and some fundamental security practices one can take to quickly assess their current cybersecurity…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Join Senior Security Consultant Steven Erwin and Security Consultant Caroline Fenstermacher as they cover the basics of BEC analysis, providing participants…

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Like most red teamers, I spend quite a lot of time looking for novel vulnerabilities that could be used for initial access or lateral movement. Recently, my…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article
Events TrustedSec HQ | November 20 2024

WiCyS Ransomware Panel & Networking Event

Join us for an insightful discussion with the Women in Cyber Security (WiCyS) Northeast Ohio Affiliate members!

Read about this article
Webinars November 20 2024

Navigating Compliance: FCI and CUI Requirements for Federal Contractors

TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.