Skip to Main Content

Travis Kaun

Senior Security Consultant

EXPERIENCE
Travis Kaun began his Information Security career-building by managing firewalls and intrusion detection systems with a managed security services provider. After time spent on the defensive side in the corporate world, Travis put on an offensive cap for a consulting role and hasn’t looked back.

Travis is a proud member of the Targeted Operations team, focusing on gaining a foothold and expanding to a large compromise while hunting for the ‘crown jewels’ and other client objectives.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer Information Systems, Herzing College
  • Offensive Security Certified Professional (OSCP)
  • Certified Red Team Operator (CRTO)
  • Certified Information Systems Security Professional (CISSP)

PASSION FOR SECURITY
Travis has contributed to open source projects and has spoken at various security conferences. Additionally, Travis co-hosts a regional InfoSec group, MadSec.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog October 20 2022

The Curious Case of the Password Database

Nowadays, password managers are king. We use password managers to secure our most sensitive credentials to a myriad of services and sites; a compromise of the…

Read about this article
Blog May 24 2022

Pwnton Pack: An Unlicensed 802.11 Particle Accelerator

This past Christmas, I received a terrific gift from my in-laws: a replica Ghostbusters Proton Pack. I was thrilled. You see, growing up in the mid 80s,…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars October 30 2024

Ask Me Anything: Advanced Cloud Pen Testing Scenarios

Cloud Penetration Tests are a critical component of cloud security, but integrating other testing methods can take the assessment to the next level. Adding…

Read about this article
Podcasts October 18 2024

Security Noise - Episode 7.4

Who's On My Network?

Read about this article
Blog October 17 2024

Spec-tac-ula Deserialization: Deploying Specula with .NET

Earlier this year, I gave a talk at Steelcon on .NET deserialization and how it can be used for Red Team ops. That talk focused on the theory of .NET…

Read about this article
Webinars October 16 2024

Calculating Business Impact

In today’s digital landscape, gaining a deep understanding of how cybersecurity threats can affect business-critical systems is crucial for maintaining…

Read about this article
Blog October 15 2024

Let’s Clone a Cloner - Part 2: You Have No Power Here

Previously on Let's Clone a Cloner, I needed a long-range RFID badge cloner. There are many walkthroughs out there on how to build a cloner that are fantastic,…

Read about this article
Events Deadwood, SD | October 09 2024

Wild West Hackin' Fest 2024

TrustedSec is happy to return as a sponsor for Wild West Hackin' Fest in 2024! Visit us at our booth at the Deadwood Mountain Grand. Principal Security…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.