Skip to Main Content

Tyler Hudak

Practice Lead, Incident Response

EXPERIENCE
Tyler has over 20 years of real-world experience in incident response, malware analysis, computer forensics, and information security for multiple organizations. He has spoken and taught at a number of security conferences about topics ranging from incident response to penetration testing techniques.

EDUCATION & CERTIFICATIONS

  • BS Computer Science, University of Akron
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Forensic Examiner (GCFE)

INDUSTRY CONTRIBUTIONS
MASTIFF Static Analysis Framework

PASSION FOR SECURITY
Tyler’s passion for incident response stems from his love of solving puzzles. He uses this ambition to get to the bottom of issues at hand; whether it’s forensic analysis of a disk, reverse engineering or malware, or the latest CTF contest, Tyler is driven to uncover every detail.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog June 01 2023

Critical Vulnerability in Progress MOVEit Transfer: Technical Analysis and Recommendations

On May 31, 2023, Progress Software released a security bulletin concerning a critical vulnerability within MOVEit Transfer, a widely used secure file transfer…

Read about this article
Blog February 07 2023

ESXiArgs: What you need to know and how to protect your data

Threat Overview Around February 03, 2023, a ransomware campaign called “ESXiArgs” emerged that targeted Internet-facing VMware ESXi servers running versions…

Read about this article
Blog December 29 2022

To OOB, or Not to OOB?: Why Out-of-Band Communications are Essential for Incident Response

tl;dr Out-of-band (OOB) communications are alternative systems or technologies that allow responders to collaborate, coordinate, and inform during an incident.…

Read about this article
Blog March 23 2022

TrustedSec Okta Breach Recommendations

TrustedSec's Incident Response Team sent urgent communications to all IR retainer clients after the discovery of the compromise of Okta. Below are the…

Read about this article
Blog March 09 2022

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene

Every day, new challenges, attacks, and vulnerabilities are publicized. Just as attackers and the threat landscape are constantly changing, adapting, and…

Read about this article
Webinars December 14 2021

Log4j: Live Update Webcast

During the webcast, we will be joined by David Kennedy, TrustedSec CEO & Binary Defense CTO, Randy Pargman, Binary Defense Vice President of Threat Hunting &…

Read about this article
Blog December 13 2021

Log4j Detection and Response Playbook

On December 09, 2021, a severe vulnerability for Apache Log4j was released (CVE-2021-44228). This vulnerability, also known as Log4Shell, allows remote code…

Read about this article
Webinars September 30 2021

Incident Response in the Cloud: Combating Business Email Compromise Threats

Learn from Incident Response Practice Lead Tyler Hudak as he discusses the latest issues and walks through Incident Response in the cloud.

Read about this article
Blog March 10 2021

New Service Launched in Response to Hafnium Attacks

Over the last several days, many organizations have been affected by the Microsoft Exchange Hafnium attacks. As a result, TrustedSec's Incident Response team…

Read about this article
Blog July 01 2020

Are You Looking for Ants or Termites?

Over the last several months, I’ve noticed something when discussing Incident Response (IR) with clients. There is often confusion between the expectation and…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.