Jason Lang
Practice Lead, Targeted Operations
Experience
With over 10 years of industry experience, Jason Lang has worked in both offensive and defensive roles. Before switching to red teaming, he spent 8 years working as a technical Security Architect for a Fortune 500, specializing in Active Directory and .Net/database development.
Education & Certifications
Offensive Security Certified Professional (OSCP), CISSP
Professional Affiliations
Jason is a regular speaker at information security conferences such as DerbyCon and CypherCon, and has released multiple offensive and defensive open source tools.
Passion for Security
While Jason truly enjoys contributing to the infosec community through both public speaking and the development of new tools, his passion manifests itself in helping clients make changes to their systems (and people) in ways that truly improve their security posture. Oh, and shells, he loves getting shellz too. =)
Recent Blog Posts
One of the more common questions we receive during a red team scoping call or RFP Q&A call is, how many dedicated consultants will be involved in the assessment? There is no “correct” answer to this question, and ultimately, the answer as to how red team engagements are staffed comes down to how the consultancy...
Read
For many of us, working from home is here to stay, but it does come with its own challenges. This article contains some of the best tips and tricks from TrustedSec consultants on how to stay focused at home. Set an alarm to start and stop working Alarms can be set in shorter intervals, to...
Read
In
Application Security Assessment,
Leadership,
Mobile Security Assessment,
Penetration Testing,
Security Program Assessment,
Security Program Management,
Security Remediation,
Security Testing & Analysis,
Social Engineering,
Table-Top Exercises,
Vulnerability Assessment
Original post: https://www.trustedsec.com/blog/the-defensive-security-strategy-what-strategy/ Massive exposures and attacks, such as recent SolarWinds and Exchange exploit issues, have been common news lately. While the security landscape has advanced and changed, these massive exposures are continuing to occur. The question is why, and how, are they occurring? While common issues are often leveraged, the mentality around them is...
Read
Recent Webinars
Join this webinar for an exclusive peek from TrustedSec’s Targeted Operations Practice Lead Jason Lang into how attackers are exploiting social dynamics to target core business functions and how Arm ditched Secure Email Gateways to architect an email security solution...
Recorded on October 21st, 2020 Understanding the real-world effectiveness of your security controls is a crucial element in constructing a robust security posture. Red Team engagements (or “Adversarial Attack Simulations” as they’re known at TrustedSec) are extended, goal-oriented engagements using...