Tyler Hudak

Practice Lead, Incident Response

Experience

Tyler has over 20 years of real-world experience in incident handling, malware analysis, computer forensics, and information security for multiple organizations. He has spoken and taught at a number of security conferences about topics ranging from incident response to penetration testing techniques.

Education & Certifications

BS Computer Science, University of Akron, GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE)

Industry Contributions

MASTIFF Static Analysis Framework

Passion for Security

Tyler’s passion for incident response stems from his love of solving puzzles. He uses this ambition to get to the bottom of issues at hand; whether it’s forensic analysis of a disk, reverse engineering or malware, or the latest CTF contest, Tyler is driven to uncover every detail.

Recent Blog Posts

Incident Response Ransomware Series – Part 3

So far in this series, we have looked at what ransomware is, what it does after it has compromised a system, and what organizations can do to detect and prevent ransomware. (Catch up with Part 1 & Part 2 before continuing!) However, that is only half the story. Organizations need to assume that they will...
Read

Cracking the DerbyCon Code

To commemorate the final DerbyCon, TrustedSec did something a little special on our challenge coin. Along the outer edge of the coin was a code, and anyone who could figure it out by DerbyCon’s final day at noon got a prize. I was lucky enough to design the code and was asked by many people...
Read
Adventures of an RDP Honeypot: Part 2 graphic

Adventures of an RDP Honeypot – Part Three: Creation of an RDP Honeypot

Welcome to the third and final part of the blog series on the RDP honeypot that I set up. The first part took a look at RDP and how it can be better secured, while the second post analyzed what the attackers did once they got into the honeypot. In this post I’ll talk about...
Read
View all posts from Tyler

Recent Webinars

Simulating a Cyber Attack – Table-Top Best Practices

Recorded March 27, 2019 at 1 P.M. EST Practice? We’re talking about practice?! Cyber attacks are an organizational concern. In order to build an effective security program, it’s impossible to rely on “best practice” policies without testing and vetting them...
View all webinars from Tyler
Tyler Hudak

Want to work with Tyler Hudak or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us