Valerie Thomas

Valerie Thomas

Executive Information Security Consultant


Valerie Thomas is a Executive Information Security Consultant for Securicon LLC that specializes in social engineering and physical penetration testing. After obtaining her bachelor’s degree in Electronic Engineering, Valerie led information security assessments for the Defense Information Systems Agency (DISA) before joining private industry. Her unique Defense and civilian background provides her with a solid understanding of intrusion detection, data loss prevention, and endpoint (in)security. Her electronic and RFID training became a crucial element of her physical security specialization. While some choose to focus on cyber of physical security, she has chosen to exploit the weaknesses of the combination of the two. As an ethical hacker and consultant, she holds multiple industry certifications.

Valerie is the coauthor of “Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats” with Bill Gardner. Throughout her career, Valerie has conducted penetration tests, vulnerability assessments, compliance audits, and technical security training for executives, developers, and other security professionals. She has provided briefings and workshops for DEF CON, Derbycon, Blackhat, and multiple BSides events.


Dissecting the Attack: How Hackers Target and Compromise Products and Systems Just Like Yours

Tuesday, July 30th
Nearly every day, the headlines are full of breach announcements of major companies and organizations that leave us with many questions. How do these breaches happen? Why didn’t anyone notice? Why does this keep happening? Could this happen to me? This session will cover how attackers select, plan and attack their targets from start to finish with real-world scenarios and conclude with what you can do to protect your company’s reputation as a manufacturer or systems integrator.

In this session, attendees will learn how to:
  • Acquire a solid understanding of who hackers are and why they hack
  • Observe the steps of real-world attacks
  • Identify what steps were involved in the attacks
Session Slides