Pre-Breach Recon: Thinking Like an Attacker Before They Strike

Date: October 28, 2025
Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST

Topic: Pre-Breach Recon: Thinking Like an Attacker Before They Strike

Watch Now

Abstract: Before an attack ever hits production systems, adversaries spend days or weeks quietly gathering intelligence. Ethical hackers can use the same reconnaissance methods, from open-source intelligence (OSINT) to infrastructure fingerprinting, to uncover weaknesses early. This session will show how to adopt the attacker’s mindset, map out your own digital footprint, and turn reconnaissance insights into prioritized defense actions.

Key Takeaways: 

  • Understand attacker reconnaissance methods
  • Mapping the corporate attack surface
  • Move from reconnaissance to defense
  • Integrate learnings into IR playbooks

Speaker:

Don Warden II, Director, Incident Response, Cybolt

Bio:  Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and Certified Cyber Security Analyst (CCSA), along with a Master’s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.

Share this post

Recent Posts

INQUIRE NOW

Related Posts

Are you looking to pursue a career in cybersecurity?

Unlock Your Cyber Security Potential at EC-Council University