Breaking the Chain: How to Disrupt Cybercrime’s Use of Stolen Data
Attendees will learn:
- How infostealers and credential theft have become foundational to modern attack chains
- The role of underground marketplaces in accelerating ransomware and fraud
- Practical strategies for identifying, prioritizing, and acting on emerging threat signals
Reserve Your Spot for Our Upcoming Webcast

Event Speakers

Ian Gray is a VP of Intelligence at Flashpoint, where he focuses on cybercrime intelligence. Ian actively researches cybercriminal fraud venues and misuse of new and emerging technologies. He holds a Master’s degree from Columbia University’s School of International and Public Affairs, where he studied cyber policy. Ian is also an adjunct professor at Fordham University’s Cybersecurity Program, where he teaches a course on technology and policy.

Paul Asadoorian is currently the Principal Security Researcher for Eclypsium, focused on firmware and supply chain security awareness. Paul’s passion for firmware security extends back many years to the WRT54G hacking days and reverse engineering firmware on IoT devices for fun. Paul and his long-time podcast co-host Larry Pesce co-authored the book “WRTG54G Ultimate Hacking” in 2007, which fueled the firmware hacking fire even more. Paul has worked in technology and information security for over 20 years, holding various security and engineering roles in a lottery company, university, ISP, independent penetration tester, and security product companies such as Tenable. In 2005 Paul founded Security Weekly, a weekly podcast dedicated to hacking and information security. In 2020 Security Weekly was acquired by the Cyberrisk Alliance. Paul is still the host of one of the longest-running security podcasts, Paul’s Security Weekly, he enjoys coding in Python & telling everyone he uses Linux.