Keatron Evans

Keatron Evans is a cybersecurity and workforce development expert with over 17 years of experience in penetration testing, incident response and information security management for federal agencies and Fortune 500 organizations. He is Principal Cybersecurity Advisor at Infosec, where he empowers the human side of cybersecurity with cyber knowledge and skills to outsmart cybercrime. Keatron is an established researcher, instructor and speaker — and lead author of the best-selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish. He regularly speaks at major industry events like RSA and serves as a cybersecurity subject matter expert for major media outlets like CNN, Fox News, Information Security Magazine and more.

Keatron holds a Bachelor of Science in Business Information Systems and dozens of cybersecurity certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP) and Licensed Penetration Tester (LTP). When not teaching, speaking or managing his incident response business, KM Cyber Security LLC, Keatron enjoys practicing various martial arts styles, playing piano and bass guitar, and spending time with his family.

Keatron Evans

AI best practices: How to securely use tools like ChatGPT

Artificial intelligence (AI) tools like ChatGPT can help with your job tasks, but they can also pose a security risk if not used correctly. Learn how to use these tools safely.

4 mistakes every higher ed IT leader should avoid when building a cybersecurity awareness program

Education was the most hacked sector last year. Learn how to build an effective higher ed security awareness program — and what mistakes to avoid.

Twitter’s cybersecurity whistleblower: What it means for the community

The recent whistleblower complaint against Twitter highlights the disconnect between cybersecurity experts and executives in organizations.

4 key takeaways from the 2022 Verizon DBIR report

Here's what cybersecurity professionals need to know about the latest version of the Verizon Data Breach Investigations Report (DBIR).

The ransomware paper (part 3): New trends and future concerns

The ransomware economy may shift towards consumer attacks as those attacks become more profitable, explains Infosec's Keatron Evans.

The ransomware paper (part 2): Real-life scenarios and lessons learned

The current IT and cybersecurity culture is part of the underlying problems with ransomware. Keatron Evans explains using case studies from the trenches.

The ransomware paper (part 1): What is ransomware?

Ransomware is everywhere, but it’s not always understood. Keatron Evans breaks down the ransomware fact and fiction based on insights from the trenches.

An Introduction to Linux Commands in Kali

  Transcription[pkadzone zone="main_top"] We are going to be looking at some of the basics of Linux.. This is really just to get you started - to get yo

The Evolution of a Technical Information Security Professional

During my years of work as a consultant and trainer in the information security world, I've noticed a few patterns that usually exist in those who do very we

Flesh Tone Analysis – Intermediate Computer Forensics

This analysis comes in handy in computer forensics cases such as porn or child pornography investigations. This video shows how to search through hundreds of

SQL Injection – Another hacking how-to

We wanted to get up a brief demo of the ubiquitous SQL Injection. We use it here to get control of the OS. We'll have a lot more angles on SQL Injection - as

An introduction to Bash Scripting for automating some nmap recon

This is a brief intro to automating recon through bash scripting. This example uses nmap scans that we're automating.  We teach this and much more in our pen