Surf channels most times of the day and you’ll see someone in scrubs, possibly in an operating room. Most TV stations have at least one show where there’s a doctor doing doctor-like things, and we find that intriguing and interesting. These are shows dealing with severe matters of life and death, showing people (just like […]
About Jayson E. Street
Jayson E. Street is the InfoSec Ranger at Pwnie Express ... He is also a Senior Partner at Krypton Security and CEO of Stratagem 1 Solutions.
Jayson battled a dragon during the Fire Run in Barcelona Spain. He 'accidentally' broke into a shark tank in the Dominican Republic and climbed the pyramid of Giza (until the guards carrying AK-47s expressed their displeasure). He consulted with the Secret Service in 2007 on the WIFI security of the White House, and has had tea with a Lebanese General in Beirut.
Jayson never finished High School but does have his GED. His first book is used as course material at four colleges in three countries (that he knows of), and he has spoken at numerous universities in the US and gave an eight hour lecture at the Beijing Institute of Technology in 2014. Outside of standardized education, Jayson has spoken five times at DEF CON, at every DerbyCon since its inception, and at many other Cons around the world.
Jayson is only one degree away from Kevin Bacon after awkward hugging Oliver Stone and Jimmy Fallon. He started in security and law enforcement over 25 years ago and has always striven to make things more secure. Jayson has been in the Information Security industry for over 15 years, and once broke into a high scale hotel in the South of France - barefoot - wearing Teenage Mutant Ninja Turtles pajamas. He was also noted as the best janitor of all McDonald's in the South East Texas region for 2 consecutive years.
Although Jayson has been hit by three cars while on foot, he has only been shot at once (they missed). He was Time Magazine's person of the year for 2006 and lived behind a dumpster for a summer when he was sixteen. Within two weeks, he was able to awkward hug the head of the N.S.A. in Vegas and two Chinese soldiers on the Great Wall of China. Jayson has had pizza on the Nile River in Egypt, within view of the Eiffel Tower in France, near the Forbidden City in Beijing and on the coast in Brazil.
Jayson has conducted successful social engineering engagements around the world from Jordan to Jamaica. He survived cancer, extreme falls, car accidents, two house fires and Twitter drama. He prides himself in spending most of his time working for a national financial institution as their resident hacker and the designer of their network defenses.
Jayson swam with dolphins in Singapore and a sea turtle in the Maldives. He has been sword fighting since the age of seven and has an extensive collection of swords from all over the world. He was asked to give his DEFCON 19 speech at an undisclosed government agency's headquarters (After smuggling in all the items that make the arsenal of his Vest of D00M, Jayson was then asked never to return). Jayson was quoted in The Rolling Stone Magazine, The Economist, Forbes and The Daily Oklahoman. He�s been interviewed on numerous television shows regarding security related topics. He also filmed a pilot for a TV show featuring hackers in a positive light (it never aired). He has held, or is currently holding, many industry certs such as CISSP, GSEC, GCIH, GCFA, IAM, IEM, Security+, CEH, etc�
Also please note none of these above statements are false!
Entries by Jayson E. Street
Curious about the Pwn Pad 4? So was Jayson! Check out a clip from his trip:
We talk a lot about IT, but we don’t talk nearly enough about making IT real. In particular, I’ve found that there’s a disconnect between IT – security guys in particular – and the people they’re securing. While this applies across the board, it becomes a problem when policies are being created. One of the […]
There have been a lot of stories in the news about transportation hacks, from planes to automobiles (and I’m waiting on the train). Security threats in transportation have become both more frequent, more threatening, and – as increasingly more of our transportation becomes “hackable” – more important. Recently, very high-risk vulnerabilities were discovered in these […]
(Continued from Part I: The Present) SK: OK, so now we’ve done a lot of talking about the great improvements in some of the cons, and what you’ve seen a lot of improvement in this year. What do you think didn’t work this year? What is concerning to you? I think this year one […]
(An Interview with Jayson E. Street – find Part II HERE) SK: I’d like to start off by having you talk a bit about your experience with conferences in general – what are some general thoughts? I have gone to conferences all over the world to speak (with no shame); I have spoken to […]
Even our terminology reflects what we think about security. Case in point; the very name of what we call the first line of perimeter defense – a firewall – shows our antiquated thinking regarding the defensive postures of the network. Somehow, we are still in the realm of thinking about moats and castle walls while […]
Regarding the new book, second in the Dissecting the Hack series, “Dissecting the Hack: The V3rb0t3n Network.” I have never run into any projects that started out in Beta, which you immediately realized were so flawless that they could go straight to production. After rushing out this book to make sure that it made it […]