Valentina Costa Gazcón Email and Phone Number
I am the CEO & Founder of V·ONE Labs. As someone who has spent years in the cybersecurity industry, I am acutely aware of the constant and evolving risks faced by businesses of all sizes. That's why I wrote "Practical Threat Intelligence and Data-Driven Threat Hunting," a book that provides cybersecurity professionals with unique insights into identifying and neutralizing threats in a data-driven manner.Find my book at: https://www.amazon.com/Practical-Threat-Hunting/dp/1838556370
Ekoparty Hackademy
View- Website:
- ekoparty.org
- Employees:
- 43
-
Blue Team Operator TeacherEkoparty HackademyBuenos Aires Province, Argentina -
FounderV 2023 - PresentSafety Harbor, Florida, Us -
OrganizerBluespacesec Mar 2020 - Present* Plan, organize, and execute the BlueSpace conference within the Ekoparty* Research and identify relevant industry trends and topics to create engaging agendas and speaker lineups* Coordinate with internal and external stakeholders, including sponsors, vendors, and attendees, to ensure seamless event execution* Manage event budgets, timelines, and logistics* Oversee marketing and promotional activities to drive attendance and engagement* Monitor and evaluate event feedback and analytics to inform future event planning and strategy -
Director Of Threat IntelligenceVersprite Cybersecurity Sep 2022 - Jan 2023Atlanta, Ga, Us* Implemented reporting standards* Implemented communication standards* Elaborated team structure and strategy* Implemented task tracking structure and dashboards using ClickUp* Established and designed PagerDuty on-call schedule* Established reporting cadence and presentation standards in client-facing engagements* Designed threat hunting lab and program* Provided direction to the engineering team in the development of features and playbooks within SOAR Platform* Evaluated the team, setting performance goals and making decisions on promotions and terminations based on their achievements* Manage client communications -
Threat Operations ManagerMarqeta, Inc Jan 2021 - Aug 2022Oakland, California, Us* Designed purple team structure and workflows.* Designed threat hunting team' structure and workflows.* Designed threat intelligence team' structure and workflows.* Designed risk management procedures within the scope of vulnerability management.* Designed vulnerability management program.* Elaborated on-call framework.* Interviewed, demoed and negotiated with security vendors.* Trained reports in threat intelligence concepts.* Trained reports in threat profiling.* Elaborated threat intellingence analysis for upper management around the cybersecurity landscape and other related topics.* Elaborated threat intelligence briefings for the security team.* Set up a threat intelligence platform & configured threat intellingence feeds. -
Senior Cyber Threat Intelligence Analyst At Threat Library TeamDeloitte Argentina Jul 2019 - Aug 2020Worldwide, OoManagement of honeypot platformDevelopment and maintenance of Threat Library portalQuality Assurance process in Threat Library platformTraining new team members -
Cyber Threat Intelligence Analyst At Threat Library TeamDeloitte Argentina May 2018 - Jul 2019Worldwide, OoCyber Threat IntelligenceTracking APTs worldwide using ATTACK Framework to analyze their Tools, Tactics and TechniquesDesign and Implementation of Quality Assurance ProcessIndicators of Compromise HuntingDesign and Development of Honeypot PlatformPython programmingPlatforms: Atlassian Jira & ConfluenceOther technologies used: PostgreSql, MongoDB, Docker, ELK, FLASK, HTML, CSS -
DeepintelPublic Speaker Nov 2019 - Nov 2019The DNS BunchA closer look to the techniques used by the threat actors that use DNS Attacks. Reviewing overlaps among them and the different techniques used by state sponsored threat actors vs criminal threat actors. Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
-
DeepsecPublic Speaker Nov 2019 - Nov 2019Once Upon a Time in the West - A Story on DNS AttacksJust like in movies about the Old West, we are going through a land riddled with well-known gunmen –OceanLotus, DNSpionage, and OilRig, among others – who roam at ease while the security cowboys sleep. This presentation will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques discovered to improve detection and dodge the bullets the bad guys are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
-
Mitre Att&CkconPublic Speaker Oct 2019 - Oct 2019Raiders of the Mitre Framework: How to Build Your Own Threat LibraryIt's the year 2019 and the internet has been around long enough to be filled with what seems to be "ancient" data. Digging through, classifying and analyzing everything sometimes makes you feel a lot like Indiana Jones searching for the right clues in a moving puzzle. But how could you move through the caves without getting buried under piles of data rubble? How might anyone revisit and study the data from the past to transform it into actionable information for the present? In this talk we are going to show you how a threat intel Indiana Jones analyst should tackle these issues in order to find the treasure of the Threat Library. We will show you how we used the MITRE ATT&CK Framework as our book of secrets for turning dusty old Internet artifacts into a library of actionable Threat Intelligence.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
-
NerdearlaPublic Speaker Oct 2019 - Oct 2019Cyber Kung Fu – Una mirada a la ciberseguridad como método de defensa personal“No vuelvas tarde”, “No andes sola por ahí de noche”, “Tené cuidado, pedí que alguien te acompañe”. Son todas las cosas que me decía-y todavía me dice-mi mamá y que sigo escuchando en mi cabeza cada vez que salgo. Desde chiquitas nos inculcan a tomar precauciones, a cuidarnos. Pero nadie nos dijo nunca “Usa una buena contraseña” o “No abras cualquier link” y sin embargo, casi todos tenemos un smartphone.La brecha entre la seguridad digital y la física parece enorme, las consecuencias lo parecen también. Sin embargo, la vida en la era digital no está exenta de peligros.Con esta charla queremos mostrar la importancia de conocer las repercusiones de nuestra huella digital y qué es lo que podemos hacer para protegernos con el objetivo último de demostrar que no es necesario convertirse en un experto en ciberseguridad para aprender defenderse.
-
Ekoparty Security ConferenceInstructor Sep 2019 - Sep 2019Alice in Malwareland: Falling into the Threat Intelligence Rabbit Hole It all started when Alice, a cybersecurity analyst, was sitting in her office reading a boring manual about the ISO 27001. Suddenly, Bad Rabbit appears in her monitoring system, dressed in like a ransomware and running for self-distribution through the company’s internal network watching its crypto wallet grow. Alice immediately had a keen interest in him and followed him to his burrow.The burrow turned out to be a deeper tunnel than what she thought filled with seemingly meaningless logs, through which Alice fell while trying to remember the intelligence cycle and the analysis techniques she learned along the way, not knowing if one day she will reach the bottom. Finally, Alice arrives in an environment full of false tracks. The rabbit does is nowhere to be found and she only sees a file that says "ENABLE MACROS". Without thinking twice, she agrees to activate its execution and, in front of her eyes, the files get encrypted at full speed. Alice will have to perform an analysis of the access door that Bad Rabbit used in order to reach him, discover his motivations and have him bring her before the kings of the deck to recover her files.Like the Alice in our history, in this course we will immerse ourselves in the day-to-day life of an intelligence analyst, analyzing examples of real attacks with the help of the recognized MITRE ATT&CK framework and other open source tools that you can use to conduct your own analysis. Once the training is finished, the participants will have learned to differentiate different types of threats, the different phases of an attack in a targeted campaign, how to collect indicators of compromise, and how to carry out an analysis of the information collected. All these tools will provide them with the necessary bases to implement defense strategies based on the previous analysis of the threats that organizations face.Ruth Esmeralda Barbacil and Valentina Palacin
-
Sans Threat Hunting SummitPublic Speaker Jul 2019 - Jul 2019Once Upon a Time in the West - A Story on DNS AttacksJust like in movies about the Old West, we are going through a land riddled with well-known gunmen –OceanLotus, DNSpionage, and OilRig, among others – who roam at ease while the security cowboys sleep. This presentation will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques discovered to improve detection and dodge the bullets the bad guys are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
-
Typhoon 2019Public Speaker Jun 2019 - Jun 2019Once Upon a Time in the West – A story on DNS Attacks Just like in Old West movies, we are going through a land riddle with well-known gunmen: OceanLotus, DNSpionage and OilRig, who roam at ease, while the security cowboys sleep. This presentation will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and their behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest discovered techniques in order to improve detections to dodge the bullets they are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
-
Owasp Global Appsec Tel AvivPublic Speaker May 2019 - May 2019Once Upon a Time in the West - A Story on DNS Attacks Just like in Old West movies, we will go through a mysterious land with the well-known gunmen OceanLotus, DNSpionage, and OilRig, who roam at ease while security cowboys sleep. This talk will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and their behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques in order to improve detection and dodge the bullets they are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
-
Phdays 9Public Speaker May 2019 - May 2019Just like in Old West movies, we will go through a mysterious land with the well-known gunmen OceanLotus, DNSpionage, and OilRig, who roam at ease while security cowboys sleep. This talk will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and their behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques in order to improve detection and dodge the bullets they are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
-
Jr Back-End Developer And DbaCardinal Worldwide Services May 2017 - May 2018Comuna 4, Ciudad Autónoma De Buenos Aires, ArSoftware development using Visual Basic and SQLDatabase maintenance HelpDesk -
Web DeveloperLenovo May 2016 - Jan 2017Morrisville, Nc, UsLenovo’s E-commerce platform maintenance and development. -
Translator And Proofreader (Freelancer)Spg - Spanish Publishing Group Jun 2011 - Apr 2016Translation and Proofreading of English text books from English to Spanish and vice versa for School Publishing Group and other publishers.
-
Campaign ManagerAdgourmet Sep 2014 - Dec 2015Google Adwords and Facebook campaigns planning and deploymentWeb Development focusing in SEO and UIMonthly evaluations reports for clients
Valentina Costa Gazcón Education Details
-
Málaga UniversityTranslation -
National Technological UniversityInformation Security -
Cema UniversityComputer Engineering -
Escuela Da VinciWeb Development -
Instituto Mc. Donough De Interpretación SimultáneaTranslation
Frequently Asked Questions about Valentina Costa Gazcón
What company does Valentina Costa Gazcón work for?
Valentina Costa Gazcón works for Ekoparty Hackademy
What is Valentina Costa Gazcón's role at the current company?
Valentina Costa Gazcón's current role is Blue Team Operator Teacher.
What schools did Valentina Costa Gazcón attend?
Valentina Costa Gazcón attended Málaga University, National Technological University, Cema University, Escuela Da Vinci, Instituto Mc. Donough De Interpretación Simultánea.
Who are Valentina Costa Gazcón's colleagues?
Valentina Costa Gazcón's colleagues are Juliana Hormachea, Nahuel Acevedo, Nadia Pouchán, Mora Miranda, Ornella Paturzo Vanni, Aldana Torres, Jorge Manquian.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial