Strata Information Group (SIG) Webinar: How I Hacked into a University (With Permission, Of Course)

Date: August 27, 2024
Time: 11:00 am - 12:00 pm
Location: Virtual

In today’s digital world, universities hold a wealth of sensitive data, making them prime targets for cyberattacks. These attacks can steal student information, disrupt research, and cripple critical infrastructure. Penetration testing, or pen testing, offers a proactive solution. By simulating real-world attacks, pen testing identifies weaknesses before hackers exploit them.

Join the Strata Information Group for a one-hour webinar led by Matt Miller, a seasoned penetration tester. He’ll unveil real-world, anonymized examples of how he gained access to university systems, escalated his privileges within their networks, and detail tactics commonly used in ransomware attacks and more.

Learn how to proactively safeguard your university’s data and cultivate a cybersecurity-conscious environment. Register today!


Matt Miller

Director of Penetration Testing, Strata Information Group

Matthew Miller’s career in information security began in the US Air Force as a Cyberspace Control Officer. He deployed to Europe and led teams in setting up secure networks for special operations missions. Back in the US, he honed his skills by evaluating the cybersecurity of critical defense systems during operational testing.

After leaving the Air Force, Matthew transitioned his skills to the private sector, performing penetration testing and audits for a wide range of clients. He gained extensive experience across various industries, from small hospitals to Fortune 500 companies. Some notable tests include an internal penetration test which led to full access to the SCADA systems of an offshore oil rig, an external penetration test of an international drug development company that led to the takeover of their presence in China, and a social engineering engagement of a major health insurance company which led to 55 out of 60 targets compromising their password and clicking a link which gave the attack team full control of the victim’s computer.