“I was restricted from using a computer until the age of 18.”

christina kubecka defcamp interview

There was no money for a babysitter, so I joined her [my mom] at work.

Watching her mother advance from a data operator to a robotics assembly manufacturing programmer to becoming an expert, speaker, and trainer gave Christina Kubecka a chance to be incredibly close to tech from an early age.

That’s how she learned basic computer skills by the age of 6.

I was addicted completely to technology at that point.

>>> See Chris @ DefCamp <<<

At age 10, she discovered a couple of weak systems, which turned out to belong to the US Department of Justice.

I was restricted from using a computer until the age of 18.

After graduation, the lack of funds for college turned Chris to the military, where she flew in combat and humanitarian missions.

I set up the first file server system for our flying squadron, installed antivirus and so forth.

And that’s not even the half of it, if you can believe it!

From there on, Christina also:

  • had a role in USAF Space Command
  • was a disaster recovery consultant
  • interned as a vascular surgery technician
  • became a senior network operations analyst for clients such as Lloyds TSB and Danone
  • detected and helped stop a second wave of cyberwar attacks against South Korea in July 2009.

In 2012, Chris pulled off one of the greatest cybersecurity operations of all time!

She came in and helped Saudi Aramco secure their network of over 35,000 endpoints that was taken offline by the “Shamoon logic bomb”, the most devastating cyberattack to EVER hit a company.

What is Saudi Aramco?

We’re glad you asked.

Saudi Aramco produces 25% of the global oil so when the attack forced them to go offline, it created a huge risk for a worldwide crisis in oil prices and the ability to keep the lights on for people around the world! Chris’ work averted a global crisis.

By now you already know that Christina is beyond impressive. She’s brilliant and approachable, insanely skilled and so fun to be around!

That’s why we are SO excited to have her at DefCamp this year!

>>> Get your DefCamp ticket <<<

Christina’s talk at DefCamp this year will be nothing short of fascinating!

James Bond has *nothing* on her. Here’s a snippet:

Ever wonder what incident management is like when an embassy gets hacked by ISIS?

Come on a journey that includes international threat actors, a state sponsored intelligence agency, and a foreign sovereign embassy.

This journey includes a walk through a series of cyber challenges that includes:

  • surprisingly weak security
  • insider threats
  • a $50 million extortion attempt
  • diplomatic immunity
  • city-wide security lock down
  • all while >400 dignitary’s lives dangle in the negotiation crossfire.

Can’t wait for November 7-8 to come? Join us!

PS: Want to find out more about Christina?

Listen to the Darknet Diaries podcast ep. 30 which is all about the Saudi Aramco operation, watch her talk from Black Hat 2015 on the topic, or read this read this interview about her life and experiences so far.

This year, we’re taking DefCamp to the next level with the help of our main, long-time partner, Orange. With support from IXIA – a Keysight Business, Secureworks, UiPath, Bit Sentinel, Thales, and other selected tech companies that value the power of community, we’re building valuable, hands-on learning experiences for 2000+ attendees from all over the world! Join us to educate, secure, and change the world! Meet our DefCamp 10 partners 2019

    Related articles​

    Securing the cloud: insights on threats, ..

    BY Adina Harabagiu
    There is no mystery that everything nowadays has a digital component. A growing number of companies are ..

    Striking a balance between security updates, ..

    BY Adina Harabagiu
    The world of cybersecurity is fast paced, there’s no denying it. Innovation is constant and threats are ..

    Pentesting: a tool for empowering – not ..

    BY Adina Harabagiu
    You’ve likely caught wind of this rising tide – offensive security, pentesting, and #RedTeams are not ..