I like sharing knowledge. I’ll be doing so in the following public arenas in the coming months:

Thursday Defensive

  • When: February 5, 2026 @ 1:30p ET.
  • Where: www.thursdef.com
  • Talk Title: AD CS and Locksmith 2!
  • Abstract:

    I’m going to talk about the AD CS security landscape and give a quick demo of what I’ve built with Locksmith 2. (More to come.)

Past Events

PowerShell Wednesday

  • When: January 21, 2026 @ 1:30p ET.
  • Where: www.youtube.com/@pdq/streams
  • Talk Title: From One-Liners to (Almost) Full-Fledged Applications
  • Abstract:

    In this talk, I’ll trace the evolution of Locksmith from a few lines of demo code written for my first conference talk in 2022 to a full-fledged open-source tool. We’ll walk through the original proof-of-concept snippets, the messy single-script version that followed, the refactoring into a proper PowerShell module, and how community feature requests and pull requests shaped the project in unexpected ways. I’ll wrap up with a live demo of Locksmith 2 and share practical lessons about code architecture, open-source maintenance, and the reality of evolving a side project into something people actually use.

CodeMash

  • When: January 13-16, 2026. My talk is currently at 2:45p ET on January 15.
  • Where: Kalahari Resort, Sandusky, OH
  • Site: codemash.org
  • Talk Title: PKI Unlocked: A No-Math Primer for Builders
  • Abstract:

    Public Key Infrastructure (PKI) has a reputation for being complicated, but it doesn’t have to be. In this talk, we’ll walk together through core cryptography concepts step by step. We’ll start with symmetric encryption and shared keys, then move into asymmetric encryption, hashing, signing, and certificates. From there, we’ll connect the pieces and show how they come together in an actual PKI. Each concept builds on the last to you a clear, practical understanding of how PKI works and how to spot its components in the wild. No math, no crypto proofs, just the essentials developers need.

Anti-Cast Training

  • When: November 12, 2025
  • Where: Anti-Cast
  • Talk Title: PKI Foundations for Security Pros w/ Jake Hildreth
  • Abstract:

    Do terms like hashing, signing, and certificates feel more confusing than clear?

    Public Key Infrastructure (PKI) has a reputation for being complicated, but it doesn’t have to be.

    Join us for a free one-hour training session with Jake Hildreth, Principal Security Consultant, on PKI Foundations for Security Professionals.

    He’ll teach core cryptography step by step—from symmetric encryption and shared keys to asymmetric encryption, hashing, signing, and certificates—then connect it all in a working PKI.

Queen City Con

  • When: November 7, 2025
  • Where: Hyatt Regency, Downtown Cincinnati, OH
  • Site: queencitycon.org
  • Talk Title: Making $ with COMPUTER$
  • Co-presenter: John Askew
  • Abstract:

    When Active Directory (AD) was initially released, the designers thought it would be a good idea to allow any user to add their computer to a domain. 25 years ago, this sort of made sense: computer accounts were difficult to abuse, and users were the focus of security concerns. But in modern environments, if you can create computer accounts in Active Directory, you can probably take over the domain. In many environments, any authenticated user can do just that.

    In this talk, we’ll walk through a bunch of ways to abuse that capability: Resource-Based Constrained Delegation attacks, AD CS shenanigans, GPO and ACL abuse, SPN-in-the-middle attacks, weird stuff with Domain Computers, and a few other surprises. We’ll dig into how it works, why it’s possible, and what you can do about it. You’ll leave knowing exactly how attackers turn “net computer /add” into Domain Admin. But more importantly, you’ll learn how to properly delegate this dangerous right!

HIP (Hybrid Identity Protection) Conf

  • When: October 7-9, 2025
  • Where: The Charleston Place, Charleston, SC
  • Site: hipconf.com
  • Talk Title: End the ESCape Clause!
  • Abstract:

    Explore a critical yet often overlooked threat: how seemingly low- or medium-severity AD CS misconfigurations, known as ESCs, can combine to compromise an entire Active Directory forest. This session, based on original research and real-world assessments, demonstrates three distinct ESC chains that escalate typical user access to Domain or Enterprise Admin. Learn why defenders often miss these risks when analyzing AD CS configurations in isolation and discover ESCalator, a PowerShell tool that surfaces escalation paths by linking multiple misconfigurations. Gain actionable insights to detect and mitigate these threats before attackers exploit them.

PancakesCon 6

  • When: September 21, 2025
  • Where: pancakescon.com
  • Talk Title: PKI and Powerlifting!
  • Abstract:

    In this talk, I will provide an no-math primer on basic PKI terms. We’ll start with simple concepts like symmetric encryption and shared keys all the way up to asymmetric encryption, hashing, signing, certificates, until we end up with discussion about Public Key Infrastructure. Much like each PKI term builds on the previous terms, I’ll also dicusss how you can get started in Powerlifting and build your strength!

Blue Team Con

  • When: September 6-7, 2025
  • Where: Fairmont Chicago, Millenium Park, Chicago, IL
  • Site: blueteamcon.com
  • Talk Title: Can opposites attract? Domain admins meet red tenant.
  • Co-presenter: Eric Woodruff
  • Abstract:

    A few years ago, Microsoft deprecated the Enhanced Security Admin Environment (aka ESAE aka red forest) model and replaced it with their Rapid Modernization Plan (RAMP). Where ESAE was focused solely on legacy Active Directory (AD), RAMP is built for protecting privileged users in both AD and Entra ID. However, all is far from perfect in this new model, and the focus is heavily slanted towards protecting the cloud.

    Over the past few years, there has been talk about “red tenants”, and a few products have been released that use a red tenant approach to protect a Microsoft cloud estate with a privileged Entra tenant.

    But why should the cloud have all the fun stuff? What if we took the red tenant model and used it to protect AD?

    In this session we explore the design of an Entra tenant that has one sole purpose – protecting Tier 0 resources in Active Directory. Sound wild? We think so. But if we break ALL the rules along the way, we might end up in a place where our attack surface is reduced, our AD authentication methods are strong, and Entra might become the go to replacement for ESAE.

    Join us as we explore the architecture and what it takes to roll out the red tenant for all your AD Admins!