Certainly! Here’s version 106 of the rewritten blog post title: Nick Percoco, leading security officer at Kraken and creator of SpiderLabs at Trustwave, also known for organizing the THOTCON hacker event in Chicago, is open to questions on cryptocurrency security breaches, hacking incidents, cybersecurity advice, and investigative techniques.

Meet Nick Percoco: A Cybersecurity Expert Ready to Share Insights

Hello, readers! I’m Nick Percoco, currently the Chief Security Officer at Kraken, a leading global digital asset exchange. With over 25 years in the cybersecurity and technology sectors, I have dedicated my career to understanding the complexities of digital security and the ever-evolving challenges we face today.

Before joining Kraken, I served as the Chief Security Officer at Uptake, an industrial AI firm, and held the position of Vice President of Global Services at Rapid7, a comprehensive cybersecurity company. My journey through the tech landscape has granted me the privilege of sharing my expertise at major industry conferences like Black Hat, DEF CON, and OWASP, as well as with esteemed organizations such as the Department of Homeland Security, US-CERT, Interpol, and the United States Secret Service.

My passion for technology ignited at a young age when I first learned to code on a Timex Sinclair 1000 computer at just seven years old during the early 1980s. As I navigated the vibrant BBS scene in the late 80s and early 90s, I transitioned from a Commodore 64 to an Intel 386 PC running Linux, further deepening my interest in computing and cybersecurity.

Being an active member of the Chicago hacker community for several decades, I initiated THOTCON, a hacker conference that will celebrate its 12th installment in 2023. Throughout my career, I have been involved in investigating some of the most significant data breaches in history. For the past four years at Kraken, I have been developing and enhancing programs dedicated to safeguarding our cryptocurrency exchange from various cyber threats.

I’m excited to share my knowledge on topics like cryptocurrency hacks, security best practices, and cybersecurity investigations. Feel free to ask me anything — I’m here to engage, inform, and foster discussion about our industry and my experiences.

Thank you for joining me on this journey, and I look forward to your questions!

Edit: I had a fantastic time answering your questions! I’ll be checking back throughout the day to respond to more inquiries. Thank you for your engagement!

Share this content:

One Comment

  1. Thank you for sharing your detailed background and insights! As a support engineer, I recommend the following steps if you’re dealing with cybersecurity issues related to cryptocurrency exchanges or hacking incidents:

    • Incident Response: If you suspect a breach, ensure you follow your incident response plan. Isolate affected systems, preserve forensic evidence, and document all activities.
    • Security Best Practices: Implement multi-factor authentication (MFA), secure API keys, and regularly update software and firmware to mitigate vulnerabilities.
    • Monitoring & Detection: Use real-time intrusion detection systems (IDS) and SIEM solutions to monitor for unusual activities or potential threats.
    • Vulnerability Management: Conduct periodic vulnerability assessments and penetration tests to identify and fix security gaps.
    • Investigative Techniques: Collaborate with cybersecurity experts and leverage threat intelligence tools to analyze attack vectors and trace malicious activities.
    • Community & Resources: Engage with cybersecurity communities like OWASP or local hacker groups for support and knowledge sharing.

    If you encounter specific technical challenges or need further guidance on implementing security measures, please provide more details so I can assist you more effectively. Remember, proactive security measures and ongoing awareness are essential in

Leave a Reply

Your email address will not be published. Required fields are marked *