Presentations
Here is a collection of Kenneth G. Hartman’s articles and presentations of a variety of topics including information security, privacy, and leadership:
Table of Contents
- Resilient Humanity: Thriving in the Age of Superintelligence
- Dealing with the Deluge of Digital Discovery
- Mastering Fabric
- Personal Cyber Security in an AI-Driven World
- Beware! Encryption Jedi Mind Trick
- Differential File System Analysis for the Quick Win
- Docker Crash Course
- Can You Really Be More Secure in the Cloud?
- Embrace Your Inner Hacker
- Tech Tuesday Workshop
- A Purple-Team Approach to Exploring AWS Security Services & Capabilities
- How Azure, AWS, Google handle data destruction in the cloud
- Doing Cloud in China
- SANS Webcast - The Best of Both Worlds - Cloud + SASE
- SANS Webcast - What To Do When Moving to the Cloud
- A DevOps Approach to Security Controls
- What Cloud Saavy Customers Really Want
- Data Protection in the Public Cloud
- Digital Forensic Analysis of Amazon Linux EC2 Instances
Resilient Humanity: Thriving in the Age of Superintelligence
Resilient Humanity: Thriving in the Age of Superintelligence explores what happens when AI enters a runaway self-improvement cycle—surpassing human cognition and upending familiar systems. Instead of trying to steer the course of global AI development, this talk reframes the singularity as an invitation to double down on our uniquely human strengths. You’ll discover how cultivating mental resilience, ethical clarity, emotional intelligence, and meaning-making can anchor you in purpose and agency—even as machines grow more powerful—and how those capacities ripple outward to influence your students, family, and community.
In a dynamic, interactive session grounded in the Human Resilience Project’s evidence-based frameworks, you’ll learn practical practices for strengthening empathy and creativity, reclaiming cognitive sovereignty in the face of algorithmic persuasion, and building habits of gratitude, presence, and connection that outlast any software update. By focusing on the ways each of us can shape AI’s impact on our own lives and those we influence, this talk equips you not just to survive the age of superintelligence—but to thrive within it, ensuring that people, not just programs, define our shared future.
Resilient Humanity: Thriving in the Age of Superintelligence - SLIDES
Resilient Humanity: Thriving in the Age of Superintelligence - YouTube Video
Dealing with the Deluge of Digital Discovery
Leveraging AI to Tackle Modern Legal Challenges
The exponential growth of digital data has revolutionized legal discovery, presenting both opportunities and challenges for defense attorneys. In this session, we will explore innovative strategies for managing large volumes of discovery documents using cutting-edge AI and Natural Language Processing (NLP) techniques. Attendees will get an exclusive sneak peek at the Lucid Truth’s “Discovery Processing Web App,” a novel tool in development designed to streamline the organization, tracking, and analysis of legal documents.
Through this interactive presentation, we will:
- Discuss best practices for handling legal discovery, including inventory management and version control.
- Highlight AI-driven approaches for identifying and resolving document discrepancies.
- Demonstrate how AI Tools like the Discovery Processing Web App can transform raw data into actionable insights.
- Understand the technical challenges and limitations of such tools.
Join us to learn how to overcome the deluge of digital discovery and enhance your investigations with AI-powered solutions. This session is ideal for PIs and Criminal Defense Investigators seeking practical tools to navigate the complexities of modern case analysis.
Dealing with the Deluge of Digital Discovery - SLIDES (2/6/2025)
Michigan Council of Professional Investigators Meeting Announcement (2/6/2025)
Mastering Fabric
Bringing the Power of LLMs to the Command Line
Security professionals are constantly seeking ways to streamline workflows, automate repetitive tasks, and analyze complex data with precision. Fabric, a command-line tool that integrates large language models (LLMs), offers a transformative approach to meeting these challenges.
This talk introduces Fabric and its potential to revolutionize workflows for security and development professionals. Attendees will learn how to integrate Fabric into tools like Visual Studio Code and GitHub Codespaces to create efficient, collaborative environments. Topics include the basics of Fabric patterns, an introduction to prompt engineering, and hands-on examples tailored to security use cases, such as log analysis and incident response.
Through engaging demonstrations and real-world scenarios, this session will show how combining Fabric with traditional CLI tools can enhance productivity and uncover new insights. Whether you are an experienced CLI user or exploring new ways to optimize your workflows, this talk will provide actionable techniques and inspiration to incorporate Fabric into your practice. No prior experience with Fabric is necessary. Join us to explore how this innovative tool can empower you to work smarter and faster in security and development.
Mastering Fabric: Bringing the Power of LLMs to the Command Line - SLIDES (1/29/2025)
Practice Files for Hands On Workshop
Daniel Miessler’s FABRIC Github Repo
Personal Cyber Security in an AI-Driven World
As artificial intelligence (AI) becomes more integrated into our daily lives, cybercriminals are finding new ways to exploit personal data and online identities through increasingly sophisticated scams. In this talk, we will explore the emerging threats posed by AI-driven cyber scams, from phishing attacks and social engineering to the dangers of voice cloning.
Participants will learn how to protect themselves using Multi-Factor Authentication (MFA) methods, including the latest advances in hardware tokens and passkeys, while also understanding the limitations of each approach. While MFA adds a vital layer of protection, it is not infallible, and knowing its weaknesses will help users stay vigilant against potential bypass tactics. We’ll also discuss how to recognize fake alerts and secure cloud backups to minimize risks.
Personal Cyber Security in an AI-Diven World - SLIDES (12/9/2024)
Meeting Announcement: Grand Traverse Humanists (12/9/2024)
Beware! Encryption Jedi Mind Trick
When a cloud service provider (CSP) says they are using encryption, that’s when you know you need to dig deeper into the details rather than succumb to the Jedi mind tricks of encryption. “You can trust us. We use encryption.” We will cover BYOK – what it actually is - and misconceptions, along with end-to-end encryption. Where do you use encryption? How do you perform encryption? How do you protect the keys throughout the key management life cycle?
Beware! Encryption Jedi Mind Trick - SLIDES (8/29/2023)
Beware! Encryption Jedi Mind Trick - YouTube Video