Presentations
Here is a collection of Kenneth G. Hartman’s articles and presentations of a variety of topics including information security, privacy, and leadership:
Table of Contents
- Unmasking the Artificial: Forensic Defense Against Deepfake Imagery
- Stop Playing Security Whack-a-Mole: Enforcing Cloud Security with Organizational Controls
- Resilient Humanity: Thriving in the Age of Superintelligence
- Dealing with the Deluge of Digital Discovery
- Mastering Fabric
- Personal Cyber Security in an AI-Driven World
- Beware! Encryption Jedi Mind Trick
- Differential File System Analysis for the Quick Win
- Docker Crash Course
- Can You Really Be More Secure in the Cloud?
- Embrace Your Inner Hacker
- Tech Tuesday Workshop
- A Purple-Team Approach to Exploring AWS Security Services & Capabilities
- How Azure, AWS, Google handle data destruction in the cloud
- Doing Cloud in China
- SANS Webcast - The Best of Both Worlds - Cloud + SASE
- SANS Webcast - What To Do When Moving to the Cloud
- A DevOps Approach to Security Controls
- What Cloud Saavy Customers Really Want
- Data Protection in the Public Cloud
- Digital Forensic Analysis of Amazon Linux EC2 Instances
Unmasking the Artificial: Forensic Defense Against Deepfake Imagery
As generative AI technologies like GANs and diffusion models reach unprecedented levels of photorealism, the line between genuine photography and synthetic fabrication has blurred, creating a crisis of trust in digital media. This presentation explores the evolving landscape of digital image forensics, moving beyond simple visual inspection to rigorous scientific detection methods. We will examine the principles of “Camera Ballistics” and Photo Response Non-Uniformity (PRNU), which use unique sensor noise to fingerprint specific devices with court-admissible accuracy. We will contrast these established methods with emerging AI-specific detection techniques, such as frequency domain analysis and model fingerprinting, which can attribute synthetic images to specific generators like DALL-E or Midjourney. Finally, we will discuss the shift toward cryptographic provenance via the C2PA standard, differentiating between hardware-embedded credentials and software-based assertions. Attendees will leave with a practical understanding of the tools and methodologies required to authenticate digital media and maintain the chain of custody in an increasingly synthetic world.
Unmasking the Artificial: Forensic Defense Against Deepfake Imagery - SLIDES (2/26/2026)
Unmasking the Artificial: Forensic Defense Against Deepfake Imagery - NOTES (2/26/2026)
Stop Playing Security Whack-a-Mole: Enforcing Cloud Security with Organizational Controls
Security teams often find themselves reacting to cloud misconfigurations and policy violations after they occur—playing an endless game of security Whack-a-Mole. Instead of relying solely on detection and response, organizations can enforce preventive security measures at scale using cloud-native organization-level controls. In this webinar, we will explore how AWS Service Control Policies (SCPs), Azure Policy, and GCP Organizational Constraints enable security teams to proactively enforce security policies and prevent risky configurations before they happen. By shifting security left and embedding controls at the organizational level, companies can reduce attack surfaces, improve compliance, and eliminate entire classes of misconfigurations.
Key Takeaways
- How preventive security controls reduce cloud misconfigurations
- Deep dive into AWS SCPs, Azure Policy, and GCP Organizational Constraints
- Real-world examples of security policies that enforce best practices
- How to test and validate organizational controls before deployment
- Strategies for balancing security and operational flexibility
Resilient Humanity: Thriving in the Age of Superintelligence
Resilient Humanity: Thriving in the Age of Superintelligence explores what happens when AI enters a runaway self-improvement cycle—surpassing human cognition and upending familiar systems. Instead of trying to steer the course of global AI development, this talk reframes the singularity as an invitation to double down on our uniquely human strengths. You’ll discover how cultivating mental resilience, ethical clarity, emotional intelligence, and meaning-making can anchor you in purpose and agency—even as machines grow more powerful—and how those capacities ripple outward to influence your students, family, and community.
In a dynamic, interactive session grounded in the Human Resilience Project’s evidence-based frameworks, you’ll learn practical practices for strengthening empathy and creativity, reclaiming cognitive sovereignty in the face of algorithmic persuasion, and building habits of gratitude, presence, and connection that outlast any software update. By focusing on the ways each of us can shape AI’s impact on our own lives and those we influence, this talk equips you not just to survive the age of superintelligence—but to thrive within it, ensuring that people, not just programs, define our shared future.
Resilient Humanity: Thriving in the Age of Superintelligence - SLIDES
Resilient Humanity: Thriving in the Age of Superintelligence - YouTube Video
Dealing with the Deluge of Digital Discovery
Leveraging AI to Tackle Modern Legal Challenges
The exponential growth of digital data has revolutionized legal discovery, presenting both opportunities and challenges for defense attorneys. In this session, we will explore innovative strategies for managing large volumes of discovery documents using cutting-edge AI and Natural Language Processing (NLP) techniques. Attendees will get an exclusive sneak peek at the Lucid Truth’s “Discovery Processing Web App,” a novel tool in development designed to streamline the organization, tracking, and analysis of legal documents.
Through this interactive presentation, we will:
- Discuss best practices for handling legal discovery, including inventory management and version control.
- Highlight AI-driven approaches for identifying and resolving document discrepancies.
- Demonstrate how AI Tools like the Discovery Processing Web App can transform raw data into actionable insights.
- Understand the technical challenges and limitations of such tools.
Join us to learn how to overcome the deluge of digital discovery and enhance your investigations with AI-powered solutions. This session is ideal for PIs and Criminal Defense Investigators seeking practical tools to navigate the complexities of modern case analysis.
Dealing with the Deluge of Digital Discovery - SLIDES (2/6/2025)
Michigan Council of Professional Investigators Meeting Announcement (2/6/2025)
Mastering Fabric
Bringing the Power of LLMs to the Command Line
Security professionals are constantly seeking ways to streamline workflows, automate repetitive tasks, and analyze complex data with precision. Fabric, a command-line tool that integrates large language models (LLMs), offers a transformative approach to meeting these challenges.
This talk introduces Fabric and its potential to revolutionize workflows for security and development professionals. Attendees will learn how to integrate Fabric into tools like Visual Studio Code and GitHub Codespaces to create efficient, collaborative environments. Topics include the basics of Fabric patterns, an introduction to prompt engineering, and hands-on examples tailored to security use cases, such as log analysis and incident response.
Through engaging demonstrations and real-world scenarios, this session will show how combining Fabric with traditional CLI tools can enhance productivity and uncover new insights. Whether you are an experienced CLI user or exploring new ways to optimize your workflows, this talk will provide actionable techniques and inspiration to incorporate Fabric into your practice. No prior experience with Fabric is necessary. Join us to explore how this innovative tool can empower you to work smarter and faster in security and development.
Mastering Fabric: Bringing the Power of LLMs to the Command Line - SLIDES (1/29/2025)
Practice Files for Hands On Workshop
Daniel Miessler’s FABRIC Github Repo