Introducing Keynote Speaker at NIC Empower: David Jacoby
David Jacoby is the hacker who’s been outsmarting machines and minds for about 30 years. He
has been mentioned as Sweden's most outgoing and boldest hackers with a personality as bold
as his code, Jacoby is not just a world-renowned expert—he’s a digital provocateur, blending
deep insights with humor and jaw-dropping live hacks that will leave you questioning everything
you thought you knew about technology.
His research reads like a thriller—whether he’s hacking a fully-updated MacOS without tools or
uncovering national security gaps, Jacoby's work goes beyond the ordinary. His advisory roles for
Sweden’s top IT security firms and his literary contributions to iconic works like "A Guide to
Kernel Exploitation" highlight his standing as a visionary in the field.
With a natural gift for making even the most complex cybersecurity topics crystal clear (and
ridiculously entertaining), Jacoby is more than a speaker—he’s a hacker with heart, ready to
inspire, educate, and keep you on the edge of your seat.
The Security Paradox: Why More Technology Isn’t Making Us Safer
Despite advancements in security products, services, and legislation, cybercriminals continue to compromise enterprises and exploit vulnerabilities in our increasingly digital world.
This presentation, grounded in 30 years of ethical hacking experience, challenges the current approach to cybersecurity, revealing how fundamental oversights and a reliance on technical solutions leave us vulnerable. By examining the evolution of cyber attacks and demonstrating methods hackers use to exploit common systems and bypass multi-factor authentication, this talk uncovers the realities of digital threats today. It also addresses the growing risk AI poses, as hackers leverage it to automate attacks, create realistic deepfakes, and further manipulate the underground economy.
Attendees will gain valuable insights into the evolving threat landscape, explore the human impact of cyber threats, and witness a live hack demonstration that underscores the need for a proactive and human-centered approach to cybersecurity.