Spencer McClain

Spencer is a former penetration tester with 10+ years of experience in cyber security. From Nebraska, currently living in Upstate New York. He has held roles at The Center for Internet Security — MS-ISAC, Cybereason, and Offensive Security. He specializes in threat emulation and helping organizations adopt a post-breach mentality.
More by Spencer McClain
WP_Query Object
(
    [query] => Array
        (
            [post_type] => Array
                (
                    [0] => post
                    [1] => webinars
                )

            [posts_per_page] => -1
            [post_status] => publish
            [meta_query] => Array
                (
                    [relation] => OR
                    [0] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                        )

                )

        )

    [query_vars] => Array
        (
            [post_type] => Array
                (
                    [0] => post
                    [1] => webinars
                )

            [posts_per_page] => -1
            [post_status] => publish
            [meta_query] => Array
                (
                    [relation] => OR
                    [0] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                        )

                )

            [error] => 
            [m] => 
            [p] => 0
            [post_parent] => 
            [subpost] => 
            [subpost_id] => 
            [attachment] => 
            [attachment_id] => 0
            [name] => 
            [pagename] => 
            [page_id] => 0
            [second] => 
            [minute] => 
            [hour] => 
            [day] => 0
            [monthnum] => 0
            [year] => 0
            [w] => 0
            [category_name] => 
            [tag] => 
            [cat] => 
            [tag_id] => 
            [author] => 
            [author_name] => 
            [feed] => 
            [tb] => 
            [paged] => 0
            [meta_key] => 
            [meta_value] => 
            [preview] => 
            [s] => 
            [sentence] => 
            [title] => 
            [fields] => 
            [menu_order] => 
            [embed] => 
            [category__in] => Array
                (
                )

            [category__not_in] => Array
                (
                )

            [category__and] => Array
                (
                )

            [post__in] => Array
                (
                )

            [post__not_in] => Array
                (
                )

            [post_name__in] => Array
                (
                )

            [tag__in] => Array
                (
                )

            [tag__not_in] => Array
                (
                )

            [tag__and] => Array
                (
                )

            [tag_slug__in] => Array
                (
                )

            [tag_slug__and] => Array
                (
                )

            [post_parent__in] => Array
                (
                )

            [post_parent__not_in] => Array
                (
                )

            [author__in] => Array
                (
                )

            [author__not_in] => Array
                (
                )

            [search_columns] => Array
                (
                )

            [ignore_sticky_posts] => 
            [suppress_filters] => 
            [cache_results] => 1
            [update_post_term_cache] => 1
            [update_menu_item_cache] => 
            [lazy_load_term_meta] => 1
            [update_post_meta_cache] => 1
            [nopaging] => 1
            [comments_per_page] => 50
            [no_found_rows] => 
            [order] => DESC
        )

    [tax_query] => WP_Tax_Query Object
        (
            [queries] => Array
                (
                )

            [relation] => AND
            [table_aliases:protected] => Array
                (
                )

            [queried_terms] => Array
                (
                )

            [primary_table] => wp_posts
            [primary_id_column] => ID
        )

    [meta_query] => WP_Meta_Query Object
        (
            [queries] => Array
                (
                    [0] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [relation] => OR
                )

            [relation] => OR
            [meta_table] => wp_postmeta
            [meta_id_column] => post_id
            [primary_table] => wp_posts
            [primary_id_column] => ID
            [table_aliases:protected] => Array
                (
                    [0] => wp_postmeta
                )

            [clauses:protected] => Array
                (
                    [wp_postmeta] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                            [compare_key] => =
                            [alias] => wp_postmeta
                            [cast] => CHAR
                        )

                    [wp_postmeta-1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                            [compare_key] => =
                            [alias] => wp_postmeta
                            [cast] => CHAR
                        )

                )

            [has_or_relation:protected] => 1
        )

    [date_query] => 
    [request] => 
					SELECT   wp_posts.ID
					FROM wp_posts  INNER JOIN wp_postmeta ON ( wp_posts.ID = wp_postmeta.post_id )
					WHERE 1=1  AND ( 
  ( wp_postmeta.meta_key = 'new_authors' AND wp_postmeta.meta_value LIKE '{5424224f713f2fdf852841236e532fbe2afe5f26295cdc87fb068b6cb22f41ff}\"152\"{5424224f713f2fdf852841236e532fbe2afe5f26295cdc87fb068b6cb22f41ff}' ) 
  OR 
  ( wp_postmeta.meta_key = 'new_presenters' AND wp_postmeta.meta_value LIKE '{5424224f713f2fdf852841236e532fbe2afe5f26295cdc87fb068b6cb22f41ff}\"152\"{5424224f713f2fdf852841236e532fbe2afe5f26295cdc87fb068b6cb22f41ff}' )
) AND wp_posts.post_type IN ('post', 'webinars') AND ((wp_posts.post_status = 'publish'))
					GROUP BY wp_posts.ID
					ORDER BY wp_posts.post_date DESC
					
				
    [posts] => Array
        (
            [0] => WP_Post Object
                (
                    [ID] => 31195
                    [post_author] => 53
                    [post_date] => 2023-11-13 09:32:23
                    [post_date_gmt] => 2023-11-13 15:32:23
                    [post_content] => 




Ransomware remains one of the greatest global cyber threats. Frequency, sophistication, costs, and impact are all on the rise – and show no signs of slowing. 

With millions of dollars spent on detective controls every year, why are we still struggling to effectively detect ransomware attacks? 

Recent advancements with breach and attack simulation (BAS) technologies unveil an opportunity to answer this question head-on. Join NetSPI BAS lead Derek Wilson and Solutions Architect Spencer McClain to explore how to use BAS to improve ransomware detections.  

During this webinar, they’ll demo NetSPI’s BAS platform and answer your questions, including:  

  • What does a ransomware simulation look like? 
  • How can I use BAS to set my SOC up for success against ransomware? 
  • How can I use attack simulations to support incident response tabletops? 

Watch today to get a deeper look at how to use NetSPI’s award-winning BAS platform to improve your ransomware readiness.

[post_title] => Product Pulse: How to Use Breach and Attack Simulation (BAS) to Improve Ransomware Detection  [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-simulation-for-ransomware-detection [to_ping] => [pinged] => [post_modified] => 2023-12-05 11:36:42 [post_modified_gmt] => 2023-12-05 17:36:42 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=31195 [menu_order] => 5 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) [1] => WP_Post Object ( [ID] => 30303 [post_author] => 53 [post_date] => 2023-06-07 12:27:26 [post_date_gmt] => 2023-06-07 17:27:26 [post_content] =>

Join Spencer McClain, Solutions Architect at NetSPI, as he guides you through a Breach and Attack Simulation (BAS) platform demo. See how NetSPI's BAS can revolutionize your company’s cybersecurity program, support security operations teams, and improve your detective controls. 

During this 30-minute session, we will: 

  • Demonstrate NetSPI’s BAS platform capabilities 
  • Highlight cutting-edge new platform features 
  • Explore common BAS use cases  
  • Dive into customer success stories  
[post_title] => Product Pulse: Demo of Breach and Attack Simulation (BAS)  [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-simulation-live-demo [to_ping] => [pinged] => [post_modified] => 2023-09-21 14:01:31 [post_modified_gmt] => 2023-09-21 19:01:31 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=30303 [menu_order] => 19 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) ) [post_count] => 2 [current_post] => -1 [before_loop] => 1 [in_the_loop] => [post] => WP_Post Object ( [ID] => 31195 [post_author] => 53 [post_date] => 2023-11-13 09:32:23 [post_date_gmt] => 2023-11-13 15:32:23 [post_content] =>

Ransomware remains one of the greatest global cyber threats. Frequency, sophistication, costs, and impact are all on the rise – and show no signs of slowing. 

With millions of dollars spent on detective controls every year, why are we still struggling to effectively detect ransomware attacks? 

Recent advancements with breach and attack simulation (BAS) technologies unveil an opportunity to answer this question head-on. Join NetSPI BAS lead Derek Wilson and Solutions Architect Spencer McClain to explore how to use BAS to improve ransomware detections.  

During this webinar, they’ll demo NetSPI’s BAS platform and answer your questions, including:  

  • What does a ransomware simulation look like? 
  • How can I use BAS to set my SOC up for success against ransomware? 
  • How can I use attack simulations to support incident response tabletops? 

Watch today to get a deeper look at how to use NetSPI’s award-winning BAS platform to improve your ransomware readiness.

[post_title] => Product Pulse: How to Use Breach and Attack Simulation (BAS) to Improve Ransomware Detection  [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-simulation-for-ransomware-detection [to_ping] => [pinged] => [post_modified] => 2023-12-05 11:36:42 [post_modified_gmt] => 2023-12-05 17:36:42 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=31195 [menu_order] => 5 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) [comment_count] => 0 [current_comment] => -1 [found_posts] => 2 [max_num_pages] => 0 [max_num_comment_pages] => 0 [is_single] => [is_preview] => [is_page] => [is_archive] => [is_date] => [is_year] => [is_month] => [is_day] => [is_time] => [is_author] => [is_category] => [is_tag] => [is_tax] => [is_search] => [is_feed] => [is_comment_feed] => [is_trackback] => [is_home] => 1 [is_privacy_policy] => [is_404] => [is_embed] => [is_paged] => [is_admin] => [is_attachment] => [is_singular] => [is_robots] => [is_favicon] => [is_posts_page] => [is_post_type_archive] => [query_vars_hash:WP_Query:private] => 6d03c511e6a2f99f99711f609a50898b [query_vars_changed:WP_Query:private] => [thumbnails_cached] => [allow_query_attachment_by_filename:protected] => [stopwords:WP_Query:private] => [compat_fields:WP_Query:private] => Array ( [0] => query_vars_hash [1] => query_vars_changed ) [compat_methods:WP_Query:private] => Array ( [0] => init_query_flags [1] => parse_tax_query ) )

Discover how NetSPI ASM solution helps organizations identify, inventory, and reduce risk to both known and unknown assets.

X