Roles and Responsibilities
Mr. Flom has been working in the computer industry for
the past 28 years and has spent the last 24 heavily
involved in computer and network security. Mr. Flom
has founded several security companies, the most
notable being SecTheory and Falling Rock Networks, as
well as co-founding ha.ckers.org and sla.ckers.org.
As lead operations engineer of Pilot Network Services’
security department he researched network and
computer threats on a daily basis protecting some of
the largest companies and organizations in the world. He
designed and implemented what was believed to be at
the time, the largest network intrusion detection system
in the world, protecting over half a million endpoints.
Mr. Flom later joined Digital Island (acquired by Cable &
Wireless and merged with Exodus), where he created
new product offerings for the Security Operations
Center he was brought on to build. After the merger
with Exodus James joined the Cyber Attack Tiger Team
and assisted with the detection and recovery of several
global network security compromises. Mr. Flom later
became the director of consulting services for
Kliosystems before co-founding SecTheory and Falling
While working on ha.ckers.org Mr. Flom invented a
methodology to protect insecure applications without
modifying the code itself, work which was later assigned
a patent for what was known as “The Armored Stack”.
Additionally, Mr. Flom authored and co-authored may
network security tools, some in wide use today such as
slowloris and fierce.
Since 1998 Mr. Flom has participated in Blackhat ,
DefCon and BSides having presented several times at
the latter two as well as OWASP and LASSCON.
▪ Various roles, Hewlett Packard SMT lab, 4 years
▪ Head of network security operations at Pilot
Networks, 3 years ▪ Lead SoC engineer at Digital
Island/Cable & Wireless, 3 years ▪ Director of
consulting at KlioSystems, 2 years
▪ Founder SecTheory and Falling Rock Networks, 16
Meet The SecTheory Team
Learn more about James Flom’s 24 years of cutting-edge leadership experience creating, managing, threat modeling, and testing mobile, network & cloud security architecture ranging from embedded systems to payment systems.
Add biography text for your team member here. You can also remove this text if you’d rather just have a name and title.
Contact SecTheory’s Trusted Cyber Partners In Practice
We’ll put together a customized quote and work with you to get started on your project.