Assaf Morag speaking at TyphoonCon

About Me

Professional Story

I began my career as a financial services consultant, working closely with customers and business stakeholders to translate their needs into effective solutions. That early hands-on experience in understanding real business challenges shaped how I approach cybersecurity today: strategic, customer-focused, and impact-oriented.

My path evolved into data science and fraud oriented within the banking sector, where I built machine learning models that helped financial institutions make smarter risk-driven decisions. From that foundation in analytics and fraud detection, I transitioned into cybersecurity research at IBM Security\'s Trusteer Labs. There, I worked with major banks worldwide to analyze cyber-enabled financial crime and mobile fraud, gaining deep insight into adversarial behavior, malware ecosystems, and large-scale fraud patterns.

I later advanced to lead multiple global cyber threat intelligence teams, responsible for generating high-value intelligence from deep/dark web sources, OSINT, and technical telemetry across customer perimeters. This role strengthened my ability to convert complex threat research into actionable outcomes that influence tactical defense and executive strategy.

Today, as Director of Threat Intelligence at Aqua Security, I design and operate a large-scale cloud-native honeypot infrastructure that captures real-world attacks across global environments. I oversee the collection and analysis of threat artifacts, reverse engineer malware, uncover misconfigurations and vulnerabilities in the cloud-native ecosystem, and publish high-impact intelligence that enhances product capabilities and market advantage.

I am passionate about the intersection of advanced research, strategic cybersecurity, and business value — pushing innovation forward while protecting those who rely on modern cloud infrastructure. Through public research, conferences, and industry collaborations, I strive to help organizations anticipate threats rather than react to them.

Expertise Areas

Cloud-Native Security

Threat Intelligence

Malware Analysis

Incident Response

Reverse Engineering

Security Research

Vulnerability Assessment

Attack Attribution