BSidesAugusta 2025

BSidesAugusta 2025

Sharon Martin

Sharon is a former Arabic Linguist who served in Operation Iraqi Freedom before pivoting to cybersecurity, earning a Master’s Degree in Information Security & Assurance. She went on to work for U.S. Army Cyber Command (ARCYBER), where she became a certified instructor for the National Cryptologic School and an elite graduate of the Offensive Cyber Operations (OCO) cyber operator program.

After leaving government service, Sharon transitioned into the private sector, serving as a Product Owner and Product Architect for Huntress. There, she helped design the foundational detection capabilities of their EDR and Microsoft 365 ITDR products — enterprise-grade cybersecurity solutions built specifically to protect small businesses.

Now, as the visionary behind Managed Nerds, Sharon brings her deep expertise in security, AI, and automation to help small businesses scale, stay secure, and compete with the big players.


Preferred Social Media:

LinkedIn

Social Media User/Handle:

managednerd


Session

10-25
13:45
30min
Clicksploitation: How Fraudsters Exploit AdTech & What You Can Do
Sharon Martin

In a digital economy where every click counts, adversaries have found a lucrative attack surface: online advertising. In this fast-paced, data-backed session, we’ll expose how fraudsters use emulators, botnets, spoofed domains, and rogue mobile apps to siphon billions from ad networks—often going undetected. Known as click fraud or invalid traffic, this growing threat not only wastes marketing spend but also inflates KPIs, distorts procurement decisions, and introduces cybersecurity risk through compromised ad placements.

Attendees will:
- Understand the tactics behind ad fraud, including real-world breakdowns of operations like Methbot and Vastflux.
- Learn how fraudsters manipulate platforms like Google and Microsoft to profit from fake engagement.
- Discover how click fraud intersects with cybersecurity, insider threat, and contractor oversight.
- Walk away with strategies to recognize and mitigate clicksploitation.

Whether you're in charge of digital strategy, cyber defense, or compliance reporting, this session will arm you with the tools to recognize fraudulent patterns, reduce wasted spend, and defend against a threat hiding in plain sight.

Track 1
Track 1 - Plug N Play