Our 2014 Speakers

Ben Miller

Why you are pwned and don’t know it

Information systems specialist turned offensive security expert, Ben Miller brings a unique mix of networking, compliance and security experience to the table. As an Ethical Hacker for Parameter Security, Miller identifies and exploits weaknesses in clients’ networks – emulating a real-world attack. Prior to Parameter Security, Ben was employed by…

Benjamin Brown

Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT)

Benjamin Brown currently works on systems safety, adversarial resilience, and threat intelligence at Akamai Technologies. He has experience in Non-profit, Academia, and the corporate world as well as degrees in both Anthropology and International Studies. Research interests include the psychology, anthropology, and sociology of information security, threat actor profiling, and thinking about security as an ecology of complex systems.

Brandon Niemczyk

Probabilistic detection of malware infected hosts via DNS query analysis.

Brandon Niemczyk was born in Chicago. He has been writing code since he was a child with his first 386 modifying the QBASIC game gorillas.bas. Later moving on to write GIS software in Orlando, FL and then wandered into information security after a brief stint writing accounting software. His interests are machine learning, mathematics, motorcycles, games, reverse engineering, and family. Brandon has previously spoken at multiple conferences on machine learning and information security.

Brett Shavers

Placing the Suspect Behind the Keyboard

Brett Shavers is the author of Placing the Suspect Behind the Keyboard and The Practitioner’s Guide to X-Ways Forensics. Brett began his career as a digital forensics investigator in law enforcement and was trained by the Federal Law Enforcement Training Center, the U.S. Department of Homeland Security, and the National White Collar Crime Center….

Brian Foster

Do You Have Enough Executioners?

Brian Foster brings over 25 years of successful product management and development experience to Damballa. Recently, Brian was senior vice president of product management for consumer security at McAfee, where he directed the strategy and development of consumer and mobile security solutions. Before focusing on consumer, Foster also directed the strategy and development of McAfee’s enterprise security solutions. Foster expanded McAfee’s enterprise product line to over 80 products, played key roles in numerous acquisitions including the Intel …

Chad Olivier

Responding to APT: Unpwning the Pwned

Chad Olivier (@techariah) is the owner of Shades of Gray Security. He has over a decade of experience in IT security. He has worked in every industry performing social engineering, reverse engineering, penetration testing, vulnerability research, and has been involved with incident response to some of the largest breaches in history.

Chris and Chrisha Anderson

Operational Security and Your Mental Health

Chris Anderson helped to found the Hive13 hackerspace in Cincinnati and helps to run Cinci2600, a local meetup for Cincinnati hackers. He also served in Military Intelligence units in the US Army. Chrisha Anderson is a licensed mental health therapist and a doctoral student studying human behavior. Her research is focused primarily on the psychological effects that fandom communities have on participants.

David Shaw

Androids vs. Android: Synthetic Mobile Malware Analysis

David has extensive experience in many aspects of information security. After starting his career in perimeter analysis and external threat research, David joined Redspin in 2009 and has performed several roles within the organization. David is currently…

Evan Booth

Keynote – Terminal Cornucopia: Demystifying the Mullet

Growing up, it was a safe bet that if an object around the house was held together with screws or contained any number of wires, Evan “treefort” Booth took it apart at some point to see what made it tick. In 4th grade, with the help of strategically placed pens, erasers, and a Pop-Tarts wrapper, Evan’s pencil box could quickly…


Red Teaming: Back and forth 5ever

FuzzyNop is a computer who knows how to computer. As a child his computers always told him he should do computers. Now he makes a living doing computers, which includes penetration testing, reverse engineering, and incident response.

Georgia Weidman

Penetration Testing Training

Georgia Weidman is a penetration tester, security researcher, and trainer. She holds a Master of Science degree in computer science, secure software engineering, and information security as well as holding CISSP, CEH, NIST 4011, and OSCP certifications. Her work in the field of smartphone exploitation has been featured in print and on television internationally. She has presented her research at conferences around the world including Shmoocon, Blackhat, Hack in the Box, and Derbycon. Georgia has delivered highly technical security training for…


Malware Analysis 101 – N00b to Ninja in 60 Minutes

grecs has over 17 years experience, undergraduate and graduate engineering degrees, and a really well known security certification. Despite his formal training, grecs has always been more of a CS person at heart going back to his VIC-20, Commodore 64, and high school computer club days. After doing the IT grind for five years, he discovered his love of infosec and has been pursuing this career since. Currently, he spends his days doing cybersecurity paperwork drills in building multi-billion dollar government systems. At night he runs a local…


Anti-Forensics: Memory or something, I forget.

int0x80 is the rapper in Dual Core. He has a mustache and doesn’t afraid of anything.

Josh Stone

It Just Keeps Going and Going

Victor Mata and Josh Stone have been working in the security industry for a combined 20 years, with focus on penetration testing, forensics, incident response, etc. Both are currently based in Baton Rouge, Louisiana. They regularly perform penetration tests for clients of all sizes, and hope to contribute to the larger community with their research projects.

Joshua Perrymon

Advanced RedTeaming: Ghosts in your Building

Josh has been in the security game for 15+ years, with a focus on Red Teaming, Social Engineering, Threat, and Intelligence. When he isn’t on the road breaking into buildings for clients, he can be found at the local dragstrip trying to hustle some lunch money.

Josiah Hagen

Probabilistic detection of malware infected hosts via DNS query analysis.

Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has a BA in Mathematics and Computer Science from Oberlin College and 15 years of professional software development experience. Josiah has 7 years in the AI field, with work focused on graph theory, search, and deductive inference on large knowledge bases. Subsequent work in AI included applying machine learning techniques identifying failure modes in email traffic. He has additional experience in systems development, including clustered NAS/SAN development and…

Paul Asadoorian

The Internet Of Evil Things: The 10 Most Wanted List

Paul Asadoorian is the founder and CEO of Security Weekly (formerly “PaulDotCom”), an organization which has been dedicated to security and hacking related podcasts, blogs, webcasts and Internet TV for 8+ years. During the day, Paul works as the product evangelist for Tenable Network Security, using vulnerability scanning tools and producing how-to content. Paul is the co-author of “WRT54G Ultimate Hacking” and “Offensive Countermeasures: The Art of Active Defense” and has spoken at several security conferences across the globe. Paul has …

Richard Stiennon

Canceled…maybe next year!

Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the booming IT security industry. He is the author of Surviving Cyberwar (Government Institutes, 2010) and UP and to the RIGHT: Strategy and Tactics of Analyst Influence (IT-Harvest Press, 2012). He writes the Cyber Domain column for forbes.com and is frequently quoted as a cyber security expert in mainstream media. He advises his clients on cybersecurity strategy. He is also the Executive Editor of securitycurrent.com and the Senior Fellow at the …

Ryan Jones

Advanced RedTeaming: Ghosts in your Building

Shannon Sistrunk

Interpersonal Manipulation

Shannon Sistrunk has a B.A. in Speech Communication from Louisiana Tech University and a M.S. in Applied Communication from Mississippi College. She is the owner of Bayou Communications LLC, specializing in corporate, interpersonal & nonverbal communication, social-engineering, and more. Most importantly she is married to Chris Sistrunk for almost 15 years, it’s been a blast! They have two children, ages 10 and 6. Shannon gets to test her skills daily against the best SE’s ever. Her kids.

Steve Jensen

iOS Analysis and Reverse Engineering using iRET

Steve Jensen is a Principal Consultant at Veracode. He has a background in software development, and has been actively engaged in application security for more than a decade. He specializes in all areas of application security, with a focus on mobile security and mobile security research.

Victor Mata

It Just Keeps Going and Going

Victor Mata and Josh Stone have been working in the security industry for a combined 20 years, with focus on penetration testing, forensics, incident response, etc. Both are currently based in Baton Rouge, Louisiana. They regularly perform penetration tests for clients of all sizes, and hope to contribute to the larger community with their research projects.