Speakers

All of our past speakers!

2025

Alex Holden

anonymous

Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in …

Allyn Stott

images/whyallyn.png

Allyn Stott is a senior staff engineer at Airbnb where he works on the InfoSec Technology Leadership team. He spends …

Chris Silvers

images/image.jpg

With more than 25 years of information security experience, Chris Silvers, CISSP, MBA, is the Founder and Principal …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

Devan Fendlason

anonymous

Devan Fendlason is a graduate student at Delgado Community College, where she studied Cybersecurity and has earned the …

Evan Kirstein

images/evan.jpeg

Evan is a passionate Information Security professional with over 10 years of IT and Cybersecurity experience, including …

Evil-Mog (Dustin Heywood)

images/image.jpeg

EvilMog is the Chief Architect for X-Force and Senior Technical Staff Member, Bishop of the Church of Wifi, and member …

Jonathan Fischer

anonymous

Jonathan Fischer is a hardware, RF, and IoT security enthusiast that spent a decade in operational technology before …

Joshua Crumbaugh

anonymous

Joshua Crumbaugh is one of the world’s leading security awareness experts and a world-renowned cyber security …

Mansoor Ahmad

anonymous

Mansoor Ahmad is an offensive security professional who has always had a curiosity about how things worked. While in …

Matthew Richard

anonymous

Matthew Richard is a software developer that enjoys coding in low level languages. His favorite text editor is Neovim. …

Matthew Wollenweber

images/IMG_4466.jpeg

Matthew Wollenweber (@MWollenweber) is a security engineer at Axonius. He has over 20 years experience as a …

Phil Brass

images/image.jpeg

Phil Brass started in the security industry in 1998 at for Internet Security Systems, and has been a member of the …

Steven Nyikos

anonymous

I like to tinker

All of our past speakers!

2024

Abbey Trent

images/image.jpeg

Abbey joined Alias in the summer of 2021 as Executive Assistant after spending 7 years working in the nonprofit sector. …

Carrie Randolph

images/image.png

Carrie Randolph is a Senior Security Consultant, leading the GRC practices of Go Security Pro with thirteen years of …

Corey Overstreet

images/image.jpeg

Corey has been engaged with Fortune 500 organizations across a variety of industries, including financial services, …

Dan McInerney

images/image.png

Dan was a pentester for a decade before moving into AI security research as ProtectAI’s Lead Threat Researcher. …

Donovan Farrow

images/image.jpeg

Donovan Farrow founded Alias in 2010. He brings more than 20 years of experience working for Schlumberger Oilfield …

int eighty (of Dual Core)

images/image.jpeg

int eighty (he/him) is a computer crime enthusiast, and the rapper in Dual Core. Occasional memes and hacking content on …

James Chacon

anonymous

James has worked in IT, Information Security, Litigation Support and Forensic Investigation for over 15 years …

Jason Lang

images/image.jpeg

Jason Lang is the practice lead of the Targeted Operations group at TrustedSec, an industry leader in offensive security …

JR Flores

anonymous

JR has worked in IT, Information Security, Litigation Support and Forensic Investigation for over 15 years representing …

Justin "h0m3l3ss" Whitehead

anonymous

H0m3l3ss (Justin Whitehead) has 8 years of experience in InfoSec (Forensics, Incident Response, and Red Teaming). …

Justin Wynn

anonymous

Justin Wynn is a Director at Coalfire who specializes in physical security and regularly performs network, application, …

Ken Westin

images/image.jpeg

Ken Westin has been in the cybersecurity field for over 15 years working with companies to improve their security …

Luke McOmie

images/image.jpeg

Since 1994, Pyr0 (Luke) has been a trusted advisor, security leader and industry mentor. At Blue Bastion, he is the Vice …

Marcello

images/image.png

Marcello is a infinity stones teamer, open source developer and offensive engineer. He’s worked at a number of …

Phillip Wylie

images/image.jpeg

Phillip is a passionate offensive security professional with over 26 years of information technology and cybersecurity …

Todd Wedel

images/image.jpeg

Todd Wedel serves as Director of Communications and Technical Writer for Alias. He joined Alias after over 20 years in …

Trey Underwood

images/image.png

Trey Underwood is a infosec engineer at a super secret security company. Previously he has been involved with several IT …

All of our past speakers!

2023

Chase Fontenot

images/image.jpeg

Chase Fontenot is a Cyber Security Engineer for a southern Louisiana-based MSP, RADER Solutions. With a young, 5 year IT …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

David Girvin

images/image.jpeg

Senior Product Security Engineer / Architecture at Red Canary Ex ship captain, welder / fabricator who somehow fell into …

Edan Cohen

images/image.jpeg

Edan Cohen is the Senior CTI Specialist at Cybersixgill. Previously, he worked in Corporate Security at the World Bank …

int eighty (of Dual Core)

images/image.jpeg

int eighty (he/him) is a computer crime enthusiast, and the rapper in Dual Core. Occasional memes and hacking content on …

Jayson E. Street

images/image.jpeg

Jayson E. Street is the VP of InfoSec at SphereNY … He is also DEF CON Groups Global Ambassador. Jayson battled a …

Jeremy Arthur

anonymous

As an IT specialist with over 22 years of experience, Jeremy Arthur brings a wealth of knowledge to the industry. Having …

Laura Johnson

images/image.png

Laura Johnson is a Security Manager, who started her career by joining the military unaware of how much she would fall …

Luke McOmie

images/image.jpeg

Since 1994, Pyr0 (Luke) has been a trusted advisor, security leader and industry mentor. At Blue Bastion, he is the Vice …

Melissa Bischoping

images/image.jpeg

Melissa Bischoping is a passionate security evangelist whose academic & professional background in human psychology …

Michele Bousquet

images/image.jpeg

Michele Bousquet is a digital forensics analyst and a professor at Tulane University, where she teaches cryptography.

Raymond Evans

images/photo.png

Raymond Evans is a security researcher having 9+ years of experience in cyber security. He has been working with …

All of our past speakers!

2022

Carmen Marsh

images/image.jpeg

As the CEO and Managing Partner of Inteligenca, Carmen Marsh leads a team that consults small and mid-size business with …

Carson Zimmerman

images/image.jpeg

Carson Zimmerman is a veteran cybersecurity specialist, author, and speaker. In his current role at Microsoft, Carson …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

Daniel Wyleczuk-Stern

images/image.png

Daniel is a recent convert to the blue team after spending the majority of his career breaking systems at Praetorian and …

Dave Hull

images/image.png

Dave Hull has been working in information security for more than 15 years, primarily in blue team roles. Hull has taught …

Ell Marquez

images/image.jpeg

Ell Marquez is a proud advocate of Hacking Is Not and Crime and Operation Safe escape. She has traveled the world for …

Evil-Mog (Dustin Heywood)

images/image.jpeg

EvilMog is the Chief Architect for X-Force and Senior Technical Staff Member, Bishop of the Church of Wifi, and member …

Fernando Tomlinson

images/image.jpeg

Fernando Tomlinson is a Principal Digital Forensics and Incident Response Consultant with Mandiant. Before joining …

John Lopes

images/image.jpeg

John is a passionate information security professional with specialist knowledge in digital forensics and incident …

Kris Wall

anonymous

Since 2003, Kris has been: An IT Technician, IT Manager, Developer, Pentester, AppSec Specialist, Red Team Manager, …

Marina Ciavatta

images/image.jpeg

Marina is a friendly little girl from Brazil who breaks and enters for a living. A Social Engineer specialized in …

Michael Cole

anonymous

Michael Cole has been in the technology and security field for over 15 years. Michael’s technical background …

Paul Coggin

images/image.jpeg

Paul Coggin is a Cyber SME at nou Systems, Inc. His expertise includes space systems, service provider, and ICS/SCADA …

Philomena Compton

images/image.jpeg

Philomena has been serving as a Technology Media Specialist/educator for 30 years. Her background includes IT …

Rob Carson

images/image.jpeg

Rob Carson is the Founder and Chief Executive Officer of Semper Sec. With over a decade working in information security …

Russell Mosley

images/image.jpeg

Russell is consultant and former CISO with over 20 years experience responsible for operational security and compliance. …

Sebastian Stein

images/image.jpeg

Currently Director of Cybersecurity Operations at BioMarin Pharmaceutical ($2B publicly traded company) in the SF Bay …

Vishal Thakur

images/image.jpeg

Vishal Thakur Vishal Thakur has worked in the information security industry for many years in hands-on technical roles, …

All of our past speakers!

2020

Adwoa Boateng-Kwakye

anonymous

We are Program Managers in the Microsoft Identity Customer Experience team. We assist our large and complex customers …

Allie Barnes

images/image.jpeg

Allie Barnes has been in the Linux community since 2011, jump-starting her IT career as a Linux Administrator at …

Angelo Castigliola

anonymous

Angelo is a Principal Consultant with Optiv Security. Angelo has over 15 years of experience in Security, Consulting, …

Brandon Scullion

anonymous

Brandon started as an information security peon and worked through several various disciplines in offense and defense. …

Brendan Watters

anonymous

The Metasploit Framework team maintains the largest open source penetration testing framework.

Brent Cook

anonymous

Brent Cook is the Engineering Manager for Metasploit at Rapid7, as well as one of the core Meterpreter payload …

Brent White

images/image.jpeg

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …

Bruce McCully

anonymous

Raised on a farm in Michigan, Bruce tinkered on computers his mom borrowed from the local elementary school. Back then, …

Chloe Messdaghi

anonymous

Chloé Messdaghi is the VP of Strategy at Point3 Security. She is a security researcher advocate who supports safe …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

Dave Cossa

anonymous

Dave likes offensive security. He is a senior consultant at RSM, where he focuses on performing testing engagements …

David Boyd

anonymous

David Boyd (@fir3d0g) is a Security Consultant with TrustedSec. He is a Christian, husband, and father who also enjoys …

David Kennedy

images/image.jpeg

David Kennedy is the Founder of TrustedSec, LLC and Co-Founder and CTO of Binary Defense Systems (BDS). David started …

Dr. Robert Firth

anonymous

Dr. Robert Firth is the CISO at MMR Group in Baton Rouge, LA. When he’s not managing the security and application …

Ell Marquez

images/image.jpeg

Ell Marquez is a proud advocate of Hacking Is Not and Crime and Operation Safe escape. She has traveled the world for …

Evil-Mog (Dustin Heywood)

images/image.jpeg

EvilMog is the Chief Architect for X-Force and Senior Technical Staff Member, Bishop of the Church of Wifi, and member …

Fernando Tomlinson

images/image.jpeg

Fernando Tomlinson is a Principal Digital Forensics and Incident Response Consultant with Mandiant. Before joining …

Glenda R. Snodgrass

images/image.jpeg

Glenda R. Snodgrass is President and founding member of The Net Effect, LLC. (1996). She is primarily engaged in cyber …

Gloria Lee

images/image.png

Gloria Lee is a Program Manager at Microsoft focused on driving customer success in Azure Identity division. She work …

Jared Gore

anonymous

Jared Gore lives in NOLA and works at Zehnder Communications where his job title is ‘DevOps’ (He …

Jim Nitterauer

images/image.jpeg

Jim is a Senior Security Engineer at AppRiver, LLC. a Zix Company. He holds a CISSP, a CISM and is well-versed in …

Joe Slowik

images/image.png

Joe Slowik hunts ICS adversaries for Dragos. Prior to this, Joe ran the Incident Response team at Los Alamos National …

Kalyan Krishna

images/image.jpeg

Kalyan Krishna is a Senior Program Manager in the Microsoft Identity platform team focused on developer experiences. In …

Leron Gray

images/image.jpeg

Ten year Navy veteran and former NSA operator with five years of offensive security experience. He’s currently …

LJ

images/image.jpeg

Laura Johnson is a Senior Security Engineer, who started her career by joining the military unaware of how much she …

Mark Morowczynski

images/image.jpeg

Mark Morowczynski is a Principal Program Manager on the customer success team in the Microsoft Identity division. He …

Martin Guidry

anonymous

Martin Guidry currently works as a penetration tester for Perspecta. Previously he has worked as a threat hunter, …

Mike Saunders

images/image.jpeg

Mike Saunders is a principal consultant at Red Siege. He has over 25 years of experience in IT and security and has …

Miriam Lorbert

anonymous

Miriam Lorbert is a Senior Cybersecurity Engineer at GE, as well as, a Cybersecurity Master’s Candidate at Johns Hopkins …

Nolan Garrett

images/image.jpeg

Nolan Garrett is the CEO at Intrinium and has probably worn every hat in InfoSec from Red Team, to Blue Team, to …

Rob Carson

images/image.jpeg

Rob Carson is the Founder and Chief Executive Officer of Semper Sec. With over a decade working in information security …

Russell Mosley

images/image.jpeg

Russell is consultant and former CISO with over 20 years experience responsible for operational security and compliance. …

Sana Noorani

images/image.jpeg

Sana Noorani is a Program Manager at Microsoft working in the Identity and Access Management space. She has a strong …

Scot Berner

anonymous

Scot started as an information security peon and worked through several various disciplines in offense and defense. He …

Sean Goodwin

images/image.jpeg

Sean is a Senior Consultant in Wolf’s Information Technology (IT) Assurance Services group where he is responsible for …

Shawn Richardson

anonymous

Shawn Richardson has spent the last 20 years working in various security and privacy roles, including PSIRT at Palo Alto …

Spencer McIntyre

anonymous

The Metasploit Framework team maintains the largest open source penetration testing framework.

Stephen "geno" Halwes

anonymous

Geno is a Sr. Research Engineer at Centauri Corp. in Ohio. He leads a team of engineers on multiple projects with …

Stephen Heath

images/image.png

Stephen currently serves as a Partner for Intrinium, Inc., a security consultancy in the Pacific Northwest. He has …

Swetha Rai

anonymous

We are Program Managers in the Microsoft Identity Customer Experience team. We assist our large and complex customers …

Tim Roberts

images/image.jpeg

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …

Xena Olsen

images/image.jpeg

Xena Olsen is a threat intelligence analyst in the financial services industry. A graduate of SANS Women’s Academy with …

All of our past speakers!

2019

Aaron Ringo

anonymous

Aaron is currently serving in the USAF as a Cyber Warfare Instructor. He holds some certs and has previously served as …

April C. Wright

anonymous

April C. Wright is a hacker, author, teacher, and community leader who has been breaking, making, fixing, and defending …

Brent White

images/image.jpeg

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …

Brett Gravois

images/image.jpeg

Brett is a Breaker of Web Applications, Leader of a DefCon Group, Maker of Tasty Food, and Owner of a Majestic Beard. He …

Brian Baskin

images/image.jpeg

Brian is a Senior Threat Researcher with Carbon Black’s Threat Analysis Unit with a specialty in digital …

Chloe Messdaghi

anonymous

Chloé Messdaghi is the VP of Strategy at Point3 Security. She is a security researcher advocate who supports safe …

Chris Holt

images/image.jpeg

Certified by GAIC, NTISSI, PADI, and previously by the USSF, Chris Holt is constantly learning something new. As the …

Christina Mitchell

anonymous

Christina is an Application Security Engineer at Indeed. She works with the crowdsourced bug hunting platform, and …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

Erika Noerenberg

images/image.jpeg

Erika Noerenberg is a Senior Threat Researcher with Carbon Black’s Threat Analysis Unit, with over 15 years of …

Evan Wagner

anonymous

20 years of IT and Security experience in EDU, Healthcare, Hospitality and retail. I have been working Incident Response …

Evil-Mog (Dustin Heywood)

images/image.jpeg

EvilMog is the Chief Architect for X-Force and Senior Technical Staff Member, Bishop of the Church of Wifi, and member …

Hexadecim8

anonymous

Hexa is a threat hunter and security researcher with 10 years in the field. She has worked with NSA, CIA, US Cyber …

Jason Haddix

anonymous

Jason is the VP of Researcher Growth at Bugcrowd. Jason works with Bugcrowd to improve the security industries relations …

Jason Kichen

anonymous

Jason is the VP of Advanced Security Services at eSentire. Prior, Jason spent nearly 15 years in the Intelligence …

Jayson E. Street

images/image.jpeg

Jayson E. Street is the VP of InfoSec at SphereNY … He is also DEF CON Groups Global Ambassador. Jayson battled a …

Jeff Man

images/image.jpeg

Jeff is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in …

Jim Allee

anonymous

Jimi2x has 25+ years of experience in InfoSec (Blue+Red+Purple Teaming/Security Research) and also involved in the video …

Jim Nitterauer

images/image.jpeg

Jim is a Senior Security Engineer at AppRiver, LLC. a Zix Company. He holds a CISSP, a CISM and is well-versed in …

Joe Gray

images/image.png

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics …

John Holowczak

images/image.jpeg

John is a Senior Threat Analyst on Carbon Black’s Threat Analysis Unit focusing on automation of threat detection …

Josh Harvey

anonymous

I have been working with computers for 10+ years and currently as a Systems Administrator at NASA.

Josh Millsap

anonymous

I am a new cybersecurity professional that recently graduated from LSU. I was the teaching assistant for the …

Josh Schwartz

images/image.png

Josh Schwartz, aka FuzzyNop, has been known to be a computer who knows how to computer. It is generally agreed that he …

Josh Stone

images/image.jpeg

Josh Stone is a security researcher, working currently in the area of red teaming command and control systems. …

JP Villanueva

images/image.jpeg

JP Villanueva (@swagnetow) is a security researcher whose main focus is in Application Security. JP has presented at …

Marcelle Lee

anonymous

Marcelle Lee is a PCAP and Forensics Chuck Norris and Joe is a Social Engineering Mr. T. Together, they bring innovative …

Michele Bousquet

images/image.jpeg

Michele Bousquet is a digital forensics analyst and a professor at Tulane University, where she teaches cryptography.

Nancy Snoke

images/image.jpeg

Nancy Snoke is currently a Senior IT Security Engineer with PGAC specializing in application security. Previously, she …

Paul W. Brager Jr M.Sci, CISSP, GICSP, CISM

images/image.jpeg

Mr. Paul W. Brager, Jr has been a contributing member of the cyber security community for over twenty-three (23) years, …

Phoenix Snoke

anonymous

Phoenix Snoke is frustrated IoT inventor. His great devices like The Bathroom Buddy with Facebook integration, …

Samantha Davison

images/image.jpeg

Samantha Davison is a Behavioral Engineering Manager at Lyft where she nudges employees & users towards positive …

Sophia Fadli

images/image.jpeg

Sophia Fadli is the founder of BSideNOVA by day and a Cyber Defense Analyst by night. She speaks 3 different languages …

Tim Roberts

images/image.jpeg

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …

Trey Underwood

images/image.png

Trey Underwood is a infosec engineer at a super secret security company. Previously he has been involved with several IT …

Yolonda Smith

images/image.jpeg

Yolonda Smith is a Lead Infosec Analyst with Target Corporation‚ Business Information Security Office, aligned with the …

All of our past speakers!

2018

Amanda Berlin

images/image.jpeg

Amanda Berlin is a Sr. Security Analyst for a consulting firm in Southern Michigan. She has spent over a decade in …

Andrew Hay

images/image.jpeg

Andrew Hay is an information security industry veteran with close to 20 years of experience as a security practitioner, …

Brent White

images/image.jpeg

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …

Brett Gravois

images/image.jpeg

Brett is a Breaker of Web Applications, Leader of a DefCon Group, Maker of Tasty Food, and Owner of a Majestic Beard. He …

Brian Andrzejewski

anonymous

Brian is the lead Information Security Engineer in the CyberDefense Branch at the United States Customs and Immigration …

Chris Silvers

images/image.jpg

With more than 25 years of information security experience, Chris Silvers, CISSP, MBA, is the Founder and Principal …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

Dan McInerney

images/image.png

Dan was a pentester for a decade before moving into AI security research as ProtectAI’s Lead Threat Researcher. …

Derek Banks

anonymous

Derek Banks is a Security Analyst at Black Hills Information Security where he does penetration testing and red teaming. …

Esteban Rodriguez

images/image.png

I am a Security Consultant at Coalfire Labs. I primarily perform network and web application penetration testing. I …

FuzzyNop

images/image.png

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …

Imani Palmer

images/image.jpeg

I am a research programmer at the Information Trust Institute. My primary research focus is the abstraction of low-level …

Jayesh Singh Chauhan

images/image.jpeg

Jayesh Singh Chauhan is a security professional with more than 6 years of experience in the security space. In past, he …

Joe Gray

images/image.png

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics …

John Sonnenschein

anonymous

John works on the Vulnerability Discovery and Product Security teams at Slack, finding bugs before the bad guys do and …

John Stickle

anonymous

Security researcher and penetration tester

Joshua Crumbaugh

anonymous

Joshua Crumbaugh is one of the world’s leading security awareness experts and a world-renowned cyber security …

Joshua Tannehill

anonymous

MSgt Louisiana Air (Force) National Guard in NOLA. Member of Fortune 500 global cyber IR team (CenturyLink) and LA …

Konstantinos Karagiannis

images/image.png

Konstantinos Karagiannis is the Chief Technology Officer for Security Consulting at BT Americas. In addition to guiding …

Luke Hebert

anonymous

Luke is presenting with Nathan.

Nathan and Luke are with the engineering firm Cybirical where they help electric utility …

Marcus Carey

images/image.jpeg

Marcus J. Carey is the founder and CEO of Threatcare. He is a hacker who helps people not suck at cybersecurity. Marcus …

Max Feldman

anonymous

Max works on the Vulnerability Discovery and Product Security teams at Slack, finding bugs before the bad guys do and …

Michael Cole

anonymous

Michael Cole has been in the technology and security field for over 15 years. Michael’s technical background …

Mikhail Sudakov

images/image.jpeg

BIO coming soon

Twitter: @msudakov0

Nancy Snoke

images/image.jpeg

Nancy Snoke is currently a Senior IT Security Engineer with PGAC specializing in application security. Previously, she …

Nathan Wallace

anonymous

Nathan is presenting with Luke.

Nathan and Luke are with the engineering firm Cybirical where they help electric utility …

Noncetonic

anonymous

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …

Paul W. Brager Jr M.Sci, CISSP, GICSP, CISM

images/image.jpeg

Mr. Paul W. Brager, Jr has been a contributing member of the cyber security community for over twenty-three (23) years, …

Phoenix Snoke

anonymous

Phoenix Snoke is frustrated IoT inventor. His great devices like The Bathroom Buddy with Facebook integration, …

Russell Mosley

images/image.jpeg

Russell is consultant and former CISO with over 20 years experience responsible for operational security and compliance. …

Ryan St. Germain

images/image.png

Ryan is a Senior Information Security Engineer with ten years’ experience, a Master’s Degree, and CISSP …

Sean Metcalf

anonymous

Sean Metcalf is founder and principal consultant at Trimarc (www.TrimarcSecurity.com ) a consulting company which …

Stefano Maccaglia

anonymous

Malware Analyst, part of RSA IR team. I have worked in several IR investigations worldwide. I was an active hacker in …

Stella

images/image.jpeg

Training and inclusion specialist, I work with vulnerable groups advising on privacy. Brexit fleeing Brit, found my …

Stephen Heath

images/image.png

Stephen currently serves as a Partner for Intrinium, Inc., a security consultancy in the Pacific Northwest. He has …

Taylor Banks

anonymous

Taylor Banks, Founder of ACE Hackware, has spent 15 years in information security. Experienced in applied hacking and …

Tim Medin

images/image.jpeg

Tim Medin is the Founder of Red Siege Information Security and focuses on the offensive arts.

Twitter: @TimMedin

Tim Roberts

images/image.jpeg

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …

Todd Carr

images/image.jpeg

Todd Carr is a DevOps Engineer at Unity Technologies. He has built highly automated systems across multiple platforms …

Wartortell

images/image.jpeg

Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …

Will Caput

images/image.png

Pen-tester, researcher. 10 years info-sec. Former Marine.

Twitter: @norcalpromo

All of our past speakers!

2017

\"Snow\" Stephanie Carruthers

images/image.jpeg

Stephanie Carruthers is a social engineering professional. After winning a black badge at DEF CON 22 for the Social …

Aaron Hnatiw

images/image.jpeg

Aaron Hnatiw is a Senior Security Researcher for Security Compass, an information security advisory firm specializing in …

Brent Cook

anonymous

Brent Cook is the Engineering Manager for Metasploit at Rapid7, as well as one of the core Meterpreter payload …

Brent White

images/image.jpeg

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …

Brian Marks

anonymous

Brian from Chicago, is an incident response consultant. He both thrive on chasing bad guys on a daily basis.  Brian has …

Charlie Vedaa

images/image.jpeg

Charlie Vedaa, GSE #112, is a fork and spoon operator for the US government. He’s presented at several conferences …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …

Dave Lewis

images/image.jpeg

Dave Lewis has almost two decades of industry experience. He has extensive experience in IT operations and management. …

David Kennedy

images/image.jpeg

David Kennedy is the Founder of TrustedSec, LLC and Co-Founder and CTO of Binary Defense Systems (BDS). David started …

David Schwartzberg

images/image.jpeg

David Schwartzberg, CISSP, GMOB, is Sr. Manager, Security & Privacy for MobileIron. He has 22 years of information …

David Shaw

images/image.jpeg

David has extensive experience in many areas of information security.

Beginning his career as a Network Security …

FuzzyNop

images/image.png

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …

Haydn Johnson

images/image.jpeg

Haydn has over 4 years of information security experience, including network/web penetration testing, vulnerability …

Jeff Man

images/image.jpeg

Jeff is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in …

Jim Allee

anonymous

Jimi2x has 25+ years of experience in InfoSec (Blue+Red+Purple Teaming/Security Research) and also involved in the video …

Jim Nitterauer

images/image.jpeg

Jim is a Senior Security Engineer at AppRiver, LLC. a Zix Company. He holds a CISSP, a CISM and is well-versed in …

Joshua Galloway

anonymous

Josh Galloway is a Research Scientist at Cylance. He previously worked as a malware analyst at Cylance, and prior to …

Justin "h0m3l3ss" Whitehead

anonymous

H0m3l3ss (Justin Whitehead) has 8 years of experience in InfoSec (Forensics, Incident Response, and Red Teaming). …

Leah Figueroa

images/image.jpeg

Leah Figueroa is a 13 year veteran of the data analytics field and works as a data analyst in higher education.  She …

Lennart Koopmann

images/image.png

Lennart is the founder of Graylog and started the project in 2010. He has a strong software development background and …

Matt Bromiley

anonymous

Matt has experience in incident response, digital forensics, threat intelligence, and network security monitoring. His …

Matt Domko

images/image.jpeg

“I’m just a guy playing with Legos. I crudely assemble the knowledge I have to build a solution for my …

Nancy Snoke

images/image.jpeg

Nancy Snoke is currently a Senior IT Security Engineer with PGAC specializing in application security. Previously, she …

Nathan Clark

anonymous

Nathan is an physical penetration tester, IT guy, network specialist, and general hacker.

Nathan has been working in the …

Nathaniel Gleicher

anonymous

Nathaniel Gleicher is the Head of Cybersecurity Strategy at Illumio, and is trained as a computer scientist and a …

Peter Bassill

anonymous

Peter has worked in the Information Security domain since 1999 and in IT in general since 1996. His work history …

Phoenix Snoke

anonymous

Phoenix Snoke is frustrated IoT inventor. His great devices like The Bathroom Buddy with Facebook integration, …

Sean Cassidy

images/image.png

Bio: Sean is the CTO of DefenseStorm, a next gen SIEM for cloud and on-premise networks. When he’s not knee-deep …

Shannon Fritz

images/image.jpeg

Shannon Fritz is a Microsoft MVP for Enterprise Security and is the Solutions Architect at Concurrency, Inc.; a Systems …

Tim Roberts

images/image.jpeg

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …

Todd Carr

images/image.jpeg

Todd Carr is a DevOps Engineer at Unity Technologies. He has built highly automated systems across multiple platforms …

Trey Underwood

images/image.png

Trey Underwood is a infosec engineer at a super secret security company. Previously he has been involved with several IT …

Wartortell

images/image.jpeg

Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …

All of our past speakers!

2016

Aamir Lakhani

images/image.png

Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major …

Andrew Cole

images/image.jpeg

Andrew Cole (@colemination) is a security researcher with an obsessive passion for Windows PowerShell. In a past life he …

Benjamin Brown

images/image.png

Benjamin Brown currently works on darknet research, threat intelligence, incident response, and adversarial resilience …

Brent White

images/image.jpeg

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …

Brett Gravois

images/image.jpeg

Brett is a Breaker of Web Applications, Leader of a DefCon Group, Maker of Tasty Food, and Owner of a Majestic Beard. He …

Caleb Thompson

images/image.jpeg

Speaker, developer, painter, gamer: an eccentric eclectic. Caleb is currently coding mostly in Ruby and Go.

He has …

Chip Thornsburg

images/image.jpeg

Chip Thornsburg is a Police Officer and Electronic Crimes Investigator for the City of Helotes. He oversees compliance …

cry0

images/image.jpeg

A newcomer to the InfoSec community, cry0 is an aspiring security researcher who chose the red pill. cry0 resides on the …

Cyni Winegard

images/image.jpeg

Cyni Winegard is currently an information security analyst with TraceSecurity. Starting her career as a systems …

Dave Lewis

images/image.jpeg

Dave Lewis has almost two decades of industry experience. He has extensive experience in IT operations and management. …

David Kennedy

images/image.jpeg

David Kennedy is the Founder of TrustedSec, LLC and Co-Founder and CTO of Binary Defense Systems (BDS). David started …

David Schwartzberg

images/image.jpeg

David Schwartzberg, CISSP, GMOB, is Sr. Manager, Security & Privacy for MobileIron. He has 22 years of information …

David Shaw

images/image.jpeg

David has extensive experience in many areas of information security.

Beginning his career as a Network Security …

Gabe K

images/image.jpeg

Gabe wasted the majority of his youth staring at Pokemon ROMs in hex editors. He is currently studying Computer Science …

Grecs

anonymous

grecs has two decades of industry experience, undergraduate and graduate engineering degrees, and a really well known …

Jim Nitterauer

images/image.jpeg

Jim is a Senior Security Engineer at AppRiver, LLC. a Zix Company. He holds a CISSP, a CISM and is well-versed in …

John Shade

anonymous

John Shade is a security researcher whose interests include privacy, network traffic analysis, and penetration testing. …

Joseph Pierini

anonymous

Joseph Pierini is the Director of Technical Services at PSC. He is responsible for the development and execution of the …

Josh Stone

images/image.jpeg

Josh Stone is a security researcher, working currently in the area of red teaming command and control systems. …

Leif Dreizler

images/image.jpeg

As a Senior Security Engineer at Bugcrowd, Leif Dreizler works to build the internal security program and customize and …

Luke McOmie

images/image.jpeg

Since 1994, Pyr0 (Luke) has been a trusted advisor, security leader and industry mentor. At Blue Bastion, he is the Vice …

Madhu Akula

anonymous

Madhu Akula is a Security Engineer @Walmartlabs. Chapter Lead & Regular Speaker at Null - The Open Security …

Matt Bromiley

anonymous

Matt has experience in incident response, digital forensics, threat intelligence, and network security monitoring. His …

metacortex

images/image.jpeg

The end of the world is probably not right around the corner but metacortex will tell you it is just to see if you will …

Nancy Snoke

images/image.jpeg

Nancy Snoke is currently a Senior IT Security Engineer with PGAC specializing in application security. Previously, she …

Patrick Fussell

images/image.png

While working in the information security industry over the past 5 years Patrick Fussell has worked in numerous roles to …

Rob Havelt

images/image.png

Bourbon-fueled absurdist. Raconteur. Man about town. All words used to describe Rob Havelt. These days, Rob identifies …

s0ups

images/image.jpeg

s0ups is a cool guy, his name can be found on many restaurant menus around the globe and he has been volunteering with …

Stacey Banks

images/image.jpeg

InfoSec Wonk. Geek. Pirate Captain. Triathlete. GRT.

Tim Roberts

images/image.jpeg

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …

Wartortell

images/image.jpeg

Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …

William Hoang

images/image.jpeg

William is a Developer Advocate on the Mobile Engineering & Developer Relations team at Couchbase. His love for …

All of our past speakers!

2015

Ahamed Nafeez

anonymous

Ahamed Nafeez is a security engineer with interest in browser and network security. In the past, he has been a speaker …

Alfredo Ramirez

anonymous

Alfredo is a Senior Security Consultant at Virtual Security Research in Boston with a background in web, mobile and …

Andy Ellis

anonymous

Andy Ellis is Akamai’s Chief Security Officer, responsible for overseeing the security architecture and compliance …

Ben Miller

images/image.png

Information systems specialist turned offensive security expert, Ben Miller brings a unique mix of networking, …

Benjamin Brown

images/image.png

Benjamin Brown currently works on darknet research, threat intelligence, incident response, and adversarial resilience …

Catherine Pearce

anonymous

Catherine (Kate) Pearce is a Senior Security Consultant at Neohapsis (Now a part of Cisco). Kate spends half her time …

Chris Sistrunk

anonymous

Chris is a Senior Consultant at Mandiant, focusing on cyber security for industrial control systems (ICS) and critical …

David Shaw

images/image.jpeg

David has extensive experience in many areas of information security.

Beginning his career as a Network Security …

Erik Burgess

anonymous

Erik has been working in the Information Technology industry for the past twenty years, while primarily focusing on …

Evan Booth

images/image.png

Evan’s company, Recursive Squirrel, has served a wide variety of clients in need of application development and …

FuzzyNop

images/image.png

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …

Gregory Carpenter

anonymous

Gregory Carpenter, CISM, is the owner of Gregory Carpenter Enterprises LLC and co-author of “Reverse Deception: …

int0x80

images/image.png

int0x80 is the rapper in Dual Core.  He has a mustache and doesn’t afraid of anything.

Jeremiah Talamantes

anonymous

Jeremiah has been in the IT security industry for nearly 20 years and is the founder and president of RedTeam Security. …

Jeremy Brown

anonymous

Jeremy is a security researcher focused on application security, largely involved in vulnerability research and …

Jonathan Suldo

anonymous

The past 5 years I’ve taken the hobby and made it a profession as Penetration Tester and Information Security …

Josh Stone

images/image.jpeg

Josh Stone is a security researcher, working currently in the area of red teaming command and control systems. …

Shannon Sistrunk

images/image.png

Shannon Sistrunk has a B.A. in Speech Communication from Louisiana Tech University and a M.S. in Applied Communication …

Wartortell

images/image.jpeg

Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …

All of our past speakers!

2014

Ben Miller

images/image.png

Information systems specialist turned offensive security expert, Ben Miller brings a unique mix of networking, …

Benjamin Brown

images/image.png

Benjamin Brown currently works on darknet research, threat intelligence, incident response, and adversarial resilience …

Brandon Niemczyk

images/image.png

Brandon Niemczyk was born in Chicago. He has been writing code since he was a child with his first 386 modifying the …

Brett Shavers

images/image.png

Brett Shavers is the author of Placing the Suspect Behind the Keyboard and The Practitioner’s Guide to X-Ways …

Brian Foster

anonymous

Brian Foster brings over 25 years of successful product management and development experience to Damballa. Recently, …

Chad Olivier

images/image.png

Chad Olivier is the owner of Shades of Gray Security. He has over a decade of experience in IT security. He has worked …

David Shaw

images/image.jpeg

David has extensive experience in many areas of information security.

Beginning his career as a Network Security …

Evan Booth

images/image.png

Evan’s company, Recursive Squirrel, has served a wide variety of clients in need of application development and …

FuzzyNop

images/image.png

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …

Grecs

anonymous

grecs has two decades of industry experience, undergraduate and graduate engineering degrees, and a really well known …

int0x80

images/image.png

int0x80 is the rapper in Dual Core.  He has a mustache and doesn’t afraid of anything.

Josh Stone

images/image.jpeg

Josh Stone is a security researcher, working currently in the area of red teaming command and control systems. …

Joshua Perrymon

images/image.png

Josh has been in the security game for 15+ years, with a focus on Red Teaming, Social Engineering, Threat, and …

Paul Asadoorian

images/image.png

Paul Asadoorian is the founder and CEO of Security Weekly (formerly “PaulDotCom”), an organization which has …

Shannon Sistrunk

images/image.png

Shannon Sistrunk has a B.A. in Speech Communication from Louisiana Tech University and a M.S. in Applied Communication …

Steve Jensen

images/image.png

Steve Jensen is a Principal Consultant at Veracode. He has a background in software development, and has been actively …

Victor Mata

images/image.png

Victor Mata and Josh Stone have been working in the security industry for a combined 20 years, with focus on penetration …

Register Today!