All of our past speakers!

Speakers - 2015

Ahamed Nafeez

anonymous

Ahamed Nafeez is a security engineer with interest in browser and network security. In the past, he has been a speaker …

Alfredo Ramirez

anonymous

Alfredo is a Senior Security Consultant at Virtual Security Research in Boston with a background in web, mobile and …

Andy Ellis

anonymous

Andy Ellis is Akamai’s Chief Security Officer, responsible for overseeing the security architecture and compliance …

Ben Miller

images/image.png

Information systems specialist turned offensive security expert, Ben Miller brings a unique mix of networking, …

Benjamin Brown

images/image.png

Benjamin Brown currently works on darknet research, threat intelligence, incident response, and adversarial resilience …

Catherine Pearce

anonymous

Catherine (Kate) Pearce is a Senior Security Consultant at Neohapsis (Now a part of Cisco). Kate spends half her time …

Chris Sistrunk

anonymous

Chris is a Senior Consultant at Mandiant, focusing on cyber security for industrial control systems (ICS) and critical …

David Shaw

images/image.jpeg

David has extensive experience in many areas of information security.

Beginning his career as a Network Security …

Erik Burgess

anonymous

Erik has been working in the Information Technology industry for the past twenty years, while primarily focusing on …

Evan Booth

images/image.png

Evan’s company, Recursive Squirrel, has served a wide variety of clients in need of application development and …

FuzzyNop

images/image.png

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …

Gregory Carpenter

anonymous

Gregory Carpenter, CISM, is the owner of Gregory Carpenter Enterprises LLC and co-author of “Reverse Deception: …

int0x80

images/image.png

int0x80 is the rapper in Dual Core.  He has a mustache and doesn’t afraid of anything.

Jeremiah Talamantes

anonymous

Jeremiah has been in the IT security industry for nearly 20 years and is the founder and president of RedTeam Security. …

Jeremy Brown

anonymous

Jeremy is a security researcher focused on application security, largely involved in vulnerability research and …

Jonathan Suldo

anonymous

The past 5 years I’ve taken the hobby and made it a profession as Penetration Tester and Information Security …

Josh Stone

images/image.jpeg

Josh Stone is a security researcher, working currently in the area of red teaming command and control systems. …

Shannon Sistrunk

images/image.png

Shannon Sistrunk has a B.A. in Speech Communication from Louisiana Tech University and a M.S. in Applied Communication …

Wartortell

images/image.jpeg

Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …

Register Today!