All of our past speakers!
Speakers - 2017
\"Snow\" Stephanie Carruthers
Stephanie Carruthers is a social engineering professional. After winning a black badge at DEF CON 22 for the Social …
Aaron Hnatiw
Aaron Hnatiw is a Senior Security Researcher for Security Compass, an information security advisory firm specializing in …
Brent Cook
Brent Cook is the Engineering Manager for Metasploit at Rapid7, as well as one of the core Meterpreter payload …
Brent White
Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …
Brian Marks
Brian from Chicago, is an incident response consultant. He both thrive on chasing bad guys on a daily basis. Brian has …
Charlie Vedaa
Charlie Vedaa, GSE #112, is a fork and spoon operator for the US government. He’s presented at several conferences …
Damon J. Small
Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security …
Dave Lewis
Dave Lewis has almost two decades of industry experience. He has extensive experience in IT operations and management. …
David Kennedy
David Kennedy is the Founder of TrustedSec, LLC and Co-Founder and CTO of Binary Defense Systems (BDS). David started …
David Schwartzberg
David Schwartzberg, CISSP, GMOB, is Sr. Manager, Security & Privacy for MobileIron. He has 22 years of information …
David Shaw
David has extensive experience in many areas of information security.
Beginning his career as a Network Security …
FuzzyNop
Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …
Haydn Johnson
Haydn has over 4 years of information security experience, including network/web penetration testing, vulnerability …
Jeff Man
Jeff is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in …
Jim Allee
Jimi2x has 25+ years of experience in InfoSec (Blue+Red+Purple Teaming/Security Research) and also involved in the video …
Jim Nitterauer
Jim is a Senior Security Engineer at AppRiver, LLC. a Zix Company. He holds a CISSP, a CISM and is well-versed in …
Joshua Galloway
Josh Galloway is a Research Scientist at Cylance. He previously worked as a malware analyst at Cylance, and prior to …
Justin "h0m3l3ss" Whitehead
H0m3l3ss (Justin Whitehead) has 8 years of experience in InfoSec (Forensics, Incident Response, and Red Teaming). …
Leah Figueroa
Leah Figueroa is a 13 year veteran of the data analytics field and works as a data analyst in higher education. She …
Lennart Koopmann
Lennart is the founder of Graylog and started the project in 2010. He has a strong software development background and …
Matt Bromiley
Matt has experience in incident response, digital forensics, threat intelligence, and network security monitoring. His …
Matt Domko
“I’m just a guy playing with Legos. I crudely assemble the knowledge I have to build a solution for my …
Nancy Snoke
Nancy Snoke is currently a Senior IT Security Engineer with PGAC specializing in application security. Previously, she …
Nathan Clark
Nathan is an physical penetration tester, IT guy, network specialist, and general hacker.
Nathan has been working in the …
Nathaniel Gleicher
Nathaniel Gleicher is the Head of Cybersecurity Strategy at Illumio, and is trained as a computer scientist and a …
Peter Bassill
Peter has worked in the Information Security domain since 1999 and in IT in general since 1996. His work history …
Phoenix Snoke
Phoenix Snoke is frustrated IoT inventor. His great devices like The Bathroom Buddy with Facebook integration, …
Sean Cassidy
Bio: Sean is the CTO of DefenseStorm, a next gen SIEM for cloud and on-premise networks. When he’s not knee-deep …
Shannon Fritz
Shannon Fritz is a Microsoft MVP for Enterprise Security and is the Solutions Architect at Concurrency, Inc.; a Systems …
Tim Roberts
Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …
Todd Carr
Todd Carr is a DevOps Engineer at Unity Technologies. He has built highly automated systems across multiple platforms …
Trey Underwood
Trey Underwood is a infosec engineer at a super secret security company. Previously he has been involved with several IT …
Wartortell
Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …

