All of our past speakers!
Speakers - 2017
\"Snow\" Stephanie Carruthers

Stephanie Carruthers is a social engineering professional. After winning a black badge at DEF CON 22 for the Social …
Aaron Hnatiw

Aaron Hnatiw is a Senior Security Researcher for Security Compass, an information security advisory firm specializing in …
Brent Cook

Brent Cook is the Engineering Manager for Metasploit at Rapid7, as well as one of the core Meterpreter payload …
Brent White

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …
Brian Marks

Brian from Chicago, is an incident response consultant. He both thrive on chasing bad guys on a daily basis. Brian has …
Charlie Vedaa

Charlie Vedaa, GSE #112, is a fork and spoon operator for the US government. He’s presented at several conferences …
Damon J. Small

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security field. He began …
Dave Lewis

Dave Lewis has almost two decades of industry experience. He has extensive experience in IT operations and management. …
David Kennedy

David Kennedy is the Founder of TrustedSec, LLC and Co-Founder and CTO of Binary Defense Systems (BDS). David started …
David Schwartzberg

David Schwartzberg, CISSP, GMOB, is Sr. Manager, Security & Privacy for MobileIron. He has 22 years of information …
David Shaw

David has extensive experience in many areas of information security.
Beginning his career as a Network Security …
FuzzyNop

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …
Haydn Johnson

Haydn has over 4 years of information security experience, including network/web penetration testing, vulnerability …
Jeff Man

Jeff is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in …
Jim Allee

Jimi2x has 25+ years of experience in InfoSec (Blue+Red+Purple Teaming/Security Research) and also involved in the video …
Jim Nitterauer

Jim is a Senior Security Engineer at AppRiver, LLC. a Zix Company. He holds a CISSP, a CISM and is well-versed in …
Joshua Galloway

Josh Galloway is a Research Scientist at Cylance. He previously worked as a malware analyst at Cylance, and prior to …
Justin "h0m3l3ss" Whitehead

H0m3l3ss (Justin Whitehead) has 8 years of experience in InfoSec (Forensics, Incident Response, and Red Teaming). …
Leah Figueroa

Leah Figueroa is a 13 year veteran of the data analytics field and works as a data analyst in higher education. She …
Lennart Koopmann

Lennart is the founder of Graylog and started the project in 2010. He has a strong software development background and …
Matt Bromiley

Matt has experience in incident response, digital forensics, threat intelligence, and network security monitoring. His …
Matt Domko

“I’m just a guy playing with Legos. I crudely assemble the knowledge I have to build a solution for my …
Nancy Snoke

Nancy Snoke is currently a Senior IT Security Engineer with PGAC specializing in application security. Previously, she …
Nathan Clark

Nathan is an physical penetration tester, IT guy, network specialist, and general hacker.
Nathan has been working in the …
Nathaniel Gleicher

Nathaniel Gleicher is the Head of Cybersecurity Strategy at Illumio, and is trained as a computer scientist and a …
Peter Bassill

Peter has worked in the Information Security domain since 1999 and in IT in general since 1996. His work history …
Phoenix Snoke

Phoenix Snoke is frustrated IoT inventor. His great devices like The Bathroom Buddy with Facebook integration, …
Sean Cassidy

Bio: Sean is the CTO of DefenseStorm, a next gen SIEM for cloud and on-premise networks. When he’s not knee-deep …
Shannon Fritz

Shannon Fritz is a Microsoft MVP for Enterprise Security and is the Solutions Architect at Concurrency, Inc.; a Systems …
Tim Roberts

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …
Todd Carr

Todd Carr is a DevOps Engineer at Unity Technologies. He has built highly automated systems across multiple platforms …
Trey Underwood

Trey Underwood is a infosec engineer at a super secret security company. Previously he has been involved with several IT …
Wartortell

Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …