All of our past speakers!

Speakers - 2017

\"Snow\" Stephanie Carruthers

images/image.jpeg

Stephanie Carruthers is a social engineering professional. After winning a black badge at DEF CON 22 for the Social …

Aaron Hnatiw

images/image.jpeg

Aaron Hnatiw is a Senior Security Researcher for Security Compass, an information security advisory firm specializing in …

Brent Cook

anonymous

Brent Cook is the Engineering Manager for Metasploit at Rapid7, as well as one of the core Meterpreter payload …

Brent White

images/image.jpeg

Brent is an Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety …

Brian Marks

anonymous

Brian from Chicago, is an incident response consultant. He both thrive on chasing bad guys on a daily basis.  Brian has …

Charlie Vedaa

images/image.jpeg

Charlie Vedaa, GSE #112, is a fork and spoon operator for the US government. He’s presented at several conferences …

Damon J. Small

images/image.jpeg

Damon “ch3f” Small is an industry veteran with nearly 30 years of experience in the information security field. He began …

Dave Lewis

images/image.jpeg

Dave Lewis has almost two decades of industry experience. He has extensive experience in IT operations and management. …

David Kennedy

images/image.jpeg

David Kennedy is the Founder of TrustedSec, LLC and Co-Founder and CTO of Binary Defense Systems (BDS). David started …

David Schwartzberg

images/image.jpeg

David Schwartzberg, CISSP, GMOB, is Sr. Manager, Security & Privacy for MobileIron. He has 22 years of information …

David Shaw

images/image.jpeg

David has extensive experience in many areas of information security.

Beginning his career as a Network Security …

FuzzyNop

images/image.png

Forged in the fire of yoloscoped Red Team operations, these space-wolves learned the hard way. The dark abyss of the …

Haydn Johnson

images/image.jpeg

Haydn has over 4 years of information security experience, including network/web penetration testing, vulnerability …

Jeff Man

images/image.jpeg

Jeff is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in …

Jim Allee

anonymous

Jimi2x has 25+ years of experience in InfoSec (Blue+Red+Purple Teaming/Security Research) and also involved in the video …

Jim Nitterauer

images/image.jpeg

Jim is a Senior Security Engineer at AppRiver, LLC. a Zix Company. He holds a CISSP, a CISM and is well-versed in …

Joshua Galloway

anonymous

Josh Galloway is a Research Scientist at Cylance. He previously worked as a malware analyst at Cylance, and prior to …

Justin "h0m3l3ss" Whitehead

anonymous

H0m3l3ss (Justin Whitehead) has 8 years of experience in InfoSec (Forensics, Incident Response, and Red Teaming). …

Leah Figueroa

images/image.jpeg

Leah Figueroa is a 13 year veteran of the data analytics field and works as a data analyst in higher education.  She …

Lennart Koopmann

images/image.png

Lennart is the founder of Graylog and started the project in 2010. He has a strong software development background and …

Matt Bromiley

anonymous

Matt has experience in incident response, digital forensics, threat intelligence, and network security monitoring. His …

Matt Domko

images/image.jpeg

“I’m just a guy playing with Legos. I crudely assemble the knowledge I have to build a solution for my …

Nancy Snoke

images/image.jpeg

Nancy Snoke is currently a Senior IT Security Engineer with PGAC specializing in application security. Previously, she …

Nathan Clark

anonymous

Nathan is an physical penetration tester, IT guy, network specialist, and general hacker.

Nathan has been working in the …

Nathaniel Gleicher

anonymous

Nathaniel Gleicher is the Head of Cybersecurity Strategy at Illumio, and is trained as a computer scientist and a …

Peter Bassill

anonymous

Peter has worked in the Information Security domain since 1999 and in IT in general since 1996. His work history …

Phoenix Snoke

anonymous

Phoenix Snoke is frustrated IoT inventor. His great devices like The Bathroom Buddy with Facebook integration, …

Sean Cassidy

images/image.png

Bio: Sean is the CTO of DefenseStorm, a next gen SIEM for cloud and on-premise networks. When he’s not knee-deep …

Shannon Fritz

images/image.jpeg

Shannon Fritz is a Microsoft MVP for Enterprise Security and is the Solutions Architect at Concurrency, Inc.; a Systems …

Tim Roberts

images/image.jpeg

Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international …

Todd Carr

images/image.jpeg

Todd Carr is a DevOps Engineer at Unity Technologies. He has built highly automated systems across multiple platforms …

Trey Underwood

images/image.png

Trey Underwood is a infosec engineer at a super secret security company. Previously he has been involved with several IT …

Wartortell

images/image.jpeg

Wartortell writes systems that find evils for the FaceBook. Previously he worked in Reverse Engineering, Threat Intel, …

Register Today!