Texas Cyber Summit 2022

Thursday, September 22 2022 8:00 AM - Saturday, September 24 2022 7:00 PM [CDT]

208 Barton Springs Rd, Austin, Texas, 78704, United States

Register Now

1. Select Seats

2. Review and Proceed

Days
Hours
Minutes
Seconds

Registration

Sale ended

GA General Admission Partial Approval - $295.00

GA level | Access to Conference, briefings and training | Swag Bag | Collectable badge/Lanyard. Bring this ticket and Gov.ID , ensure you email your vaccination card ahead of time, we use it to mark you completed and delete. Please check the safety guidelines and requirements frequently on the website as procedures may change as the CDC changes their requirements. Social Mixer ticket sold separately, must be 18yr.

sales ended

VIP Admission Partial Approval - $395.00

VIP level | Access to VIP/Speaker Mixer | VIP Event Gift | Extra Access.

Sale ended

Texas Cyber Summit - Social Speak Easy Partial Approval - $5.00

Attend the GA Event Speaker Easy Social Mixer - Thursday September 22nd, We are charging a small fee for this event to ensure we have the appropriate amount of food and beverages for those of age to attend. Attendee must be at least 21 yr of age to attend, photo id will be reviewed at check-in

sales ended

College Student/Military Partial Approval - $99.00

GA College Student or Military - Access to Conference, briefings and training only.

Sale ended

Texas Cyber - LA-GA Ticket Partial Approval - $129.00

Limited Availability, GA Discounted Ticket, no swag, no frills, great access to all briefings, keynotes and trainings. Does not include any social events, need to be purchased separately. Must follow all code of conduct and Covid related restrictions as outlined.

Enter your discount code

  • Subtotal (excluding fees and discounts)
  • Fee
  • Total amount
  • ( Inclusive of Texas )

Thursday, September 22 2022 8:00 AM - Saturday, September 24 2022 7:00 PM [CDT]

Hyatt Regency, 208 Barton Springs Rd, Austin, Texas, 78704, United States.

Texas Cyber Summit is a IRS-501(c)3 Non-Profit

Texas Cyber Summit Team would like to let attendees know, from the start, we have committed to hosting a convention that would help protect our attendees from the spread of COVID while staying true to the traditions that makes Texas Cyber Summit Educational, Fun and Memorable. As things continue to get better with Covid19 reduced transmission rate , we will relax our requirements. At this time you do not need to wear a mask through-out open areas of the hotel. Please practice patience onsite.

Covid19 Safety - By purchasing an in-person ticket you agree to follow all covid19 related rules and regulations, they are frequently updated on the website, please review them as you are bound by them.

The latest is here:  https://texascyber.com/updates/

Additionally, we have added many FAQs on the website addressing questions we have received from attendees, including details around the mask mandate and anticipated questions with today’s announcement.  We encourage you take the time to review each of these to help you prepare for Texas Cyber Summit 2022.

On-Site Tickets Sold will have access to the onsite event, we will have tickets for sale at the door as well. There will be no wait list or tickets on-hold. All ticket sales are final, this space is meant to host 2500 people so there is plenty of room for social distancing - we expect you will be comfortable and enjoy the lineup we have planned.

No Scheduled or Reserved Seating - All Conference rooms have limited seating, the first in line will get first choice of seat. (VIP - Will have access to the front row) You will need to be in line to attend briefings and workshops, and trainings (all hands-on Labs will have a Separate reg) we are not responsible if you are unable to attend a briefing because of lack of seating. We will try to accommodate everyone for every session if the demand is very high we may/will try to run the class again. Please practice patience as we start to move conferences back to in-person, there are always a lot of unknowns, and your patience goes a long way in making the event enjoyable for everyone.

Refunds/Cancellations: Conference registration cancellations after COB Friday, August 19, 2022 are NOT refundable. Requests for cancellation before Friday, August 19, 2022 are subject to a 25% cancellation fee. Cancellations must be submitted via email refund [at] texascyber org.

Finally – when onsite, before, during and after, please practice patience, we are in dealing with a fluid situation and depend on everyone maintaining a level head and patience.

 

 

 

TXCIBERDOJO,INC

https://TexasCyber.com

Texas Cyber Summit is a IRS-501(c)3 Non-Profit Fusion: A fusion of Cybersecurity Professionals and World Renown Hackers This year's event is a multi-day, multi-track, multi-platform diverse and inclusive conference for every level of knowledge. Just about every company needs to provide Cybersecurity awareness to their employees – What better way than to spend your training time, then with friends, colleagues, and acquaintances: learning from world renown experts, the up and coming, and having a fun, educational conference that provides dozens of options for training, briefings, labs, hands-on villages, workshops, challenges, competitions and a great number of other learning opportunities. 2022 Program: Texas Cyber Summit is loaded with World Renown Keynote speakers, workshops, briefing and trainers. Featuring highly technical briefings, cutting-edge trainings and groundbreaking research. This year will include informational breakout sessions, hands on training, tools and methods, a Capture the Flag competitions. Verticals for forensics, scada, critical infrastructure, hardware hacking, Wireless workshops, Red and Blue team specific trainings and challenges, briefings and hands-on classes, and of course our world class “Hackers Haven”, just to name a few. Sponsors are welcome: To review our multi-day professional business hall, and to obtain high visibility, there will be limited onsite booths and table space.

Contact the Organizer

Brigadier General Paul Craft
Deputy Commanding General
Joint Forces HQ. Cyber Command

https://www.arcyber.army.mil/Leaders/Leaders-Article-View-Page/Article/3144315/brig-gen-paul-g-craft/ Brig. Gen. Paul G. Craft has served as Deputy Commanding General, Joint Force Headquarters-Cyber (Army), U.S. Army Cyber Command (ARCYBER), since May 2022. As Deputy Commanding General of JFHQ-C (Army), he leads a team of more than 150 Soldiers, civilians and contractors that provide cyberspace support to U.S. Central Command, U.S. Africa Command, and U.S. Northern Command. A native of Piqua, Ohio, Craft graduated from the U.S. Military Academy at West Point, N.Y., in 1993 and commissioned as a second lieutenant in the Signal Corps. During his career Craft has served in key leadership and staff positions from platoon leader to company commander, battalion commander and brigade commander. He has served on multiple tours in armistice operations in the Republic of Korea; peacekeeping operations in Haiti with the 10th Mountain Division; multiple combat operations in Afghanistan with the 82nd Airborne Division and the British Army; and humanitarian operations supporting the Department of Homeland Security for the resettlement of Afghan refugees. At the operational and strategic level, he has served at the 3rd Military Intelligence Battalion (U.S. Army Intelligence and Security Command); the U.S. Army Signal Center of Excellence (U.S. Army Training and Doctrine Command), the U.S. Army Human Resources Command; the Army Network Enterprise Technology Command (NETCOM), the Department of the Army Chief Information Officer/G-6; the Defense Information Systems Agency; and Joint Force Headquarters– Department of Defense Information Network/U.S. Cyber Command. Prior to his assignment to JFHQ-C, he served as the Army Chief of Cyber and Commandant of Cyber and Electromagnetic Warfare School. Craft has earned a bachelor’s degree in American Political Science from the U.S. Military Academy, and master’s degrees in Information Management and Business Administration from Arizona State University (dual degree program) as part of the Army’s Advanced Civil Schooling program, and in National Security and Resource Strategy with a concentration in Cyber from the Eisenhower School, National Defense University.

https://www.goarmy.com/careers-and-jobs/specialty-careers/army-cyber.html

About Brigadier General Paul Craft

Deputy Commanding General
Joint Forces HQ. Cyber Command
Ed Mornston
Director of the Directorate of Intelligence and Security
US Army Futures Command

Mr. Ed Mornston serves as the Director of the Directorate of Intelligence and Security (DoIS) at Army Futures Command (AFC). In this role, he is a member of the AFC executive leadership team and is the Senior Intelligence Officer. Mr. Mornston is responsible for the strategic management of intelligence, counterintelligence, and security for Army Modernization. He provides authoritative advice and recommendations on intelligence matters related to the modernization of the Army in a changing strategic environment. Prior to joining AFC, Mr. Mornston served at the National Geospatial-Intelligence Agency (NGA) headquarters as the Agency Chief of Staff, Executive Director and as their Director of Human Resources. He also served in other leadership positions throughout NGA to include the Director of NGA-Denver at Aerospace Data Facility-Colorado and Director of Global Support, as well as Director and Deputy Director of the Joint Intelligence Task Force – Combating Terrorism at the Defense Intelligence Agency. Mr. Mornston enlisted in the Army upon graduating from high school, attended the Military Academy Prep School, and graduated from the United States Military Academy at West Point, New York in 1980. He served as an infantry officer for twenty years. Additionally, he received a Masters of Military Art and Science in 1992 from the School of Advanced Military Studies in Ft Leavenworth, Kansas, and a Graduate Certificate in Systems Engineering from George Washington University. Other significant training and certifications include, GEOINT Fundamentals Professional Certification; Chief of Staff Seminar – McChrystal Group; Senior Managers in Government from the Harvard

About Ed Mornston

Director of the Directorate of Intelligence and Security
US Army Futures Command
Red Thomas
Director of Operations
Texas Cyber Summit

Jason “Red” Thomas, Founder of Red Knight, Senior Security Researcher, passionate security researcher in the field of detection engineering. Volunteer at Texas Cyber Summit

https://www.red-knight.com

About Red Thomas

Director of Operations
Texas Cyber Summit
Peter Luo
CEO
Dtonomy

Peter Luo CEO, DTonomy | PhD | Ex-Microsoft | AI for SecOps

About Peter Luo

CEO
Dtonomy
Mike Schwartz
Founder/CEO
Gluu

Gluu Founder / CEO, Free Open Source Software advocate. Expert in digital authentication and access management: OpenID Connect, SAML, LDAP, UMA. Mike has been an entrepreneur and digital identity expert for more then two decades. The company he founded, Gluu, is one of the leaders in modern digital identity–the Gluu platform is relied on by large enterprise customers and governments around the world. In addition to his role as founder of Gluu, he is the author of the 2018 Apress book “Securing the Perimeter,” and is the host of the podcast Open Source Underdogs

About Mike Schwartz

Founder/CEO
Gluu
Bryan McAninch
Solutions Architect
N/A

Bryan McAninch is a cybersecurity professional with over twenty years of experience in various disciplines including digital forensics, security analytics, penetration testing, and security architecture. His independent security research is focused on the privacy and security implications of cloud, container, and artificial intelligence technologies. He holds a Bachelor of Science in Business Administration from the University of Texas at Dallas and a Master of Science in Cybersecurity from the University of Dallas. Additionally, he holds CISSP, SANS GPEN, SABSA CSA, and AWS CSA certifications. Bryan is passionate about cybersecurity and giving back to the community. He is the founder of Prevade Cybersecurity, founder of Hacking is NOT a Crime, organizer of the North Texas Cyber Security Group, member of the Dallas Hackers Association, SANS instructor, Frisco ISD mentor, and Collin College curriculum advisor.

About Bryan McAninch

Solutions Architect
N/A
Michael Heinzl
Security Researcher
N/A

Michael Heinzl, Security Researcher Michael is an independent security researcher specialized in vulnerability research, fuzzing and exploit development. With over a decade of industry experience in offensive security he has discovered a plethora of vulnerabilities across a wide range of high-value enterprise software and operating systems. “Michael is an independent security researcher specialized in vulnerability research, fuzzing and exploit development. With over a decade of industry experience in offensive security he has discovered a plethora of vulnerabilities across a wide range of high-value enterprise software and operating systems.

About Michael Heinzl

Security Researcher
N/A
Darryl MacLeod
Advisory Services
Lares

Darryl MacLeod has over 20 years experience in the IT security sector, having been responsible for optimizing service delivery to all levels of enterprise and government level organizations. Darryl MacLeod currently holds CISM, CISSP, CISA, and PCIP certifications. Darryl has presented at the Atlantic HTCIA IT Security Conference, Halifax Area Security Klatch (HASK), Security B-Sides St. John’s (x2), ISACA Atlantic Provinces Chapter Information Security & Risk Conference (x2) and GoSec. I sit on the Board of Directors for the Atlantic Security Conference and I was the Lead Organizer for the Security B-Sides Cape Breton conference.

About Darryl MacLeod

Advisory Services
Lares
Jay Paz
Senior Director
Cobalt

Jay Paz has more than 12 years of experience in information security and nineteen plus years of information technology experience including system analysis, design and implementation for enterprise level solutions. Jay has a strong background in developer supervision and training as well as experience in major programming languages, operating hardware and software, and major infrastructure application development. Specialties: Information Security, Application Security, Web Application Security, Penetration Testing, Risk Assessments, Security Policy, Security Awareness

About Jay Paz

Senior Director
Cobalt
Christopher Russell
Chief Information Security Officer
tZero Group

CISO at tZERO Group | Venture Capital Advisor | Snyk Ambassador • Cloud Security Certifications for AWS | Azure | GCP. • Cylance, Carbon Black, Palo Alto XDR, SentinelOne, Crowdstrike and Windows Defender ATP training and certifications. • PCNSE and PCNSC – Palo Alto Networks Certified Network Security Engineer and Consultant. • Chronicle, Splunk, Microsoft Sentinel, Devo and Greylog service ownerhsip and automation oversight. • Leadership and project management roles with both U.S. Military and private industry. • Master of Science Degree in Cyber Security, University of Dallas. • Bachelor of Arts Degree in Security Management, American Military University

About Christopher Russell

Chief Information Security Officer
tZero Group
James Boyd
HUNT Leader
Cisco Systems

James Boyd Experienced Principal Architect with a demonstrated history of working in the information technology and services industry. Skilled in Shamanism, PHP, Vulnerability Management, Computer Forensics, and IDA Pro. Strong information technology professional with a Master’s Degree focused in Information Technology from Grantham University.

About James Boyd

HUNT Leader
Cisco Systems
Jayson Street
Chief Chaos Officer
Truesec

As the Chief Chaos Officer, I exemplify real world teachable moments. By being a simulated adversary I can show employees how a real world attacker & criminal will try to steal & do damage in their environment. As a true advocate I make sure they are educated and fully understand the importance of Security Awareness by the time I’m finished. I also promote education over exploits, defense through discovery & security through awareness. I also teach several classes ranging from creating an internal security awareness team. To classes on becoming a full blown teachable moment like myself. At Truesec I work with all other departments in any way I can be of service. Our company’s main strength is the ability to work & learn from each other to better be able to provide the best service to our clients around the world!

https://HackerAdventures.World

About Jayson Street

Chief Chaos Officer
Truesec
Michael Gough
Principal Incident Response
NCC Group

Michael developed several Windows logging cheat sheets to help the security industry understand Windows logging, where to start and what to look for. Michael presents at many security and technology conferences helping to educate on security that attendees can go back to work and actually do. Michael is a primary contributor to the Open Source project ARTHIR. Michael is also co-developer of LOG-MD, a free and premium tool that audits the settings, harvests and reports on malicious Windows log data and malicious system artifacts. Michael is co-host of “THE Incident Response Podcast”. In addition Michael also ran BSides Texas entity (Austin, San Antonio, Dallas and Houston) for six years and lead for the Austin Conference.

About Michael Gough

Principal Incident Response
NCC Group
Timothy Amerson
Director of Scheduling
Texas Cyber Summit

Multi-certified, Cybersecurity Information Technology (IT) leader with 25+ years in federal government and military environments. Demonstrated in-depth knowledge of and experience with sound Cybersecurity and IT portfolio management and recognized technical expertise to understand strengths and weakness of current and future Cybersecurity and IT portfolio. Continually sought to address complex issues related to Cybersecurity concern, Cybersecurity Product Line Leader for the cybersecurity portfolio. Proven leadership including implementing forward-thinking, innovative programs, including the first-ever Texas National Guard Cyber Unit. Well regarded for expertise in relevant Cybersecurity and IT laws, regulations, policies, and procedures. Established the state’s first-ever cyber unit. Envisioned and stood up this multi-state Cyber Protection Team (CPT), ensuring appropriate training for all members and creation and implementation of appropriate cyber policies, as well as opportunities to participate in high level cyber exercises. Red Team, Blue Team and Accessor for Federal Cybersecurity exercises like Cyber Storm, Cyber Shield and Cyber Guard worked alongside NSA, FBI, and Judge Advocate. Certification: CISSP, CCNA-Cyber Ops, CCNA-Security; CNDA, CEH, PMP, ITIL Degree: BS CIS Military Award/Recognitions: Legion of Merit Medal, Bronze Star Medal, Meritorious Service Medal(4), Army Commendation Medals(2), Amy Achievement medal(6), National Defense Service Medal w/ Bronze Star(3), Iraq Campaign Medal w/ Campaign Star(2), Korean Defense Service Medal, Humanitarian Service Medal, Military Outstanding Volunteer Service Medal, Multi-National Force Operations Medal(2), Pathfinder Badge, Parachute Badge, Singapore Armed Forces Basic Parachutist Wings, Meritorious Unit Award, Army Superior Unit Award, Texas Superior Service Award, Texas Outstanding Service Medal, Texas Medal of Merit(2), Texas Combat Ribbon(2), Texas Cavalry Service Medal(2), Adjutant General’s Individual Award(2), Governors Unit Citation, Bronze Order of Mercury, Silver Order of Thor, Bronze Order of Saint George Volunteering: Mentoring and Coaching Cyber Patriot High school teams resulting in numerous awards, grants and accolades for the schools and the students: National and State level first and second place awards, Mayoral letter of proclamations, HEB $100,000 Grants, School Board Recognitions, ISC2 $3,000 scholarship, Navy Academy 4-year scholarship and other college Scholarships.

https://texascyber.com/

About Timothy Amerson

Director of Scheduling
Texas Cyber Summit
Santiago Holley
Threat Intelligence Leader
GE

Santiago Holley has worked in multiple threat intelligence and cyber positions over the past ten years, including a stint as a Threat Intelligence Lead with the FBI, and this allows him to offer some advice to security leaders that have been tasked with setting up a robust threat intelligence program for their organization.

About Santiago Holley

Threat Intelligence Leader
GE
Karl Rasmussen
Tech Advisor
GKRSOFT

MITRE Technical advisor for ACC/A26 at Lackland AFB, Texas. Background in Machine Learning, Malware Triage and Cloud.

About Karl Rasmussen

Tech Advisor
GKRSOFT
Christina Barker
Manager Global Cyber
Celonis

Christina Barker is the Manager of the Global Cyber Defense Team at Celonis, Inc., where she manages a global security operations center (SOC) team who is responsible for all security monitoring and incident response. Prior to her working at Celonis, Inc. Christina worked for NCC Group for five years as part of the North American Cyber Incident Response Team (NA-CIRT). She started her career with NCC Group as a Incident Response Security Consultant and eventually transitioned into the role of Practice Director of the NA-CIRT. During this time Christina worked various types of security incidents for clients and was exposed to several different technologies. Christina is currently a member of High Technology Crime Investigation Association (HTCIA), Global Information Assurance Certification (GIAC) Advisory Board, Information Security Systems Association (ISSA), and InfraGard. She has also participated as part of the working group who put on BSides Austin and teaches security basics to children at local schools. Christina obtained her GSEC in 2008, GCFE in 2013, GCIH in 2014, and GNFA in 2017. She also participated in the SANS FOR572: Advanced Network Forensics and Analysis course in 2017, where she and her team won the course challenge and earned the SANS Lethal Forensicator Coin award.

About Christina Barker

Manager Global Cyber
Celonis
Danielle Jablanski
OT Cybersecurity Strategist
Nozomi Networks

Danielle Jablanski is an OT cybersecurity strategist at Nozomi Networks, responsible for researching global cybersecurity topics and promoting operational technology (OT) and industrial control systems (ICS) cybersecurity awareness throughout the industry. She is also a nonresident fellow at the Cyber Statecraft Initiative of the Atlantic Council’s Scowcroft Center for Strategy and Security. Jablanski serves as a staff and advisory board member of the nonprofit organization Building Cyber Security, leading?cyber-physical?standards development, education, certifications, and labeling authority to advance physical security, safety, and privacy?in public and private sectors. Since January 2022, Jablanski has also served as the president of the North Texas Section of the International Society of Automation, organizing monthly member meetings, training, and community engagements. She is also a member of the Cybersecurity Apprenticeship Advisory Taskforce with the Building Apprenticeship Systems in Cybersecurity Program sponsored by the US Department of Labor. Jablanski has been responsible for conducting academic and market research on emerging technologies throughout her career. She has independently consulted for the US government and a technology startup on novel technology applications for the military, Department of Defense, and commercial sectors. She began her career with the Stanley Center for Peace and Security evaluating cyber technology impacts to nuclear weapons policy and use worldwide. Before returning to the world of physical and industrial cybersecurity, Jablanski was a senior research analyst with Guidehouse Insights and spent the two years prior contributing to the creation and development of the Stanford Cyber Policy Center at Stanford University. She holds a master’s degree in international security from the Josef Korbel School of International Studies at the University of Denver and a bachelor’s degree in political science from the University of Missouri – Columbia.?In her free time, Jablanski enjoys reading, camping, and the great outdoors with her family and two pups. She also volunteers locally with Reading Partners North Texas and the Tarrant Area Food bank.

About Danielle Jablanski

OT Cybersecurity Strategist
Nozomi Networks
Kevin Johnson
CEO
Secure Ideas

Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. Kevin Johnson has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute. In his free time, Kevin enjoys spending time with his family and is an avid Star Wars fan and member of the 501st Legion (a worldwide Star Wars costuming charity organization comprised of and operated by Star Wars fans).

https://www.secureideas.com

About Kevin Johnson

CEO
Secure Ideas
Christian Nanry
Sr. Inspector
United States Marshals Service

Dr. Christian A. Nanry is a veteran and serves his community as a law enforcement official for over 25 years. He holds an undergraduate’s degree from Empire State College, a master’s degree from Seton Hall University, and a Doctorate of Philosophy from Texas State University. Dr. Nanry’s research has focused on the relationship between higher education and law enforcement performance. He has been published in Preparedness Without Paranoia, an Adult Education Magazine focused on educating parents concerning current events. The researched topics illuminate Human Trafficking and Exploitation. Dr. Nanry has also written book reviews for accomplished authors on Modern Slavery. His current research aims to evaluate the current criminal justice degree curriculum in America and the associated occupational needs using a decision analysis to determine its efficacy and make recommendations for meeting the current law enforcement needs of our communities.

About Christian Nanry

Sr. Inspector
United States Marshals Service
Serge Borso
CEO
SpyderSec

Serge Borso is the Founder and CEO of SpyderSec, published author, SANS Certified Instructor & Course Author, President of the Denver OWASP Chapter, public speaker/presenter and seasoned cyber security professional. When it comes to cyber security, Serge is among the best possible instructors to learn from due to his experience, accomplishments, and, quite frankly, his personality. Duplicate badges to walk right through security and access a “secure” facility – did that. Dumpster diving for sensitive information outside of a financial institution – to him, that was “lots of fun.” Create an enterprise-wide, measurably successful security program for a billion-dollar company – one of his many accomplishments. All of them, in scope of the engagements. He’s an instructor for SEC488: Cloud Security Essentials and author for the upcoming SEC388: Introduction to Cloud Computing & Security, a published author, President of the Denver Open Web Application Security Project (OWASP) chapter, founder and CEO of the cyber security consulting firm, SpyderSec, he’s discovered multiple 0-days, written OSINT tools for the community, and is a polished presenter who speaks regularly at national conferences. Truly, an expert in the field.

https://spydersec.com/

About Serge Borso

CEO
SpyderSec
Weijia Yan
Student
Carnegie Mellon University

Weijia Yan is a passionate InfoSec advocate, she is a student at Carnegie Mellon University. She enjoys general cybersecurity education and raising awareness among her community.”

https://www.cmu.edu/ini/news/2022/yangooglescholarship.html

About Weijia Yan

Student
Carnegie Mellon University
Anup Barde
Federal Systems Engineer
Zscaler

Anup Barde has 20 years of pre-sales IT experience. Partnering, educating, gaining mindshare, and driving revenue. Extensive Federal Civilian, FSI, and Public Sector experience.

About Anup Barde

Federal Systems Engineer
Zscaler
Kayley Cerney
Federal Sales Manager
Zscaler

About Kayley Cerney

Federal Sales Manager
Zscaler
Jan Marek
Co-founder
Cyber Rangers

Jan Marek is a red teamer, security consultant and architect with more than 15 years of proven experience. Jan Marek focuses primarily on products in the area of cybersecurity, private and public cloud, specifically Windows Security, Microsoft Cloud Security Stack (Microsoft Sentinel, Microsoft Defender family), Microsoft Hyper-V, Windows Server and Active Directory. To prove his knowledge, he has passed many certifications – OSEP | OSCP | eCPPT | CHFI, CEH, CEI, Comptia Pentest+, MCSE, MCSA, MCITP, MCTS, MS, MCT. For his speaking-/writing- related activities, he was awarded with the Microsoft Community Contributor and Microsoft Most Valuable Professional (MVP) in the Cloud and Datacenter Management category. His daily work includes red teraming, penetration testing, purple teaming, incident reponse/digital forensics, engineering and training delivery. His motto is “Failure isn’t an option, it’s a choice.” Specialties: – Microsoft Security (Windows 10, Windows Server, Azure Sentinel/Defender, MDE, MDI) – Computer Forensics (Windows) – Penetration Tests and Red Team Operations (Windows, Active Directory, Microsoft Cloud) – PowerShell – Microsoft Hyper-V https://www.youtube.com/channel/UC8W-VCrRaXn5KyjO5rTQ74Q

cyber-rangers.com

About Jan Marek

Co-founder
Cyber Rangers
Conrad Maiorino
DoD Cybersecurity Systems Engineer
Zscaler

Conrad Maiorino is a Innovative Tech Sector Leader with a Core Engineering Foundation. A real enthusiast for true customer success with a proven track record for building businesses, high-performance teams and go to market strategic alliances. Known as an inspirational leader with strong integrity and 20+ years of driving growth in both public-sector and private theaters, comprising of security, cloud, software, and, data management at industry-leading Fortune 500 Technology Companies, including NetApp and Palo Alto Networks. Earned a Postgraduate Diploma with Merit in Information System Management from The University of Liverpool, England. Currently expanding my education, studying Artificial Intelligence and how to apply it to large datasets for faster A.I. Learning in the Cybersecurity realm. Skills include: Sales, Engineering and Technology Leadership, Revenue and Market Share Growth, Business Transformation by Disrupting Oneself, Developing High-Performance Teams, Strategic Planning and Execution, Creating Strategic Partnerships and Alliances; Strategy Consulting, Information Technology, Software, Cloud; Storage/Data Management

About Conrad Maiorino

DoD Cybersecurity Systems Engineer
Zscaler
Fernando Cruchaga
Sr. Solutions Engineer for Active Defense
Zscaler

Fernando Cruchaga over 30 years of I/T experience with the last 11 years focusing on Enterprise level Data Security. Extensive experience with Deception, and DLP Technology and with a side focus on SIEM environments including RSA eNvision and Netwitness.

About Fernando Cruchaga

Sr. Solutions Engineer for Active Defense
Zscaler
Fabien Guillot
Technical Manage
Vectra AI

Fabien Guillot is an experienced Technical Marketing Engineer with a background in computer networking. Fabien Guillot is a security enthusiast who enjoys rolling up his sleeves and getting hands-on, often working with many different security technologies. Guillot continues to improve and develop many of the trainings and workshops offered at Vectra, providing free education to security operation teams and engineers that include Red Team, Blue Team, Threat Hunting, and Attack Simulation

About Fabien Guillot

Technical Manage
Vectra AI
Brad Duncan
Threat Intelligence Analyst
Palo Alto Networks Unit 42

Brad Duncan is shining a light on malicious network activity, focusing on Windows-based malware and traffic analysis of packet captures (pcaps). Brad Duncan shares pcaps and malware samples through his blog at malware-traffic-analysis.net

https://www.malware-traffic-analysis.net/

About Brad Duncan

Threat Intelligence Analyst
Palo Alto Networks Unit 42
Cyrille Franchet
Technical Marketing Engineer
Vectra AI

Cyrille Franchet is a Technical Marketing Engineer focusing on cloud security for Vectra. With more than 15 years of experience in cybersecurity, Franchet has worked in a variety of industries including telecommunications, financial services, and insurance. He is constantly expanding his technical knowledge by working on difficult security projects, playing in CTF events, or resolving new cyber challenges. Franchet currently develops content for the Vectra Red and Blue Team workshops

https://www.rsaconference.com/experts/Cyrille%20Franchet

About Cyrille Franchet

Technical Marketing Engineer
Vectra AI
Dan Gunter
CEO
Insane Forensics

Dan Gunter is the founder and CEO of Insane Forensics, a threat hunting-focused company that helps organizations protect against the threats of yesterday, today, and tomorrow. Before Insane Forensics, Dan served as Director, Research and Development for Dragos Inc, an industrial control system cybersecurity firm. He established and oversaw detection engineering and reverse engineering efforts focused on protecting oil and gas, energy, and other critical infrastructure sites. As an early employee at Dragos, he also served as one of the original Principal Threat Analysts working with Oil and Gas and Energy companies to expand cybersecurity capabilities. Before Dragos, Dan was an officer in the United States Air Force serving in assignments, including the Air Force Computer Emergency Response Team (AFCERT) and operational CYBERCOM teams. Dan was competitively selected for and graduated from the Department of Defense’s elite Computer Network Operations Development Program and the Air Force Research Lab’s Advanced Course in Engineering Cyber Security Bootcamp. Dan earned a Bachelor of Science in Computer Science from Baylor University, a Master of Science in Computer Science from the University of Louisville, and a Graduate Certificate in Incident Response from SANS Technology Institute. Dan is also a graduate of MIT Bootcamp’s Innovation Leadership program and pitched on the winning new venture team. In the community, Dan has spoken at Blackhat, Schmoocon, S4, CS3STHLM, Texas Cyber Summit and taught at a variety of smaller and private events on the topics of incident response, threat hunting, consequence analysis, and general security operations.

About Dan Gunter

CEO
Insane Forensics
Tom VanNorman
Sr. VP
GRIMM

Tom VanNorman is founding member of the ICS Village

About Tom VanNorman

Sr. VP
GRIMM
Qasim Ijaz
Director of Offensive Security
Blue Bastion

Qasim Ijaz has earned a reputation as a dedicated, detail-oriented offensive security lead with expertise in driving and supporting key cybersecurity efforts including management of bug bounty programs, red teams, and compliance-based penetration testing. Qasim Ijaz progressive experience has led to demonstrated success in identifying and helping remediate major security concerns, with the capacity to build out specialized strategies and quickly react to new threat scenarios at an enterprise level. Easily able to move from hands-on project management to guiding large, cross-organizational initiatives, Qasim ensures that companies and clients alike enjoy the best possible results. Qasim is experienced in penetration test and red team execution in compliance with a multitude of frameworks, including but not limited to HIPAA, HITRUST, PCI-DSS, and FedRAMP. Bolstering Qasim’s professional attainments are his exceptional academic qualifications and continued community engagement through Alpharetta Pentest Meetup and cybersecurity instruction. Qasim has presented and taught at cybersecurity conferences including BSides and Blackhat on offensive security topics. He currently teaches a bootcamp on Offensive Security Certified Professional (OSCP) certification. Qasim possesses both a Master of Science in Cyber Security as well as a Master of Business Administration from the University of Maryland Global Campus. Qasim also possesses Offensive Security Certified Professional (OSCP) and Certified Red Team Professional (CRTP) certifications. In his free time, he enjoys playing PayDay2, hiking, and learning new penetration testing tools, techniques, and processes. You can contact Qasim at qijaz at pm d0t me.

About Qasim Ijaz

Director of Offensive Security
Blue Bastion
Jeff Carrell
Networking and Big Data Instructor/Course Developer
HPE

Jeff Carrell is an Author, speaker, trainer, all-around network guy, focusing on IPv6 & Network Automation. He has a multi-vendor lab with Layer3 switches and routers from HPE Networking (Aruba/ProCurve & 3Com/H3C), Cisco, Juniper, Arista, Quanta, VyOS, and multiple server & client OS’s. The following lists some of the conference venues I have offered the IPv6 hands-on lab workshops: – IPv6 Business Conference, Zurich, 2015 – 2014 North American IPv6 Summit – Texas IPv6 Task Force (TXv6TF) Spring 2014 IPv6 Summit – TTVN 2014 – Texas IPv6 Task Force (TXv6TF) Summer 2013 IPv6 Summit – Sharkfest’13 – TTVN 2013 – Texas IPv6 Task Force (TXv6TF) Winter 2012 IPv6 Summit – gogoNET LIVE! 3 – Australian IPv6 Summit 2012 – Sharkfest’12 – TTVN 2012 – gogoNET Live! 2 – Australian IPv6 Summit 2011 – Texas IPv6 Task Force (TXv6TF) Fall 2011 IPv6 Summit – Sharkfest’11 – Rocky Mountain 2011 IPv6 Summit ——— – IPv6Forum – Certified Trainer (Gold) – IPv6Forum – Certified Network Engineer (Gold) – IPv6Forum – Certified Network Engineer (Silver) – Hurricane Electric, IPv6 Certification – Sage – Sourcefire Certified Professional – (SFCP) – EC-Council Certified Ethical Hacker (C|EH) – HP Master Accredited Systems Engineer (MASE) – ProCurve Networking Secure Mobility Specialist – HP Accredited Systems Engineer (ASE) – ProCurve Networking and Mobility – HP Accredited Integration Specialist (AIS) – ProCurve Networking – PADI Master Diver: specialties include wreck, deep, night, nitrox, and altitude

About Jeff Carrell

Networking and Big Data Instructor/Course Developer
HPE
Rod Soto
Principal
Splunk

Security Researcher, Co-founder Hackmiami & Pacific Hackers. Principal Security Research Engineer at Splunk Over 15 years of experience in information technology and security. He has spoken at ISSA, ISC2, OWASP, DEFCON, RSA Conference,Hackmiami, DerbyCon, Splunk .CONF, Black Hat,BSides, Underground Economy and also been featured in Rolling Stone Magazine, Pentest Magazine, Univision, BBC, Forbes, VICE, Fox News and CNN. Rod Soto was the winner of the 2012 BlackHat Las Vegas CTF competition and is the founder and lead developer of the Kommand & KonTroll/NOQRTRCTF competitive hacking Tournament series. Secretary of the board of Hackmiami Co-founder of Pacific Hackers Silicon Valley meetup. Founder & President Pacific Hackers Conference www.phack.org.

About Rod Soto

Principal
Splunk
Matthew Cronin
Director of National Cybersecurity
White House, Office of the National Cyber Director

Matt Cronin currently serves as Director of National Cybersecurity in The White House’s Office of the National Cyber Director. In this role, Matt helps lead the nation’s efforts to overcome cybersecurity threats and ensure that the United States is a leader in key emerging technologies. He joins the Office of the National Cyber Director on detail assignment from the Department of Justice, where he serves as the National Security & Cybercrime Coordinator. Prior to that role, Matt was an Assistant United States Attorney (federal prosecutor). In that position, he primarily prosecuted transnational, cyber, and cryptocurrency cases. Several of Matt’s prosecutions have been announced by the U.S. Attorney General and he has received a number of national awards for his work, including at The White House. His prosecution of a Chinese transnational criminal group was also featured on 60 Minutes. Matt has additionally published journal articles on cryptocurrencies, the dark net, and autonomous systems.

About Matthew Cronin

Director of National Cybersecurity
White House, Office of the National Cyber Director
Teoderick Contreras
Threat Research
Splunk

Teoderick Contreras Senior Threat Research Engineer on Splunk’s Threat Research Team. I’ve been working in the cybersecurity industry for almost 12+ years. I primarily focus on malware reverse engineering/analysis, digital forensics and detection development. Present in TrendMicro SHIFT++, Splunk .Conf, Botnet Conf Germany events and CERT-Verbund conference. Over 13 years of experience in Cyber Security focus on malware reverse engineering, digital forensics and blue team.

About Teoderick Contreras

Threat Research
Splunk
Kathleen Fitzgerald
Trainer, Researcher, Hacker, CEO
EvilKat

Kathleen Fitzgerald is much more then a Drummer, hacker, defender against rogue #IoT, diver, photographer. Kathleen Fitzgerald is a lover of fine tequilas & Dancing Flamingos

About Kathleen Fitzgerald

Trainer, Researcher, Hacker, CEO
EvilKat
Kevin Zuk
Information Security Practitione
N/A

Kevin Zuk is an information security practitioner with a versatile skillset that includes incident response/computer forensics, network analysis, malware analysis and scripting expertise. He has led and participated in incident response engagements involving nation state/financial actors. enjoys writing reports and assisting customers with briefings and post-breach remediation assistance. Kevin was on a team of cross disciplinary professionals that identified and reported CVE-2015-3113.

About Kevin Zuk

Information Security Practitione
N/A
Matt Downing
Threat Researcher
N/A

Forward Deployed Engineer at Anvilogic, my history is mostly research, threat intel, and detection engineering at various security startups/Fortune 500 Anvilogic detection automation platform delivers AI-driven insights and recommendations to measure and improve threat detection coverage. The platform helps SOC teams to break down security silos by bringing together automation, AI, and APIs into a unified detection and hunting platform that delivers actionable insights to find threats and triage.

About Matt Downing

Threat Researcher
N/A
Lee McWhorter
CTO / Director Cyber Security
Covered6

Lee McWhorter love affair with technology began with his very first computer…a Commodore VIC-20. I taught myself to program and learned HTML before it was even officially a 1.0 spec. Fluency in technology came easy to me, so I continually pushed my equipment to see what more it could do. When faced with limitations, I developed solutions. I quickly became the “go-to” guy for everything technology-related, leading to many opportunities in the Tech sector as well as Education and Business. My roles have spanned from the server room to the Board room across multiple industries. I pride myself on keeping current with the latest technology developments and trends. My expertise has afforded me positions such as Subject Matter Expert, Consultant Expert, and IT Expert. I am thrilled to become one of the first 400 people in the world to obtain a PenTest+ Certification and teach the PenTest+ Train the Trainer Series for CompTIA

About Lee McWhorter

CTO / Director Cyber Security
Covered6
Chip Thornsburg
Cyber Defense Program Coordinator
Northeast Lakeview College

Chip Thornsburg Cyber Defense Program Coordinator, Northeast Lakeview College 35 year Avid Technologist and Computer Security Enthusiast. Bridging the gap between Law Enforcement and Information Technology Professionals. Experienced Business and Technology Instructor and public speaker on issues of Computer Security and Cyber Crime Investigation. Specializing in Incident Response and Investigation.

About Chip Thornsburg

Cyber Defense Program Coordinator
Northeast Lakeview College
Sandra Stibbards
Owner
Camelot Investigations

Sandra Stibbards * ONLINE COURSE: OPEN SOURCE INTELLIGENCE FOR PROFESSIONALS offered by Camelot Investigations and Covered 6 LLC. Details and Registration at https://covered6institute.com/osint/ * 6-Webinar Series Certificate Course: On-Demand online virtual Certificate Course based on the 2-Day Open Source Intelligence Training. Two courses, three sessions each, 90 minutes each. Recorded so that you can take missed classes or review on your own. This is a great way to get 9 hours of Continuing Education and improve your Open Source Intelligence Investigative skills! Use OSINT for due diligence, KYC, financial crime, background checks, third party risk management and fraud investigations. Sign up today https://lnkd.in/dmcFMZn The ‘Open Source Intelligence Training’ (OSINT) provides extensive information relating to surface and deep web searching along with advanced online search techniques & strategies, online privacy / anonymity tools, counterintelligence techniques used by the criminal element, utilize database systems, archiving tools and methods to obtain archived pages & hidden information, search techniques of blogs and social networks, transfer of large files, screen shot capabilities, and analysis, organization, preparation. Lists of search engines, blogs, forums, social networks, various software, etc. along with search tools on the ways to use these items will be provided throughout the training. It is a completely interactive class. Bring your laptop/ table with wireless capability. The In-House Training is highly recommended for large corporations and small businesses as well as government agencies. The In-House training is tailored to the specific needs of the client.

About Sandra Stibbards

Owner
Camelot Investigations
Amber Bennoui
Security Product Strategy
Datadog

Amber Bennoui has a varied career in product management, cybersecurity, DevOps, and software engineering across a multitude of industries like healthcare, education, and media for companies such as Threat Stack (acquired by F5), itslearning and MIT. She also co-founded two companies — University of Reddit and Hard Times Media. She is currently focused on bolstering diversity and inclusion in the tech industry.

About Amber Bennoui

Security Product Strategy
Datadog
Andrew Krug
Lead Security Evangelist
Datadog

Andrew Krug Innovation and impact are two core components of the work that Andrew does. Since beginning of his career in technology in the mid 2000s he has worked in a variety of roles: Managerial, Systems Administration, Network Engineering, DevOps, Product Management, Product Innovation, Development, and Instruction. This unique blend of skills helps him to bring a diverse perspective and impact to new projects. Open software / Libre software is very near and dear to his heart and he pushes the community forward through advocacy and use where ever possible. Andrew has started many of his own open source project over the years including https://github.com/threatresponse which included aws_ir and margaritashotgun. Specialties: Cloud, CloudSec, AWS Lambda, Architecture, Governance, Security, Security Automation, DFIR, and forensics.

About Andrew Krug

Lead Security Evangelist
Datadog
Brad Palm
Director of Product Research
Ascent

Problem solver and a convergent thinker that looks forward to challenges in bridging the physical and virtual worlds. Highly skilled at analyzing and navigating the IT risks that are inherent when adopting technologies. Motivated to work with dynamic, fast-paced, high-performing teams! Builder | Technologist | Bunker Labs Ambassador | Purveyor of Board Sports

About Brad Palm

Director of Product Research
Ascent
Christopher Cottrell
Senior Manager, Information Security
NVIDIA

Christopher Cottrell is an Offensive security leader that finds bad stuff, and helps fix bad stuff. Focused on helping people, teams, and programs eradicate things that keep them up at night. Apply philosophical concepts to Threat Operations, displaying data and messaging in unique ways to get stuff fixed at scale.

About Christopher Cottrell

Senior Manager, Information Security
NVIDIA
Harshit Agrawal
Security Researcher
Boston University

Harshit Agrawal is currently working as an RF and IoT Security Researcher with two years of progressive work experience and notable research in Radio Frequency Intelligence, IoT Security, and Drone Security. He has a B.Tech in Computer Science from Pune University, and pursuing my Master’s in Cybersecurity from Boston University. Harshit Agrawal (@harshitnic) is currently working as an RF Security Researcher, Graduate Student at Boston University, and Chair for Media & Technology at IEEE Computer Society – Cybersecurity STC. He is enthusiastic about SIGINT, Drone Pentesting, Network Security, ISR activities, Threat Intel and IoT Security. He presented his research at multiple International Security conferences including Defcon USA, RSAC USA, Cyberweek UAE, HITB Amsterdam, Hack Summit Poland, Nanosec Malaysia, etc. Previously, he was President of the CSI Chapter and Vice President for the Entrepreneurship cell at MIT, where he also headed the team of security enthusiasts, giving him a good insight into cybersecurity and increasing his thirst to explore more in this field. He is a student, developer, programmer, and researcher, he believes in providing something out of the box!

About Harshit Agrawal

Security Researcher
Boston University
Chris Kulakowski
Lead Threat Hunter
IBM

Chris Kulakowski is a passionate technologist, innovator, and tinkerer. His career spans over 10 years of Digital Media, Information Technology, Security, and Digital Forensics roles at multiple fortune 50 companies. Chris is disciplined in detection engineering, incident response, threat hunting, threat intelligence, and security operations. Chris holds a Computer Criminology degree from Florida State University and several industry leading cyber security and digital forensics certifications including CISSP, EnCE, GCFE, GREM, and Security+. Chris is also accredited with a Stanford University Advanced Computer Security Certificate.

https://www.IBM.com

About Chris Kulakowski

Lead Threat Hunter
IBM
Eric Capuano
CTO
Recon Infosec

Eric is the CTO and founder of Recon InfoSec, a Managed Detection & Response provider based here in Austin, Texas. He is a certified SANS instructor of Digital Forensics and Incident Response, and a former Cyber Warfare Operator in the Texas Air National Guard.

https://www.reconinfosec.com/

About Eric Capuano

CTO
Recon Infosec
Phillip Wylie
Manager, Tech Evangelism & Enablement CyCognito
N/A

Phillip Wylie is an Offensive Cybersecurity Professional, Offensive Cybersecurity Instructor, and The Pwn School Project founder. Phillip Wylie has 24 years of experience with the last 9 plus years spent in offensive cybersecurity working as a pentester and red team operator. He is the concept creator and coauthor of the book “The Pentester Blueprint: Starting a Career as an Ethical Hacker”.

About Phillip Wylie

Manager, Tech Evangelism & Enablement CyCognito
N/A
Ross Foard
ICAM SME and Zero Trust Architect
CISA

With over 20 years of public sector and commercial cybersecurity and identity and access management experience Ross supports DHS' Cybersecurity and Infrastructure Security Agency (CISA) as a senior engineer on the CDM Program. Ross is responsible for leading the architecture and technical integration of several CDM capabilities including Identity and Access Management, Cryptography, Data Protection and Zero Trust Architectures. Ross is the co-lead on the Federal Mobility Group (FMG) Derived PIV Working Group (DPIVWG). This working group shares information across federal agencies about industry practices in adopting Derived PIV Credentials on mobile devices, both certificate-based and with the many forms of phishing-resistant authenticators such as FIDO2 authenticators. Ross's professional goal is to help Agency leaders understand how to identify and prioritize cybersecurity risk and continuously mitigate that risk through a strong focus on Identity and Access Management.

About Ross Foard

ICAM SME and Zero Trust Architect
CISA
Charles Burton
Information Technology Director
Calcasieu Parish Police

Charles Burton, IT Management & Project Management experience in a wide variety of technology, business & education industries. Charles Burton Particularly focused in unique technology challenges and projects, which require multiple skill levels and business relationships. Management of multi-million dollar operational & project budgets. Always interested in migration projects, business analysis, data driven reporting and decision-making. Specialties: Technology leadership, Project management, Business technology development

About Charles Burton

Information Technology Director
Calcasieu Parish Police
David Brearley
OT Cyber Director
HDR

David Brearley (GICSP, PMP) is a senior professional associate and the operational technology cybersecurity director at HDR in Charlotte, North Carolina. David has nearly 20 years of international experience in providing IT and OT (operational technologies/industrial controls) solutions, services, and consulting. In providing hands-on configuration, assessment, design, and consulting services, his experience covers the comprehensive control system life cycle. David is motivated by helping improve the security awareness and risk posture for HDR’s cross-sector clients. David Brearley provides hands-on configuration, assessment, design, and consulting services, his experience covers the comprehensive control system life cycle. David is motivated by helping improve the security awareness and risk posture for HDR’s cross-sector clients.

About David Brearley

OT Cyber Director
HDR
Nader Zaveri
Senior Manager
Mandiant

Nader Zaveri has over 14 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states. He also leads the remediation efforts with his knowledge and experience by providing strategic short, medium, and long-term remediation recommendations to directors and C-level executives. He also leads the efforts in providing tactical recommendations to specialists, to improve the security posture of an organization. Nader also has experience with leading transformational projects over infrastructure and processes with technical and organizational change components in response to rapidly evolving business needs and regulatory requirements. Nader Zaveri conducted interviews and presentations for dozens of organizations and conferences regarding cloud and on-prem Incident Response and Remediation topics. He regularly provides security updates and briefings to C-Suite personnel during and after an incident, as well as assists with post-remediation and hardening efforts for the organization. Prior to joining Mandiant, Nader Zaveri spent several years in leadership positions at major cyber security consulting firms. Before joining consulting, Nader worked as a lead practitioner for multi-national organizations. Certifications: – Certified Information Systems Security Professional (CISSP) – 604955 – Certified Information Security Manager® (CISM) – 1949391 – Certified Information Systems Auditor® (CISA) – 19161780 – Certified Cloud Security Knowledge (CCSK) – UVn4Uci43sST5dynRAfai2ww – Certified Ethical Hacker (CEH) – ECC3408927516 – Computer Hacking Forensic Investigator (CHFI) – ECC6283057419 – Certified Chief Information Security Officer (C|CISO) – ECC8037421965 – AWS – Certified Solution Architect – VPGJF3C2GMQEQX9X – M365 Security Administrator – 990424292 – Azure Security Engineer – 990424292

About Nader Zaveri

Senior Manager
Mandiant
Kemba Eneas Walden
Principal Deputy National Cyber Director
White House

Kemba Eneas Walden is the Principal Deputy National Cyber Director in the Office of the National Cyber Director. Previously, she served as Assistant General Counsel in Microsoft’s Digital Crimes Unit (DCU) responsible for launching and leading DCU’s Ransomware Program. Prior to Microsoft, Kemba spent a decade in government service at the Department of Homeland Security, most recently as a cybersecurity attorney for the newly created Cybersecurity and Infrastructure Security Agency, and its predecessor. Kemba was appointed to the Cyber Safety Review Board and also serves as an Adjunct Professor at Georgetown University in the School of Continuing Studies teaching a course entitled “Information Security Laws and Regulatory Policy.” Kemba graduated from Hampton University with a B.A. in Political Science, from Princeton University’s School of Public and International Affairs with a Master’s in Public Affairs, and from Georgetown University Law Center.

About Kemba Eneas Walden

Principal Deputy National Cyber Director
White House
Fernando (Nando) Tomlinson
Principal DFIR Consultant
Mandiant

Fernando “Nando” Tomlinson is a Digital Forensics and Incident Response (DFIR) leader with over 20 years of extensive experience executing, leading and mentoring cyber professionals in challenging environments. Fernando “Nando” Tomlinson is part of a dynamic team or working independently, he is a results-driven professional with a proven ability to communicate, collaborate and consult with both internal and external entities at varied levels of the organization. Nando is reliable, flexible, and consistently strives to provide efficient solutions and championing customer needs in a complex atmosphere. Core Competencies • Digital forensics • Incident response • Cyber Security Operations • Threat Hunting • Intrusion Analysis • Cyber Threat Intelligence • Malware Triage • Project Management • Vulnerability Assessments • Penetration testing

About Fernando (Nando) Tomlinson

Principal DFIR Consultant
Mandiant
Lenin Alevski Huerta
Security Software Engineer
N/A

Lenin Alevski Huerta is a Full Stack Engineer and generalist with passion for Information Security. Lenin specialize in building and maintaining Distributed Systems, Application Security and Cloud Security in general. Lenin loves AWS, GCP, Kubernetes hardening, Vault KMS, Container Security, Pod Security Policies, Networking Policies, RBAC, OIDC & Oauth2.0 & SAML & LDAP, TLS Certificates, Applied Cryptography, Go, NodeJS and React coding. Lenin loves playing CTFs in his free time and talking about security and privacy https://www.alevsk.com

https://www.alevsk.com

About Lenin Alevski Huerta

Security Software Engineer
N/A
Ross Foard
ICAM SME and Zero Trust Architect
CISA

Through the White House Executive Order 14028 the Federal Government has declared that in order to protect the nations most critical assets we must move from a perimeter-based security model to a modern cybersecurity architecture based on a Zero Trust Architecture. NIST has provided guidance and the Office of Management and Budget (OMB) has provided specific measures and expectations to achieving the architecture. CISA supports this initiative by providing the Zero Trust Maturity Model and by executing programs such as Continuous Diagnostics and Mitigation. In this presentation Ross Foard will be discussing the Federal Zero Trust focus, how NIST and CISA describe the architecture and how CDM helps Agencies move towards a Zero Trust Architecture.

About Ross Foard

ICAM SME and Zero Trust Architect
CISA
Robert Brown
Counsel
Latham & Watkiins

Robert Brown advises on compliance with US and international data privacy and security laws and guides clients through the data privacy and security aspects of complex corporate transactions. Mr. Brown regularly helps clients across all market sectors navigate the business implications of new and evolving data privacy laws, including the California Consumer Privacy Act (CCPA), the EU General Data Protection Regulation (GDPR), and various sector-specific state and federal regulations, such as the Gramm-Leach-Bliley Act (GLBA), the Children’s Online Privacy Protection Act (COPPA), and the Health Insurance Portability and Accountability Act (HIPAA). Drawing on previous experience as data privacy counsel for a Fortune 500 energy company and as legal counsel for a Fortune 500 technology company, he takes a risk-based approach to: Assessing data privacy and security risks Designing data privacy compliance programs Negotiating data privacy and security contract terms and data processing agreements Providing data privacy and security support on corporate transactions Responding to requests from data subjects and authorities Preparing for and responding to data breaches Addressing data privacy issues related to digital marketing, employee privacy, and cross-border data transfers While working in-house, Mr. Brown developed and managed a global privacy program designed to comply with the GDPR, CCPA, and various other US and international data privacy laws. In this role, he routinely navigated the challenges internal privacy compliance teams face. Recognized by the International Association of Privacy Professionals as a Privacy Law Specialist, a Certified Information Privacy Professional (CIPP-US), and a Certified Information Privacy Manager, Mr. Brown

https://www.lw.com/people/robert-brown

About Robert Brown

Counsel
Latham & Watkiins
Geoffrey Coulehan
Strategic Alliances
MixMode

Geoffrey is a cybersecurity business executive and leader with over 25 years of experience and a proven track record in sales and solutions across a wide variety of information security technologies, risk management, and regulatory compliance solutions. Geoffrey currently runs Strategic Alliances at MixMode and before coming to MixMode he ran large solutions teams at Splunk, Palo Alto Networks, and SAP.

About Geoffrey Coulehan

Strategic Alliances
MixMode
Debbie Gordon
Founder & CEO
Cloud Range

Debbie Gordon is founder and CEO of Cloud Range, the industry-leading cybersecurity simulation training solution that helps organizations reduce cyber risk. A globally recognized technology entrepreneur, Debbie founded Cloud Range on the premise that simulation training is as integral in cybersecurity as it is in other fields like medicine, aviation, or the military. The result was that Cloud Range led the development of a new category in cybersecurity. Only three years later, organizations around the globe are incorporating the company’s cyber readiness solution as a core element of their security programs. A graduate of Vanderbilt University where she earned her degree in human and organizational development, Debbie has focused her work on businesses that improve people’s lives. Her career began in technical education and certification, and she has built and sold several companies in eCommerce, IT asset management, and training. She is currently on the board of directors of Entrepreneurs’ Organization – Nashville. Debbie is a frequent speaker on cybersecurity readiness, simulation training, and team effectiveness at conferences and seminars all around the world. She has also been featured in many podcasts, has authored many articles, and has been quoted in major publications including Fox News, Wall Street Journal and Forbes. Link to existing published articles or presentations: https://www.tag-cyber.com/media/videos/debbie-gordon-ceo-of-cloud-range-full-interview https://soundcloud.com/cybercrimemagazine/debbie-gordon-on-cloud-range-cyber-for-partners-and-cisos https://cybersecurityventures.com/cybersecurity-experts-hone-their-skills-in-a-virtual-dojo/

https://www.cloudrangecyber.com/

About Debbie Gordon

Founder & CEO
Cloud Range
Elizabeth Rogers
Lawyer, Fellow
State Bar of Texas

Elizabeth focuses on projects including breach prevention, privacy risk assessments, and management of breach response teams. Elizabeth also focuses on building enterprise-wide privacy and cybersecurity compliance frameworks across industries such as retail, health care, contingent workforce and staffing, education, and state and local governments. She has a breadth of experience creating solutions for privacy issues arising in the employment law context, as she spent the first half of her law career as a management-side employment lawyer. Leveraging her in-house and Texas state government experiences, Elizabeth works with executive leadership and other stakeholders to provide practical compliance counseling on cybersecurity and privacy requirements, design and conduct tabletop exercises, and create and implement policies, procedures, and employee privacy and security awareness training. Outside of her law practice, Elizabeth teaches cybersecurity and privacy law topics for the University of Texas School of Information’s Master’s Program in Information Privacy & Security. She is a thought leader on privacy and cybersecurity matters facing businesses and frequently speaks about and is published on emerging trends in these areas. Honors & Recognitions Top Latino Lawyers, Latino Leaders magazine, 2019, 2020 Outstanding Young Lawyer of San Antonio, 1992 Professional Activities Chairman of the Board of Directors, the Computer & Technology Section of the State Bar of Texas, June 2021 – Present Advisory Member, Global Cybersecurity Institute – UC Berkeley, 2018–Present Member, Cybersecurity Task Force, Greater Houston Partnership, 2017–Present Fellow, Texas Bar Foundation Member, Austin Bar Association Co-Chair, Legislative Committee, 2015–2016 Co-Chair, Leadership Academy, Class of 2015 Co-Chair, Membership Committee, 2013–2015 Board Member, St. Mary’s University School of Law Foundation, 2011–present Former Board Member and President, Alumni Association, St. Mary’s School of Law, 1993–2011

https://www.michaelbest.com/People/Elizabeth-Rogers

About Elizabeth Rogers

Lawyer, Fellow
State Bar of Texas
Jason Robbins
Senior Manager Security
Amgen

Jason Robbins has a deep and extensive history of developing and implementing risk mitigation and cybersecurity strategies in both the private and public sectors. Jason has worked within the military, government, and commercials businesses on both IT and OT networks to perform a wide array of services from incident response, computer forensics, penetration testing, vulnerability management, risk management, regulatory compliance, and strategic vision.

About Jason Robbins

Senior Manager Security
Amgen
William MacMillan
Senior Vice President for Security Product and Program Management
Salesforce

William M. MacMillan is Senior Vice President (SVP) for Security Product and Program Management (SPPM) at Salesforce. Prior to joining Salesforce, he was the Chief Information Security Officer (CISO) at the Central Intelligence Agency (CIA), where he played a key role in reshaping the CIA’s cybersecurity strategy. William MacMillan, Former CISO for the Central Intelligence Agency, An experienced executive leader and trusted voice on cyber, digital transformation, and national security. Passionate about leveraging military, special operations, and intelligence expertise to strengthen collective resilience and raise the water line for cyber defenders.

About William MacMillan

Senior Vice President for Security Product and Program Management
Salesforce
Ira Winkler
Chief Security Architect
Walmart

Ira Winkler, CISSP is Chief Security Architect for Walmart and author of You Can Stop Stupid and Security Awareness for Dummies. Ira Winkler is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader. Most recently, Ira was named 2021 Top Cybersecurity Leader by Security Magazine.

About Ira Winkler

Chief Security Architect
Walmart
David Kennedy
CEO/President
TrustedSec

TrustedSec is an information security consulting company located in Strongsville, Ohio. TrustedSec was founded by David Kennedy and provides top-notch information security assessment and consulting services. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. Binary Defense is a full service 24/7/365 Monitoring and Detection company (MSSP) that focuses on the detection of attackers in its early stages. BD is an extension of your team, and something you can rely upon. David Kennedy is the Founder of TrustedSec and Co-Founder and Chief Hacking Officer of Binary Defense Systems (BDS). David started both these companies with the belief in the betterment of the security industry and promoting the advancement of the industry through quality services. TrustedSec and BDS (both sister companies) provide consulting and MSSP services and can handle every aspect of an organization. Prior to TrustedSec and BDS, David was a Chief Security Officer (CSO) for Diebold Incorporated, an international Fortune 1000 global company. David has had guest appearances on FoxNews, CNN, and other high-profile media outlets. David is the founder of DerbyCon, a large-scale security conference in Louisville Kentucky. David also co-authored Metasploit: The Penetration Testers Guide book which was number one on Amazon.com in security for over 6 months. David was also one of the founding members of the “Penetration Testing Execution Standard (PTES)“. PTES is the industry leading standard and guidelines around how penetration tests should be performed and methodologies.David is the creator of several widely popular open-source tools including The Social-Engineer Toolkit (SET) and many more. David has over 12 years of security experience, with over five years specifically for information security consulting. Lastly, David was a U.S. Marine working for the intelligence community and spent several years in the middle east including Iraq.

https://www.trustedsec.com/team/dave-kennedy/

About David Kennedy

CEO/President
TrustedSec
Jack Marchetti
Senior Solutions architect
Amazon Web Services

Jack Marchetti is a Senior Solutions architect at Amazon Web Services (AWS). Jack Marchetti has a background in software engineering, Jack is primarily focused on helping customers implement serverless, event-driven architectures. Prior to AWS Jack spent the bulk of his career in the ad agency space building experiences for some of the largest brands in the world. Jack is legally blind and resides in Chicago. He also is a screenwriter, and director with a primary focus on Christmas movies and horror. View Jack’s filmography at his IMDb page.

About Jack Marchetti

Senior Solutions architect
Amazon Web Services
Oscar Anaya
Hacker
IBM X-Force Red

Oscar Anaya is a hacker for X-Force Red specializing in hardware and web application testing. He has also previously conducted successful automotive and mobile vulnerability research. Before working for X-Force Red, Oscar conducted research on access control and had great success finding bypass methods for these systems. Hacker Oscar Anaya wakes up every morning in disbelief. He kisses his wife and daughter, walks around his new home, opens his @IBM laptop, and reflects with gratitude on his “dream life.” How did he get here?

About Oscar Anaya

Hacker
IBM X-Force Red
Colonel (Ret) Marc Jamison
Consultant
Cyber Checkmate

Colonel (Ret) Marc Jamison consults on National Security, Strategy and Operations for his own company Cyber Checkmate Consultants. He has consulted for over 70 industry partners supporting cyber and military operations. Col Jamison’s clients range from SBIR Phase 1 companies, and startups to mid and large multi-national defense contractors. In 2017, he completed a tour at STG as their VP of DOD and IC Business Development. From 2013-2016 he supported the US Army at PM EW & Cyber as they build the new Cyber Electromagnetic Activities (CEMA) concept combing Cyber and Electronic Warfare. He worked for L-3 Communications as the Director of Cyber Operations and Director of Strategic Ventures that included Merger & Acquisition evaluations and oversight of strategic partnerships with universities Colonel Jamison has more than 30 years of progressive experience directing, managing, and training government teams in air operations and cyber security. He has led and planned national Cyber, Counter Terror and Air Operations and has advised senior-level USG leadership on strategies and policy. Colonel Jamison is a demonstrated expert in cyber strategy, planning, training, threats, operations, policy and organizations. Prior to industry, Colonel Jamison served as J35 Director of Future Operations for USCYBERCOM and as the J3 Director of Operation for its predecessor organization Joint Functional Component Commander – Network Warfare at Ft. Meade. He spent three years as a senior executive establishing USCYBERCOM, a “plank holder”, where he directed multiple national level operations and developed cyber doctrine and tactics, techniques and procedures. Colonel Jamison is a retired U.S. Air Force Colonel and combat aviator, who flew B-52 and B-1 bombers. He was the Director of USAFE’s Strategy Division and commanded the Combat Plans Squadron for 8th Air Force. He is a graduate of the School for Advanced Air and Space Studies and USAF Weapons School. He holds four Master’s degrees, including an M.S. in Strategic Studies from the U.S. Army War College and is a published author. Colonel Jamison serves on the Board of Advisors for the National Security Collaboration Center in San Antonio, as the President of the Texas Chapter of Military Cyber Professional Association (MCPA), on the Board of Directors for Association of Old Crows in San Antonio, Board of Advisors Cyber Security Forum Initiative (CSFI) and on San Antonio’s Chamber of Commerce Cyber Industry Council.

About Colonel (Ret) Marc Jamison

Consultant
Cyber Checkmate
Jonathan Gonzalez
Falcon Complete Analyst
CrowdStrike

Jonathan Gonzalez is a security analyst on the Falcon Complete Team at Crowdstrike, where he leverages his skills in DFIR to respond to security incidents for a wide range of customers. Prior to joining Crowdstrike, Jonathan attended The University of Texas at San Antonio, where he majored in both Information Systems and Cybersecurity while minoring in Digital Forensics. During his collegiate career, he had various internships in the realms of Web Application Security, Helpdesk, DFIR and still actively mentors students who are new to the field, just like he was at one point. In Winter of 2020, Jonathan led the organization of UTSA’s first cybersecurity conference, RowdyCon, which was attended by over 20 speakers and 300 students and has since spoken at such conferences as BSides. He currently resides in Austin, where he enjoys reading historical military non-fiction, brushing up on the newest CTI developments and writing science-fiction.”

About Jonathan Gonzalez

Falcon Complete Analyst
CrowdStrike
Robert Grubbs
Cyber Intel
Idaho National Laboratory

Robert Grubbs (GCFE) has twenty years of experience in the cyber security, intelligence / counterintelligence and telecom fields working for and supporting the US Government. Robert currently manages the Idaho National Laboratory (INL) team on-site supporting DHS CISA with operations and intelligence analysis. Robert specializes in being technical enough to understand what the nerds are saying, and eloquent enough to explain that to management in terms they’ll understand, then repeating that process in reverse. He is usually the only English major at these conferences, and is a proud Virginia Tech alum.

About Robert Grubbs

Cyber Intel
Idaho National Laboratory
Joshua Long
Chief Security Analyst
Intego

Joshua Long is Chief Security Analyst at Intego, I conduct original cybersecurity research, battle malware, and write, podcast, and do public speaking about computer security and privacy topics. Joshua has been doing information security research for more than 20 years. My research has been featured by both mainstream and tech press, including CBS News, CIO, CNET, Lifehacker, MacTech Magazine, Macworld, Naked Security, The Register, ZDNet, and more. After completing three degrees, including a master’s in Information Technology concentrating in Internet Security, I have also taken doctorate-level coursework and other continuing education. I am a CompTIA Security+ and Network+ certified professional.

About Joshua Long

Chief Security Analyst
Intego
Nataliia Zdrok
Threat Intelligence Analyst
Binary Defense

Nataliia Zdrokb is a CompTIA Security+, Network+, Linux+, and AWS Solutions Architect Associate certified professional currently focusing on Cyber Security. I’m also skilled at network defense, which includes detecting network vulnerabilities and hardening OSes.

About Nataliia Zdrok

Threat Intelligence Analyst
Binary Defense
Ashley Rose
CEO
Living Security

Ashley M. Rose CEO of Living Security, Ashley has been the driving force behind the company’s rapid growth. Since its founding in 2017, Living Security has raised more than $20 million for growth and product development and accelerated revenue growth for three consecutive years. Ashley is also continually working to build a diverse and inclusive organization around the belief that the team should reflect the community at large. An adaptable problem solver, Ashley is thoughtful and transparent in her approach to running the company and working with clients toward a singular goal: reduce risk by making people a security asset instead of a liability. Ashley has a Bachelors of Business Administration from the University of Michigan and is a serial entrepreneur with experience designing and managing product lines. After launching her career in the tech industry, she became intrigued by cybersecurity and its accelerating impact on organizations, individuals, families and communities. She co-founded Living Security based on a philosophy that empowering people is the best approach to lasting security awareness and breach prevention. She has also become a thought leader in the industry regularly contributing to Forbes among other publications.

About Ashley Rose

CEO
Living Security
Erin Meyers
Sr. Manager Product Marketing
Bitdefender

Erin Meyers is a strategic, proactive and creative thinker and communicator with a demonstrated proficiency in product marketing, industry analyst relations, corporate communications and public relations. I navigate different business units simultaneously with excitement, initiative and drive. Specialties include: GTM strategy, positioning, branding, messaging, analyst relations, product training, sales enablement, competitive analysis, content marketing, technical marketing, media outreach, customer engagement, strategic planning, and business intelligence.

About Erin Meyers

Sr. Manager Product Marketing
Bitdefender
Ted Oakley
Founder and CEO
Non-Fungible Texas

Theodore Oakley is founder and CEO of Non-Fungible Texas, a Web3 Metaverse company. Ted Oakley’s vision is to provide blockchain and metaverse services to both government and private-sector Small-to-Medium Businesses (SMBs) to realize their transition from Web2 to Web3, and beyond. As a corporate professional, retired USAF Special Agent, and former Counterintelligence & Technology Protection Division Chief, Ted was the sole USAF Special Agent assigned to San Antonio’s FBI Strategic Technology Task Force. Upon retirement he received a letter of appreciation for his support to the FBI from Director Robert Mueller. Ted is a blockchain and NFT consultant, which includes consultation in Web3 branding, strategy and roadmapping, multi-chain and smart-contracts, and metaverse concepts and design, to include live metaverse event planning and execution. His experience in security-based technologies and consultation is rooted in leading development teams, data scientists, and AI/ML experts supporting the DoD Acquisitions Lifecycle, Product Development, DevSecOps, and Systems Security Engineering. Ted is a graduate of Bellevue University with a Master’s of Science in Security Management; he also possesses a graduate certificate in Technology Commercialization at the University of Texas at San Antonio (College of Business). He has launched several companies in eCommerce, non-profit (Social Impact), real estate and hospitality, fashion, arts, music & entertainment, and technology industries. As an inventor and entrepreneur Ted has designed, manufactured, and distributed products through global supply chains internationally. He is a graphics illustrator, former professional recording artist, music producer, community volunteer and public speaker in the local-Texas community.

https://www.nonfungibletexas.io/

About Ted Oakley

Founder and CEO
Non-Fungible Texas
Bailey Bickley
Chief Strategy Offier
National Security Agency

High energy, eternal optimist, dog person. Empowers teams to integrate strategic communications, operations, stakeholder engagements, and creative marketing tactics to drive cybersecurity impacts that scale across USG and industry. Mentors and uplifts other women as a passion. Calm under pressure with a bias for action. Sets vision, weighs risks, pushes boundaries, drives change.

https://www.nsa.gov/

About Bailey Bickley

Chief Strategy Offier
National Security Agency
Jadon Montero
Sr. Director, Product Management
Bitdefender

Senior Director of Product Management [MDR] at Bitdefender | Former PM of Cloud Security at Censys | Security Orchestration & Automation Expert

About Jadon Montero

Sr. Director, Product Management
Bitdefender
Tony Loehr
Developer advocate
Cycode

Tony Loehr is Developer advocate, software engineer, and lifelong learner.

About Tony Loehr

Developer advocate
Cycode
Ryan Rene Rosado
Security Operations
Optiv

Ryan René Rosado is an Enthusiastic Cybersecurity Professional with 10 years of experience. Ryan has led teams, and connected with clients, and stayed up to date with the trends to offer modernized and compliant solutions in the world of Cybersecurity. Ryan’s creativity and critical thinking stand out, whether in the articles she has published or the innovative business development solutions she has solutioned. She has held many leadership positions, including in EY’s Women in Cybersecurity and Young AFCEANs Chair. Ryan is driven to learn and execute in the cybersecurity arena. She began in cyber threat intelligence and has expanded through various capacities in cybersecurity to offer a well-rounded executive perspective to empower client’s and teams with their cybersecurity maturity and resilience. Well-rounded: Ryan has analyzed, written reports, and briefed on cyber threats across industries through corporate consulting in the Big4, the military, and other opportunities as well as studying and pursuing various educational opportunities. -Quality Delivery Management: Ryan has superior writing and quality assurance skills for client deliverables, publications, Standard Operating Procedures, policy creation, and presentations using a variety of mediums to meet client requirements and build teams and/or increase audience involvement and collaboration. -Energetic Talented Public Speaker, frequently speaks and presents to clients, at nonprofit events, and other various speaking occasions to the Board of Directors and C-suite executives’ levels -Event Management; Ryan balances client needs and expectations, has planned ~50 events (mostly no -profit or client events) and projects. -Business Development; Ryan has designed unique presentations for clients that enhance solving client problems and drive realistic solutions with roadmaps and timelines. – Ryan’s personality type is the ENTJ or known as “the Commander” (Myers Briggs Personality Type) – find out yours today – https://www.16personalities.com

https://muckrack.com/ryan-rene-rosado

About Ryan Rene Rosado

Security Operations
Optiv
Chris Culling
Senior Technical Success Manager
Gigamon

Chris Culling currently works for Gigamon as a Senior Technical Success Manager. He is retired U.S. Army (Military Intelligence), lives in Stevensville, Maryland, and has been working as a government contractor for the last ten years in the areas of operations management, SOC operations, and CTI analysis. Chris has been married for 31 years to a very patient woman, has three adult children (two who are married and have yet to bless him with any grandkids), two cats, a dog, and a Vietnamese pot-bellied pig. Chris is also a recovering alcoholic. Once he finally received a diagnosis of severe ADHD, anxiety, and depression at age 48, he was able to stop self-medicating and receive the help he truly needed to overcome his addiction and begin understanding his neurodiversities

About Chris Culling

Senior Technical Success Manager
Gigamon
Chris Jordan
CEO and Co-founder
Fluency Security

Chris Jordan is the CEO and co-founder of Fluency Security, an award-winning cybersecurity innovator that offers streaming analytics of live data using adaptive behavioral SIEM technology, relied upon by many of the country’s most discerning organizations. One of the many efforts he’s leading is to provide enhanced cybersecurity awareness, from diverse and distributed networks, common in today’s hybrid workforces, enterprise businesses, and multi-national businesses, by leveraging advanced user and entity behavioral analytics (UEBA) and machine learning. Mr. Jordan has worked in security since 1989. An original member of the Army CERT, he has also established and managed a number of CERTs in the Federal Government and commercially to include the DoD CERT, Army CERT, FAA CISRC, NetSec (now Verizon SOC), JP Morgan CERT and Dupont CERT. In 2003, Mr. Jordan started Endeavor Security in order to pursue innovations addressing the shortcomings in operations security and enterprise security. The result was a product based on artificial intelligence which automated signatures while detecting new threats to an organization. Endeavor was primarily funded by the Department of Homeland Security (DHS) and the National Security Agency (NSA). Endeavor Security was acquired by McAfee in 2009, where Mr Jordan was the vice president of McAfee’s Threat Intelligence.

About Chris Jordan

CEO and Co-founder
Fluency Security
Tim Brown
CISO
SolarWinds

Tim Brown is at the front line of the most vexing challenge facing organizations today: IT security. Tim is currently the CISO for SolarWinds with responsibility spanning internal IT security, product security, and security strategy. As a former Dell Fellow, CTO, chief product officer, chief architect, distinguished engineer, and director of security strategy, Tim deeply understands the challenges and aspirations of the person responsible for driving digital innovation and change. Tim has more than 20 years of experience developing and implementing security technology, including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security.

About Tim Brown

CISO
SolarWinds
Beau Woods
Master of Capers and Frilly Doilies
N/A

Beau Woods work bridges the gap between security research and public policy communities to ensure connected technology that can impact life and safety is worthy of our trust. Over the past several years, he has consulted with the healthcare, automotive, aviation, rail, and IoT industries, as well as cyber security researchers, US congressional offices, the White House, and other US and international policy makers. Beau is a Cyber Safety Innovation Fellow with the Atlantic Council, a leader with the I Am The Cavalry grassroots initiative, and Founder/CEO of Stratigos Security, among other active roles. Beau recently served as Entrepreneur in Residence with the US Food and Drug Administration and was formerly Managing Principal Consultant and Solutions Architect for Dell SecureWorks. Beau supports several non-profit initiatives from and by the security research community. Beau is on the board and/or founding member of the non-profit Biohacking Village, Aerospace Village, ICS Village, Hack the Sea, and Gamayun. These organizations bring together industry stakeholders, public policymakers, and security researchers to improve safety, reliability, and trustworthiness to serve public good. He also leads the I Am The Cavalry and Public Ground tracks at BSides Las Vegas. Beau is a frequent presenter, media contributor, and author, and graduated from the Georgia Institute of Technology with a BS in Psychology. Specialties: Mobility Security, Cloud Security, Hacktivism, Advanced Persistent Threat, Industrial Controls Systems Security, Vulnerability and Threat Management, Security Awareness, Security Governance, Security Strategy, IT Security Audit, Compliance, PCI, GLBA, HIPAA/HITECH, IT Security Risk, Global Threats, Product

About Beau Woods

Master of Capers and Frilly Doilies
N/A
Ron Cole
Security Engineer
Arcticwolf

Ron Cole is a skilled Security Engineer with a passion for vulnerability management. Worked in various roles from penetration testing, consulting, to the defensive side conducting investigations and vulnerability remediation. Veteran of the United States Air Force. Extremely passionate about the military transition and bringing the diversity veterans offer, to the ever growing field of cyber security.

About Ron Cole

Security Engineer
Arcticwolf
Rob Carson
Founder and CEO
Semper Sec

WHAT ROB DOES: I help companies design and implement successful Information Security and Compliance Programs for ISO 27001, PCI, HIPAA, HITRUST, NIST 800-171 & GDPR. In short, I know how to SIMPLIFY problems and DELIVER solutions on time and within budget. WHY IT MATTERS: It’s not only the authorities, but increasingly your Customers, Partners and Investors who want proof you’re in compliance before they’ll do business with you. HOW I DO IT: I have a proven process to create comprehensive governance strategies, complete policy sets & standard operating procedures so you fully comply with regulatory requirements. EXPERIENCE AND RESULTS: I’ve personally directed the service delivery of over 300 total and 50 concurrent Security Projects resulting in a 100% revenue increase year after year. WHAT OTHERS SAY: “Rob’s credentials, professionalism, and communication skills allow him to easily alleviate any prospect’s security concerns around our cloud offering.” Michael Maley, Cherwell Software HOW/WHY IT WORKS: I specialize in developing and executing strategic plans through tactical execution of key objectives and cloud technologies to protect and enable growth. WHERE YOU’VE SEEN ME: I’m a regular speaker at popular Cyber Security Events like BSides Las Vegas and CyberDallas. LEADERSHIP: As a Former Marine Corp Captain I routinely built and lead high performing teams resulting in mission accomplishment through troop welfare. DID YOU KNOW: In my spare time I love Skiing, Scuba Diving, and raising my ‘Man Cubs’ with ‘Mama Bear’… LIKE TO KNOW MORE? Just connect with me here on LinkedIn and I’ll send

About Rob Carson

Founder and CEO
Semper Sec
Simran Sakraney
Cyber Security Consultant
Mandiant

Simran S. Sakraney Consultant with experience in Information Security strategy consulting across multiple industries. Confident communicator with strong skills in problem-solving, analysis, synthesizing raw data into an impactful, actionable narrative and developing/implementing strategic initiatives. Simran S. Sakraney Consulting experience covers the The Department of Defense, Finance, and Health/Pharmaceutical, and High Tech/Digital industries. Functional expertise includes cyber security strategy, cloud computing, risk assessment, and large scale transformations. Passionate about Risk Management, Community Engagement, and Technological Innovation with experience assisting some of America’s largest and well-known organizations with their IT strategy & development. Lead Research Fellow at Cloud Security Alliance. I completed my Bachelors of Business Administration (BBA) majoring in Management with a Certificate in National Security at Florida International University. While at university, I worked full time, launched a start-up, and was a student leader on campus through Toastmasters, The Ambassador Program, & Student Government.

About Simran Sakraney

Cyber Security Consultant
Mandiant
Steve Adler
Mayor
City of Austin

Steve Adler is Austin’s 52nd Mayor, having won re-election in 2018 by 40 points in a field of 8 candidates. His top priorities include mobility, affordability, and equity for all Austinites. Mayor Adler is a Trustee of the United States Conference of Mayors, Past Chair of the Capital Area Metropolitan Planning Organization (CAMPO) policy board, and Vice President of the National Council of Democratic Mayors. While he’s been in office the City of Austin passed the largest mobility and affordable housing bonds in its history. The city raised its minimum city wage to $15/hr, passed city-wide sick leave and second chance hiring protections. Still working on the homelessness challenge, the city has become one of a limited number of cities to achieve effective net zero veteran homelessness. The city has become a world leader on climate change action. Mayor Adler has received broad recognition for innovative leadership. Foreign Policy named him a Global reThinker and Living Cities included Mayor Adler on its list of 25 Disruptive Leaders (along with Facebook’s Mark Zuckerberg and author Ta-Nehisi Coates) to mark that organization’s 25th anniversary.

https://www.austintexas.gov/department/mayor

About Steve Adler

Mayor
City of Austin
Serrin Turner
Partner
Latham & Watkiins

Serrin Turner is a member of the firm’s Data Security & Privacy Practice, Complex Commercial Litigation Practice, and White Collar Defense & Government Investigations Practice. A former federal prosecutor, Mr. Turner is an experienced trial and appellate lawyer who represents and advises clients on a wide range of cybersecurity and privacy-related matters, including: Class-action litigation Regulatory investigations Commercial disputes Incident response Mr. Turner joined Latham following six years as an Assistant US Attorney for the Southern District of New York, where he served as the Office’s lead cybercrime prosecutor. In that role, Mr. Turner handled a wide range of cybercrime investigations and prosecutions, including matters involving computer hacking, data breaches, trade-secret theft, black-market websites, trafficking in stolen payment card and personal identity information, and money laundering through digital currencies. While at the US Attorney’s Office, Mr. Turner also handled high-profile litigation involving US electronic surveillance statutes, including Amnesty International v. Clapper, a constitutional challenge to a key foreign-intelligence surveillance statute, as well In re Microsoft Search Warrant, a challenge brought by a leading email provider to a search warrant for data stored overseas. Prior to his service at the US Attorney’s Office, Mr. Turner served in the Civil Division of the US Department of Justice. He is a two-time recipient of the Attorney General’s Award for Distinguished Service, the Justice Department’s second-highest award, and he has also received the John Marshall Award for Trial of Litigation, the Justice Department’s highest award for trial litigators.

https://www.lw.com/en/people/serrin-turner

About Serrin Turner

Partner
Latham & Watkiins
Thom Singer
Chief Executive Officer
Austin Technology Council

New CEO at the Austin Technology Council. Working with the best thought leaders and visionary entrepreneurs to promote and support the Austin Tech Community. My life’s work is to share the power in business relationships, trust, and accountability. I have spent 15 years speaking to corporate and association audiences about how to cultivate meaningful connections. It was 1991 when I moved to Austin for a job. The intention was to remain in Texas for for three years. But soon after my wife and I arrived in the state Capital, we realized the growth oriented attitude and entrepreneurial spirit of the city made it a great place to live and raise a family. After a successful career in business development for law firms, banks, and consulting firms I started my own business as a keynote speaker and trainer for corporate and association meetings in 2009. During the pandemic I joined the team at Stanton Chase International, a leading executive search firm assisting companies to grow their senior executive teams. In everything I do, I am passionate about the power of community and collaboration. I believe that adding one person to your inner circle is more powerful than adding 1000 people to social media. My first job was working as a busboy at “The Big Yellow House Restaurant” in Monrovia, CA. It was in this early employment that I learned the importance of customizing my work for whomever I had the honor to serve. Between the vast number of customers dining

About Thom Singer

Chief Executive Officer
Austin Technology Council
Rebecca (Becky) Taylor
Executive-In-Residence
Austin Technology Incubator

Rebecca either creates or join leadership teams to take on bold, creative changes and cultivate growth opportunities in radical ways. And do it with humility and humor. If you are looking for leadership that helps move your organization forward, let’s talk. Rebecca’s experience would be of interest to you. She has a long history of inciting change with large, multi-national corporations, the State Department in Washington DC, and successful entrepreneurial startups in the technology and public service arenas. With her experiences and network of connections, She knows how to drive results. In Rebecca experiences, she motivated some of the top people in their field, from science and technology to public policy and community building, to achieve new and innovative pursuits. We all win when we strive to grow beyond our current area of expertise. You’ll see from Rebecca profile that she built a track record of success with many organizations in a variety of circles. I can bring my network to you to cultivate new possibilities in areas you may never have before considered. My profile includes non-profit leadership, board service, government service and senior leadership in a corporate structure. I bring a business perspective that focuses on what direction should be taken and why those decisions should be made. Rebecca led organizations in developing their technological programs to keep pace with the industry standards and best practices. Rebecca know that if you’re not planning for tomorrow’s advances, you’re planning to fall behind. Currently Rebecca is considering opportunities in

About Rebecca (Becky) Taylor

Executive-In-Residence
Austin Technology Incubator
Mel Nevarez
Manager Cyber Security
CenterPoint Energy

Mel Nevarez has been employed by CenterPoint Energy for over 40 years. He is a graduate of the University of Houston. Mel is Currently responsible for CenterPoint Energy’s Identity and Access Management tools, SAP Security and Cyber Incident Response. Mel Nevarez has 40 years of IT experience with backgrounds in Networks, Infrastructure, Physical Security, Training, Management of the Corporate Help Desk as well as developing the current Security Awareness Program. Mel has been a member of the Greater Houston Partnership Cyber Committee for the last 8 years where he has assisted in developing a self-assessment tool, Cyber Incident Response Plan and hosted/participated in various Tabletop Exercises.

About Mel Nevarez

Manager Cyber Security
CenterPoint Energy
Selenis Leguisamon
AWS Team,
AWS

Selenis Leguisamon is a highly motivated client-facing technology professional with over 17 years of international experience utilizing technical and leadership skills to design and execute innovative solutions that create added-value. Selenis Leguisamon has Strong communication and written skills in English and Spanish. Background includes Consulting, Technical and Leadership roles in the Financial, Insurance, distribution and non-profit industries. Passionate about innovation, technology, entrepreneurship and social responsibility. Obtained an International MBA focused on Strategy, Entrepreneurship and Innovation from IE Business School in Madrid, Spain. IE Business School is ranked among the top international business schools.

About Selenis Leguisamon

AWS Team,
AWS
Justin Hutchens
Director
Cybersecurity & Privacy

Justin Hutchens (“Hutch”) is a seasoned cyber security professional with experience delivering TVM (Threat and Vulnerability Management), IR (Incident Response), AppSec (Application Security), and GRC (Governance, Risk & Compliance) services. He is the creator of Sociosploit, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology. Hutch has spoken at multiple conferences to include HouSecCon, Texas Cyber Summit, ISSA, ToorCon, and DEFCON.

About Justin Hutchens

Director
Cybersecurity & Privacy
Evan Pena
Managing Director
Mandiant, Global Red Team

Evan Pena is a highly experienced security consultant with years of professional experience. Evan Pena is currently working at Mandiant, Managing Director, Global Red Team. During which he has lead and assisted vulnerability assessments, penetration tests, threat assessments, incident response engagements, taught law enforcement, and worked to develop internal vulnerability assessment and penetration test methodology and tools.

About Evan Pena

Managing Director
Mandiant, Global Red Team
Andrew Oliveau
Red Team Consultant
Mandiant

Andrew Oliveau Performs network penetration testing, web application penetration testing, social engineering assessments, source code reviews, and threat analysis Andrew Oliveau Performs network penetration testing, web application penetration testing, social engineering assessments, source code reviews, and threat analysis

About Andrew Oliveau

Red Team Consultant
Mandiant
Jacqueline Gonzalez
Security Engineer
Anvilogic

“Jacqueline Gonzalez is a cybersecurity professional with a focus in security operations and engineering. She has worked in securing organizations in the finance and technology sector, and obtained her Masters in Cybersecurity from Florida International University.”

About Jacqueline Gonzalez

Security Engineer
Anvilogic
Eric Hines
Threat Detection Manager
Anvilogic

Eric Hines is an experienced Cryptologic Technician with a demonstrated history of working in the military industry. Diverse background in Management, Leadership, Cyber security and Information Security principles. Cybersecurity professional with a Bachelor of Science – BS focused in Computer Network Infrastructure and Cybersecurity from University of Maryland Global Campus.

About Eric Hines

Threat Detection Manager
Anvilogic
Chris Wysopal
CTO and co-founder
Veracode

Chris Wysopal, Veracode’s CTO and co-founder, is responsible for the company’s software security analysis capabilities. In 2008 he was named one of InfoWorld’s Top 25 CTO’s and one of the 100 most influential people in IT by eWeek. One of the original vulnerability researchers and a member of L0pht Heavy Industries, he has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He published his first advisory in 1996 on parameter tampering in Lotus Domino and has been trying to help people not repeat this type of mistake for 25 years. He is also the author of “The Art of Software Security Testing” published by Addison-Wesley.

About Chris Wysopal

CTO and co-founder
Veracode
Cecilia Marinier
Strategy, Innovation
RSA Conference

Cecilia Murtagh Marinier is a business leader focused on growth with extensive experience in identifying innovators in cybersecurity across enterprises, governments, startups and academic research centers. Excels at researching and synthesizing the big picture and curating a rich network of experts and investors from across the globe. Cecilia curates RSA Conference Innovation Sandbox Contest which awards Most Innovative Startup annually. She launched RSAC Early Stage Expo which exposes nascent startups to industry decision makers. Tapping into her global network of venture capitalists, entrepreneurs, and accelerators, she designs and moderates the monthly RSAC Innovation Showcase. To attract and support the next generation of cybersecurity warriors, she created and stewards RSAC Security Scholars program and RSAC College Day. Prior to working at RSAC, she spent seven years with Monitor Group, a boutique firm that develops new approaches to the complex problems facing the US Government Intelligence Community. She also served on the Commonwealth Club’s Inforum Board and currently serves on the Schools That Can’s Cyber Brain Trust.

About Cecilia Marinier

Strategy, Innovation
RSA Conference
Andrew Hay
Chief Operations Officer
Lares

Andrew Hay is an experienced cybersecurity leader, data scientist, researcher, and international public speaker with decades of experience across multiple IT, security, and risk domains. Andrew Hay has authored several books on endpoint, network, cloud, and security management topics, has grown and led engineering, research, data science, and security teams worldwide, and has experience growing companies from inception through acquisition. Andrew also stays active as a certified USA Rugby coach, a rugby strength & conditioning coach, and a competitive powerlifter with the United States Powerlifting Association (USPA).

About Andrew Hay

Chief Operations Officer
Lares
Jace Walker
Threat Researcher
Binary Defense

Jace Walker Security Engineer and Linux nerd

About Jace Walker

Threat Researcher
Binary Defense
Joe McMann
Head of Cyber Services
Binarydefense

Joe McMann is a hands on leader with demonstrated expertise in building cybersecurity programs, intelligence driven computer network defense, enterprise level incident response, and advanced threat intelligence analysis. Strategic thinker adept at applying 15+ years of practical network defense experience to drive progress and evolution across organizations, processes, and technologies.

About Joe McMann

Head of Cyber Services
Binarydefense
David Probinsky
Red Teamer
Elevate

David is a seasoned Information Technology and Cybersecurity professional with over 7 years of professional services experience in the area of Information Technology (IT) and offensive security consulting. He currently holds a Computer and Network Security degree, multiple industry certifications, such as the Network+, Security+, PenTest+ , the INE eJPT certification, and a few others. He is an active member of Hack Miami (%27), as well as a member of South Florida Information Systems Security Association (SFISSA), The Open Organization Of Lockpickers (TOOOL), President of the Cyber Security Club at Broward College where he currently attends and is also very involved with other hacker communities such as the RedTeamRD from the Dominican Republic.

About David Probinsky

Red Teamer
Elevate
Jasmine Henry
JupiterOne
Field Security Director

Jasmine Henry is a Security Director at JupiterOne, where she is responsible for compliance, risk, and information assurance, along with research on cyber asset inventories, attack surfaces, and attack paths. Jasmine is an accidental career specialist in applied knowledge graphs for cloud-native startup security. She is also a candidate for a PhD in Computer & Information Sciences at the University of Arkansas, Little Rock and the executive editor of the book "Reinventing Cybersecurity." Jasmine has worked with Philips, ADP Research Institute, IBM Security, HPE, Mimecast, TVA, and other organizations in her career.

https://jasminehenry1.skyword.com/

About Jasmine Henry

JupiterOne
Field Security Director
Sherif Hazzaa
Managing Director
ISnSC

Sherif Hazzaa ISnSC “Essence” is an Intelligence Support & Security Consulting leader that has evolved since 2003 to a highly efficient R&D house with Intellectual Properties & Patents in * Cyber Warfare * Cyber Defense * Cyber Intelligence. Serving Military and Law Enforcement for 15+ years

About Sherif Hazzaa

Managing Director
ISnSC
Rob (Mubix) Fuller
Red Team Director
HAK5

Rob “Mubix” Fuller is a Red Team who is always looking for a challenge and willing to learn anything to overcome it. Specialties: Information Assurance, Network Security and Auditing, Penetration Testing https://malicious.link/about/ Rob has over 16 years of experience covering all facets of information security. He has been behind the lines helping to design, build, and defend the US Marine Corps, US Senate, and Pentagon networks – as well as performing penetration tests and Red Team engagements against those same networks. More recently, Rob has built and lead numerous Red Teams in successful engagements against many of the Fortune 50 companies, representing some of the best defensive teams in the industry. Rob’s experience and expertise ranges from embedded and wireless devices in ICS/OT networks to standard IT infrastructures. He is a frequent speaker and trainer at a number of well-known security conferences. He has also served as a senior technical advisor for HBO’s show Silicon Valley. Rob has acquired a number of certifications and awards over the years, but the ones he holds above the rest are father, husband, and United States Marine. (he/him) Dad / Husband / Marine / Student / Teacher / Red Team Director / @Hak5 / @NoVAHackers / @SiliconHBO / @MidatlanticCCDC/ @MARFORCYBER Auxiliary

About Rob (Mubix) Fuller

Red Team Director
HAK5
Jordan Bonagura
Security Researcher
NEART Investments

Jordan is the Head of Inovação Tecnologia, Pesquisador em Segurança da Informação / CEH CISO and Information Security Researcher – CEH, Hacking is NOT a Crime Advocate, Stay Safe (Magazine and Podcast) Founder. Computer Scientist, Post Graduated in Business Strategic Management, Innovation and Teaching Organizer of Vale Security Conference – Brazil Director Member of Cloud Security Alliance – Brazil Advisory Member of Digital Law and High Tech Crimes OAB (Association of Brazilians Lawyers) IT Teacher and Course Coordinator SJC Hacker Space Founder Speaker (AppSec California, GrrCon, Angeles Y Demonios, BSides Augusta, Bsides SP, H2HC, Silver Bullet, Seginfo, ITA, INPE, BalCCon2k14, etc)

About Jordan Bonagura

Security Researcher
NEART Investments
Bryson Bort
CEO and Founder
SCYTHE

Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, and Co-Founder of the ICS Village, a non-profit advancing awareness of industrial control system security. Bryson is a Senior Fellow with the Atlantic Council’s Cyber Statecraft Initiative, the National Security Institute, and an Advisor to the Army Cyber Institute. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain. He was recognized as one of the Top 50 in Cyber in 2020 by Business Insider. ? Bryson received his Bachelor of Science in Computer Science with honors from the United States Military Academy at West Point. He holds a Master’s Degree in Telecommunications Management from the University of Maryland, a Master’s in Business Administration from the University of Florida, and completed graduate studies in Electrical Engineering and Computer Science at the University of Texas.

https://www.scythe.io/about/bryson-bort

About Bryson Bort

CEO and Founder
SCYTHE
Daniel Clayton
Vice President Global Security Services
Bitdefender

Daniel Clayton is best known as an Operations and Cyber-Security executive with more than 30 years of experience building and delivering complex, global operations. Industry commentator and is a frequent speaker at international and national conferences. He believes that people and informed decision-making are the foundation of any successful operation, so his approach is rooted in strong people leadership and data-driven insight. Professional Competencies: SOC Operations Threat Intelligence Managed Services Digital and Cultural Transformation Strategic Planning Change Management Global Operations Global P&L Management Customer Success Technical Support Operational Engineering

About Daniel Clayton

Vice President Global Security Services
Bitdefender
Annabelle Klosterman
Cybersecurity Engineer
Cyber Community Club

Annabelle Klosterman is a Cybersecurity Engineer for Southwest Airlines, Co-Founder/Program Director of the Cyber Community Club, and a Cyber Operations student at Dakota State University. Her areas of focus are offensive and defensive security, governance, risk and management, security consulting, program management, and cybersecurity training/outreach. As a high school student, Annabelle worked as an Information Systems Assistant at a data center providing services to 15+ banks throughout the state. The past couple years, she has been a Cybersecurity Intern for the Department of Defense (DoD). Throughout the years, Annabelle has competed in numerous competitions and placed second nationally at the Collegiate Cyber Defense Competition in 2022 and was a national finalist in CyberPatriot in 2019 and 2020. Additionally, she earned 1st place in the 2022 Idaho National Laboratory CyberCore CTF, and Women in Cybersecurity (WiCyS) CTF in 2021 and 2022. She holds SANS certifications in Cybersecurity Technologies (GFACT), Cloud Security (GCLD), and Incident Handling (GCIH). Ms. Klosterman has spoken on cybersecurity and career topics at various events and organizations including BSidesSATX, RSA Conference, South Dakota InfraGard, Civil Air Patrol, and more. Annabelle’s goal is to be in a position that changes the way people view and handle security, for their protection and safety, and the benefit of everyone. Annabelle Klosterman is a Cyber Operations student at Dakota State University and Co-Founder/Program Director of the Cyber Community Club. As a high school student, Annabelle worked as an Information Systems Assistant at a data center providing services to 15+ banks throughout the state. The past couple years, she has been a Cybersecurity Intern for the Department of Defense (DoD). She has organization experience researching and implementing cybersecurity products and practices, analyzing and configuring policies, and more. Throughout the years, Annabelle has competed in numerous competitions and placed second nationally at the Collegiate Cyber Defense Competition in 2022 and was a national finalist in CyberPatriot in 2019 and 2020. Additionally, she earned 1st place in the 2022 Idaho National Laboratory CyberCore CTF, and Women in Cybersecurity (WiCyS) CTF in 2021 and 2022. She holds SANS certifications in Cybersecurity Technologies (GFACT) and Cloud Security (GCLD).

About Annabelle Klosterman

Cybersecurity Engineer
Cyber Community Club
Mariel Klosterman
Cybersecurity Analyst
Cyber Community Club

Mariel Klosterman is a Network and Security Administration graduate from Dakota State University and Co-Founder/Program Director of the Cyber Community Club. Mariel Klosterman is a Cyber Threat Intelligence Analyst and Researcher. She is passionate about security and enjoys sharing her knowledge and skills, and helping those looking to start or grow in the cybersecurity field. Ms. Klosterman has conducted significant research relating to foreign influence campaigns and sock puppet accounts, which are an integral part of OSINT and digital investigations. She has received recognition and an award for her research from the OSMOSIS Institute. Her whitepaper published with the Hetherington Group can be found at: www.hetheringtongroup.com/product/21st-century-sock-puppets-pulling-the-wool-over-on-you She has experience performing threat intelligence research with newly identified threats and vulnerabilities, writing threat intelligence reports and security policies, improving and creating required operational tools related to SOC workflows, and implementing data protection controls and training. Ms. Klosterman has presented at professional groups and conferences including Silicon Valley High Technology Crime Investigation Association, InfraGard South Dakota, NEbraskaCERT, OSMOSISCon, Day of Shecurity, and Rainbow Secure Cyber Symposium. She has appeared on podcasts such as PI Perspectives, Great Women in Fraud, and OSINT Coc

About Mariel Klosterman

Cybersecurity Analyst
Cyber Community Club
Caroline Caldwell
Data Scientist
ExtraHop

Caroline Caldwell uses statistics and machine learning to clean up messy data and make predictions. Caroline Caldwell has been writing algorithms to detect cybersecurity threats as a data scientist at ExtraHop since 2020. Before that she received her PhD in Astrophysics, where she combined massive hydrodynamic cosmological simulations and data from large observational surveys to constrain the mass of the neutrino. Caroline also contributed to NASA’s Kepler planet discovery program as an undergraduate at UT Austin. Tech: Python, SQL, Pyspark/Scala, Cloud computing using GCS, Dataproc, Airflow, Plotly, Git Stats: Random Forests, Gradient Boosted Trees, AB testing, Regression

About Caroline Caldwell

Data Scientist
ExtraHop
Chuck Weissenborn
Regional Manager
Dragos - DoD/IC

Chuck Weissenborn is a Strategic lead for US DoD and IC focused business. Management experience ranging in scope from small teams to 900 people. Avid volunteer focused on STEM development and DoD/Industry Integration. Technologist | Cyber Security Business Leader | Mentor | Volunteer | Speaker

About Chuck Weissenborn

Regional Manager
Dragos - DoD/IC
Ell Marquez
Security Researcher
GRIMM

Ell Marquez is a proud advocate of Hacking Is Not and Crime and Operation Safe escape. Ell Marquez has traveled the world for five years, educating security practitioners on subjects from on-prem infrastructure to the cloud and everything in between. As part of her journey in 2022, Ell transitioned to GRIMM with the focus on researching and training organizations on strengthening their defenses against the latest cyber threats.

About Ell Marquez

Security Researcher
GRIMM
Roger Grimes
Defense Evangelist
KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. Roger Grimes worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005. “With social engineering being a factor in 93 percent of all successful data breaches, I believe that working on any other problem in the security industry would be an inefficient use of my time,” said Grimes. “This job allows me to pursue my biggest passion in the cybersecurity industry of promoting a culture that supports data-driven defense. I look forward to working with Stu and the KnowBe4 team to help drive the company’s ultimate vision.” * e:rogerg@knowbe4.com, Twitter:@rogeragrimes, LinkedIn: https://www.linkedin.com/in/rogeragrimes/, Weekly Columns: http://www.infoworld.com/blog/security-adviser *Author or co-author of over 1100 computer security columns and 12 books *Any opinions expressed are purely mine own and not of my employers *Blatant book plugs: *Latest book: Ransomware Protection Playbook (https://www.amazon.com/Ransomware-Protection-Playbook-Roger-Grimes/dp/1119849128) *Hacking Multifactor Authentication (https://www.amazon.com/Hacking-Multifactor-Authentication-Roger-Grimes/dp/1119650798) *My quantum book, Cryptography Apocalypse (https://www.amazon.com/Cryptography-Apocalypse-Preparing-Quantum-Computing/dp/1119618193), about quantum computers breaking today’s crypto *A Data-Driven Computer Security Defense (https://www.amazon.com/Data-Driven-Computer-Security-Defense-Should/dp/1549836536/) *Hacking the Hacker, (https://www.amazon.com/Hacking-Hacker-Learn-Experts-Hackers/dp/1119396212/)

About Roger Grimes

Defense Evangelist
KnowBe4
Joey Jablonski
VP of Analytics
Pythian

Joey Jablonski is VP of Analytics at Pythian, he leads strategic engagements assisting customers in developing their data strategy, defining and executing on data governance programs and building analytical models to power the modern data-driven organization. Prior to Pythian, Joey was VP of Product at Manifold, where he brought a product mind-set is part of all engagements—allowing for delivery of value quickly in any project, and building over time to drive adoption of new data-centric capabilities in an organization. Joey led engagements across industries including high tech, pharmaceuticals and for the federal government. Before Manifold, Joey held executive leadership positions at Northwestern Mutual, iHeartMedia and Cloud Technology Partners. He brings 20+ years of experience in software engineering, high performance computing, cyber security, data governance and data engineering.

About Joey Jablonski

VP of Analytics
Pythian
Mark Peters
Product Manager
BrainGu

Mark Peters is Agile-focused, self-motivated Cybersecurity expert, DevOps integrator focused on melding security into software development and operations, at scale and in time, dedicated to solving tomorrow’s problems today. Mark Peters is an experienced executive-level team builder, Agile, DevOps proficient program manger, previous US Air Force professional with cybersecurity and intelligence expertise. Visionary leader who implements tailored technical solutions integrating scaled, successful operations through configuring secure networks and associated practices. Steered multiple groups by building integrated teams, creating efficient processes, and delivering metric-based, clearly communicated results.Led highly successful combat missions/staff functions across eight world-wide assignments and five combat deployments. Author of Cashing in on Cyberpower (Potomac 2018) on economic cyber-attack analysis, published writer, and polished, professional speaker. Mentor, trainer, and transitional coach.

About Mark Peters

Product Manager
BrainGu
Apurv Singh Gautam
Threat Researcher
Cyble

Apurv Singh Gautam works as a Threat Researcher at Cyble. He commenced work in Threat Intel 4 years ago. He works on hunting threats from the surface and dark web by utilizing OSINT, SOCMINT, and HUMINT. He is passionate about giving back to the community and has already conducted several talks and seminars in conferences like SANS, Defcon, BSides, local security meetups, schools, and colleges. He loves volunteering with Station X to help students make their way in Cybersecurity. He looks forward to the end of the day to play and stream one of the AAA games Rainbow Six Siege. Certifications: CompTIA Security+ Programming Skills: Proficient in Python, Java, and Bash. Fundamentals of C, C++, PHP, JavaScript Security Skills: Threat Intelligence/Hunting, OSINT, SOCMINT, HUMINT, Reverse Engineering, Malware Analysis Other Misc. Skills: Elastic Stack, MITRE ATT&CK, NLP

About Apurv Singh Gautam

Threat Researcher
Cyble
Jenny Kinney
Senior Strategic Advisor
Living Security

Jenny Kinney is a experienced cybersecurity professional with a history of working in the information technology and services industry. Jennifer Kinney is a former information security awareness program owner of a multibillion dollar company. In addition to her written publications, she has facilitated hundreds of webinars and in-person training sessions on cybersecurity and incident response, worldwide. Her 15+ years of training experience has taught her that when given the right tools, anyone can improve their security posture to keep their work and personal lives safer. She is passionate about communication as a means of motivating end users of all technical levels to become the strongest force against cyber threats. Jennifer holds a Bachelor’s degree in Psychology and Business Management from the University of South Carolina Links to past videos or recorded presentations: Building a Successful Security Champions Program Cybersecurity Awareness Month Tips and Tricks for Effective Communication Strategies

https://www.livingsecurity.com/

About Jenny Kinney

Senior Strategic Advisor
Living Security
Casey Ellis
Founder/CTO
Bugcrowd

20+ year field taught cybersecurity and startup veteran who pioneered the Crowdsourced Security-as-a-Service model, launching the first programs on Bugcrowd in 2012. My working style takes the classic Australian "solve it with whatever is within arm's reach" approach to value-discovery and creation, blends it with a long-standing fascination with cybercriminal creativity and the socio-technical aspects of cybersecurity, and applies it in the pursuit of connecting latent opportunity with unmet demand in systems capable of hyper-growth. I'm a passionate believer in the pursuit of potential, and strive for that both personally and in those I get the opportunity to influence and/or lead. This applies as much in helping the hacker community grow as it does for those I manage directly, and those I get the opportunity to mentor. Experience is extremely broad and includes: - Offensive security and engineering as a penetration tester - Sales and offensive/defensive solution architecture - Product invention and creation - Technical community development and open-sourced product management - Conference keynoting in security and startups - Influencing federal policy and creating policy standards - Hiring and management of teams as a Director and as CEO - Board of Directors construction and management as a Chairman.

https://www.bugcrowd.com/

About Casey Ellis

Founder/CTO
Bugcrowd
Andre Tucker
Principal Product Strategist
Living Security

Andre Tucker is the Principal Product Strategist at Living Security, a pioneer in human risk management and leader in cybersecurity training. He is a seasoned technology and cybersecurity professional having held several senior positions at software and managed security services companies including Splunk, ReliaQuest and CIPHER. Andre is also a proud veteran of the United States Air Force, where he launched his technology career in systems administration, web development, and database administration.

About Andre Tucker

Principal Product Strategist
Living Security
Matthew Saner
Principal Security Solutions Architect
Amazon

Matt Saner is a Principal Security Solutions Architect at AWS, focusing on helping the world’s largest Manufacturing and Industrial customers solve critical security challenges in the cloud. Prior to AWS, Matt spent nearly 2 decades working in the Financial Services industry, solving various technology, security, risk, and compliance challenges. He highly values life-long learning and holds a Masters in Cybersecurity from NYU.

About Matthew Saner

Principal Security Solutions Architect
Amazon
Maitreya Ranganath
Security Solutions Architect
AWS

Maitreya is an Principal Security Solutions Architect at AWS. He enjoys helping customers solve security and compliance challenges and architect scalable and cost-effective solutions on AWS.

About Maitreya Ranganath

Security Solutions Architect
AWS
Reet Kaur
Chief Information Security Officer
Portland Community College

Reet Kaur is an influential, strategic, and highly accomplished C-Suite executive with more than twenty years of extensive experience spearheading security, technology, and business transformations in diverse and ever-changing environments. Reet Kaur has a demonstrated and proven track record of success leveraging technological adeptness and business intelligence to develop and execute robust strategies and roadmaps positioning the organization as an industry leader in a highly competitive landscape. ?Reet background includes scaling companies through extraordinary innovation and leadership championing the organizational mission and goals. Additionally, I execute on challenges and maintain a forward-thinking, entrepreneurial mindset aligned with the enterprise vision. ?Reet is proficient at building powerful teams and relationships, establishing expectations, communicating vision, and monitoring performance to maximize effectiveness. A well-regarded senior executive translating organizational needs into technology solutions accelerating change and growth.

About Reet Kaur

Chief Information Security Officer
Portland Community College
W. Garrett Myler
CEO
Enclave Defense

W. Garrett Myler Cybersecurity Consultant | CISSP | GCFA | Sec+ | 62443 Risk Assessment Specialist W. Garrett Myler is the owner of Enclave Defense and a cybersecurity consultant specializing in risk assessment and critical infrastructure. Garrett started his INFOSEC career as an U.S. Air Force cyber warfare operator and DoD contractor and has supported both offensive and defensive cyber operations from the strategic to tactical levels of effort. Part time, Garrett continues to serve as a cyber warfare trainer with the U.S. Air Force Reserves. He has a degree and some certs but would rather you ask him about his family or outdoor hobbies.

About W. Garrett Myler

CEO
Enclave Defense
Ernesto Ballesteros
Cybersecurity Advisor
DHS CISA

Ernesto Ballesteros is an Experienced information systems and security professional with a demonstrated history of success in higher education, financial services, state government leadership, as well as federal service. I proudly aspire to serve my neighbor, state, and country. Ernesto Ballesteros former State Cybersecurity Coordinator for Texas (Texas Government Code 2054.511), Chairman of the Texas Cybersecurity Council (Texas Government Code 2054.512), information security officer, consultant, professor, and director of a nationally recognized Center of Academic Excellence in Cyber Defense Education (CAE-CDE) designated by the National Security Agency (NSA) and Department of Homeland Security (DHS). JD, MS, CISSP, CISA, Security+

About Ernesto Ballesteros

Cybersecurity Advisor
DHS CISA
Gabriel Schuyler
Enterprise Solutions Engineer
Wiz, Inc

Gabriel M Schuyler is a seasoned cloud security practitioner with years of experience in all of the major clouds. Gabriel M Schuyler works as a solutions engineer at Wiz, Inc, and prior worked as a web application specialist at Palo Alto Networks. Seven years at PuppetLabs gave him an appreciation for devops, which is clear in his automated approach to cloud security. Off the clock, he enjoys wireless hacking, lockpicking (poorly), and encouraging the use of technology for positive social change.

About Gabriel Schuyler

Enterprise Solutions Engineer
Wiz, Inc
Gerard Johansen
Incident Handling, Manager
RedCanary

Gerard Johansen is an cyber security professional with over decade of experience in security operations, incident response and threat intelligence. He is currently an Incident Handling Manager at a Managed Detection and Response provider working directly with customers and incident handlers in identifying and responding to cyber incidents Prior to moving into the private sector, Gerard spent ten years in law enforcement at both the state and federal level with considerable time investigating cyber crime. Gerard has also obtained a masters degree in Information Assurance from Norwich University along with a masters certificate in Monitoring, Surveillance and Intelligence Operations from Utica University. Gerard has been privileged to speak at a number of conferences including SANS DFIR and CTI as well as Techno Security and HTCIA. Furthermore, he has had the opportunity to publish articles in eForensics magazine as well as writing several books, most notably the third edition of Digital Forensics and Incident Response through Packt publishing. Obtained the Certified Information System Security Professional Certification: Completed a Masters of Science in Information Assurance from a National Security Agency Center of Academic Excellence in Information Assurance Education; Served as Special Deputy United States Marshal for the Federal Bureau of Investigations Connecticut Computer Crimes Task Force; Assigned as a Certification and Accreditation Analyst for a federal government inter-agency unit; Conducted technical and non-technical vulnerability assessments for financial and government organizations; Extensive training and experience in Digital Forensics and Computer Security Incident Response; Developed and maintained industry and personnel relationships gained; Through continual development related to security spanning business functions; Frequently requested to conduct Information Security related seminars and workplace programs to educate and train a wide variety of personnel. Specialties: Risk Assessment / Mitigation; Cyber Threat Intelligence; Computer Security Incident Response; Vulnerability Assessment and Penetration Testing; Digital Forensics / e-Discovery; Decision Support Alternative Analysis; Threat emulation and Redteaming; Corporate Counter Intelligence / Counter Espionage; Threat Source Intelligence; Cloud Security Challenges; Insider Threat Assessment / Mitigation; Executive Protection

About Gerard Johansen

Incident Handling, Manager
RedCanary
John Vecchi
Chief Marketing Officer
Phosphorus

John Vecchi is Chief Marketing Officer at Phosphorus Cybersecurity, John’s achieved more than 25 years of experience in high-tech security marketing, strategy, product marketing, product management, and consulting. A serial CMO and security visionary, he has helped build and lead some of the biggest brands in enterprise security, including Solera Networks, Blue Coat Systems, Check Point Software, McAfee, Zscaler, Symantec, Anitian, ColorTokens, and Anonyome Labs. Throughout his career, John’s been featured at events and conferences world-wide, built an award-winning security podcast titled “Security on Cloud,” and wrote as a featured columnist at SECURITYWEEK, writing about advanced threats and big data security.

About John Vecchi

Chief Marketing Officer
Phosphorus
Dayspring Johnson
Cloud Detection Engineering
Datadog

Dayspring is a Detection Engineer at Datadog where he builds out various detection mechanisms for Datadog’s Cloud SIEM product with a focus on the major cloud providers. In his spare time, he actively manages a cybersecurity community called Cyberwox Academy where he helps 1800+ college students and entry-level cybersecurity professionals navigate their cybersecurity careers. Dayspring has a YouTube Channel with 13K+ subscribers and over 500K views where he creates content on his cybersecurity journey, how to break into cybersecurity with labs, projects, certifications, and various other strategies. His passion for the Cybersecurity industry makes him enjoy what he does to the fullest and drives him to continue to grow, become better at what he does, and help others break into the field. Skills: – Cloud Security – AWS/GCP/Azure – Security Operations & Engineering – Threat Detection, Engineering & Response – Kubernetes Security (Managed/Unmanaged) – IdPs – Okta, Auth0 – Microsoft 365, Google Workspace – Endpoint Security – Crowdstrike, Carbon Black, Cylance, Tanium, McAfee – SIEM/SOAR – Datadog, Splunk, Cortex XSOAR

About Dayspring Johnson

Cloud Detection Engineering
Datadog
Joseph Mlodzianowski
Founder
Texas Cyber Summit

Joseph has a long and distinguished history of leading large teams of project, program Managers, architects, Cybersecurity Engineers and developers in the design, deployment and management of a number of multi-million dollar commercial and DoD projects. A Network, and Cybersecurity infrastructure expert, published author, Course Developer and Trainer; Joseph has many certifications including the Cisco CCIE, CNE, CISSP, ITILv4. Joseph worked at the Department of Defense for more then ten years as an operator, and SME, where he performed CNE/CNA functions and later led large teams to architect and build many Data Centers, Critical infrastructure and big data systems, all in pursuit of National Security initiatives. Joseph Co-Authored the CompTIA Security+ SY0-601 Cert Guide, available here: https://www.amazon.com/CompTIA-Security-SY0-601-Guide-Certification/dp/0136770312 Joseph teaches various “Dark Web” Classes for O’Reilly, the agenda here: https://www.oreilly.com/live-events/darknets-and-the-dark-web-recon-for-the-ciso/0636920074169/0636920074167/ Founder of the Texas Cyber Summit and the original Defcon Red Team Village.

https://darkarts.io

About Joseph Mlodzianowski

Founder
Texas Cyber Summit
Mathew Lamb
Cloud Native Solutions Architect
Prisma Cloud

Mathew J. Lamb is Empathetic, dedicated, innovative technology leader focused on CloudOps, DevOps, and SecOps helping State Governments, Higher Education, Local Government, and Lower Education understand, migrate, and secure complex public, private, and hybrid cloud environments from the build phase to runtime. United States Infantry Officer in the Texas National Guard

About Mathew Lamb

Cloud Native Solutions Architect
Prisma Cloud
Kyle Avery
Offensive Security Lead
HEB

Kyle Avery Experienced penetration tester and red teamer with history working in internal and consultant positions. Skilled in developing offensive tooling with C, C#, and Go. Kyle Avery is a red teamer and offensive tool developer with a focus on post-exploitation. He previously worked at Black Hills Information Security as a red teamer, specializing in .NET development. He has since moved to an internal red team at H-E-B, where he works to improve the organization’s security posture through continuous testing of configurations and processes.

https://kyleavery.com/

About Kyle Avery

Offensive Security Lead
HEB
Dave Stokes
Technology Evangelist
Percona

Dave Stokes is the MySQL Community Manager. He speaks at various events on various MySQL subjects. Specialties: Databases, Open Source Software. Open Source Databases Talks about #data, #mysql, #database, and #mysqldba

About Dave Stokes

Technology Evangelist
Percona
Jose Hernandez
Senior Manager
Splunk, Threat Research

José Hernandez is a Senior Manager for the Threat Research team at Splunk. José Hernandez started his professional career at Prolexic Technologies (now Akamai), fighting DDOS attacks from “anonymous” and “lulzsec” against Fortune 100 companies. As an engineering Co-Founder of Zenedge Inc. (acquired by Oracle Inc.), Hernandez helped build technologies to fight bots and web-application attacks. While working at Splunk as a Security Architect, he built and released an auto-mitigation framework used to automatically fight attacks in large organizations. He has also built security operation centers and run a public threat-intelligence service. Although security information has been the focus of his career, Hernandez has found that his true passion is in solving problems and creating solution

About Jose Hernandez

Senior Manager
Splunk, Threat Research
Parth Shukla
Cybersecurity Analyst
Cequence Security

Parth Shukla is a cyber security analyst at Cequence Security and has a great passion for Web Application Security. Parth Shukla is also Bug hunter; community builder and Cyber security enthusiast and I believe in quote “security is a myth”.

About Parth Shukla

Cybersecurity Analyst
Cequence Security
Solomon Sonya
Assistant Professor
United States Air Force Academy

Solomon Sonya Cyber Security and Software Engineering Expert Solomon Sonya Expertise in Software Engineering, Computer and Network Security, Reverse Engineering, Malware Analysis, Threat Intelligence, Hacking, Digital Forensics. I’ve been blessed to work with extremely knowledgeable people over the years who are gifted in Computer Science and Cyber Security. This has enabled me to really enhance my skillset and travel the world presenting software and research I have developed to various conferences. The bigger the problem and harder the challenge makes the software even more rewarding when I develop the solution.

About Solomon Sonya

Assistant Professor
United States Air Force Academy
Adam Compton
Principal Security Consultant
TrustedSec

Adam Compton is a diversely skilled Information Systems Security Professional with over 20 years progressive experience in network design, systems administration, infrastructure design, risk assessment, vulnerability assessment, penetration testing, and host/network security. Specialties: • System and network vulnerability discovery and penetration testing. • Programming: C, C++, C#, Java • Scripting: Bash, Perl, PHP, Python

About Adam Compton

Principal Security Consultant
TrustedSec
Marco Palacios
Senior de Amenazas T?cticas
Fortinet

Marco Palacios es Analista Senior de Amenazas Tácticas en Fortinet y Vicepresidente de Pacific Hackers Association. Comenzó su carrera en TI y pasó más de una década en operaciones de TI antes de hacer la transición a la ciberseguridad. Marco ha pasado los últimos seis años especializándose en la defensa de organizaciones y en la construcción e implementación de operaciones de seguridad modernas. Marco también es cofundador de la asociación sin fines de lucro Pacific Hackers Association (PHA). A través de la PHA, él personalmente asesora y aboga por los veteranos y las comunidades subrepresentadas para ayudarlos a encontrar caminos no tradicionales en la industria de la ciberseguridad. Sirvió en la Fuerza Aérea de los Estados Unidos y tiene una Maestría en Ciberseguridad y una Licenciatura en Sistemas de Información.

About Marco Palacios

Senior de Amenazas T?cticas
Fortinet
Darwin Salazar
Product Detection Engineer
Datadog

Darwin Salazar is a Product Detection Engineer @ Datadog. Formerly medical device security and cloud security consulting for several Fortune 500s. Darwin Salazar Enjoys reading, working out, spending time with family and giving back to his community. Darwin is currently a Certified Azure Security Engineer (AZ-500), Certified Kubernetes Administrator (CKA) and also holds the AWS Certified Cloud Practitioner (CCP) certification, CompTIA Security+, Azure Fundamentals (AZ-900) and the Certified Cloud Security Knowledge (CCSK) certification.

About Darwin Salazar

Product Detection Engineer
Datadog
David Mendoza Jr.
CISO
Texas A&M-SA

David Mendoza Jr. Over 24 years of experience in Computer Systems and Information Technology including Information Assurance, LAN/WAN administration (building, designing and configuring networks), helpdesk management, computer upgrades and repair. David Mendoza Jr. Over 24 years of experience in Computer Systems and Information Technology including Information Assurance, LAN/WAN administration (building, designing and configuring networks), helpdesk management, computer upgrades and repair.

About David Mendoza Jr.

CISO
Texas A&M-SA

About Title Sponsor: Bitdefender

https://www.bitdefender.com/ Sponsor Logo

About Titanium Sponsor: RedKnight

https://red-knight.com/ Sponsor Logo

About Platinum Sponsor: Binary Defense

https://www.binarydefense.com/ Sponsor Logo

About Platinum Sponsor: Elastic

https://www.elastic.co/ Sponsor Logo

About Platinum Sponsor: Fluency

https://www.fluencysecurity.com/ Sponsor Logo

About Platinum Sponsor: NetSfere

https://www.netsfere.com/ Sponsor Logo

About Platinum Sponsor: MixMode

https://mixmode.ai/ Sponsor Logo

About Platinum Sponsor: Cisco SECURE

Sponsor Logo

About Diamond Sponsor: Nozomi Networks

https://www.nozominetworks.com/ Sponsor Logo

About Diamond Sponsor: CIA Careers

https://www.cia.gov/careers/ Sponsor Logo

About Diamond Sponsor: QOMPLX:

https://www.qomplx.com/ Sponsor Logo

About Diamond Sponsor: Amazon

https://aws.amazon.com/?nc2=h_lg Sponsor Logo

About Gold Sponsor: SpecterOps

https://specterops.io/ Sponsor Logo

About Gold Sponsor: PlexTrac

https://plextrac.com/ Sponsor Logo

About Gold Sponsor: Trend Micro

https://www.trendmicro.com/en_us/business.html Sponsor Logo

About Gold Sponsor: Artic Wolf

https://arcticwolf.com/ Sponsor Logo

About Silver Sponsor: ThreatLocker

https://threatlocker.com/ Sponsor Logo

About Silver Sponsor: Securonix

https://www.securonix.com/ Sponsor Logo

About Silver Sponsor: CriticalStart

https://www.criticalstart.com/ Sponsor Logo

About Silver Sponsor: Randori

https://www.randori.com/ Sponsor Logo

About Bronze Sponsor: TrustedSec

https://www.trustedsec.com/ Sponsor Logo

About Bronze Sponsor: Cribl

https://cribl.io/ Sponsor Logo

About Bronze Sponsor: Set Solutions

https://www.setsolutions.com/ Sponsor Logo

About Bronze Sponsor: Fortinet

https://www.fortinet.com/ Sponsor Logo

About Bronze Sponsor: CyberArk

https://www.cyberark.com/ Sponsor Logo

About Bronze Sponsor: zscaler

https://www.zscaler.com/ Sponsor Logo

About Bronze Sponsor: InQuest

https://inquest.net/ Sponsor Logo

About Bronze Sponsor: Dyrwolf

https://dyrwolf.com/ Sponsor Logo