Holly Baroody
Executive Director
USCYBERCOM
Ms. Baroody has 20+ years of experience in the Department of Defense (DoD) and Intelligence Community (IC) through both military and civilian service. She served in the United States Navy (USN) from 2002 - 2009 as a Cryptologic Technician, with her first duty station in Yakima, Washington serving as a signals analyst with the National Security Agency (NSA). In 2005, she became a plank owner within the Navy's newly established Cryptologic Technical Networks (CTN) field, and subsequently went on to serve on NSA's Red Team as an operator conducting simulated adversary computer network operations in support of NSA's cybersecurity mission. She joined NSA as a civilian in 2009 and, through a variety of technical and leadership assignments within NSA's Computer Network Operations (CNO) and predecessor organizations, gained a broad and deep perspective of NSA's computer network exploitation operations supporting NSA's foreign intelligence and cybersecurity missions. She served as an executive assistant to NSA's Assistant Deputy Director for Operations from 2016 to 2017 where she gained a broader strategic and operations view of NSA and its partners, then re-joined the CNO in 2017 to lead CNO's newly established Joint Cyber Product Group (JCPG) to support USCYBERCOM's offensive cyber operations efforts and NSA's cybersecurity counter-cyber threat requirements. Prior to assuming her current position as USCYBERCOM Executive Director (EXDIR), Ms. Baroody served on a Joint Duty Assignment (JDA) as the Deputy to the Commander of the Cyber National Mission Force (CNMF) in USCYBERCOM from 2021 - 2022, where she supported the CNMF Commander in leading a 2000+ person organization with an Enterprise footprint to plan, direct, and synchronize full spectrum cyberspace operations to Defend the Nation from foreign adversary cyber threats.
LEADERSHIP PHILOSOPHY
Ms. Baroody strives to embody the servant style of leadership and believes in empowering individuals and teams toward clear strategic goals, enabling innovation, and building bridges across interagency, industry, academia, and international partners to achieve common objectives in support of our Nation’s security and defense. She invests in the growth of others, actively coaching and mentoring junior and mid-level personnel as they navigate their careers.
PERSONAL
Ms. Baroody lives in Ellicott City, MD with her husband Michael and their two children. She is an avid reader and enjoys walks with her family.
About Holly Baroody
Follow Holly Baroody
Executive Director
USCYBERCOM
Cecile Mengue
Hacker
IBM X-Force Red
Cecile, a Certified Cybersecurity Professional and Hacker at IBM X-Force Red, turned her experience as an online crime victim into a mission to enhance digital security. She shields businesses and individuals from online threats, sharing her expertise and authoring "Digital Security Overhaul," a guidebook for securing online lives. Cecile drives change towards a safer digital world.
www.cybercile.com
About Cecile Mengue
Follow Cecile Mengue
Hacker
IBM X-Force Red
Tahira Mammen
Cybersecurity Director
National Security Agency - Texas
Tahira Mammen is the Cybersecurity Director at National Security Agency - Texas. Tahira has held various positions during her time at NSA, including in a mathematics development program, as a cyber-analyst, and in multiple leadership roles.
Tahira holds multiple cyber and intelligence-related certifications and is a Lean Six Sigma Black Belt. She strongly believes that her LSS education enables her to critically examine and optimize business workflows and systems for the offices to which she is assigned or leads.
Tahira serves as the lead advisor over 11 different groups that foster diversity and accessibility. She is a passionate leader and contributor to initiatives that aim to improve employee morale while facilitating a culture of equity and inclusion.
Tahira has Bachelor's degrees in Russian Linguistics & Mathematics from Bryn Mawr College and a Master's Degree in Statistics from Rice University.
Tahira lives near downtown San Antonio with her husband and their three young children. She has recently taken up trail running and is looking forward to her first 15-mile trail race in the Fort Davis Mountains this September. She is an avid reader, who finishes 2-3 books each month and enjoys organizing her office's weekly Jeopardy competition.
About Tahira Mammen
Follow Tahira Mammen
Cybersecurity Director
National Security Agency - Texas
Wanda Jones-Heath
Principal Cyber Advisor
Department of the Air Force
Dr. Wanda T. Jones-Heath, a member of the Senior Executive Service, is the Principal Cyber Advisor for the Department of the Air Force, comprised of the U.S. Air Force and U.S. Space Force. As the Principal Cyber Advisor for the DAF, her duties include synchronizing, coordinating and overseeing the implementation of the DAF Cyber Strategy and advising the Secretary of the Air Force on all cyber programs. She is responsible for overseeing cyberspace recruitment; resourcing and training of cyber mission forces, as well as assessing their readiness; overseeing acquisition; advocate for cyber investments; cybersecurity supply chain risk management; security of information systems and weapon systems.
Prior to her current position, Dr. Jones-Heath served as the Chief Information Security Officer and advised the Chief Information Officer on cybersecurity policy, cybersecurity programs, and cyber force development. She leads a directorate comprised of military, civilian, and contractor personnel responsible for developing cybersecurity policy and strategy for over 5,000 Air Force information technology systems. She oversees risk management and cybersecurity accountability for information systems, weapon systems, and operational technology supporting military cyberspace operations. Her portfolio includes policy governing the defense industrial base, supply chain risk management, and cybersecurity capabilities. She has oversight for the Freedom of Information Act, Privacy Act laws, and cryptographic modernization supporting cyber operations.
Since entering civil service, Dr. Jones-Heath has held technical and leadership positions performing cyber operations and cybersecurity duties in communications units from the squadron to the wing level and she has served in headquarters units at the major command, agency, and Air Staff level. Her experience includes extensive joint and interagency work along with cross functional assignments with duties such as testing, assessments, lessons learned management, strategy development and other functions in organizations both within and outside of the communications field.
Dr. Jones-Heath graduated from the University of South Carolina in 1990 with a degree in Computer Science. She began her Civil Service career as a Palace Acquire Intern, Information Systems Specialist, in various functional areas. She moved to Headquarters Air Combat Command, Langley Air Force Base, Virginia, in 1993.
About Wanda Jones-Heath
Follow Wanda Jones-Heath
Principal Cyber Advisor
Department of the Air Force
Elizabeth Irwin
Director for Cyber Policy and Programs
White House - Office of the National Cyber Director (ONCD)
Public policy professional with experience leading strategic engagement on cyber policy, planning, and programs for the U.S. Government. Responsible for advancing initiatives with industry, interagency, and international partners; engaging with legislators and regulators to advocate for U.S. national cybersecurity priorities and achieve alignment on technology policy objectives; and advising the White House and Congress on development and implementation of cybersecurity strategy and policy, incident response, and threat mitigation.
About Elizabeth Irwin
Follow Elizabeth Irwin
Director for Cyber Policy and Programs
White House - Office of the National Cyber Director (ONCD)
Ryan McBeth
Journalist and Content Creator
Ryan McBeth Productions LLC
Ryan McBeth is a software architect, novelist, triathlete, YouTuber. He makes videos on YouTube about Programming, Cybersecurity, OSINT and Military topics. ? He spent 20 years as an anti-armor and heavy weapons infantryman with two overseas deployments. He also spent time performing C4ISR intelligence collection for various government customers and currently consults on intelligence collection and analysis methods.
https://www.ryanmcbeth.com/
About Ryan McBeth
Follow Ryan McBeth
Journalist and Content Creator
Ryan McBeth Productions LLC
Rika Nakazawa
Group Vice President
NTT
Rika is a technology leader, VC investor, best-selling author, and frequent public speaker on technology-powered industry transformation. She is Global Vice President with NTT’s New Ventures & Innovation team where she is building Agile Co-innovation practices for emerging technologies like 5G, Edge Computing, AI, and IoT. In her additional role as Head of Sustainability for Americas at NTT, Rika is driving NTT's sustainability ambition in operations while also orchestrating the go-to-market for NTT's climate-positive solutions across their portfolio of digital infrastructure solutions. For 2 consecutive years in 2022 and 2023, Rika has been awarded “Power 70” and “Power 80” recognition for the Women of Channel awards with The Channel Co’s CRN network. She has also been ranked as "Top 100 in Emerging Tech" by Women of the Future.
Trilingual in Japanese, German, and English, Rika grew up in Japan and moved to the US to attend Princeton University. Rika has since worked internationally in senior executive roles in strategy, business development, consulting, and marketing with Fortune 500 companies - Accenture, NVIDIA, Capgemini, Sony - and Silicon Valley startups. She is a digital innovation veteran and has served on multiple boards in Next-Gen Computing, XR/VR/AR, Cybersecurity, and AI ecosystems. Rika is currently board chair at STRIDES AI - a social impact venture that is advancing diversity in senior leadership with an AI platform, and a board member of Venus Shell Systems - a circular and blue economy enterprise.
Rika is the best-selling author of “Dear Chairwoman” - featuring the trials and triumphs of women corporate board leaders. Her next book, with the vaunted publisher Taylor & Francis and featuring the intersection of sustainability, digital innovation, and the pandemic, is called “Beyond the Black Swan: How the Pandemic and Digital Innovation Intensified the Sustainability Imperative - Everywhere".
About Rika Nakazawa
Follow Rika Nakazawa
Group Vice President
NTT
Lionel Maynard, Jr
Director
NASA Security Operations
Mr. Lionel “Lee” Maynard leads the National Aeronautics and Space Administration’s cybersecurity operations including the NASA Security Operations Center and Cybersecurity Incident Response Team whose combined mission functions as the 24/7/365 nerve center for all cybersecurity incident monitoring, detection, prevention, response, mitigation, reporting, and cyber threat analysis for NASA’s enterprise. He oversees multiple distributed security operation sites and the agency’s cybersecurity incident response team positioned at twelve NASA operating locations providing incident response services to the NASA enterprise.
Prior to joining NASA, Mr. Maynard has spent 33+ years of government service within the Department of Defense, the Intelligence Community, and NASA. His service includes 22+ years in the United States Air Force retiring as a Cyber Officer; 1 year as the Senior Information Assurance Security Engineer for the Air Force Distributed Ground System; 3 years directing Information Operations product development and integration within the Information Operations Joint Management Office, Office of the Deputy Undersecretary of Defense for Intelligence; and 5 years as the Deputy Director and 2 years as the Director, Command, Control, Communications, Cyber and Chief Information Officer for the Joint Enabling Capabilities Command.
About Lionel Maynard, Jr
Follow Lionel Maynard, Jr
Director
NASA Security Operations
Melissa Aarskaug
Global Vice President
Bulletproof, A GLI Company
Melissa Aarskaug is a global executive and business leader at the forefront of the technology/cybersecurity industry. She shapes strategy, leads teams, and partners with Fortune 500 companies and other enterprise clients to protect their organizations from risk and noncompliance—while improving operations and accelerating growth.
For 15+ years, Melissa has taken the reins to propel organizations to the next level of performance. By combining business acumen and revenue optimization with the sharp mind of an engineer, she uncovers and seizes opportunities for profitable growth in the US and around the world.
Melissa has established a distinguished career with Gaming Laboratories International (GLI), where she is a key member of the senior executive team. Throughout her tenure, she has assembled teams, developed new markets, and influenced P&L impact, ultimately positioning GLI as the #1 provider of testing, certification, and cybersecurity services to the global gaming and lottery space.
After achieving this feat—a big win for GLI and game-changer for clients worldwide—Melissa steered both GLI and Bulletproof (acquired by GLI in 2016) into untapped verticals: finance, government, healthcare, higher education, hospitality, and retail.
A curious, lifelong learner, Melissa holds dual Bachelor of Science degrees in Civil and Environmental Engineering with minors including Business and Mathematics.
In addition to her own personal and professional development, Melissa is committed to helping other people thrive both inside and outside of the workplace. She actively mentors and empowers team members at GLI and is an executive leader and coach for Global Gaming Women, Emerging Leaders in Gaming and actively pursues ongoing education.
Throughout her career, Melissa has inspired individuals, teams, and entire organizations to think differently about innovation, cybersecurity, leadership, and business development. She was honored as one of the “Emerging Leaders in Gaming: 40 Under 40” and she continues to share her ideas and expertise through publications, podcasts, webinars, and presentations.
https://bulletproofsi.com
About Melissa Aarskaug
Follow Melissa Aarskaug
Global Vice President
Bulletproof, A GLI Company
Julie Cullivan
Board of Directors
Axon
For more than 25 years, Julie Cullivan has driven transformational go-to-market, technology, security, and operational strategy for both public and pre-IPO companies. Most recently she served as the Chief Technology and People Officer at Forescout Technologies where she was responsible for leading the company’s business model transformation, information technology strategy, production operations, and human resources. Prior to Forescout, Julie held executive positions at FireEye, Autodesk, McAfee, EMC, and Oracle. She was recognized as a Cybersecurity Woman of the Year 2020 by CSWY, a Woman of Influence 2019 by the Silicon Valley Business Journal, 2019 Most Influential Corporate Board Directors, and awarded the Bay Area CIO of the Year 2017. Julie is a recognized leader in both the technology and cybersecurity fields and a frequent speaker on topics including women in technology, security as a board room imperative, digital innovation, and building high impact teams. She serves on the Boards of Judy Security, Axon Enterprise, HeartFlow, Cobalt, OPSWAT, and Astra Space.
https://www.linkedin.com/company/axon-protect-life/
About Julie Cullivan
Follow Julie Cullivan
Board of Directors
Axon
Didi Dayton
Board of Directors
Judy Security
Didi is widely recognized as a champion for diverse talent on Boards of Directors, forging strategic alliances, and building uncharted routes to market for hyper-growth startups. Didi recently held a fractional Growth and Strategy Executive position at JupiterOne, where she built the Alliance and Channel teams, building 180 technology and alliance partnerships.
Before joining True, she served as Partner at Wing Venture Capital. While at Wing, Didi successfully built and led the Customer Network with a F500 CXO community of over 1,500 top executives across functions. Didi brings over 25 years of experience in building early-stage and hyper-scaled businesses, including 13 M&A and 3 post-merger integration teams, one IPO, and significant early stage advisory experience with Companies like Forcepoint, FireEye, Tanium, and Cylance. She has spent the past 7 years supporting CEOs of a broad portfolio of companies in their GTM, channels alliances and
operational strategies. Didi also Co-Founded the Forte Group, an Education and Advocacy non-profit 501(c)(3) group for women leaders in Cybersecurity, where she Chairs the Board of Directors and oversees operations.
About Didi Dayton
Follow Didi Dayton
Board of Directors
Judy Security
Lisa Matherly
CMO/Board Advisor
Cobalt
Dynamic marketing executive with nearly 20 years of building and optimizing high-performance marketing teams at Network Associates, McAfee, Intel Security, and currently at Cobalt. Successful track record in driving high-impact results through effective go-to-market strategy, planning, and execution; aligning sales, partners, and marketing teams through process, automation, and shared goals. Obsessed with operational efficiencies, best practices, and business impact within cybersecurity organizations. Empowering leader who believes in accountability, results, and recognition. Passionate about the customer, partner, and employee experience through authentic relationships built on integrity.
About Lisa Matherly
Follow Lisa Matherly
CMO/Board Advisor
Cobalt
Sam Curry
VP, Chief Information Security Officer
Zscaler
Prior to joining Zscaler, Sam served as Chief Product Officer and Chief Security Officer at Cybereason. He is a Fellow at the National Security Institute, on the Board of Trustees of the Cybersecurity Coalition, on the Board of Directors for Sequitur Labs, an adjunct professor at Wentworth Institute of Technology and Nichols College and serves as an advisor to several companies.
Previously, he held leadership roles over the last 30 years at RSA, EMC (where he was a Distinguished Engineer), Chief Security Architect at McAfee, CTO/CSO at Arbor/NetScout and Danaher, and SVP Engineering and CISO at MicroStrategy.
Sam also led RSA Labs at MIT, received the 2015 Pillar of CERIAS award at Purdue and has over 17 current patents, is a frequent contributor in the media, maintains a column on Forbes.com and was awarded the 30th Anniversary “Visionary Award” by SC Media.
About Sam Curry
Follow Sam Curry
VP, Chief Information Security Officer
Zscaler
Merritt Baer
Field CISO
Lacework
Merritt (Twitter: @MerrittBaer) is Field CISO at Lacework, a cloud security unicorn. Merritt provides technical security guidance to Lacework’s customer executives. She is also instrumental in the security industry: speaking, talking and advising companies on security at scale, and she helps to inform Lacework product roadmaps with customer and threat landscape feedback.
Previously, Merritt served in the Office of the CISO at Amazon Web Services, as part of a small elite team that formed a Deputy CISO. She provided technical cloud security guidance to AWS’ largest customers, like the Fortune 100, on security as a bottom line proposition. She also helped build strategic initiatives for how AWS secures itself, running on AWS, and how AWS externalizes security services.
Merritt has experience in all three branches of government and the private sector. Before Amazon, Merritt served as Lead Cyber Advisor to the Federal Communications Commission. She has also served at the US Department of Homeland Security, the Office of US Senator Michael Bennet, and the US Court of Appeals for the Armed Forces. Before joining the government, Merritt started a business advisory for emerging tech companies.
Merritt speaks regularly on infosec, including cloud computing, AI/ML, quantum computing, and the future of the Internet. Her insights on business strategy and tech have been published in Forbes, The Baltimore Sun, The Daily Beast, LawFare, Talking Points Memo, and ThinkProgress. Her academic work has appeared in the journals of Temple, Georgetown, Santa Clara, UPenn, and UVA.
Merritt is a graduate of Harvard Law School and Harvard College. She is admitted to the Bars of New York, the United States Court of Appeals for the Armed Forces, and the United States Supreme Court. Based in Miami, FL and Denver, CO, she has been a member of the Council on Foreign Relations, a National Security Fellow at the Center for New American Security, and a Cyber Fellow at the East-West Institute. She advises and serves on boards of young companies, including Expanso (open-source platform that enables efficient and secure distributed computation). She is founder of women’s tech expert network Tech & Roses; serves on the Miami-Dade College Business Industry Leadership Team, has served as Adjunct Professor of Cybersecurity at the University of Maryland and Penn State Law School; is a mother, and was an amateur boxer.
https://www.lacework.com/
About Merritt Baer
Follow Merritt Baer
Field CISO
Lacework
Richard Bird
Chief Security Officer (CSO)
Traceable AI
Richard is a multi-time, c-level executive in both the corporate and start-up worlds, Richard is internationally recognized for his expert insights, work and views on cybersecurity, data privacy, digital consumer rights and next generation security topics. Richard delivers keynote presentations around the world and is a highly sought after speaker, particularly when he is translating cybersecurity and risk realities into business language and imperatives. He is a Senior Fellow with the CyberTheory Zero Trust Institute, a Forbes Tech council member and has been interviewed frequently by media outlets including the Wall Street Journal, CNBC, Bloomberg, The Financial Times, Business Insider, CNN, NBC Nightly News and TechRepublic.
https://www.traceable.ai/
About Richard Bird
Follow Richard Bird
Chief Security Officer (CSO)
Traceable AI
HD Moore
CTO
runZero, Inc
HD Moore is a pioneer of the cybersecurity industry who has dedicated his career to vulnerability research, network discovery, and software development since the 1990s. He is most recognized for creating Metasploit and is a passionate advocate for open-source software and vulnerability disclosure.
HD serves as the CTO and co-founder of runZero, a provider of cutting-edge cyber asset management software and cloud services. Prior to founding runZero, he held leadership positions at Atredis Partners, Rapid7, and BreakingPoint. HD has also been a frequent speaker at industry events such as Black Hat and DEF CON.
HD's professional journey began with exploring telephone networks, developing exploits for the Department of Defense, and hacking into financial institution networks. When he's not working, he enjoys hacking on weird Go projects, building janky electronics, running in circles, and playing single-player RPGs.
https://www.runzero.com/
About HD Moore
Follow HD Moore
CTO
runZero, Inc
Riley (Caezar) Eller
CTO
React Mobile, Inc.
For 25 years, at DEF CON aka "hacker summer camp", Mr. Eller hosted the Caezar's Challenge parties. His involvement in the nascent cybersecurity industry is unparalleled, from the first ASCII-only shellcode to the introduction of Distributed Denial of Service attacks, from organic defense patterns to the invention of fuzzing, from winning the original Capture the Flag contest three years in a row to reinventing the game in the form we know today. A prolific developer, he spent a decade or more actively developing business automation, embedded operating systems, security tools, mobile mesh networks, airborne routing, and peer to peer content distribution networks. As a board advisor and chief technology officer, he brings lean engineering principles alongside his deep technical experience to help alleviate the natural tension between investors and developers.
reactmobile.com
About Riley (Caezar) Eller
Follow Riley (Caezar) Eller
CTO
React Mobile, Inc.
Phillip Wylie
Director of Services and Training
SCYTHE
Phillip Wylie is an Offensive Cybersecurity Professional, Offensive Cybersecurity Instructor, and The Pwn School Project founder.
Phillip Wylie has 24 years of experience with the last 9 plus years spent in offensive cybersecurity working as a pentester and red team operator. He is the concept creator and coauthor of the book “The Pentester Blueprint: Starting a Career as an Ethical Hacker”.
About Phillip Wylie
Follow Phillip Wylie
Director of Services and Training
SCYTHE
Joseph Mlodzianowski
Executive Director
Texas Cyber Summit
Joseph Mlodzianowski is a twenty-seven-year veteran of the cybersecurity field and considered a security aficionado by his peers. He is a traveler and adventurer. He is involved in M3AAWG Messaging Malware Mobile Anti-Abuse industry working group. Joseph is a Security Architect in Cisco’s Managed and Intelligence services. He is also involved in the Cisco exam criteria and curriculum for certifications, and he has authored several books. Joseph worked in/for the Department of Defense in various SME roles, and has conducted investigations for various law enforcement agencies. You can also learn more about him on twitter @cedoxx
About Joseph Mlodzianowski
Follow Joseph Mlodzianowski
Executive Director
Texas Cyber Summit
Timothy Amerson
Director of Scheduling
Texas Cyber Summit
Deputy CISO with over 25+ years of Cybersecurity Information Technology (IT) leadership experience in both federal government and military environments of Multi-certified, Demonstrated in-depth knowledge of and experience with sound Cybersecurity and IT portfolio management and recognized technical expertise to understand strengths and weakness of current and future Cybersecurity and IT portfolio. Proven leadership including implementing forward-thinking, innovative programs, including the first-ever Texas National Guard Cyber Unit. Well regarded for expertise in relevant Cybersecurity and IT laws, regulations, policies, and procedures. Established the state’s first-ever Army cyber unit. Envisioned and stood up this multi-state Cyber Protection Team (CPT), ensuring appropriate training for all members and creation and implementation of appropriate cyber policies, as well as opportunities to participate in high level cyber exercises. Lead Red Team, Blue Team and Accessor for Federal Cybersecurity exercises like Cyber Storm, Cyber Shield and Cyber Guard worked alongside NSA, FBI, and Judge Advocate.
Certification: CISSP, CCNA-Cyber Ops, CCNA-Security; CNDA, CEH (Hall of Fame inductee), PMP, ITIL; Degree: BS CIS
Military Award/Recognitions: Legion of Merit Medal, Bronze Star Medal, Meritorious Service Medal(4), Army Commendation Medals(2), Amy Achievement medal(6), National Defense Service Medal w/ Bronze Star(3), Iraq Campaign Medal w/ Campaign Star(2), Korean Defense Service Medal, Humanitarian Service Medal, Military Outstanding Volunteer Service Medal, Multi-National Force Operations Medal(2), Pathfinder Badge, Parachute Badge, Singapore Armed Forces Basic Parachutist Wings, Meritorious Unit Award, Army Superior Unit Award, Texas Superior Service Award, Texas Outstanding Service Medal, Texas Medal of Merit(2), Texas Combat Ribbon(2), Texas Cavalry Service Medal(2), Adjutant General’s Individual Award(2), Governors Unit Citation, Bronze Order of Mercury, Silver Order of Thor, Bronze Order of Saint George
Volunteering: Mentoring and Coaching Cyber Patriot High school teams resulting in numerous awards, grants and accolades for the schools and the students: National and State level first and second place awards, Mayoral letter of proclamations, HEB $100,000 Grants, School Board Recognitions, ISC2 $3,000 scholarship, Navy Academy 4-year scholarship and other college Scholarships.
https://texascyber.org/
About Timothy Amerson
Follow Timothy Amerson
Director of Scheduling
Texas Cyber Summit
Red Thomas
Director of Operations
Texas Cyber Summit
Red Thomas grew up on a ranch just outside of a small town in Southeastern Oklahoma where he learned at a young age the value of rising early. He studied Electrical Engineering at Oklahoma State University before becoming a control systems engineer for a manufacturing company. Desiring to contribute in a more meaningful way to his country, Red joined the U.S. Army in 2002, where he served as an intelligence analyst until he separated at the rank of Sergeant in 2006.
Working as a contractor in the Defense Intelligence Community after his separation from the Army, Red was approached to join a project to develop an enterprise monitoring system for one of his customers. Through this opportunity in early 2011, Red formed a new company
called RedKnight and joined the San Antonio Chamber of Commerce. His work at RedKnight and with the Chamber allowed Red to realize there existed a need for supporting servicemen transitioning away from the military. Red created the ConOp Foundation to provide assistance, working as a side project for a little over a year and then finally filing to make it a separate legal entity in 2016.
Red is now CEO of RedKnight, Chairman and founder of the nonprofit ConOp Foundation, Chairman and co-founder of the nonprofit SAMSOC Foundation, and Red also Chairs the Professional Development Committee for the Alamo Chapter of the Military Intelligence Corps Association, and is a District Chairman for the Boy Scouts. Red personally mentors a number of currently serving members of the military, as well as several veterans in the San Antonio area. Most importantly, Red spends every waking moment hopelessly in love with Misty, his wife since 2002.
https://www.texascyber.org
About Red Thomas
Follow Red Thomas
Director of Operations
Texas Cyber Summit
Jim Barton
Field Engineer
Solo.io
Jim Barton is a Field Engineer for Solo.io whose enterprise software career spans 30 years. He has enjoyed roles as a project engineer, sales and consulting engineer, product development manager, and executive leader of tech startups. Prior to Solo, he spent a decade architecting, building and operating systems based on enterprise open-source technologies, at the likes of Red Hat, Amazon, and Zappos. After two years of COVID-driven, Zoom-encrusted isolation, Jim especially enjoys sharing with and learning from three-dimensional people at technical conferences around the world. https://craft-conf.com/2023/speaker/jim-barton
https://solo.io
About Jim Barton
Follow Jim Barton
Field Engineer
Solo.io
Josh Hammerstein
Technical Manager, Research & Prototypes
Software Engineering Institute/Carnegie Mellon University
https://sei.cmu.edu
About Josh Hammerstein
Follow Josh Hammerstein
Technical Manager, Research & Prototypes
Software Engineering Institute/Carnegie Mellon University
Chris Neill
Cybersecurity Professional
ManTech International
Software Architect with experience in steering software design, development, and delivery. Proven experience in software development life cycle (SDLC), Computer Network Operations (CNO), security software, file systems, reverse engineering, and in-depth knowledge of Windows internals from both user-mode and kernel-mode perspectives. Deft at deploying analytical skills in leading projects end-to-end; provides strategic direction to deliver continuous improvement and customer satisfaction.
www.mantech.com
About Chris Neill
Follow Chris Neill
Cybersecurity Professional
ManTech International
Jason Robbins
Security Automation and Machine Learning Leader
Amgen
Jason Robbins has a deep and extensive history of developing and implementing risk mitigation and cybersecurity strategies in both the private and public sectors.
Jason has worked within the military, government, and commercials businesses on both IT and OT networks to perform a wide array of services from incident response, computer forensics, penetration testing, vulnerability management, risk management, regulatory compliance, and strategic vision.
https://www.linkedin.com/company/amgen/
About Jason Robbins
Follow Jason Robbins
Security Automation and Machine Learning Leader
Amgen
Corey Overstreet
Senior Security Consultant
Red Siege Information Security
Corey has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare and is widely recognized for his in-depth OSINT talks and workshops. Additionally, he is a Black Hat trainer and has spoken at conferences such as Wild West Hackin' Fest and CarolinaCon. He has over five years of systems administration and extensive VMWare administration experience. Corey was a member of the SECCDC Red Team and is one of the top Red Team Operators at Red Siege.
https://www.redsiege.com
About Corey Overstreet
Follow Corey Overstreet
Senior Security Consultant
Red Siege Information Security
Brian Contos
Chief Strategy Officer
Sevco Security
With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. He has over 25 years in the security industry as a security company entrepreneur, board advisor, investor, and author. After getting his start with the Defense Information Systems Agency (DISA) and later Bell Labs, Brian began the process of building security startups and taking multiple companies through successful IPOs and acquisitions, including Riptech, ArcSight, Imperva, McAfee, Solera Networks, Cylance, JASK, Verodin, and Mandiant. Brian has worked in over 50 countries across six continents. He authored the book Enemy at the Water Cooler and co-authored Physical & Logical Security Convergence with former NSA Deputy Director William Crowell. He was featured in the cyberwar documentary 5 Eyes alongside General Michael Hayden, former NSA, and CIA Director. Brian writes for Forbes and regularly presents at conferences like Black Hat, RSA, OWASP, and BSides.
About Brian Contos
Follow Brian Contos
Chief Strategy Officer
Sevco Security
Terry McGraw
Vice President, Global Cyber Threat Analysis
Secureworks
Terrence "Terry" McGraw is a retired Lieutenant Colonel from the United States Army and now serves as Deputy Chief Threat Intelligence Officer and senior executive Incident Response Consultant with over 20 years of providing expertise in cyber security architectural design and operations in both commercial and government sectors.Terry previously served as president and principal consultant for Cape Endeavors, LLC, the Vice President of Global Cyber Threat Research and Analysis for Dell SecureWorks. He retired from the United States Army in 2014 completing 27 years of service; the last 10 years of his Army career were leading key Cyber initiatives for the Army's Network Enterprise and Technology Command, Army Cyber Command and the National Security Agency (NSA). He has multiple combat tours with his culminating assignment, serving as the Director of Operations, Task Force Signal Afghanistan, 160th Signal Brigade (FWD), providing all strategic communications infrastructure.
https://www.secureworks.com/
About Terry McGraw
Follow Terry McGraw
Vice President, Global Cyber Threat Analysis
Secureworks
Sara Anstey
Director, Data Analytics
Novacoast
Sara Anstey is the Director of Data Analytics at Novacoast who is passionate about empowering businesses to use everyday data to make strategic business decisions. She believes that the intentional adoption of a data-driven culture can be a key differentiator to companies in today’s security climate. Sara has experience in custom web development, risk quantification, data analytics, business intelligence, and applied statistics.
https://novacoast.com/
About Sara Anstey
Follow Sara Anstey
Director, Data Analytics
Novacoast
Jose Palafox
Application Security Executive
Github/Microsoft
Jose is an Application Security Executive for GitHub. He spends his time helping the largest technology companies on the west coast adopt and utilize GitHub security features. Jose started his career as an early employee of Puppet Labs and helped grow the Puppet community into one of the largest linux projects. For a time he led Intel’s upstream kubernetes engineering efforts. In his free time he’s an amateur cook and gardener.
github.com
About Jose Palafox
Follow Jose Palafox
Application Security Executive
Github/Microsoft
William Reed
Cyber Risk Advisor
Optiv Security
William D. Reed, is a risk advisor with over two decades experience in analyzing technical problems, developing workable solutions, and helping business manage their risk. He advises businesses on cost-efficient and effective approaches to cyber risk management. He is helps organizations improve the alignment of their security program to their business. He has seen the possibilities, the challenges, the constraints, and the risks; from the C-Suite to the front lines. He has analyzed, designed, built, protected, and supported technology infrastructure for many businesses over the years. He sees the opportunities for organizations to thrive in these uncertain times. Certified and trained in the following: CISSP, CEH, CCIE #10522 (former), Applied Information Economics (AIE) Analyst 1, FAIR-certified, and CMU Chief Risk Officer (CRO) Certificate Program. William helps organizations make better risk-informed decisions to improve their business outcomes. He is author of the book, "System of Controls: I.T.'s Guide to Managing Cyber Risk". He is an advocate for innovated systems thinking and embracing of uncertainties in today’s disruptive and complex world to seize new opportunities that technology affords the world.
www.optiv.com
About William Reed
Follow William Reed
Cyber Risk Advisor
Optiv Security
Qasim Ijaz
Director of Offensive Security
Blue Bastion
Qasim Ijaz is the Director of Offensive Security at Blue Bastion Security and specializes in healthcare security and penetration testing. He has conducted hundreds of penetration tests in small to large environments with a focus on networks and web applications testing. His areas of interest include healthcare security, Active Directory, cybersecurity policy, and the "dry" business side of hacking. Qasim is a penetration test lead during the day and a teacher in the after-hours. Qasim has presented and taught at cybersecurity conferences including BSides and Blackhat on offensive security topics.
bluebastion.net
About Qasim Ijaz
Follow Qasim Ijaz
Director of Offensive Security
Blue Bastion
Gerard Johansen
Principal Readiness Engineer
Red Canary
Gerard Johansen is an information security professional with over a decade of experience in Incident Response, Digital Forensics and Threat Intelligence. During his various roles over the last decade, he has been involved in investigating and resolving a range of network intrusions and other cyber attacks both as a consultant and incident response lead. Using this experience, Gerard has authored several books and articles on digital forensics and incident response. He was also able to leverage this experience in developing interactive cyber range exercises for security professionals. Gerard has extensive training in various aspects of incident response and threat intelligence and holds several industry recognized certifications. Additionally he is a graduate of Norwich University's Masters in Information Assurance along with a graduate certificate in Monitoring, Intelligence and Surveillance operations from Utica University.
redcanary.com
About Gerard Johansen
Follow Gerard Johansen
Principal Readiness Engineer
Red Canary
Steve Foster
Senior Lead Cloud Security Architect
TIAA
Steve Foster, Lead Information Security Architecture TIAA, Steve is a seasoned professional with more than 20 years of industry experience with multiple certifications including:*Certified Information Security Professional (CISSP)* Amazon Web Services (AWS)* Microsoft* Agile* BlockchainWorked for dot.com startups to Fortune 100 financial and tech firms and spends his free time playing table-top games with his friends, forging, studying emerging technology, and spending quality time with his wife and 2 young boys
https://www.tiaa.org/public/
About Steve Foster
Follow Steve Foster
Senior Lead Cloud Security Architect
TIAA
Matthew Chiodi
Chief Trust Officer
Cerby
Matt has over two decades of security leadership experience and is the Chief Trust Officer at Cerby. Before Cerby, he was the CSO of Cloud at Palo Alto Networks. He is a frequent blogger and speaker at industry events such as RSA. He is also on the faculty at IANS Research.
cerby.com
About Matthew Chiodi
Follow Matthew Chiodi
Chief Trust Officer
Cerby
Ryan Burkovich
Security Solutions & Advisory
Soteria LLC
Ryan Burkovich is an adaptable Security Advisor and Marine Corps Veteran dedicated to world-class security practices. He has over 11 years of private and public sector experience in various high-stress, fast-paced environments. His career is supported by an advanced degree in Cybersecurity, BA in Criminal Justice, and Security+ and CISA certifications.
https://soteria.io/
About Ryan Burkovich
Follow Ryan Burkovich
Security Solutions & Advisory
Soteria LLC
Raymond Leong
Staff Reverse Engineer
Google/Mandiant
Raymond is a Staff Reverse Engineer on Mandiant's FLARE team where he enjoys analyzing malware, contributing to automated malware analysis solutions, and teaching new reverse engineers. He previously was a Cyber Threat Analyst at both Mandiant and US Govt, with a focus on Chinese cyber threats and malware.
https://www.mandiant.com/
About Raymond Leong
Follow Raymond Leong
Staff Reverse Engineer
Google/Mandiant
Brendan McKeague
Principal Threat Analyst
Google/Mandiant
Brendan McKeague is a Principal Threat Analyst on Mandiant’s Advanced Practices team, where he contributes to frontline intrusion intelligence support to Managed Defense. Prior to joining Advanced Practices, he was a security analyst on Managed Defense protecting customers from cyber-attacks.
About Brendan McKeague
Follow Brendan McKeague
Principal Threat Analyst
Google/Mandiant
Brian Hileman
Solution Architect
Cyberhaven
Brian is an expert in the data protection field with 12 years of experience. He currently works as a Solution Architect at Cyberhaven, specializing in Data Loss Prevention (DLP) and Insider Risk Management. He has held past roles at Palo Alto Networks, Digital Guardian, and InteliSecure. Brian created and manages DLPTest.com, a website for testing and evaluating DLP capabilities. He is a speaker on data security and has presented at numerous events.
https://www.cyberhaven.com/
About Brian Hileman
Follow Brian Hileman
Solution Architect
Cyberhaven
Parth Shukla
Threat Researcher
Cequence Security
Parth Shukla is a Threat Researcher at Cequence Security and has a great passion for Web Application Security. Parth Shukla is also a Bug hunter; community builder and Cyber security enthusiast and I believe in the quote “security is a myth”.
cequence.ai
About Parth Shukla
Follow Parth Shukla
Threat Researcher
Cequence Security
Zachary Brabham
Solutions Engineer
Splunk
Currently a Solitions Engineer at Splunk, Zach works closely with Federal Civilian agencies to help make sense of their data and . Zach has experience working across the public-sector in the areas of software asset management, endpoint detection & response, and threat intelligence. His domain knowledge has fostered a passion for data and eagerness to use data to solve security challenges.
About Zachary Brabham
Follow Zachary Brabham
Solutions Engineer
Splunk
Huxley Barbee
Security Evangelist
runZero
Huxley Barbee is the organizer for BSidesNYC and security evangelist at runZero. Huxley previously worked at Datadog, where he formulated their Cloud Security Platform. Earlier at Cisco, he led a team that automated SecOps and IR playbooks. He holds both the CISSP and CISM certifications.
https://runzero.com
About Huxley Barbee
Follow Huxley Barbee
Security Evangelist
runZero
Joe Sarkisian
Manager, Lead Penetration Tester
DenSecure by Wolf & Co.
Joe serves as a Manager and Lead Penetration Tester on Wolf & Company’s DenSecure team. Joe is responsible for coordinating and conducting penetration testing services for clients in a variety of industries including financial, healthcare, and software. His expertise consists of internal and external network penetration testing, social engineering, vulnerability assessments, Microsoft Windows security and management audits, and general information security and controls. Joe has extensive experience conducting penetration testing audits and is pursuing ethical hacking certifications from industry-recognized organizations like the SANS Institute and Offensive Security.
Certifications: OSCP, GCPN, GWAPT
http://www.densecure.com
About Joe Sarkisian
Follow Joe Sarkisian
Manager, Lead Penetration Tester
DenSecure by Wolf & Co.
William Gamazo
Principal Security Researcher
Palo Alto Networks, Cloud Threat Intelligence Team, Unit 42
Nelson William Gamazo Sanchez is a Principal Security Researcher at Palo Alto Networks, currently working on Cloud Security. Prior to joining Palo Alto Networks, he was a Threat Security Researcher at ZDI Trend Micro, in the Threat Hunting Team, leading the ITW hunting initiative where he published and presented multiple unique findings. He has worked in the security field since 2000, working in multiple security-oriented companies, including anti-malware and computer forensics companies. He has worked in multiple areas as reversing engineer, vulnerability analyst and vulnerability researcher, threat researcher, and computer forensics.
unit42.paloaltonetworks.com/category/cloud
About William Gamazo
Follow William Gamazo
Principal Security Researcher
Palo Alto Networks, Cloud Threat Intelligence Team, Unit 42
Vivek Ponnada
Technical Solutions Director
Nozomi Networks
Vivek Ponnada is an OT Security practitioner with global experience and currently works at Nozomi Networks as a Technical Solutions Director. Having started his career in ICS as an Instrumentation Technician, Vivek became a Controls Engineer and commissioned Gas Turbine Controls systems in Europe, Middle-East, Africa and South-East Asia. Throughout his career, Vivek held multiple roles including Sales, Marketing & Business Development and Services covering Control systems & Cybersecurity solutions for Critical Infrastructure (Power, Oil & Gas, Water, Mining etc.) industries at GE and ICI Electrical Engineering in North America. He is the co-lead for the Top 20 Secure PLC Coding Practices Project and his recent talks/contributions include DefCon ICS Village, Industrial Security Conference in Copenhagen, several BSides and others. Vivek has a Bachelor's Degree in Electrical Engineering from I.E. India, MBA from The University of Texas at Austin and GICSP certification from GIAC.
https://www.nozominetworks.com/
About Vivek Ponnada
Follow Vivek Ponnada
Technical Solutions Director
Nozomi Networks
Joey Jablonski
VP Global Solutions
Pythian
Joey Jablonski is VP of Global Solutions at Pythian, he leads strategic engagements assisting customers in developing their data strategy, defining and executing on data governance programs and building analytical models to power the modern data-driven organization. Prior to Pythian, Joey was VP of Product at Manifold, where he brought a product mind-set to all engagements—allowing for delivery of value quickly in any project and building over time through adoption of new data-centric capabilities in an organization. Joey led engagements across industries including retail, high tech, pharmaceuticals and the federal government. Before Manifold, Joey held executive leadership positions at Northwestern Mutual, iHeartMedia and Cloud Technology Partners. He brings 22+ years of experience in software engineering, high performance computing, cyber security, data governance and data engineering.
https://www.joeyjablonski.com
About Joey Jablonski
Follow Joey Jablonski
VP Global Solutions
Pythian
Donovan Farrow
Founder and CEO
Alias Infosec
Donovan Farrow founded Alias in 2010. He brings more than 20 years of experience working for Schlumberger Oilfield Services, Loves Travel Stops, Chesapeake Energy and NTT Security in the fields of Information Technology, Information Security, Digital Forensics and Incident Response. Farrow currently serves as CEO of Alias. He has provided digital forensic analysis in more than 2,100 court cases, 160 incident response engagements, 250 penetration tests, was appointed Special Master by the Court, sits on the Oklahoma City Community College Advisory Board, and is ACE, PCE, CCE, and GCFA certified.
With Farrow’s leadership, Alias received national recognition in the Inc. 5000 List of Fastest Growing Companies of 2022. Farrow is a member of The Journal Record’s 19th class of Achievers Under 40 and was named one of Oklahoma’s Most Admired CEOs in 2022. In addition, Farrow was awarded the “Young Entrepreneur of the Year” Award at the Tulsa Small Business Summit and Awards Ceremony in 2018.
www.aliasinfosec.com
About Donovan Farrow
Follow Donovan Farrow
Founder and CEO
Alias Infosec
Dr. Jason Edwards
Cybersecurity Author
Cybersecurity Author
I have over 25 years of experience in cybersecurity, risk, compliance, and technology across various industries, including finance, insurance, and energy. I hold several prestigious credentials, such as a Certified in Risk and Information Systems Control (CRISC), a Certified Information Systems Security Professional (CISSP), and a Doctorate in Management, Information Systems, and Technology, specializing in Cybersecurity Regulatory Compliance at Large Financial Institutions. I am on the regulatory assurance team for one of the world's largest cloud computing platforms.
Besides my professional achievements, I am passionate about sharing my knowledge and expertise. I have been an Adjunct Professor of Cybersecurity at multiple universities for over four years, teaching professional and graduate-level courses. I have also authored several cybersecurity-related publications, such as the New York Department of Financial Services (NYDFS) regulation and its implications for the industry.
I am the co-author of the Cyber Spear educational newsletter, which offers free daily and weekly educational newsletters to enhance cybersecurity awareness and build skills within the industry. In addition, I have penned several books set to be published, including a series of children's novels focused on cybersecurity.
Besides my professional achievements, I am passionate about sharing my knowledge and expertise. I have been an Adjunct Professor of Cybersecurity at multiple universities for over four years, teaching professional and graduate-level courses. I have also authored several cybersecurity-related publications, such as the New York Department of Financial Services (NYDFS) regulation and its implications for the industry. My mission is to empower organizations and individuals to protect their data, assets, and customers from cyber threats and to foster a culture of security and innovation.
I am the co-author of the Cyber Spear educational newsletter, which offers free daily and weekly educational newsletters to enhance cybersecurity awareness and build skills within the industry. In addition, I have penned several books set to be published, including a series of children's novels focused on cybersecurity.
https://jason-edwards.me/
About Dr. Jason Edwards
Follow Dr. Jason Edwards
Cybersecurity Author
Cybersecurity Author
Conrad Franke
Cyber Engineer
Zetier
Conrad Franke is a veteran who grew up in northern Michigan. Conrad primairly focuses on reverse engineering, however, also works in the realm of hardware engineering. Conrad has developed software and hardware products that are used globally. Conrad is most proficient with PLC's and embedded systems but has looked at larger binaries and cloud services during his time with the army and in the civilian world. Conrad spends free time cooking or working on independent projects for stronger reverse engineering skills.
https://www.zetier.com/
About Conrad Franke
Follow Conrad Franke
Cyber Engineer
Zetier
Leo Bastidas
Principal Incident Response Consultant
TrustedSec
Started my career as a troubled teen, it's how I ended up working at the local repair shop, fixing PCs. I then joined the military after high school, as there were no other options at the time. That is where I started at the Military Police as a System Administrator, then quickly pivoted into Incident response. Later in my military career, I pivoted again, but this time into special operation as a communications sergeant. I am the by-product of an immigrant single mom in a poverty-stricken home in Los Angeles, California. But we didn't give up, my mother worked hard and so did I. That is where I get my work ethic and where I get my determination. It's how I have excelled in the military and now looking to excel in the private sector. I am a simple person who doesn't ask for much. I love my country, and it was the reason I chose to defend it with my life. Now that I am out in the private sector, I like anything and everything about information security and programming, especially C.
https://www.trustedsec.com/blog/?_sfm_blog_author_array=20140
About Leo Bastidas
Follow Leo Bastidas
Principal Incident Response Consultant
TrustedSec
Scott Nusbaum
Principal Incident Response and Research Consultant
TrustedSec
Over 14 years of experience in software development and 10 years in Information Security. Experience range from Material Handling, Banking, to the Defense Industry. Education & Certifications: BS in Computer Engineering, University of Cincinnati. Masters in Computer Science with a focus on Cyber Informatics, University of Cincinnati. GIAC Reverse Engineering Malware (GREM)Passion for Security: Scott has always been fascinated with computers and software. He started programming in Elementary and has never stopped. Scott is passionate about learning the internal workings of software and systems. This led to Reverse Engineering, Malware, exploits and CTF.
About Scott Nusbaum
Follow Scott Nusbaum
Principal Incident Response and Research Consultant
TrustedSec
Neal Dennis
CSM/SME/Threat Intelligence Specialist
Cyware Labs
Intelligence analyst veteran with over 22 years of experience. Efforts include building intelligence teams for five fortune 100 companies as a consultant, supporting product companies like Cyware building use cases and service delivery for clients, and a host of experiences with USCYBERCOM, NSA, AFCYBER all stemming for an active duty background in United States Marine Corps as a linguist and digital collection specialist.
www.cyware.com
About Neal Dennis
Follow Neal Dennis
CSM/SME/Threat Intelligence Specialist
Cyware Labs
Dalton Wright
Senior Security Consultant
Nettitude
Dalton Wright is a Senior Security Consultant at Nettitude with over 5 years of penetration testing and consulting experience. His specializations are physical security and internal infrastructure assessments. He is well versed in physical penetration techniques which he has used to perform covert entry and physical vulnerability assessments.
https://www.nettitude.com/us/
About Dalton Wright
Follow Dalton Wright
Senior Security Consultant
Nettitude
Chris Paradowski
Principal Federal Sales Engineer
RedSeal
Chris Paradowski's journey with computers began at a young age, and his interest in Information Security and computers was sparked by his father's involvement in selling IBM and Apple computers during the early 1980s. Following high school, Chris joined the United States Air Force, where he contributed his expertise in messaging/voice, internet, network infrastructure, and secure internet services both on the base and during deployments. During this period, Chris pursued higher education at Boise State and Strayer University, ultimately earning a degree in Network Information Security.
Over the last 25 years, Chris has been dedicated to the design, implementation, and testing of security solutions, working as a consultant for critical infrastructure and networks across various government agencies. Presently, he holds the position of Principal Federal Sales Engineer at RedSeal, leveraging his extensive experience to assist customers and prospects in comprehending their security status and identifying ways to enhance it.
About Chris Paradowski
Follow Chris Paradowski
Principal Federal Sales Engineer
RedSeal
Mishaal Khan
vCISO
Decisive Resources
Mishaal is a subject matter expert in cybersecurity, pentesting, privacy, Open Source Intelligence and social engineering and a frequent speaker on these topics at Universities and popular cybersecurity conferences like DEFCON, Wild West Hacking Fest and multiple BSides events. Mishaal has worked with multinational companies for over 20 years, securing their networks and providing executive level consultancy as a CISO to manage risk and avoid breaches. He's the author of the book; The Phantom CISO, runs a cybersecurity practice as a vCISO and owns a privacy management and investigations firm.
mishaal.us
About Mishaal Khan
Follow Mishaal Khan
vCISO
Decisive Resources
Sandra Stibbards
Owner / President
Camelot Investigations
Sandra Stibbards opened her investigation agency, Camelot Investigations, in 1996. Currently, she maintains a private investigator license in the state of California. Stibbards specializes in financial fraud investigations, competitive intelligence, counterintelligence, business and corporate espionage, physical penetration tests, online vulnerability assessments, brand protection/IP investigations, corporate due diligence, and Internet investigations. Stibbards has conducted investigations internationally in five continents. Stibbards clients include several Fortune 500 and international companies. Stibbards has been providing training seminars and presentations on Open Source Intelligence (OSINT) internationally since 2010 to federal governments and corporations.
camelotinvestigations.com
About Sandra Stibbards
Follow Sandra Stibbards
Owner / President
Camelot Investigations
Lee McWhorter
CTO / Director Cyber Security
Covered 6
Lee McWhorter, CTO at Covered 6, has been involved in IT since its early days and has over 30 years of experience. He is a highly sought-after professional who first learned about identifying weaknesses in computer networks, systems, and software when Internet access was achieved using just a modem. McWhorter currently holds an MBA and over 20 industry certifications (including all of CompTIA’s) in such areas as IT, system admin, networking, programming, Linux, IoT, and cybersecurity. His roles have ranged from the server room to the board room, and he has taught for numerous universities, colleges, commercial trainers, and non-profits. McWhorter works closely with the Texas Cyber Summit, DEFCON Red Team Village, RSA Dark Arts Village, CompTIA, and the CompTIA Instructor Network (he is a Board Member) as a Speaker, SME, and Instructor.
www.covered6.com
About Lee McWhorter
Follow Lee McWhorter
CTO / Director Cyber Security
Covered 6
Gabrielle Botbol
Offensive Security Advisor
Desjardins
Gabrielle Botbol is a Pentester at Desjardins, the largest financial cooperative in North America. With a deep focus on the banking industry, Gabrielle specializes in exploring mobile applications and API.
Gabrielle is an avid blog writer who advocates for access to education for all. In addition, she has a large following on social media, where she shares many educational resources about technical training and many other cyber topics.
She actively contributes to various organizations as a member of their Advisory Board, such as APIsec University. She is a speaker and trainer at global events and prestigious universities, like Blackhat, APIsecure, Apidays, Bsides, Owasp, Cuny University, Toronto University…
With her contributions to the community, Gabrielle has been the recipient of multiple prestigious awards. Among them, she was honored as one of the Top 20 women in cybersecurity in Canada, Pentest Ninja at WSCJ, Educator of the Year at AYA, Top Influencer in Cybersecurity by IFSEC Global, and Woman Hacker of the Year by CSWY.
https://csbygb.github.io/
About Gabrielle Botbol
Follow Gabrielle Botbol
Offensive Security Advisor
Desjardins
Gideon Rasmussen
vCISO, Cybersecurity Management Consultant
Virtual CSO, LLC
Gideon Rasmussen is a Cybersecurity Management Consultant with over 20 years of experience in corporate and military organizations. Gideon has designed and led programs including Information Security (as a CISO), PCI - Payment Card Security, Third Party Risk Management, Application Security and Information Risk Management. Has diverse industry experience within banking, insurance, pharmaceuticals, DoD/USAF, state government, advertising and talent management.
Gideon has authored over 30 information security articles. He is a veteran of the United States Air Force, a graduate of the FBI Citizens Academy and a recipient of the Microsoft Most Valuable Professional award. Gideon has also completed the Bataan Memorial Death March (4 occurrences).
https://virtualcso.com
About Gideon Rasmussen
Follow Gideon Rasmussen
vCISO, Cybersecurity Management Consultant
Virtual CSO, LLC
Garrett Myler
Owner / Consultant
Enclave Defense
Garrett Myler, owner of Enclave Defense and proud U.S. Air Force veteran, has over a decade of experience supporting threat intelligence and cyber operations within the U.S. Department of Defense and the private sector from strategic to tactical levels of operation. He has unique experience performing risk and vulnerability assessments on industrial control systems (ICS) supporting critical infrastructure. As an experienced and engaging cybersecurity instructor, presenter, and co-host of the "Cyber Mylers" YouTube podcast, Mr. Myler integrates humor and pop culture into cybersecurity principles. He will complete his MS in Digital Forensics and Cyber Investigation in 2023. Mr. Myler is honored to fill the roles of husband to his wife Julie and father to their five children.
https://enclavedefense.com
About Garrett Myler
Follow Garrett Myler
Owner / Consultant
Enclave Defense
Darin Fredde
Principal Consultant of Offensive Security and Proactive Services
Birch Cline Cybersecurity
Darin Fredde is an accomplished cybersecurity expert, educator, and offensive security specialist with over two decades of experience. Holding an M.S. in Cybersecurity from the University of Dallas and backed by a Graduate Certificate endorsed by the U.S. National Security Agency, Darin's credentials include the prestigious CISSP certification. His career has spanned significant roles such as Vice President, Senior Product Manager, and Senior Penetration Tester at US Bank, where he led transformative offensive testing initiatives. At Birch Cline Cybersecurity Consulting, as the Principal Consultant of Offensive Security and Proactive Services, he pioneered successful cybersecurity programs for local government, education agencies, and mid-market organizations. Darin's impact reaches the classroom too, as an Adjunct Instructor at Dallas College, where he's educated numerous students for Ethical Hacking and Defense. His journey is defined by leadership, innovation, and a resolute dedication to shaping a secure digital future
https://www.birchcline.com/
About Darin Fredde
Follow Darin Fredde
Principal Consultant of Offensive Security and Proactive Services
Birch Cline Cybersecurity
James Green
Doctoral Candidate in Organizational Leadership
University of the Incarnate Word
James has been leading in the intelligence, information operations, and cybersecurity space for over 20 years. He is a retired Army First Sergeant, and has led and built organizations numbering from 5 -150 in the Army, NSA-CSS Texas, Theater Information Operations Group, Rackspace, and Chromalloy. His passions are building high-performance teams, developing cybersecurity and information technology leaders, and conducting academic research on how to best do both.
uiw.edu
About James Green
Follow James Green
Doctoral Candidate in Organizational Leadership
University of the Incarnate Word
Dr. Joan Labay-Marquez
Graduate Studies Coordinator
University of the Incarnate Word
Dr. Joan Labay-Marquez serves as the Graduate Studies Coordinator for the Dreeben School of Education at the University of Incarnate Word. She earned her Juris Doctor and Master of Jurisprudence from St. Mary’s University School of Law with a focus on Cyber and Data Security, Compliance, Business Law & Risk. She is the Vice President for the San Antonio Affiliate of the Women in Cybersecurity (WiCyS) and a member of the San Antonio Women in Tech (SAWIT). She serves on the Space & Engineering Technology Academies Advisory Committee (SETA) for San Antonio NEISD and is the K-12 Education Outreach Chair for the Southwest Texas Section of AIAA (American Institute of Aeronautics and Astronautics).
http://www.uiw.edu
About Dr. Joan Labay-Marquez
Follow Dr. Joan Labay-Marquez
Graduate Studies Coordinator
University of the Incarnate Word
Dr. Ashley Love
Associate Professor | Director of Graduate Studies
University of the Incarnate Word
Dr. Ashley S. Love is a multidisciplinary professional specializing in public health and telehealth. She is currently the Director of Graduate Studies at the Dreeben School of Education in San Antonio, TX. Her academic journey, with multiple degrees from Columbia University and Nova Southeastern University, showcases her commitment to diverse learning domains. Dr. Love's work as the former State Epidemiologist and Bureau Chief of Epidemiology at the Delaware Division of Public Health, where she played a vital role in managing the H1N1 pandemic, further underlines her proficiency in biosurveillance. As a multidisciplinary leader, Dr. Love bridges the realms of technology, public health/healthcare, education, and community welfare. Her unique perspective on biosurveillance and her dedication to adult-centered education bring valuable depth to the conversation on cybersecurity and inclusivity.
https://www.uiw.edu/education/faculty-and-staff/directory/ashley-love.html
About Dr. Ashley Love
Follow Dr. Ashley Love
Associate Professor | Director of Graduate Studies
University of the Incarnate Word
Chris May
Technical Director
Software Engineering Institute/Carnegie Mellon University
Chris May serves as the Technical Director of the CERT® Division Cyber Mission Readiness (CMR) Directorate within the Carnegie Mellon University Software Engineering Institute (CMU SEI).
Chris leads a diverse team of cybersecurity engineers and researchers on large-scale projects for numerous U.S. Government agencies. He directs CMR’s cybersecurity modeling, simula-tion, and exercise programs and research efforts. He directs CERT’s execution of the U.S. Department of Homeland Security’s President’s Cup Cybersecurity Competition and other U.S. Department of Defense joint and combined cyber exercise programs. His team devel-ops and transitions numerous open-source software prototypes, hands-on exercise plat-forms, and modeling and simulation tools.
Chris was a CMU adjunct faculty member in applied cybersecurity and digital forensics. He also founded CMU’s Cyber Forensics and Incident Response curriculum track. He served sev-en years in the U.S. Air Force as a communications officer in various IT positions in Korea, Germany, and the United States. He received his bachelor's in education from Indiana Uni-versity of Pennsylvania and his master's in computer resources management from Webster University in St. Louis, Missouri. He is a graduate of the CMU Chief Information Security Of-ficer executive education program.
The CERT Division of CMU SEI is the birthplace of cybersecurity research, conducting collabo-rative and innovative evidence-based research to fortify the cyber ecosystem and protect national security and prosperity.
A U.S. Department of Defense federally funded research and development center since 1984, the SEI has been critical to the government’s ability to acquire, develop, operate, and sustain software systems that are innovative, affordable, trustworthy, and enduring. The SEI researches complex software engineering, cyber operations, and Artificial Intelligence engi-neering solutions; creates and pilots innovative technologies; and transitions maturing solu-tions into practice.
The SEI is part of CMU, pioneering discoveries that enrich the lives of people on a global scale. CMU turns disruptive ideas into successes through leading-edge research.
https://sei.cmu.edu
About Chris May
Follow Chris May
Technical Director
Software Engineering Institute/Carnegie Mellon University
Jonathan Frederick
Senior Engineer
Software Engineering Institute/Carnegie Mellon University
Jonathan Frederick serves as the Team Lead in in the CERT® Division Cyber Mission Readiness (CMR) Directorate within the Carnegie Mellon University Software Engineering Institute (CMU SEI).
Jonathan manages various projects capturing and delivering on U.S. Department of Home-land Security (DHS) requirements. He previously developed cyber courseware and exercises for the U.S. Department of Defense and DHS.
Jonathan was employed by Recorded Future where he established partnerships, contracts, schedules, and deliverables for all instructor-led courses held globally. Jonathan was also the technical subject matter expert for the training team building online courses on topics such as open-source indicators of compromise and the Recorded Future application programming interface.
Jonathan served as a cyber analyst in the Air National Guard. He received his bachelor's in Information Sciences and Technology from The Pennsylvania State University, a master's in Management Information Systems from Robert Morris University, where he is also pursuing a PhD. Additionally, he hold certifications as an Information Systems Security Professional (CISSP) and Project Management Professional (PMP), founded and served on the board of the International Information System Security Certification Consortium (ISC2) Pittsburgh chapter since founding. Finally, he is an integral member of CMU SEI’s Science Technology Engineering and Math (STEM) outreach efforts.
The CERT Division of CMU SEI is the birthplace of cybersecurity research, conducting collabo-rative and innovative evidence-based research to fortify the cyber ecosystem and protect national security and prosperity.
A U.S. Department of Defense federally funded research and development center since 1984, the SEI has been critical to the government’s ability to acquire, develop, operate, and sustain software systems that are innovative, affordable, trustworthy, and enduring. The SEI researches complex software engineering, cyber operations, and Artificial Intelligence engi-neering solutions; creates and pilots innovative technologies; and transitions maturing solu-tions into practice.
The SEI is part of CMU, pioneering discoveries that enrich the lives of people on a global scale. CMU turns disruptive ideas into successes through leading-edge research.
http://www.sei.cmu.edu
About Jonathan Frederick
Follow Jonathan Frederick
Senior Engineer
Software Engineering Institute/Carnegie Mellon University
James Honeycutt
Cyber Operations Technician or P0w3rChi3f
Ozark Cyber Security Consulting\Training
Mr. Honeycutt is a 26-year military veteran and has over 20 years of experience in IT/Security operations. He holds numerous SANS certifications and is currently working on his MSISE Degree (Master of Science Information Security Engineering with a Forensics focus). Mr. Honeycutt enjoys giving back to the community by instructing. He has conducted a SANS Mentor Windows Security and PowerShell class, taught a three-month Security Boot Camp with Trilogy, and taught Firewalls and Network Security at Howard Community College. He was also selected to peer review the SEC586: Blue Team Operations: Defensive PowerShell. When he has the time, he will produce PowerShell videos on YouTube.
Mr. Honeycutt became the Active Directory PowerShell expert as a SysAdmin. He started learning PowerShell back in PowerShell v2 and stays current with the changes. Mr. Honeycutt is currently serving as the Windows and PowerShell expert on his Cyber Protection Team, creating new ways and techniques to accomplish tasks without specialized tools. His current work includes a PowerShell Port Scanner, a PowerShell version of the bash file command. You can find his published work on GitHub.
He believes that if the adversary is living off the land, the defender should too
About James Honeycutt
Follow James Honeycutt
Cyber Operations Technician or P0w3rChi3f
Ozark Cyber Security Consulting\Training
Stephen Nelson
Penetration Tester
DenSecure by Wolf and Company
Steve is a Penetration Tester at Wolf and Company's DenSecure group where he's responsible for coordinating and conducting penetration testing services and red team operations for clients in a variety of industries, including financial, healthcare, and software. His expertise consists of internal, external, mobile and web penetration testing, offensive tool development, offensive infrastructure development and social engineering. Steve has over 2 years of experience performing security assessments and holds such certifications as Certified Red Team Operator (CRTO), GIAC Mobile Security Analyst (GMOB), and eLearn Security Junior Penetration Tester (eJPT).
https://blog.stevesec.com/home
About Stephen Nelson
Follow Stephen Nelson
Penetration Tester
DenSecure by Wolf and Company
Ken Johnson
CTO & Co-Founder
DryRun Security
Ken Johnson has been hacking web applications professionally for 14 years and given security training for 11 of those years. Ken is both a breaker and builder and is the CTO & Co-Founder of DryRun Security. Previously, Ken was a Director with GitHub's Product Security Engineering team and has held both technical and leadership roles both within the consulting world as well as a corporate defender. Previously, Ken has spoken at RSA, You Sh0t the Sheriff, Insomnihack, CERN, DerbyCon, AppSec USA, AppSec DC, AppSec California, DevOpsDays DC, LASCON, RubyNation, and numerous Ruby, OWASP, and AWS events about appsec, devops security, and AWS security. Ken's current passion project is the Absolute AppSec podcast with Seth Law.
https://dryrun.security
About Ken Johnson
Follow Ken Johnson
CTO & Co-Founder
DryRun Security
Mark Walker
Lead Information Security Analyst & Penetration Tester
USAA
Mark is an avid security professional with 8+ years of experience in the cyber security industry and 4+ years' experience penetration testing at a fortune 500 company. His specialty is network penetration testing, but he also dabbles in webapp, mobile, wireless, and mainframe testing. Mark attended Brigham Young University where he obtained his Bachelor of Science in Information Systems. He received a Masters of Science in Information Technology with an emphasis in Information Assurance (Cyber Security) from the University of Texas at San Antonio. Mark enjoys spending time with friends, exploring wild caves, and good food. Mark is active in his church and enjoys spending time with his wife Katie and his sons four sons.
About Mark Walker
Follow Mark Walker
Lead Information Security Analyst & Penetration Tester
USAA
J. Alexander Chanoine
Director of Privacy, Privacy Attorney
MBL Technologies, Inc.
Mr. Alex Chanoine is a Privacy Attorney and Director of Data Privacy for MBL Technologies, Inc., he is a Regulatory and Privacy compliance Subject Matter Expert with over 18 years of privacy compliance experience. Mr. Chanoine is responsible for the development and deployment of comprehensive programs mitigating confidentiality and privacy risks, he ensures privacy is an integral part and fabric of each client's corporate governance, assuring all organizations meet and exceed their stated privacy practices. Mr. Chanoine assist clients with the design and implementation of holistic privacy programs, inclusive of people, process, and technology capabilities, assisting complex clients and organizations in the pursuit of growth, innovation and performance through proactive management of associated privacy and cybersecurity risks, providing clients with continuous regulatory, policy, and instructional guidance in the protection and security of Personally Identifiable Information (PII) and Protected Health Information (PHI). Mr. Chanoine has continuously provided regulatory and statutory expertise and guidance for federal and state data privacy policy and regulations including the Privacy Act, HIPAA, GDPR, HITECH, COPPA, TCPA, and CPRA.
Mr. Chanoine has implemented and enforced privacy regulations and compliance for the 9.6 million beneficiaries of the Department of Defense, Defense Health Agency (DHA) Military Health System (MHS), as well as the 4,135 Federal Deposit Insurance Corporation (FDIC) insured U.S. banks and their customers. Mr. Chanoine has authored, published, and presented Continuing Legal Education (CLE) lectures on the privacy standards of the Health Insurance Portability and Accountability Act, he is published, and will be a speaker this September at the Texas Cyber Summit. Mr. Chanoine has;
• Provided client guidance on all matters of compliance regarding to the privacy of PII and PHI including the Privacy Act, HIPAA, HITECH, GDPR, COPPA, TCPA, and CCPA
• Assist in creating and implementing DHA COVID-19 Privacy Policies
• Drafted privacy position papers for the U.S. Senate Armed Services Committee and House Armed Services Committee
• Created precedent with 2018 Health and Human Services Office of Civil Rights decision regarding HIPAA’s National Security Exception
• Drafted global responses worldwide regarding the confidentiality, integrity, authority, and privacy of PII and PHI
https://www.mbltechnologies.com/
About J. Alexander Chanoine
Follow J. Alexander Chanoine
Director of Privacy, Privacy Attorney
MBL Technologies, Inc.
Mathieu Saulnier
Individual Researcher
Individual Researcher
Mathieu Saulnier is a security enthusiast and Core Mentor for Defcon’s Blue Team Village. He lead world class teams and focuses on research, hunting & detecting adversaries. With 2 decades now in the security space, he’s had the opportunity to work for amazing organizations and make an impact in cyber defense. He shared his passion at Derbycon, SANS Summits and RSAC, amongst others.
/www.sumologic.com
About Mathieu Saulnier
Follow Mathieu Saulnier
Individual Researcher
Individual Researcher
Mike Saunders
Principal Consultant
Red Siege
Mike Saunders (@hardwaterhacker) is Red Siege Information Security's Principal Consultant. Mike has over 25 years of IT and security expertise, having worked in the ISP, banking, insurance, and agriculture businesses. Mike gained knowledge in a range of roles throughout his career, including system and network administration, development, and security architecture. Mike is a Black Hat trainer and a highly regarded and experienced international speaker with notable cybersecurity talks at conferences such as DerbyCon, Circle City Con, NorthSec, SANS Enterprise Summit, and DakotaCon, in addition to having more than a decade of experience as a penetration tester. You can find Mike's in-depth technical blogs and tool releases online and learn from his several offensive and defensive-focused SiegeCasts. He has been a member of the NCCCDC Red Team on several occasions and is the lead Red Team Operator for Red Siege Information Security.
https://redsiege.com
About Mike Saunders
Follow Mike Saunders
Principal Consultant
Red Siege
Jeff Foley
Vice President of Research
ZeroFox
Jeff Foley served the United States Air Force Research Laboratory from 2001 to 2017 as a contractor specializing in cyber warfare research and capabilities engineering. He concluded his government contracting at Northrop Grumman Corporation where he performed the roles of Subject Matter Expert for Offensive Cyber Warfare Research & Development and Director of Penetration Testing. In these roles, he also developed penetration testing training curriculum for Northrop Grumman Cyber Academy and taught trainers to utilize the material across the international organization. Jeff has taught and spoken at various academic institutions on the topics of offensive security and penetration testing during his time in this profession.
During the last six years, Jeff identified a lack of situational awareness in traditional information security programs and shifted his attention to this important function. He is now the Project Leader for Amass, an OWASP Foundation Flagship Project that performs in-depth attack surface mapping and asset discovery. Jeff has assisted various companies with attack surface management and been invited to speak at conferences, such as DEF CON, on the topic. Currently, he is the Vice President of Research at ZeroFox, the company that delivers proactive cybersecurity outside the traditional corporate perimeter. Previously, Jeff was the Global Head of Attack Surface Management at Citi, one of the largest global banks - an institution connecting millions of people across hundreds of countries and cities.
https://github.com/caffix
About Jeff Foley
Follow Jeff Foley
Vice President of Research
ZeroFox
TJ Null
Pentester and Red Teamer
N/A
Tj Null is a pentester and red teamer in the private sector. He's very passionate about red team development and supporting open source projects like Kali Linux and Powershell for Linux. Through his work and contributions to the community, TJ continues to advance the field of hacking and help organizations better defend against cyber threats by sharing his knowledge to the information security community. TJ earned a BS in Cybersecurity from the University of Maryland University College (UMUC) where he is a board member for the award-winning UMUC Cyber Padawans. Over the years, he has participated in many cybersecurity competitions across the globe and is a two-time SANS Netwars Champion, TraceLab Black Badge Winner, and Hack-A-Sat Finalist.
https://www.netsecfocus.com/
About TJ Null
Follow TJ Null
Pentester and Red Teamer
N/A
Marina Ciavatta
CEO and Co-Founder
Hekate, Inc.
Marina Ciavatta is the CEO and Co-Founder of Hekate, Inc. She specializes in Social Engineering, a technique also known as "human hacking". Marina has physically breached some of the largest companies in Brazil (where she is from), using Social Engineering tactics to compromise people's behavior, gaining access to restricted areas, spying, and stealing documents and equipment, among other missions. Marina has been working with Cybersecurity and Hacking culture for 10 years, and is also an Information Security Awareness instructor, as well as an international speaker, teaching the public and companies around the globe how to better protect themselves from attacks, with practical tips and sharing her field experiences.
About Marina Ciavatta
Follow Marina Ciavatta
CEO and Co-Founder
Hekate, Inc.
Azim Khodjibaev
Senior Threat Intelligence Analyst
Cisco Talos
Azim Khodjibaev is a senior threat intelligence analyst at Cisco Talos. His main are of focus is Russian cybercrime, APT activity, and disinformation. He has been with Cisco Talos for over 7 years.
talosintelligence.com
About Azim Khodjibaev
Follow Azim Khodjibaev
Senior Threat Intelligence Analyst
Cisco Talos
Charles Waterhouse
Senior Security Analyst
Synack, Inc
Charles “Charlie” Waterhouse is a senior security analyst on Synack’s Special Projects team. He is originally from Texas and took an early out from a prior career in the airline industry to help large enterprise and government entities increase their security.
Prior to his current role, Charlie was a security analyst in Synack’s Vulnerability Operations team. He has also worked with Synack’s product development/management team and managed a catalog of over 30 security products, many of which he developed. He was also involved with building out Synack’s API and CVE testing capabilities.
Charlie’s daily work involves meeting with internal teams, Synack clients and researchers to review security testing methods, outlier technologies and emerging threat vectors.
He has an adopted Siberian Husky who thinks he is a coworker, showing up often in calls.
synack.com
About Charles Waterhouse
Follow Charles Waterhouse
Senior Security Analyst
Synack, Inc
Hudney Piquant
Solutions Architect
Synack, Inc
Hudney Piquant currently serves as a Solutions Architect for Synack. Prior to coming on board as a Solutions Architect, he was an elite member of the Synack Red Team (SRT), which is what led him to being recruited to a full-time position on the team. He brings a unique perspective to Synack’s clientele, having served both in an adversarial role and as a trusted consultant and evangelist ‘hacktivist’ for Synack’s services. Outside of his professional endeavors, Hudney has a passion for mentoring others in the field of Cyber Security — helping aspiring techies to navigate education, certifications, interview processes, and more — while masterfully weaving in life lessons and philosophies into a cyber-focused narrative.
About Hudney Piquant
Follow Hudney Piquant
Solutions Architect
Synack, Inc
Jan Marek
Red Teamer
Cyber Rangers
Meet Jan Marek, the co-founder of Cyber Rangers, red teamer and offensive security extraordinaire with a delightful sense of humor (see? :))! With over 15 years of experience, Jan's expertise lies in the thrilling realm of red teaming, penetration testing, and all things related to offensive maneuvers. But don't worry, he's not your typical serious cyber warrior – he knows how to lighten the mood too! When he's not busy unraveling digital mysteries, Jan dives headfirst into thrilling activities like red teaming, penetration testing, incident response, digital forensics, engineering, and training delivery. He's like a fearless adventurer, always seeking new challenges and pushing boundaries in the ever-evolving landscape of cybersecurity.
https://www.cyber-rangers.com
About Jan Marek
Follow Jan Marek
Red Teamer
Cyber Rangers
Allyn Stott
Senior Staff Engineer
Airbnb
Allyn Stott is a senior staff engineer at Airbnb. He currently works on the information security technology leadership team where spends most of his time working on threat detection and incident response. He especially enjoys building strategies for hunting down and finding advanced threat actors. Over the past decade, he has built and run detection and response programs at companies including Delta Dental of California, MZ, and Palantir. Red team tears are his testimonials.
In the late evenings, after his toddler ceases all antics for the day, Allyn writes a semi-regular, exclusive security newsletter. This morning espresso shot can be served directly to your inbox by subscribing here: https://www.meoward.co
Allyn has previously presented at Kernelcon, BSides Seattle, BSides SATX, The Diana Initiative, and BSides Singapore. He received his Masters in High Tech Crime Investigation from The George Washington University as part of the Department of Defense Information Assurance Scholarship Program.
https://www.meoward.co
About Allyn Stott
Follow Allyn Stott
Senior Staff Engineer
Airbnb
Andrew Schwartz
Practice Lead, Attack Simulation and Detection
TrustedSec
Andrew is energetic and driven, with strong technical knowledge and experience in defensive and offensive security, vulnerability management, and the development of transformational strategies, which help clients enhance their security postures to detect and stop adversaries.Andrew's security passion started at a young age and stemmed from his love of classic action, crime, and spy movies. He also always showed a particular interest in the history of global security agencies and current events. His family still jokes about how he would spend countless hours glued to the weekly issues of Time and Newsweek magazines, reading every detail from cover to cover. These interests led Andrew to pursue a post-collegiate career in various investigative roles supporting both federal and local law enforcement agencies. Andrew's love for the InfoSec industry is demonstrated by his eagerness to constantly grow and educate himself. Whether it's reading a book, following a blog, keeping up to date.
https://www.trustedsec.com/team/andrew-schwartz/
About Andrew Schwartz
Follow Andrew Schwartz
Practice Lead, Attack Simulation and Detection
TrustedSec
Charlie Clark
Senior Security Consultant
MDSec
Charlie has worked in IT for around 19 years and security for over 6. He moved into security having had a career in building and maintaining corporate networks, although his passion was always security. Working as a pentester for 6 years, he spent his spare time doing Active Directory security research, resulting in becoming a co-dev of Rubeus, maintaining a fork of PowerView and giving a talk on OPSEC Kerberos ticket requests at YASCON 2020.He currently maintains a blog at https://exploit.ph
https://exploit.ph
About Charlie Clark
Follow Charlie Clark
Senior Security Consultant
MDSec
Marcus Guevara
Director of Security Services
Recon InfoSec
Marcus Guevara is married with six children, is the Director of Security Services for Recon InfoSec, and is a certified SANS Instructor in Incident Response and Forensics. Marcus previously spent time enlisted in the Air Force and as an officer in the US Coast Guard performing Threat Hunting and Incident Response.
http://reconinfosec.com
About Marcus Guevara
Follow Marcus Guevara
Director of Security Services
Recon InfoSec
Jonathan Johnson
Sr. Security Researcher
Binary Defense
Jonny is a security enthusiast who loves spending time with all things related to Windows Internals, reverse engineering, and data analysis. Jonny applies threat research and low-level knowledge to defensive capabilities, arming defenders with the information and tools needed to cover defensive gaps. Jonny loves to share his actionable findings in blogs and is committed to helping defenders be effective, independent, and efficient.
https://jsecurity101.medium.com
About Jonathan Johnson
Follow Jonathan Johnson
Sr. Security Researcher
Binary Defense
Mike Felch
Cloud Pentester / Security Researcher
Dark Optics
Mike Felch (@ustayready) is founder of Dark Optics, a cloud penetration testing and security consulting firm. In his role he identifies and weaponizes security vulnerabilities in cloud platforms like AWS, Azure, and GCP. Mike started his career in 1997 as a Linux administrator, which led to numerous offensive security roles at places like Black Hills Information Security and CrowdStrike. Outside of work, Mike operates a family ranch where he raises cattle, chickens, goats, and horses. He regularly speaks at security conferences throughout the USA and is an active member of the central Florida infosec community.
https://darkoptics.com/
About Mike Felch
Follow Mike Felch
Cloud Pentester / Security Researcher
Dark Optics
Dwayne McDaniel
Developer Relations professional
GitGuardian
Dwayne has been working as a Developer Relations professional since 2015 and has been involved in tech communities since 2005. He loves sharing his knowledge, and he has done so by giving talks at over a hundred events worldwide. Dwayne currently lives in Chicago. Outside of tech, he loves karaoke, live music, and performing improv. Thanks again, Dwayne
https://www.gitguardian.com/
About Dwayne McDaniel
Follow Dwayne McDaniel
Developer Relations professional
GitGuardian
Apurv Singh Gautam
Sr. Threat Research Analyst
Cyble
Apurv Singh Gautam is a Sr. Threat Research Analyst at Cyble who commenced work in Threat Intel 5 years ago. He is focused on monitoring and analyzing a wide spectrum of sources, creating automated tools, and performing threat investigations by utilizing HUMINT, SOCMINT, and OSINT and producing threat intelligence. He is passionate about giving back to the community and has already conducted several talks and seminars at conferences like SANS, Defcon, BSides, local security meetups, schools, and colleges. He loves volunteering with Station X to help students navigate into cybersecurity. He looks forward to the end of the day to play and stream one of the AAA games Rainbow Six Siege.
https://apurvsinghgautam.me
About Apurv Singh Gautam
Follow Apurv Singh Gautam
Sr. Threat Research Analyst
Cyble
Karan Dwivedi
Security Engineering Manager
Google
Karan Dwivedi is a security engineering manager at Google with expertise in blue team i.e. detection, incident response, digital forensics, insider threats and investigations at scale. He has successfully led projects within large scale tech companies in Silicon Valley to improve security for over a billion users. He owns the security blog "All Things Pwned" (www.allthingspwned.com) where he shares novel interviewing advice for security engineers. His interviewing articles are provided as a reference by the Google hiring team. He serves as a program committee member of the DFRWS conference, reviewer for DFIR Reviews and editorial board member of international journals in digital forensics. He is a regular invited speaker at security conferences, universities, and podcasts. He has a track record of guiding hundreds of students and professionals over LinkedIn by offering resume reviews and career advice. His complete portfolio can be found at his website https://karand.me
https://karand.me
About Karan Dwivedi
Follow Karan Dwivedi
Security Engineering Manager
Google
Anthony Rose
Director, Security Research
BC Security
Anthony "Coin" Rose, CISSP, is the Director of Security Research at BC Security, where he specializes in adversary tactic emulation planning, Red and Blue Team operations, and embedded systems security. He has presented at numerous security conferences, including Black Hat, DEF CON, HackSpaceCon, HackMiami, and RSA conferences. Anthony is the author of various offensive security tools, including Empire and Starkiller, which he actively develops and maintains. He is recognized for his work, revealing wide-spread vulnerabilities in Bluetooth devices and is the co-author of a cybersecurity blog at https://www.bc-security.org/blog/.
https://www.bc-security.org/
About Anthony Rose
Follow Anthony Rose
Director, Security Research
BC Security
Johnathan Azaria
Data Scientist Tech Lead
Imperva
Experienced Data Scientist and Tech Lead at Imperva's threat research group where I work on creating machine learning algorithms to help protect our customers against web app and DDoS attacks. Before joining Imperva, I obtained a B.Sc and M.Sc in Bioinformatics from Bar Ilan University.
www.imperva.com
About Johnathan Azaria
Follow Johnathan Azaria
Data Scientist Tech Lead
Imperva
Gabe Schuyler
Enterprise Solutions Engineer
Wiz, Inc
Gabe is an enterprise solutions engineer at Wiz, Inc. His day-to-day stock in trade is cloud security, helping people secure what they've got in the cloud and keeping everyone on top of trends. Off the clock, he enjoys tinkering with RFID, experimenting with ambient notification, and encouraging the use of technology for social change
wiz.io
About Gabe Schuyler
Follow Gabe Schuyler
Enterprise Solutions Engineer
Wiz, Inc
Eric Smalling
Sr. Developer Advocate
Snyk
Eric is a 30+ year enterprise software developer, architect, and consultant with a focus on CI/CD, DevOps, and container-based solutions over the last decade. He is a Docker Captain, is certified in Kubernetes (CKA, CKAD, CKS), and has been a Docker user since 2013. As a Senior Developer Advocate at Snyk, Eric helps developers implement proactive and scalable security practices with a focus on container and cloud-native technologies.
http://ericsmalling.com
About Eric Smalling
Follow Eric Smalling
Sr. Developer Advocate
Snyk
Marino Wijay
Developer Advocate
Solo.io
Marino Wijay is a Canadian, Traveller, International Speaker, Open Source Advocate for Service Mesh, Kubernetes, and Networking. He is an Ambassador @ EddieHub, and Lead Organizer for KubeHuddle Toronto. He is passionate about technology and modern distributed systems. He will always fall back to the patterns of Networking and the ways of the OSI. Community building is his driving force; A modern Jedi Academy.
Solo.io
About Marino Wijay
Follow Marino Wijay
Developer Advocate
Solo.io
Raymond Confer
Cyber Threat Intel Lead
Trinet
I am an InfoSec Specialist, in the industry for 15 years. I started off teaching infosec bootcamps for two different training companies and amassed 21 certifications ranging from EcCouncil, Microsoft, Comptia among others. I then moved into web application pentesting for the government division of Veteran Affairs. From that, I transitioned to Trinet and built their AppSec program from scratch. I currently have moved away from AppSec and am now building their Cyber Threat Intelligence Program from scratch. I also run a YouTube Infosec vlog covering topics such as Threat Intel, Red Teaming, Appsec, etc. https://www.youtube.com/sh1katagana1. I am a musician of 27 years, mainly playing guitar and singing. I have been doing something called live looping for the past 20 years where I use a loop pedal to layer guitar, bass, vocals, keys and samples and create the music on the fly. I have been playing in virtual worlds doing concerts for 15 years, worlds like Second Life, OpenSim and Neos VR. You can check out my "music to hack to" at https://www.reverbnation.com/sh1katagana1.
https://www.sh1katagana1.com/
About Raymond Confer
Follow Raymond Confer
Cyber Threat Intel Lead
Trinet
Nick Powers
Senior Consultant
SpecterOps
Nick is a senior consultant on the adversary simulation team at SpecterOps. He has experience with providing, as well as leading, red team and pentest service offerings for a large number of fortune 500 companies. Nick has previously presented at Defcon, Wild West Hacking Fest, and instructed training at Blackhat. With a career focused on offensive security, a few of his interests and prior research focuses have included initial access techniques, evasive Windows code execution, and targeted cross-protocol relay of NTLM authentication.
https://specterops.io
About Nick Powers
Follow Nick Powers
Senior Consultant
SpecterOps
Steven Flores
Service Architect
SpecterOps
Steven Flores is an experienced red team operator and former Marine. Over the years Steven has performed engagements against organizations of varying sizes in industries that include financial, healthcare, legal, and government. Steven enjoys learning new tradecraft and developing tools used during red team engagements. Steven has developed several commonly used red team tools such as SharpRDP, AssemblyHunter, SharpMove, SharpStay, and SharpView.
https://specterops.io
About Steven Flores
Follow Steven Flores
Service Architect
SpecterOps
Ben Schmerler
Senior Solutions Consultant
Independent Security Evaluators (ISE) as well as the IoT Village
Ben Schmerler has been helping people manage cybersecurity risks for over a decade. His experience ranges from consulting clients on security risk management, to vulnerability testing, to security awareness and more. He now works with Independent Security Evaluators as Senior Solutions Consultant to guide clients in need of Web Application Security Testing, Penetration Testing, Iot Device Hacking and more along the assessment process by working with them to identify their needs so that true vulnerabilities are identified, assets are protected and ensure that their security strategy achieves their goals.
https://www.ise.io/
About Ben Schmerler
Follow Ben Schmerler
Senior Solutions Consultant
Independent Security Evaluators (ISE) as well as the IoT Village
Rita Griffith
IT Assurance Senior Manager
Wolf & Company, P.C.
Rita is a Senior Manager in Wolf’s Information Technology (IT) Assurance Services group. Rita is responsible for coordinating, and supervising IT audit services for clients in a variety of industries including financial institutions, SaaS organizations, and financial technology organizations. Rita has over twelve years of experience in the IT assurance field. She has expertise in facilitating IT audits, Model Risk Management and Model Validation reviews, and System and Organization Control (SOC) reports.
https://www.wolfandco.com/
About Rita Griffith
Follow Rita Griffith
IT Assurance Senior Manager
Wolf & Company, P.C.
Alex Martirosyan
Senior Penetration Tester
DenSecure by Wolf & Company
Alex is a Senior Penetration Tester at Wolf’s IT Assurance Services group where he’s responsible for coordinating and conducting penetration testing services for clients in a variety of industries, including financial, healthcare, and software. His expertise consists of internal and external network penetration testing, threat emulation exercises, social engineering, vulnerability assessments, cloud security assessments, and Active Directory security reviews.
Additionally, he has experience working with standards from the National Institute of Standards and Technology (NIST), the Center for Internet Security (CIS), and leveraging the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework. Alex has over three years of experience performing security assessments and holds certifications from industry-recognized organizations such as Offensive Security and Global Information Assurance Certification (GIAC).
https://www.wolfandco.com/
About Alex Martirosyan
Follow Alex Martirosyan
Senior Penetration Tester
DenSecure by Wolf & Company
Mackenzie Zappe
Computer Science Masters Student
University of Nevada, Reno
Mackenzie Zappe is a Computer Science Masters student at the University of Nevada, Reno. Her studies have been focused on the interdiciplanary intersections of cybersecurity. She has a specialized interest in Critical Infrastructure and Industrial Control Systems security. She is passionate about vulnerability assessments and integrating creative and secure solutions into legacy SCADA components
About Mackenzie Zappe
Follow Mackenzie Zappe
Computer Science Masters Student
University of Nevada, Reno
TJ Preyear
Security Analyst
Independent Security Evaluators
TJ Preyear is a Cyber Security Analyst that is currently employed by Independent Security Evaluators(ISE), the company of Ethical hackers known for hacking IoT devices, web applications, and password managers. TJ got into Cyber Security because of his limitless curiosity and his accidental hacking of an educational website. This open a new world for him because of his previous occupation of working in I.T. He spent several years only troubleshooting and fixing devices, now he is reward and praised for breaking them.
https://www.ise.io/
About TJ Preyear
Follow TJ Preyear
Security Analyst
Independent Security Evaluators
Shani Peled
Cyber Security Expert
CYE
Shani is an accomplished professional in the field of Cyber Security and a recognized SME in Cloud Security. Shani's primary focus centers on the penetration testing of cloud environments within prominent 2023 enterprise entities on a global scale. Her career includes a distinguished tenure as a leading female team lead within the Israeli Intelligence Corps, where she played a pivotal role in the security operations department.
https://cyesec.com/
About Shani Peled
Follow Shani Peled
Cyber Security Expert
CYE
Int eighty
Computer Crime Enthusiast, Rapper
Dual Core
int eighty (he/him) is a computer crime enthusiast, and the rapper in Dual Core. Occasional memes and hacking content on Mastodon, Bluesky, and Twitter as @int0x80.
dualcoremusic.com
About Int eighty
Follow Int eighty
Computer Crime Enthusiast, Rapper
Dual Core
Andre Rall
Director of Cloud Security
Uptycs
Andre Rall brings a unique combination of cloud security, fraud, and risk knowledge to the infosec community. Prior to joining Uptycs, Andre spent five years at AWS overseeing a global team responsible for ATO detection, mitigation, and the business intelligence strategy for all of AWS Fraud Prevention. Before joining AWS, Andre spent seven years at Rackspace, with his final role being Director of AWS Technical Support & Operations providing DevOps services for customers.
https://www.uptycs.com/
About Andre Rall
Follow Andre Rall
Director of Cloud Security
Uptycs
Ernesto Ballesteros
State Cybersecurity Coordinator of Texas
CISA
Mr. Ballesteros (Ballesteros) serves as the Cybersecurity State Coordinator (CSC) for the State of Texas at the Cybersecurity & Infrastructure Security Agency (CISA) in Region 6. As the CSC for the State of Texas, his role is to build strategic public and private sector relationships in Texas to facilitate the development and maintenance of secure and resilient infrastructure, pursuant to 6 United States Code, Section 665(c) (2021). Previously, Ballesteros served the State of Texas, as the State Cybersecurity Coordinator and Chair of the Texas Cybersecurity Council, at the Texas Department of Information Resources (DIR). As the State Cybersecurity Coordinator, his primary charge was to oversee cybersecurity matters for the State of Texas and lead the Texas Cybersecuity Council to collaborate on matters of cybersecurity concerning Texas, pursuant to Texas Government Code, Sections 2054.511 and 512. During his tenure, he contributed to the development and implementation of statewide initiatives, such as the Texas Information Sharing and Analysis Organization (TxISAO), the Statewide Cybersecurity Awareness Training Program, and more. Prior to serving in state government, Ballesteros’ career spanned several industries, including academia, financial services, private consulting, and public utilities. Of note, his prior professional roles included the following: Information Security Officer for the Alamo Colleges District (San Antonio, Texas); Information Security Officer at Jefferson Bank (San Antonio, Texas); Information Security Consultant at Omnikron Systems (Woodland Hills, California); Assistant Professor of Computer Information Systems and Security at Our Lady of the Lake University (San Antonio, Texas); Director of the Center for Information Assurance Management and Leadership at Our Lady of the Lake University (San Antonio, Texas); and Information Systems Auditor for CPS Energy (San Antonio, Texas). Currently, Ballesteros is an Adjunct Professor of Law at St. Mary’s University School of Law (San Antonio, Texas), where he teaches cybersecurity, information systems, and law. Academically, Ballesteros holds several degrees and professional certifications pertaining to cybersecurity, law, and information systems. Ballesteros holds a Bachelor (BS) and Master of Science (MS) in Computer Information Systems and Security (CISS) from Our Lady of the Lake University; an NSA/DHS-designated Center of Academic Excellence in Cyber Defense Education (CAE-CDE).
cisa.gov
About Ernesto Ballesteros
Follow Ernesto Ballesteros
State Cybersecurity Coordinator of Texas
CISA
Luke (Pyr0) McOmie
VP Offensive Security
Blue Bastion
Luke started in offensive security in 1994 and is a trusted advisor, security leader and mentor. With a career focus in offensive security and a strong technical background, he is recognized for his excellence in developing and executing enterprise security strategies and leading technical and tactical programs. He has founded and contributed to several industry leading organizations over his career including start ups, fortune 100 enterprises, and federal agencies. As an extrovert, he passionately supports the information security community, is a featured speaker at various conferences, a published author, and an industry liaison for many businesses and organizations.
About Luke (Pyr0) McOmie
Follow Luke (Pyr0) McOmie
VP Offensive Security
Blue Bastion
Todd Vasilou
Cybersecurity Advisor
CISA
Todd Vasilou is a Cybersecurity Advisor (CSA) with the Cybersecurity and Infrastructure Security Agency (CISA), Region 6, located in San Antonio, TX. As a CSA he is responsible for securing and defending U.S. critical cybersecurity infrastructure through advising stakeholders on matters of cybersecurity risk, resiliency, and posture via in-depth cybersecurity assessments, workshops, and information sharing. Mr. Vasilou coordinates and provides liaison support to federal partners and senior state and local government officials to create and enhance cybersecurity resiliency. He also participates in cybersecurity partnerships with, and across, critical infrastructure owners, operators and state, local, tribal and territorial governments, promoting collaborative efforts to reduce cybersecurity risks and threats to critical information, enterprise, communications, and control systems. Mr. Vasilou previously served as a Security Operations Center as a Service (SOCaaS) manager with CrowdStrike, where he supervised and led Extended Detection & Response (XDR) and Managed Detection & Response (MDR) platform services for customer endpoints. As the central focal point for incident management and escalation, Mr. Vasilou coordinated with and advised customer senior leadership and technical staff on matters of detection, mitigation, and remediation of cybersecurity events and incidents. Mr. Vasilou began his career as a Cryptologic Telecommunications Technician with the National Security Agency, Central Security Service (NSA/CSS), Fort Meade, MD (2000). In 2006, Mr. Vasilou was recruited by the Air Force Office of Investigations (AFOSI) as a Special Agent where he led criminal, counterintelligence and cyber investigations and operations. During his tenure as a Special Agent, Mr. Vasilou deployed in support of Operation Enduring Freedom (OEF) where he performed outside-the-wire counterintelligence operations in Afghanistan (2008) and Pakistan (2009). He was later augmented to the Joint Special Operations Command (JSOC) (2012) and USCYBERCOM, Cyber Mission Force (CMF) (2018), in support of National Cybersecurity objectives, abroad. Previous assignments include: AFOSI Liaison Officer to 33rd Network Warfare Squadron (AFCERT); Acting Chief, AFOSI Insider Threat; Acting Liaison Officer to 16th Air Force; Task Force Officer (TFO), FBI Cyber Division, San Antonio, TX.
About Todd Vasilou
Follow Todd Vasilou
Cybersecurity Advisor
CISA
JC Herz
Senior Vice President, Software Supply Chain Solutions,
Exiger
JC Herz is the Senior Vice President of Exiger’s Software Supply Chain Solutions, where she leads the deployment and scaling of Exiger’s cyber supply chain solutions across the public and private sectors. JC was the co-founder and CEO of Ion Channel, which was acquired by Exiger in 2023, and has prior startup experience in predictive AI and data visualization. JC served as co-chair on the National Telecommunications and Information Administration’s Working Group on Software Bill of Materials Standards and Formats. She was one of three co-authors of the Pentagon’s Open Technology Development Roadmap. Earlier in her career she was a New York Times columnist and published author. She is a Fellow at George Mason University’s National Security Institute.
https://www.exiger.com/professionals/jc-herz/
About JC Herz
Follow JC Herz
Senior Vice President, Software Supply Chain Solutions,
Exiger
Raffaele Mautone
CEO & Founder
Judy Security
Raffaele Mautone is Founder and CEO of Detroit-based Judy Security. Raffaele's strategic thinking and effective leadership have been instrumental and paramount in his career as an IT, sales and operations professional. His extensive experience in the IT and security industry serves as the platform of Judy. Raffaele's consistent record of leading teams through successful acquisitions; strategic planning and implementation and deploying large, multi-tiered complex programs has served companies such as Duo, FireEye, McAfee and Dell. He also has experience in implementing marketing and sales strategies, positioning companies for future growth, and deploying applications and business process improvements to assist with bookings, leads and new go-to-market programs. Raffaele holds a BS from Eastern Michigan University.
https://judysecurity.ai
About Raffaele Mautone
Follow Raffaele Mautone
CEO & Founder
Judy Security
Matthew Saner
Sr. Manager, Security Specialist SAs
Amazon Web Services
Matt Saner is a Sr Manager leading Security Specialists at AWS. He and his team help the world’s largest brands solve complex and critical security challenges in the cloud. Prior to AWS, Matt spent nearly 2 decades working in the Financial Services industry, solving various technology, security, risk, and compliance challenges. He highly values life-long learning and holds a Masters in Cybersecurity from NYU. For fun, he flies airplanes.
https://aws.amazon.com
About Matthew Saner
Follow Matthew Saner
Sr. Manager, Security Specialist SAs
Amazon Web Services
Maitreya Ranganath
Principal Security Solutions Architect
Amazon Web Services
Maitreya is an AWS Principal Security Solutions Architect. He enjoys helping customers solve security and compliance challenges and architect scalable and cost-effective solutions on AWS.
About Maitreya Ranganath
Follow Maitreya Ranganath
Principal Security Solutions Architect
Amazon Web Services
John Bays
Senior Solutions Security Consultant, Federal
RedSeal
John Bays moved into the cybersecurity field 7 years ago, solving his first security incidents in a Security Operations Center. With a passion for solving complex problems and inventing new solutions to every day struggles, John quickly grew in his roles. Continuously seeking improvement and knowledge, John obtained a variety of certifications including a CISSP, CISM, and CEH. A short time later, a Bachelors and Master’s degree in cyber security were added to that list of credentials. Coming to RedSeal in 2020 as an Professional Services Engineer, John has been dedicated to the success of RedSeal customers through managing some of the largest and most complex environments in the world with the RedSeal product.
An avid professional, John has streamlined server deployments, created new processes, and architected various integrations of RedSeal to other cyber security tools such as ServiceNow and Splunk. When not assisting others in RedSeal or creating new products, John mentors new individuals in the technology field as well as teaches Python as a coding language.
About John Bays
Follow John Bays
Senior Solutions Security Consultant, Federal
RedSeal
Wendy Howell
CEO, Moderator
Executive Council Network
Wendy Howell is the CEO at Executive Council Network. ECN is an invite only executive council that provides opportunities for connections, community, executive elevation and venture investments. We work collectively with our membership to create a positive business and social impact! Previous roles include Chief of Staff at Cisco and executive roles in M&A and Strategy at Symantec and VERITAS.
Wendy is a connector, community builder “for good” and a passionate advocate for giving back. She is deeply involved in non-profit as the Managing Director for Girls In Tech, Chair of STEM Scouts, Co-Chair 50/50 Women On Boards, a judge for TiE Young Entrepreneurs, and Founder’s Circle member at DivInc. She considers herself a “rebel with a cause” and is known for her dogged tenacity and creativity to support her passions! Nothing excites her more than creating positive social impact and helping to create the next generation of empowered leaders.
https://www.executivecouncilnetwork.com/
About Wendy Howell
Follow Wendy Howell
CEO, Moderator
Executive Council Network
Laura Sillman
Vice President
Left Lane Capital
Laura Sillman is Vice President at Left Lane Capital, a venture capital and early growth equity firm that invests in high-growth internet and consumer technology businesses. At Left Lane, Laura focuses on fintech, real estate, healthcare & SMB software. Laura sourced & led investments including Bilt Rewards, Arc Technologies, Hnry, GHC, Masterworks, as well as other announced transactions.
Laura graduated from the Wharton School of Business at the University of Pennsylvania in 2020 with a MBA in Finance & Innovation. While at Wharton, Laura ran Rough Draft Ventures, General Catalyst’s student-led platform that invests in companies founded on campuses (undergrad through PHD). After graduating, Laura joined the firm full time, focusing on seed & pre-seed investments in the consumer space.
Before her time in venture capital, Laura was Director of Strategic Operations at Rumble Boxing, where she managed key growth initiatives from two studios through the sale of the business, which included launching the Training & Digital Platforms, supporting 3 successful fund raises totaling over $40M, and executing partnerships for the organization. Prior to this, Laura worked as a Senior Associate and Principal Investigator for Hangar Management, a startup studio that creates companies in markets driven by federal, state, and local government. In this role, Laura's primary responsibility was to design, execute, and manage the research efforts and business planning for seed stage companies. Laura began her career as an analyst at BlackRock, where she was responsible for developing investment strategies on behalf of large institutional clients.
Laura graduated Magna Cum Laude from the University of Michigan in 2014 with a BBA in finance & entrepreneurship.
https://www.leftlanecap.com/
About Laura Sillman
Follow Laura Sillman
Vice President
Left Lane Capital
Robin Sanders
Chief Sales Officer
Impellam Group
Robin’s experience of the contingent and external workforce industry spans over 20 years, starting as a recruiter and then spending over 9 years managing long-term client relationships for the largest global staffing provider. As the Chief Sales Officer at Impellam, Robin is responsible for leading strategy and growth including establishing new client relationships for North America. With each client’s specific challenges and goals in mind, Robin is trusted by our clients to help strategize and design external workforce programs to deliver talent in a better way. Robin is an industry leader and has spoken at several executive conferences including Sourcing Industry Group, ProcureCon, Contingent Workforce Summit hosted by Staffing Industry Analyst and many more. Her expertise includes Managed Services, Integrated Talent, Recruiting, Vendor Management Systems (VMS), Recruitment Process Outsourcing, Independent Contractors (1099) and Service Procurement (SOW) Management.
Robin has lived in Texas her entire life, graduated from Texas Tech University, she has 4 grown kids, and her husband has been an American Airlines pilot for over 25 years. Robin fought the battle of her life from 2016 to 2018 and is a PROUD breast cancer survivor. She now spends her personal time traveling the world, crocheting, volunteering and loves sitting outdoors enjoying a glass of red wine!
guidantglobal.com
About Robin Sanders
Follow Robin Sanders
Chief Sales Officer
Impellam Group
Susan Schnabel
Co-Managing Partner
aPriori Capital
Susan C. Schnabel, age 61, is the Co-Founder and Co-Managing Partner of aPriori Capital Partners LP, a private equity fund formed in connection with the spin-off of DLJ Merchant Banking Partners from Credit Suisse in 2014. Over the course of her 30+ year career she has served on over thirty public and private boards including the roles of Lead Director (NYSE), Audit, Compensation and Nominating & Governance Chair. Currently, Ms. Schnabel serves as a member of the Audit and Compensation Committees of the Board of Directors of Altice USA, Inc., (NASDAQ: ATUS) a US cable television and cellular services provider, since June 2021, and as the Chair of the Audit Committee of KKR Private Equity Conglomerate LLC (K-PEC) (SEC filer) and Kayne Anderson BDC, LLC (SEC filer) a closed-end debt fund, in addition to several privatecompanies. She formerly has served on the boards of Versum Materials (NYSE:VSM), Neiman Marcus, STR Holdings (NYSE:STRI), Rockwood Specialties (NYSE:ROC) and Shoppers Drug Mart (TO:SDM). Prior to forming aPriori Capital, Ms. Schnabel held a number of senior management positions of increasing responsibility and scope at Credit Suisse and Donaldson, Lufkin & Jenrette (DLJ). Ms. Schnabel alsoserved as Chief Financial Officer of PetSmart, Inc. (formerly NASDAQ:PETM), a retail chain engaged in the sale of pet animal products and services. Ms. Schnabel serves as a Trustee of Cornell University (Executive Committee, Nominating & Governance,and Investment Committee), and the US Olympic & Paralympic Foundation Board of Directors - Finance Committee. In addition, Ms. Schnabel recently completed her term as a member of the California Institute of Technology - Investment Committee and the Harvard Business School Alumni Advisory Board where sheserved on the Executive Committee. Ms. Schnabel earned her B.S. in Chemical Engineering from Cornell University and her MBA from Harvard Business School.
About Susan Schnabel
Follow Susan Schnabel
Co-Managing Partner
aPriori Capital
Jose Hernandez
Cloud Security Researcher
Lacework
Currently, Jose Enrique Hernandez is a Distinguished Cloud Threat Researcher at Laceworks. Previously he founded and lead the Threat Research team at Splunk (STRT). Jose is known for creating several security-related projects, including: Splunk Attack Range, Splunk Security Content, Git-Wild-Hunt, Melting-Cobalt, and LOLDrivers.io and Bootloaders.io projects. He also works as a maintainer of security industry critical repositories such as Atomic Red Team and LOLBAS
www.josehelps.com
About Jose Hernandez
Follow Jose Hernandez
Cloud Security Researcher
Lacework
Michael Haag
Principal Threat Researcher
Splunk
Michael Haag is a Principal Threat Researcher at Splunk. Michael has more than a decade of experience in security architecture and operations. His specialties include advanced threat hunting and investigations, atomic testing, and technological evaluations and detection engineering. Michaels is the co-founder of the Atomic Red Team (https://github.com/Atomics-on-A-Friday) project and co-host of Atomics on a Friday (https://www.youtube.com/@atomicsonafriday).
https://www.youtube.com/@atomicsonafriday
About Michael Haag
Follow Michael Haag
Principal Threat Researcher
Splunk
Jason Haddix
CISO and “Hacker in Charge”
BuddoBot Inc
Jason Haddix AKA jhaddix is the CISO and “Hacker in Charge” at BuddoBot, a world-class adversary emulation consultancy. He’s had a distinguished 15-year career in cybersecurity previously serving as the CISO of Ubisoft, Head of Trust/Security/Operations at Bugcrowd, Director of Penetration Testing at HP, and Lead Penetration Tester at Redspin. He has also held positions doing mobile penetration testing, network/infrastructure security assessments, and static analysis. Jason is a hacker, bug hunter and currently ranked 51st all-time on Bugcrowd’s leaderboards. Currently, he specializes in red teaming, recon, and web application analysis. Jason has also authored many talks on offensive security methodology, including speaking at cons such as DEFCON, BSides, BlackHat, RSA, OWASP, Nullcon, SANS, IANS, BruCon, Toorcon and many more.
https://buddobot.com/
About Jason Haddix
Follow Jason Haddix
CISO and “Hacker in Charge”
BuddoBot Inc
Daryan Dehghanpisheh
President and Founder
Protect AI
Prior to founding Protect AI with Mr. Swanson, D was the Global Leader for Artificial Intelligence and Machine Learning Solution Architects, under Mr. Swanson. His team was responsible for customer facing engineering resources that helped the AI/ML business of AWS become the largest AI/ML business in the world. Prior to Amazon, D was Sr. Vice President of Digital Strategy at Howard Hughes Corporation where D built an industry leading AI platform to price and model economics of illiquid assets using advanced ML techniques in 2015. Previous experiences included Sr. Vice President and Managing Director of Technology and Data Products at NYSE, which was acquired by ICE in May 2013. Prior to NYSE, D was at Intel Corporation for over 12 years where his roles included building the first financial services vertical team and delivering over $1B of annual revenue contribution from the group, Chief of Staff and Technical Advisor to the global sales and marketing organization, and a variety of other responsibilities.
protectai.com
About Daryan Dehghanpisheh
Follow Daryan Dehghanpisheh
President and Founder
Protect AI
Seth Law
Principal Consultant
Redpoint Security, Inc.
Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. Seth is the founder and principal of Redpoint Security, hosts the Absolute AppSec podcast with Ken Johnson, and is a regular speaker at developer meetups and security events, including Blackhat, Defcon, CactusCon, and other regional conferences.
https://redpointsecurity.com
About Seth Law
Follow Seth Law
Principal Consultant
Redpoint Security, Inc.
Vivek Ramachandran
Founder and CEO
SquareX
Vivek Ramachandran has been researching cybersecurity for the past two decades. He has spoken-trained at the top hacker conferences in the world like DEFCON and Blackhat and authored five-star rated books on practical Wi-Fi security and pentesting which have sold thousands of copies worldwide and have been translated into multiple languages.
He discovered the Caffe Latte attack, broke WEP Cloaking, and created Chellam (Wi-Fi Firewall), WiMonitor Enterprise (802.11ac monitoring), Chigula (Wi-Fi traffic analysis via SQL), and other tools. Vivek’s work on wireless security (Caffe Latte attack) has been quoted in BBC Online, InfoWorld, MacWorld, The Register, IT World Canada, and others. He was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He has also published multiple research papers in the field of DDoS, ARP Spoofing Detection, and Anomaly-based Intrusion Detection Systems.
Vivek is currently the Founder, and CEO of SquareX and is best known for being the founder of Pentester Academy (acquired in 2021) which has helped train thousands of customers from government agencies, Fortune 500 companies, and smaller enterprises from over 100 countries. He also created SecurityTube.net in 2008 which was a YouTube for cybersecurity content.
Vivek also created and conceptualized VRN Comics’ “Hackers: Superheroes of the Digital Age” which blends real-world hacks with a thrilling story in an attempt to explore the often-misunderstood world of Hackers and Hacking.
https://sqrx.com/
About Vivek Ramachandran
Follow Vivek Ramachandran
Founder and CEO
SquareX
Shourya Pratap Singh
Principal Engineer
SquareX
Shourya Pratap Singh is Principal Engineer at SquareX. His work primarily focuses on understanding and addressing browser vulnerabilities, enhancing the security features of browser extensions, and providing solutions to combat browser fingerprinting. He leads the team responsible for building SquareX’s secure and privacy-focused extension. Beyond this, he holds a pivotal role in making decisive choices concerning customer privacy and security, ensuring protection across every product and feature in SquareX.
https://sqrx.com/
About Shourya Pratap Singh
Follow Shourya Pratap Singh
Principal Engineer
SquareX
Dan Gunter
CEO & Founder
Insane Forensics
Dan Gunter is the founder and CEO of Insane Forensics, a digital forensics automation software and services company helping industrial asset owners protect critical operations. Before Insane Forensics, Dan served as Director, Research and Development for Dragos Inc, an industrial control system cybersecurity firm, and served in the United States Air Force. Dan earned a bachelor of science in computer science from Baylor University, a master of science in computer science from the University of Louisville, and a graduate certificate in incident response from SANS Technology Institute. Dan has spoken at Blackhat, Schmoocon, S4, and CS3STHLM, and taught at private events on the topics of incident response, threat hunting, consequence analysis, and security operations.
www.insaneforensics.com
About Dan Gunter
Follow Dan Gunter
CEO & Founder
Insane Forensics
Caleb Mathis
Industrial Cybersecurity Consultant
Ampere Industrial Security
Caleb Mathis is an accomplished Cybersecurity and Process Engineering Specialist, with a niche focus on the energy and oil and gas sectors. Currently an independent consultant, he brings a unique amalgamation of technical skills and industry-specific knowledge to offer tailored solutions for his clients.
Mathis' professional journey began in the energy sector, where he served as a Chemical Engineer at Exxon and Chevron. He worked across refinery and offshore oil rig operations, specializing in control logic development and auditing, hazard operations, capital project management, and control system design. His work in these fields highlighted the intricate complexities and unique compliance needs of the industry.
Seeking to incorporate an extra layer of cybersecurity to his portfolio, he transitioned to the Tennessee Valley Authority. Here, he intertwined his engineering expertise with cybersecurity practices, conducting architecture reviews, coordinating cyber incident response processes, and correlating operational states with potential cyber events. This role significantly elevated his understanding of industry-specific protocols and system vulnerabilities.
At Dragos, Inc., he held the position of Principle Researcher supporting the suite of provided service engagement types. His duties entailed control system and protocol research, all the while leveraging his background in process engineering and cybersecurity for engagement scoping and optimization. His time in this role further expanded his understanding of the interplay between physical and digital security within the energy sector.
Furthermore, Mathis has had hands-on experience teaching a wireless penetration testing class at STAG. He also served for two years as a content engineer, focusing on the automation of pcap dissection to compliance mappings using golang at the industrial startup, Synsaber.
Caleb's unique blend of industry-specific experience and technical acumen enables him to address and anticipate the unique compliance needs of energy and oil and gas sector clients. He brings a proactive, research-driven approach to identify and mitigate vulnerabilities, providing comprehensive and customized cybersecurity strategies.
www.insaneforensics.com
About Caleb Mathis
Follow Caleb Mathis
Industrial Cybersecurity Consultant
Ampere Industrial Security
Don Slife
Enterprise Customer Success Manager
Splunk
Don's first exposure to what was then called Information Operations was in the Advanced Programs Directorate at the Air Force Information Warfare Center (AFWIC) at Kelly AFB, Texas, in the 90s and early 2000s. After ten years serving in the Air Force, he worked in various defense contractor positions across the CNO/CNA/CND spectrum, including training, red team, counter anti-tamper, and culminating with a position as the Deputy Program Manager and SOC Chief for the US Senate. He now uses his extensive technology and cyber experience across the offensive and defensive landscape to help Splunk customers get the most value from their investments in people, processes, and technology.
https://www.splunk.com/
About Don Slife
Follow Don Slife
Enterprise Customer Success Manager
Splunk
Leo Cruz
Specialist
Cisco
In order to threat hunt, in order to create threat intelligence, one must first identify the what before the where, the where, before the why, the why before the who, and then you’ll know who attacked you…maybe ??
About Leo Cruz
Follow Leo Cruz
Specialist
Cisco
Tim Bank
Lead Developer Advocate
Dell Technologies
Tim’s tech career spans over 25 years through various sectors. Tim’s initial journey into tech started in avionics in the US Marine Corps and then into various government contracting roles. After moving to the private sector, Tim worked both in large corporate environments and in small startups, honing his skills in systems administration, automation, architecture, and operations for large cloud-based datastores.
Today, Tim leverages his years in operations, DevOps, and Site Reliability Engineering to advise and consult with the open source and cloud computing communities in his current role. Tim is also a competitive Brazilian Jiu-Jitsu practitioner. He is the 2-time American National and is the 5-time Pan American Brazilian Jiu-Jitsu champion in his division.
About Tim Bank
Follow Tim Bank
Lead Developer Advocate
Dell Technologies
Robert Grubbs
Site Lead - Intelligence and Operations
Idaho National Lab
Robert Grubbs has 20 years in cybersecurity, cyber intelligence and counterintelligence, supporting the US government and large financial firms, and has experience in a variety of "INT's", specializing in HUMINT and OSINT. Robert is currently the on-site lead for Idaho National Lab's (INL) support to DHS CISA's Threat Hunting branch. He specializes in being technical enough to understand the really smart tech people said, and well-spoken enough to translate to the non-technical decision makers.
Robert believes strongly in the US government's role in community outreach and is a frequent speaker at conferences aimed towards the state, local, tribal and territorial (SLTT) sector and colleges and universities. He got his start in government through an internship with the State Dept and is passionate about mentoring and reaching out to the next generation of cyber talent.
Robert works at a brewery part-time to turn a hobby into a side hustle, is a proud Virginia Tech alum (Go Hokies!) and when he isn't working he's usually plotting how to steal people's dogs to play with his own pup Kacey.
https://inl.gov/
About Robert Grubbs
Follow Robert Grubbs
Site Lead - Intelligence and Operations
Idaho National Lab
Tim is the CEO of Red Siege, an information security company focused on penetration testing and to help organizations identify and prioritize security initiatives. Tim is a Senior Instructor and course author (SEC560) at SANS. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. Tim has gained information security experience in a variety of industries including previous positions in control systems, higher education, financial services, and manufacturing. Tim is an experienced international speaker, having presented to organizations around the world. Tim is the creator of the Kerberoasting, a widely utilized Red Team penetration test technique to extract kerberos tickets in order to offline attack the password of enterprise service accounts.
RedSiege.com
About Tim Medin
Follow Tim Medin
CEO
Red Siege
Samantha Domingo, MBA
Staff, Critical Programs Talent Strategist / President
Lockheed Martin Space / The KEY Community
Samantha Domingo, MBA is a Staff, Critical Programs Talent Strategist at Lockheed Martin Space, President for The KEY Community & the cofounder of #MilCityMeetup/#LinkedinMilCity.
Samantha is a proud Air Force Veteran Spouse of 17 years. She spent her childhood overseas as a military brat in countries like Germany, England, Japan & Saudi Arabia. Her passion to serve is shared with her Veteran husband & the CEO/Founder of The KEY Community, Rey Domingo.
With 10+ years of experience in Talent Acquisitions, Human Resources & Program development she is a recognized leader specializing in Military, Cleared & Technical Recruiting/Sourcing, Event Management & Program development within the Tech, Banking/Financial & Aerospace and Defense Industries. She has recruited, sourced &/or built military talent strategies, initiatives & programs for companies like USAA, Rackspace Technology, Amazon Web Services, Twitter & now Lockheed Martin Space.
Samantha’s dedication to competitive employment for the military community has led to 200+ speaking engagements, panels, events & the receipt of multiple awards, to include the prestigious Hiring Our Heroes Military Spouse Volunteer Impact Award, We are the Mighty - Mighty 25: Influential People Supporting the Military Community, Amazon’s Military Spouse Icon Award & the JS Foundations 2023 Veteran Volunteer Award.
https://www.thekeycommunity.org/
About Samantha Domingo, MBA
Follow Samantha Domingo, MBA
Staff, Critical Programs Talent Strategist / President
Lockheed Martin Space / The KEY Community
Rey Domingo
CEO
The KEY Community
Rey Domingo is the CEO for The KEY Community. The KEY Community is the umbrella for six pillars.
1. The KEY Mentor Group are selected mentors from corporate companies, non profit organizations, entrepreneurs, ranging from CEO to entry level. We currently have over 250+ mentors that have been interviewed and selected.
2. The KEY Social are in person networking events held in different cities and states. This is an opportunity for job seekers, employers, mentors and mentees, to meet each other. During these in person events, we have a panel of KEY Mentos that share their story.
3. The KEY Wellness & Healing are licensed professionals that hold 3-5 virtual events for our Military Veterans, Mil/Vet Spouses, Military Dependents and First Responders.
4. The KEY Events are events that are held virtually and in person; conferences, job fairs, workshops, presentations and panels.
5. The KEY Sourcing are experienced Sourcers and Recruiters that are partnered with companies to help them find the talent they need.
6. The KEY Consulting are experienced professionals that consult companies on how to build their Military Programs, Mil/Vet Spouse Programs, how to build ERG, process improvements and many more.
Rey is also the cofounder of #MilCityMeetup/#LinkedInMilCity, a grass root in person event. This December 2023 will be the 5th year anniversary. Events are held across San Antonio and surrounding areas.
Rey retired from Air Force back in 2015. He started as Security Forces, then cross trained into Interior Electrician and was accepted into Air Force Recruiting Service, where he ended his last 12 years. After a difficult transition to the civilian workforce, he didn’t want to see others endure the same. Rey has dedicated his post-military career to educating, elevating and advocating for transitioning military, Veterans & Military Spouses.
After retiring from the Air Force, he had the opportunity to work for companies as a contractor and full time employee within Talent Acquisition, globally, as a leader, recruiter and sourcer. The experience he now has from Wyndham Vacation Ownership, USAA, Boeing/NASA, Manpower Group (Elbit Systems of America, Gulfstream Aerospace, M7 Aerospace and KMC Systems), Experis IT (Accenture, HP and JP Morgan Chase), F5 Networks, Lockheed Martin and M&T Bank.
https://www.thekeycommunity.org/
About Rey Domingo
Follow Rey Domingo
CEO
The KEY Community
Laurie Pimentel-Johnson
Chief of Staff
The KEY Community
Laurie Pimentel-Johnson is an Army veteran where she served 11 years of honorable service as a Human Resources Specialist. As she was attending Grand Canyon University in pursuit of her Bachelors degree in Applied Management she served as a Work Study for Texas Veterans Commission assigned to the Family Career Advisor, where she assisted family members with employment readiness. She began her career with Texas Veterans Commission (TVC) in March of 2015 as a Veterans Career Advisor, assigned to the Walzem American Job Center in San Antonio. She graduated from GCU in 2017.
As a Veterans Career Advisor her dedication and passion to assist veterans was relevant in her day to day performance and she set the example for the team to emulate. She enjoys being part of the team and ensuring that the TVC mission for VES is accomplished and often was the first to volunteer for events and was always willing to help assist a team member. Her performance was recognized in June 2019 when she received the Disabled American Veteran’s (DAV) Disabled Veterans Outreach Program Specialist Award.
She is currently working for Texas Veterans Commission and is serving as the South Texas District Outreach Coordinator as of January 15th, 2020. Where she performs a vital role in the community of San Antonio, also known as Military City USA, and other assigned areas to South Texas District, informing community partners and organizations of TVC’s role in advocating for veterans and their families in the state of Texas ensuring that they receive the benefits they are entitled to.
She truly enjoys assisting and informing veterans of their benefits, assisting with employment readiness, and volunteering with organizations in her community. She places the best interest of the veteran and listens to the veterans and their needs and is always ready to assist with contact information or pointing them in the direction to attain assistance. She holds a high level of integrity and work ethic in customer service.
She also serves as Chief of Staff for The KEY Community, the Volunteer Manager for MilCity MeetUp, and also volunteers with The Mission Continues San Antonio Service Platoon.
https://www.thekeycommunity.org/
About Laurie Pimentel-Johnson
Follow Laurie Pimentel-Johnson
Chief of Staff
The KEY Community
Moses Frost
Red Team Operator
Neuvik
Moses Frost is a Red Team Operator at Neuvik, author of Grey Hat Hacking, 6th addition, and Author and Senior Instructor for the SANS Institute. Moses has been focused on Red Team operations for over a decade and has developed Cloud Penetration Courses and Advanced Web Application Penetration Testing courses. Moses has worked at Cisco, Mcafee, Several Enterprise Organizations, and Startups.
About Moses Frost
Follow Moses Frost
Red Team Operator
Neuvik
Georgia Weidman
Security Architect
Zimperium
About Georgia Weidman
Follow Georgia Weidman
Security Architect
Zimperium
Dean Webb
Cybersecurity Architect
Merlin cyber
Dean Webb is a cybersecurity expert with Merlin Cyber, where he advises on cybersecurity architecture and solutions. He is a contributing editor to the weekly Merlin Cybersecurity Newsletter and, in his spare time, enjoys participating as a contributor and moderator at Networking-Forums.com. He is also a volunteer DJ on KNON 89.3FM in Dallas, where he spins classic rock and soul from the 50s and 60s.
www.merlincyber.com
About Dean Webb
Follow Dean Webb
Cybersecurity Architect
Merlin cyber
Ben Opel
Director, Security Operation Services
Ascent Solutions
Benjamin Opel is Ascent’s Director of Security Operations Services. Ben directed professional services for his previous firm, AttackIQ, built and led multiple teams of specialized cybersecurity technicians as part of the Department of Defense’s initial Defensive Cyberspace Operations buildout, and served for a total of 12 years in the United States Marine Corps.
Ben earned an information technology degree from the United Sates Naval Academy and is currently pursuing a masters’ degree in information security engineering from the SANS Technology Institute. He also earned numerous certifications from various accreditation bodies. He lives in Wisconsin with his wife and two children.
www.meetascent.com
About Ben Opel
Follow Ben Opel
Director, Security Operation Services
Ascent Solutions
Lisa Jones-Huff
Senior Director of Global Security Specialists
Elastic
Lisa Jones Huff is a Senior Director of Global Security Specialists, Solutions Architects at Elastic. Lisa takes a consultative approach to engaging with customers to identify and address their ongoing security challenges based on their existing investments in technology. This approach allows Lisa to spend time with customers to identify ways of providing Enterprise Visibility into the entities that exist (users and assets) within the organizations. This provides customers with more information to make informed decisions about potential cyber threats that may be targeting entities within their organization. Lisa has been focusing on Cyber Security for over 20 years and has worked with some of the largest organizations to help them stay ahead of targeted threats.
https://www.elastic.co
About Lisa Jones-Huff
Follow Lisa Jones-Huff
Senior Director of Global Security Specialists
Elastic
Jared Quinn
Joint Cybersecurity Operations Lead
FBI
Jared Quinn is a senior leader in cyber at the FBI, with over a decade in cybersecurity experience both with the FBI and beyond - with organizations such as the Department of State and the NSA.
About Jared Quinn
Follow Jared Quinn
Joint Cybersecurity Operations Lead
FBI
Danny Cohen
Head of STEM, Moderator
Impellam, North America
With over 20 years of experience in the STEM staffing sector, Danny brings a wealth of expertise in delivering staffing business growth in North America, Benelux, and France. Danny drives strategy across the Impellam Group STEM portfolio, including the Lorien, SRG, and Bartech divisions in North America.
As a champion for equity, diversity, and inclusion (ED&I), Danny is passionate about giving back to the communities in which we work and leverages his know-how and resources to build ethical pathways for creating strong candidate communities and networks. Notably, he is the founder of the STEM Council for Good (https://www.impellam.com/about-us/community/stem-council-for-good), an organization established to help create pathways for everyone considering a career in STEM.
Danny is Co-Chair of both the 50/50 Women on Boards (https://5050wob.com/) in Austin and part of the US Boards committee, and the?San Diego Tech Hub (https://sandiegotechhub.com/), a partnership to help under-served and under-represented communities get jobs in technology. Danny also holds board seats on WICT Rocky Mountain Chapter (https://www.wict.org/organizer/wict-rocky-mountain-chapter/) as Director of Mentoring and WICT Greater Texas Chapter (https://www.wict.org/texas-chapter/) as Director of DEI, empowering women in Media, Entertainment and Technology. Danny also serves on the committee of the Texas Cyber Summit which has a vision to increase the number of persons of all demographics entering the cybersecurity field.
Danny was recently voted Top Staffing Leaders to Watch (https://www.candidate.ly/staffing-leaders-to-watch-in-2023/danny-cohen) by Candidate.ly, 40 under 40 (http://40under40.staffingindustry.com/danny-cohen/) by Staffing Industry Analysts, and a top ED&I Influencer (http://dei.staffingindustry.com/honoree/danny-cohen/) in North America.
www.impellam.com
About Danny Cohen
Follow Danny Cohen
Head of STEM, Moderator
Impellam, North America