PhD Candidate, UCSB
Yanick Fratantonio is a Ph.D. candidate in Computer Science at the University of California, Santa Barbara, and he is soon going to join EURECOM as an Assistant Professor. His research focuses on the security and privacy of mobile systems, such as Android. His work spans different areas, such as malware detection, vulnerability analysis, characterization of emerging threats, and the development of novel practical protection mechanisms. Recent projects I was involved with include Cloak & Dagger (Android UI attacks), ultrasound cross-device tracking, and Drammer. In his free time, he enjoys playing and organizing Capture The Flag competitions with the Shellphish hacking team. On twitter, he is @reyammer.
STM, Cyber Security & Big Data Research & Development Group Manager
Distinguished Professor, Penn State
Patrick McDaniel is a Distinguished Professor in the School of Electrical Engineering and Computer Science and Director of the Institute for Networking and Security Research at the Pennsylvania State University. Professor McDaniel is a Fellow of the IEEE and ACM and program manager and lead scientist for the Army Research Laboratory's Cyber-Security Collaborative Research Alliance. Patrick’s research centrally focuses on a wide range of topics in security and technical public policy. Prior to joining Penn State in 2004, he was a senior research staff member at AT&T Labs-Research.
Anti-Abuse Engineer, Facebook
David Freeman is a research scientist/engineer at Facebook working on spam and abuse problems. He previously led anti-abuse engineering and data science teams at LinkedIn, where he built statistical models to detect fraud and abuse and worked with the larger machine learning community at LinkedIn to build scalable modeling and scoring infrastructure. He is an author, presenter, and organizer at international conferences on machine learning and security, such as NDSS, WWW and AISec, and is currently writing (with Clarence Chio) a book on Machine Learning and Security to be published by O'Reilly. He holds a Ph.D. in mathematics from UC Berkeley and did postdoctoral research in cryptography and security at CWI and Stanford University.
Technology Fellow, Stanford
Joseph is a researcher at the Applied Crypto Group at Stanford University and a Technology Fellow at the Electronic Frontier Foundation. His research has spanned a variety of topics in cryptography and security including HTTPS and web security, passwords and authentication, cryptocurrencies, end-to-end encrypted communication tools, and side-channel cryptanalysis. He holds a PhD from the University of Cambridge and BS and MS degrees in computer science and cryptography from Stanford University. He has previously worked as a researcher at Princeton University and as engineer at Google, Yahoo! and Cryptography Research, Inc.
Director Biz Dev, AppGuard
Jinan Jaber is the EVP of Cybersecurity and Strategy of Telo Consulting. Mrs. Jaber has over 16 years of progressive cybersecurity and leadership experience. She is a frequent participant at national conferences, as a cyber thought leader and subject-matter expert. Jinan has extensive knowledge of advanced cyber attacks and threat actors’ techniques, tactics and procedures (TTPs). She has broad experience across security disciplines, including cybersecurity and emerging threats, mobile application security, fraud protection and behavioral analysis, deep and dark web intelligence, phishing, reputation management and brand protection, and insider threat protection. The spectrum of her experience and her applied focus give her a unique insight into the issues that can plague the operationalization of cybersecurity and threat intelligence initiatives. Jinan holds a Masters of Business Administration degree from George Mason University.
Google PhD Fellow in Security, Penn State
Nicolas Papernot is a PhD student in Computer Science and Engineering advised by Dr. Patrick McDaniel at the Pennsylvania State University. His research interests lie at the intersection of computer security and deep learning. He is supported by a Google PhD Fellowship in Security. In 2016, he received his MS in Computer Science and Engineering from the Pennsylvania State University and his MS in Engineering Sciences from the École Centrale de Lyon.
Robert M. Lee
Founder & CEO, Dragos Inc.
Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode’s Influencers, awarded EnergySec’s Cyber Security Professional of the Year (2015), and inducted into Forbes’ 30 under 30 for Enterprise Technology (2016). A passionate educator, Robert is the course author of SANS ICS515 – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of SANS FOR578 – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification. Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission. He may be found on Twitter @RobertMLee
CTO, CounterTack Inc
Michael A. Davis has been privileged to help shape and educate the global community on the evolution of IT security. His portfolio of clients includes international corporations such as AT&T, Sears, and Exelon as well as the U.S. Department of Defense. Davis’ early embrace of entrepreneurship earned him a spot on BusinessWeek’s “Top 25 under 25” list, recognizing his launch of IT security consulting firm Savid Technologies, which was recognized as one of the fastest growing companies of its decade. He has a passion for educating others and as a contributing author for the “Hacking Exposed” books, has become a keynote speaker at dozens of conferences and symposiums worldwide. Most recently, Davis has served as CTO of CounterTack, provider of an endpoint security platform delivering real-time cyber threat detection and forensics. He chose to join the company because he recognized that the battle is moving to the endpoint, and that conventional IT security technologies can’t protect enterprises. Rather, he saw a need to deliver to the community continuous attack monitoring backed by automated threat analysis. Davis brings a solid background in IT threat assessment and protection to his latest posting, having been Senior Manager Global Threats for McAfee prior to launching Savid, which was acquired by External IT. Aside from his work advancing cyber security, Davis authors through industry publications including InformationWeek and Dark Reading. Additionally, he has been a partner in a number of diverse entrepreneurial startups; held a leadership position at 3com; managed two Internet service providers; and recently served as President/CEO of the InClaro Group, a firm providing information security advisory and consulting services based on a unique risk assessment methodology. Davis' ability to analyze, translate, and make connections among emerging IT and security trends combined with a business and entrepreneurial mindset make him a popular speaker — he strives to present complex concepts in a way that delivers value to a range of listeners. He regularly presents at industry conferences including Black Hat, Interop, SuperStrategies, and InfoSecWorld. His long-term vision, to create systems that will “push defenders ahead of attackers,” is relevant to a wide array of enterprise, government and vertical-industry stakeholders.
Founder & CEO, RB Advisory LLC
Regine Bonneau is a leading expert on cyber security, risk management and compliance. Her career spans 20 years with a focus on technology and processes in the healthcare, financial and energy sectors. Ms. Bonneau is the Founder of RB Advisory LLC, which provides cyber risk management, security assessments, compliance services, forensic audits and privacy consultations for private sector and government clients. She is a sought after speaker and holds leadership roles in several technology industry associations. Ms. Bonneau has been featured in the Orlando Sentinel, the Orlando Business Journal and other prominent publications. Areas of expertise: Risk management, Cyber Risk Management, compliance, cyber security, systems and technology, product development, anti-money laundering (AML) risk and control, business continuity, training and education.
Vinod Vasudevan is the co-founder and CTO of Paladion. He has over 20 years of experience in the technology and information risk management domain. He is responsible for establishing the company’s technology and services vision, and leading all aspects of the company’s technology development. As the CTO at Paladion, Vinod has serviced large enterprise organizations across the globe for setting up integrated risk management systems, and for streamlining system based operations. Vinod regularly presents in leading global cyber security forums and conferences. He sits on the expert panel of industry consortiums. He is the lead author of the book “Application Security in the ISO 27001 Environment” from IT Governance, UK. Vinod is also the co-author of “Enhancing Computer Security with Smart Technology” published by Auerbach. He is a CISSP.
Assistant Prof, U of Maryland
Tudor Dumitraș is a professor in the Electrical & Computer Engineering Department at the University of Maryland, College Park. His research is in the area of data-driven security: he conducts empirical studies of adversary behavior, he builds machine learning systems for detecting malware and attacks, and he investigates the security of machine learning in adversarial environments. He also has a good knowledge of the security industry, having worked for 2.5 years at Symantec Research Labs. In his most cited paper he measured how long zero-day attacks go on undiscovered in the wild. His research has been widely cited in the media, for example in The Economist, the MIT Technology Review, Forbes, and The Register.
VP, Engineering, DataVisor Inc
David Ting is the vice president of engineering at DataVisor, an innovator in Big Data analytics for financial fraud and anti-money laundering, which utilizes unsupervised machine learning to identify attack campaigns. Prior to DataVisor, he was the VP of Engineering at CARDFREE, where he worked on mobile payment solutions that power three out of the top 10 Food and Beverage apps. He was also previously General Manager of North America for NetEase, and General Manager and SVP of eSports for IGN, which was acquired by Blizzard Entertainment in 2013. He is a big believer in innovation design culture that drives solution that pushes the imagination on scale, simplicity, maintainability and time-to-market. David has rich domain expertise in mobile, gaming, eCommerce, streaming media and payment. He received his Bachelor of Science in Electrical Engineering from UCLA and worked on his advanced degree in Computer Science at Stanford University.
Candan Bolukbas is digital polymath and Certified Ethical Hacker. Candan fully appreciates the growing threat to digital communications and data accumulation which affects all of us. He is co-founder and chief technology officer for NormShield, Inc., a McLean-based “security-as-a-service solutions” company. Candan and NormShield’s primary focus is on cyber threat intelligence, vulnerability management and perimeter monitoring. Candan is responsible for the technical direction and innovation of NormShield products. Besides being a certified Ethical Hacker, he is a certified secure programmer, certified incident handler and a certified computer hacking forensic investigator. He has more than ten years of experience working with data protection and information security standards and technologies including business continuity, data-loss protection, data privacy, disaster recovery, encryption, enterprise architecture, firewalls, intrusion detection and prevention systems, penetration testing, physical security, security event management and vulnerability scanning. Candan has a BS degree in Computer Engineering and he has been developing security products, performing penetration testing & forensic analysis, and providing cyber security training. Certifications: CCNA, CCNP, CHFI, ECSP, MCSA, ECIH, CEH, LPT. Candan worked for both public and private sectors for many years and strong supporter of human rights, freedom and privacy.
Software Engineer, Google Chrome
Eric Lawrence (@ericlaw) is a Software Engineer on the Google Chrome Security team, helping bring HTTPS to every site on the web. Prior to Google, Eric spent a decade building browsers and websites for Microsoft, and was best known as the original developer of the Fiddler web debugging platform. Eric blogs about security and software development at https://textslashplain.com/.
Founder & CEO, SparkCognition
Amir Husain, recognized as Austin’s Top Technology Entrepreneur of the Year and one of Onalytica’s Top 100 global Artificial Intelligence influencers, is a serial entrepreneur and inventor with more than 50 filed patents. He is the founder and chief executive officer of SparkCognition, an award-winning machine-learning/AI-driven cognitive analytics company. He is the author of the upcoming book, The Sentient Machine, to be published by Simon & Schuster.
Assistant Professor, Purdue
Mathias Payer is a security researcher and an assistant professor in computer science at Purdue university leading the HexHive group. His interests are related to system security, binary exploitation, user-space software-based fault isolation, binary translation/recompilation, and (application) virtualization. His research focuses on protecting applications even in the presence of vulnerabilities, with a focus on memory corruption. Before joining Purdue in 2014 he spent two years as PostDoc in Dawn Song's BitBlaze group at UC Berkeley. He graduated from ETH Zurich with a Dr. sc. ETH in 2012. The topic of his thesis is related to low-level binary translation and security. He analyzed different exploit techniques and wondered how we can enforce integrity for a subset of data (e.g., code pointers). All prototype implementations are open-source. In 2014, he started the b01lers Purdue CTF team. Some of his random ramblings on security-related topics are published on a security blog . You can find his publications under Publications or on Google scholar .
Assistant Research Professor, IMDEA
Juan Caballero is an Associate Research Professor at the IMDEA Software Institute in Madrid, Spain. His research focuses on security issues in systems, software, and networks. One of his focus is the analysis of malware and cyberattacks. He received his Ph.D. in Electrical and Computer Engineering from Carnegie Mellon University, USA and was a visiting student researcher at University of California, Berkeley for two years. His research regularly appears at top security venues and has won two best paper awards at the USENIX Security Symposium and the DIMVA Most Influential Paper 2009-2013 award. He is an Associate Editor for ACM Transactions on Privacy and Security (TOPS). He has been in the technical committee of venues such as IEEE S&P, ACM CCS, USENIX Security, NDSS, WWW, RAID, and DIMVA. He has been program chair or co-chair for the Annual Computer Security Applications Conference (ACSAC, 2017), the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA, 2016), the Digital Forensics Research Symposium (DFRWS, 2014 & 2013), the European Workshop on Systems Security (EuroSec, 2015 & 2014) and the International Symposium on Engineering Secure Software and Systems (ESSoS, 2015 & 2016).
SVP Engineering, Silent Circle
David Puron is a telecommunications engineer, serial entrepreneur and maker, with more than 20 years of experience working with technology. He started his career as software developer and international standards delegate in the telco carrier Telefonica, where he had a rapid promotion getting to be the Open Mobile Alliance Requirements Group Chairman for two years. He jumped in 2009 to the device manufacturer side, working in big companies - such as Huawei - and startups - such as Geeksphone. In 2014, David co-founded the joint venture "Blackphone", the first privacy oriented mobile device manufacturer that won the TIME Magazine's Best 25 Inventions of 2014, Best of MWC 2014 Award by PC Magazine and Top 10 Breakthrough Technologies 2014 by MIT Technology Review among other awards. In the recent years, David has become more and more active in the Internet of Things ecosystem, and currently he is running TipTap Labs as Managing Director and CTO. TipTap Labs is a software development company specialized in secure connected devices, including IoT, wearables and smartphones.
Co-Founder & CTO, SafeBreach
Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA, CCC and H2HC. Prior to founding SafeBreach, Itzik served as CTO at Security-Art, an information security consulting firm, and before that he was SOC Team Leader at Radware. (NASDQ: RDWR).
Mr. Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a 45 year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Since the beginning of Mr. Schober’s BVS tenure in 1989, the company’s product line of wireless test and security instruments has increased to over 100 products with a core focus on Wi-Fi, Cellular, WiMAX, LTE, IoT and advanced radio devices. As an experienced software engineer, Schober has developed cellular test instruments used for measuring, optimizing and plotting signal coverage, primarily for the initial cellular build-out throughout the United States. Scott’s recent focus has been development (patent pending) of BVS’ cell phone detection tools, used to enforce a ‘no cell phone policy’ in various markets including government, corporate, military, educational, correctional and law enforcement. Thousands of these security tools have been deployed throughout every state in the U.S. and around the world. Mr. Schober is a highly sought after subject expert on the topic of Cybersecurity and wireless technology for media appearances and commentary. He is often seen on ABC News, Bloomberg TV, Al Jazeera America, CBS This Morning News, CGTN America, CNBC, CNN, Fox Business, Fox News, Good Morning America, Inside Edition, MSNBC and many more. His security advice is heard on dozens of radio stations such as National Public Radio, Sirius XM Radio, Bloomberg Radio, and The Peggy Smedley Show. He regularly presents at conferences around the globe discussing wireless technology and its role in the current Cybersecurity breaches along with his vision for best practices to stay safe in the future. Scott has been interviewed in WSJ, Forbes, Fortune, Success, NY Daily News, Newsweek, USA Today, and The New York Times. Scott educates all business around the world about how to prepare for a future of Cybersecurity and corporate espionage, opening their eyes to this ever deepening black hole of liability. He has spoken at SecureWorld, ShowMeCon, GovSec, Counter Terror expo, ISS Americas, Espionage Research International, Connected World, ConstrucTech, IEEE and GSM World Congress as well as many business events. Mr. Schober was a VIP attendee at two Concordia Summits both held in New York and was selected to appear in an interview discussing national security. He is a regular contributor on Huffington Post, Fortune Magazine, and blogs for IBM, SecureWorld, HP’s Business Value Exchange, and TripWire’s State of Security. Scott Schober, Pres/CEO of BVS, Author, cyber security expert @ScottBVS www.ScottSchober.com
CIO, Portage County
Brian Kelley is in his 27th year at Portage County where he has served in the capacity of Chief Information Officer for the past 26 years. He is responsible for the County’s enterprise-wide information technology operations spanning 18 elected officials, over 30 departments, and 700+ users. Under his leadership, Portage County has received international, national, state, and regional recognition for highly successful enterprise-wide IT projects. Brian earned his Master of Public Administration Degree from Kent State University. He completed the Certified Government Chief Information Officer Program at the University of North Carolina at Chapel Hill. Brian is an adjunct professor in the Political Science Departments at Kent State University where he teaches a public sector IT management , e-governance, and strategic planning online graduate courses and undergraduate police role and interviewing course in Sociology. He is also a senior lecturer at the University of Akron where he teaches an undergraduate course in computer and information security. Brian spent fifteen years as a commissioned special deputy sheriff at Portage County, OH, and performed computer forensics and conducted cyber-related investigations. He is currently sector chief for higher education with the Northeast Ohio InfraGard Chapter sponsored by the FBI and he is a member of the Cleveland Electronic Crimes Taskforce sponsored by the Secret Service.
Sr Threat Research Analyst, Webroot
Tyler Moffitt is a Senior Threat Research Analyst with Webroot, Inc. He has been with Webroot since 2010 working as a key member of the Threat Research team, immersed deep within the world of malware. Tyler is focused on improving the customer experience through his work directly with malware samples, creating antimalware intelligence, writing blogs, speaking at conferences, and testing in-house tools. Tyler has a passion for hands on learning as he spends his time gathering samples from the wild to test and improve Webroot capabilities to handle the latest malware threats.
Insider Threat Analyst, Dtex Systems
Katie is a seasoned cyber investigator and insider threat specialist, applying a unique blend of public and private sector experience to her work. Conducting threat assessments through in-depth analysis of user activities, Katie communicates the observed threats to a client’s information security posture; reporting the weaknesses in their information security measures and user practices warranting further investigation. A client portfolio spanning EMEA provides an expert understanding of corporate cultures, legislation and culpability, insider threat maturity, risk appetite acceptance anomalies within companies and the challenges faced at board level. Katie is a qualified OSINT practitioner, certified ‘human hacker’, a Maltego CTF champion and a Women in Cyber advocate. Leisure activities include running, yoga and Egyptology.
VP of Development, Mkacyber
Julia Ellefson has over 17 years of software development experience in variety of industries, with nearly a decade of experience in development for the cybersecurity industry. Ms. Ellefson currently serves as Vice President of Development at MKACyber where she is responsible for leading the development of MKACyber technologies. Previously Ms. Ellefson worked at Concept Solutions leading the development of an enterprise level cyber-focused Incident Management system for a Federal client. Her work ranged from designing, coding, testing, and implementing several Web 2.0 Oracle applications. Preceeding her work at Concept Solutions, Ms. Ellefson held software engineering roles at both Citizant and Verizon. Ms. Ellefson holds Bachelor of Science, Mathematics.
Software Executive that started with the birth of the internet as a commercial venture - spent years creating Operating Systems to support distributed systems, servers for internet scale. Have a specialization in intelligent software systems, security and safety technologies, and ML as it is applied in distributed systems, especially focused on concepts of Identity. Currently the Chief Technology Officer at Adbrain, where I oversee engineering data science, and product management.
CTO, Sucuri, Inc
Daniel B. Cid is the Founder & CTO of Sucuri, VP of Engineering at GoDaddy and also the founder of the open source project OSSEC. He is passionated about security, with special interest for intrusion detection, log analysis, web-based malware research and secure development. You can find more about Daniel on his site https://dcid.me or on Twitter:
Security Researcher, Lookout
Max is a Security Researcher with more than ten years of experience in areas as reverse engineering, software security, vulnerability research and advanced exploitation. Max was a lead security researcher at Pegasus iOS malware investigation. Max is author of various jailbreaks for iOS\tvOS\watchOS.
Owner, TMG Corporate
Ex-pat Irish living in Belgium, avid traveller 85/196, privacy advocate & alphabet agency contrarian, works for a fee most of the time but also works for free for activists, hacktivists, & the politically homeless. Not available for work in Iran or Turkey due to differences of opinion on human rights. Distrusts anyone who works for a government. Owner of TMG Corporate Services (Private Military Company) & Intelography (Specialized Security Provider - Encryption & TSCM), Blogger at AirGap Anonymity Collective (www.airgapanonymitycollective.com), Anonymous Chronic (@AnonymousCronic) & Peerlyst (@Peerlyst), CMO @MyFaceValue, Social VIP & Systems Innovator @IBMSystems, No.16 Global Influencer #Cybersec & #Infosec @Onalytica, Open Water Diver @PADI, Nomad
Developer, Tor Browser.
Arthur Edelstein is a programmer for the Tor Project. He works on the team that develops Tor Browser and contributes features to prevent tracking of users, improve browser security, and enhance the user experience. He also collaborates closely with a team at Mozilla working to bring Tor Browser anti-tracking features to Firefox.
Associate Professor, McGill University
CEO & Co-founder, Axiom Cyber Solutions
Troy Wilkinson began his career serving others as a Law Enforcement officer. He commanded a Joint Terrorism Task Force, was a lead bomb investigator, and violent crime and homicide detective however his greatest achievement in the field of law enforcement came from his ability and skill investigating and prosecuting child pornography and other electronic crimes.
Wilkinson was recruited by the U.S. State Department to train police officers in Kosovo on cyber investigations. Working under the George W Bush and Obama presidencies, he was a top U.S. cyber investigator seconded to the United Nations and European Union to lead investigations into political corruption, organized crime, war crimes, financial crimes and terrorism. Together with a team of international investigators, Wilkinson built the first IT forensics lab in the European Union Mission in Kosovo.
After returning home to the U.S, Wilkinson co-founded Axiom Cyber Solutions, with a mission to develop intelligent, automated, and self-healing cyber security platforms to help secure America’s businesses against cybercriminals. He is an international speaker on cyber security focusing on the topics of ransomware, DDoS, cyber-crime trends, and cyber security careers.
Technical Director, iProov Limited
Joe is a skilled and experienced developer and project manager with a degree in Computer Science from UCL. His expertise lies in internet technology, and as co-founder and director of SoftForge he successfully delivered large and complex web-based e-commerce and secure information solutions for clients such as the NHS and Shell. Since 2012 he has led the development of iProov’s proprietary technology.
CyberZest Pty Ltd.
A Digital Security Evangelist, working in the domain of Information Security for past 11 years with the experiences spanning across working with Knowledge Processing Industry, Technology Conglomerates, ISVs and Financial Entities delivering range of Security Solutions and Framework for Information Security, Cyber Security and IPR protection. Over all an explicit career in IT and Information Security of over 20 years. A continuous learner, researcher, blogger and a traveller who has worked and travelled across 34 countries. Originally from New Delhi, India and now based in Sydney, Australia where he is managing the security of an International Bank. His list of qualifications entails an Honours in Bachelors of Commerce with specialisation in Tax Planning and Financial Management,MCA, MBA from IIM Calcutta, India, LLB, PGD in Cyber Laws and IPR Management from Indian Law Institute, New Delhi along with other Industry certifications like CISSP, CISA, ISO27001 LI, CPISI PCI DSS, CEH, CHFI, Six Sigma, ITIL, PMP, PRINCE2.
VP, Global Security Strategy, Engineering and Architecture, Pearson
Khadir Fayaz is a recognized Cyber Security Executive Leader with more than 16 years of experience in driving large scale technology security initiatives, cyber resiliency programs and risk management. Experience includes Financial, FMCG, Education, Manufacturing, Technology Consulting and Hospitality/Travel industries requiring on demand adaptability, high availability, and secure architecture. Currently employed with Pearson as a VP, Global Security Engineering and Architecture.
CEO & Founder, ZoneFox
Jamie is a data security and enterprise software entrepreneur and is the CEO at ZoneFox. He attended the prestigious Ignite course at Cambridge University’s Judge Business School, and the Entrepreneur Development Programme at MIT. Jamie has a PhD in Computer Science, extensive security and digital forensics experience and was recently recognised as the 'Champion of Champions' at the inaugural Scottish Cyber Security awards for his contribution to the industry. ZoneFox protects business-critical assets; data and IP and has a proven track record protecting reputation, sales revenue, and competitive advantage for its growing client base.
Chief Cybersecurity Strategist, vArmour
Mark Weatherford is SVP and Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He has more than 20 years of security operations leadership, and executive-level policy experience, in some of the largest and most critical public and private sector organizations in the world. His experience includes roles at The Chertoff Group, an appointment by President Obama as Deputy Under Secretary for Cybersecurity at DHS, VP & CSO at the North American Electric Reliability Corporation (NERC), an appointment by Governor Schwarzenegger as CISO for the state of California, and CISO for the state of Colorado.
Chief Information Security Officer, KPMG AUS
Abbas Kudrati is the chief information security officer for KPMG Australia, responsible for managing cybersecurity policies, standards, and best practices to protect the firm’s information systems. He has more than 20 years of working experience with cross-functional sectors of cyber security, information security and information risk management, with skills in cyber security strategy, information security management, ethical hacking, cloud and BIG Data security, IT contingency planning, information system security auditing and compliance in various industries including government, Big 4 consulting, banking, financial, telecommunications and education sectors. He is a frequent speaker at external conferences, events and local universities on the topics of cyber and information security. He is a Certified Chief Information Security Officer (C|CISO), Certified Information Security Manager (CISM) and a Certified Information Systems Auditor (CISA), among other professional certifications.
Lecturer of Cyber Security, Macquarie University
Chief Data Officer & Cybersecurity Scientist, Champion Technology Company Inc.
A recognized thought leader in the defense and intelligence communities, Shawn Riley, Executive Vice President at The Center for Strategic Cyberspace and Security Science, brings over 25 years of cyber security, all source cyber threat intelligence, and artificial intelligence experience with an unparalleled understanding of the pitfalls that overtake modern security teams.
Head of Cybersecurity Active Defense, McKesson
Lonnie was formerly the Senior Director of Security Operations at Docusign, and he has over 20 years of information security experience. In 2007, he was part of a hand picked Air Force red team that took over The White House network in two hours. Lonnie then led the Application Security Team at Washington Mutual and also created the Red Team at Boeing. He is an expert in security operations, enterprise security assessment strategy and vulnerability management.
Fellow & Chief Scientist, McAfee
Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organisation in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL). Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. Raj Samani is a sought-after speaker and regularly appears on television commenting on the top IT security issues driving headlines today. Samani’s recent speaking engagements include Mobile World Congress and RSA.
CEO, NEST Negotiation Strategies
Moty Cristal is the founder of NEST Group and the CEO of NEST Consulting. Following an illustrious career as one of Israel's leading negotiation experts, Cristal established NEST in order to bring a unique systemic approach to the world of negotiation and the benefit of his experience and success to the private and public sector. From 1994 to 2001, Mr. Cristal served in various official capacities in Israel's negotiation teams with Jordan and the PLO, and experienced years of intense negotiations. Since 2001, Mr. Cristal advises, consults and trains business people, top managers, CEOs and senior government officials in US, Europe (UK, France, Spain, Germany, Austria, Serbia, Greece, Italy) Russia and CIS and Asia (China, Singapore, Sri-Lanka, Australia and New Zealand) in analyzing, planning and designing complex negotiation processes. His experience extends to the energy, construction, financial, technological, pharmaceutical, industrial, transportation and aeronautical sectors, and varies from complex deal-making negotiations, business cross-cultural disputes, union-management conflicts, post-merger integration, project integration and project management to business and national crisis management. Cristal is a Lt. Col. (Res.) in the Israeli Defense Forces, with extensive operational experience in crisis negotiation and crisis management, within the physical and the virtual worlds. He is a Professor for Negotiation Dynamics at SKOLKOVO, Moscow's leading Business School, as well as a lecturer at Hebrew University in Jerusalem, the Lauder School of Government at and the Arison Business School at the Interdisciplinary Center in Herzelia. Mr. Cristal commentates and writes regularly on the international media, international conferences and academic publications on negotiation processes and crisis interventions. (See recent profile article: http://www.haaretz.com/weekend/magazine/.premium-1.556814) Graduated Bar-Ilan Law School in Israel (1994), and Harvard Kennedy School of Government (1998), Mr. Cristal is also a doctoral researcher at the London School of Economics. Personal email: firstname.lastname@example.org
Chief Cybersecurity Strategist , Leidos
Gib Sorebo is a Chief Cybersecurity Technologist for Leidos where he develops strategy and solutions, leads large cybersecurity captures, and provides subject matter expertise to commercial and government customers. He has been working in the cybersecurity industry for more than twenty years in both the public and private sector. In addition to federal and state governments, Gib has done security consulting and led professional services teams in the financial services, healthcare, and energy sectors. He also recently co-authored a book on Smart Grid Security that was published in December 2011.
PhD Candidate, UCSB
Yan Shoshitaishvili is a Assistant Professor of Computer Science at Arizona State University. Over much of the last decade, he has pursued techniques in the automation of Computer Security, building frameworks (angr.io) and whole systems (shellphish.net/cgc) to enable the assistance of security researchers by autonomous systems. He route to Computer Security involved accidental buffer overflows in C code written in elementary school, hacking his friends for fun in high school, protecting networks in college, and competing in cybersecurity competitions with his team, Shellphish.
Developer Advocate, Google Cloud
Jen is a Developer Advocate on Cloud at Google. In this role she helps developers build cool stuff on all sorts of platforms. Previously she worked in a wide variety of software roles from robotics at NASA, to developer advocacy for Google Glass. She is passionate about education, especially on the subjects of technology and science. If she’s away from her laptop, she’s probably skating around a roller derby track, or hanging from aerial silk.
Software Security Consultant, Prowareness
Marudhamaran Gunasekaran (Maran) is a Software Security Consultant at Prowareness who focuses on helping Organizations implement Security Initiatives and delivering secure software at a faster pace. He is an ICAgile Certified Coach and works with Agile Software Development Teams and Portfolio Managers daily switching between a developer and security coach roles. At his spare time he digs the OWASP ZAP project, moderates some security meet up groups in India and The Netherlands, and enjoys watching comedy. He blogs at https://renouncedthoughts.wordpress.com./
Senior Security Consultant, Evolve Security
Brian Liceaga has worked and consulted for organizations of all sizes from start-ups to large corporations. Brian’s experience includes vulnerability management, application security, incident response, security program development, cloud security, DevSecOps, and penetration testing. Notably, he has developed and implemented solutions to establish secure SDLC processes for Waterfall and Agile environments. Recently, his focus has been on next-generation vulnerability management utilizing automation and orchestration as well as finding solutions for privacy and security to better coexist.
PhD, Stanford University
Florian Tramèr is a second year PhD student at Stanford University, advised by Prof. Dan Boneh. He is interested in various aspects of Machine Learning Security, from adversarial examples to attacks on model confidentiality and data privacy. Before starting his PhD, he was a Master student and researcher at EPFL, Switzerland, working on various topics in Cryptography and Cryptocurrencies.
CS Assistant Prof, NUS
Reza Shokri is a computer science assistant professor at National University of Singapore. He is an active member of the security and privacy community, and his research focuses on data and computational privacy. He received his PhD from EPFL.
United Health Group, Chief Enterprise Security Architect
Aaron Rinehart currently serves as Chief Enterprise Security Architect at the United Health Group and has worked and consulted in the field of Information Security and Technology for organizations such as the Department of Homeland Security (DHS), National Aeronautics and Space Administration (NASA), and the Department of Defense (DoD). Aaron has been a featured speaker at several media outlets and conferences, most notably the National Press Club in Washington DC, RSA, HITRUST, and ABC News. Aaron has been interviewed and quoted in various publications including the Huffington Post, Medill News Service, and CBS MarketWatch.
AlienVault, Vice President & Chief Scientist
Jaime Blasco is a renowned Security Researcher with broad experience in network security, malware analysis, and incident response. At AlienVault, Jaime leads the Lab Intelligence and Research team that leads the charge of researching and integrating threat intelligence into detection mechanisms. Prior to working at AlienVault, he founded a couple of startups (Eazel, Aitsec) working on web application security, source code analysis, and incident response. He is based in San Francisco. Jaime’s work in emerging threats and targeted attacks is frequently cited in international publications such as New York Times, BBC, Washington Post and Al Jazeera.
AlienVault, Security Researcher / Threat Engineer
Chris had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense’s forensics competition. Chris run a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.
Ahmad Abdulkader is CTO of Voicera and a well-renowned industry expert in Machine Learning, Deep Learning, and Neural Networks. Before co-founding Voicera, Abdelkader served as a lead architect for Facebook’s applied AI efforts, which produced platforms like DeepText, a text-understanding engine with near-human accuracy in over 20 languages. Prior to that, he worked at Google, building OCR engines, Machine Learning systems, and computer vision systems. Prior to Google, Abdulkader led a number of teams at Microsoft Ad-Center & Bing. He also built the state of the art 'Handwriting Recognition Technology' which currently powers Microsoft's touch devices including 'Surface'.
Postdoc Researcher, EPFL
Philipp Jovanovic is a cryptographer and post-doctoral researcher at the Swiss Federal Institute of Technology Lausanne (EPFL), in Switzerland. He obtained his PhD in cryptography from the University of Passau, Germany, in 2015. Philipp designed several cryptographic algorithms, such as NORX and OPP/MRO, and protocols, like CoSi, ByzCoin, and RandHound. He is actively involved in the development of open source projects like the kyber crypto library or the cothority framework for scalable, decentralized, cryptographic protocols, and he works as an adviser on the DFINITY project. His research is published regularly at top crypto/security conferences such as IEEE S&P, USENIX Security, or EUROCRYPT, and he is frequently active at non-academic events like the Chaos Communication Congress, Troopers, or dotSecurity. Philipp tweets as @daeinar.
Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
Yanick Fratantonio, EURECOM
Control-Flow Hijacking: Are We Making Progress?
Mathias Payer, Purdue University
ICS Cyber Attacks: Fact vs. Fiction
Robert M. Lee, Dragos, Inc.
Cybersecurity and DevOps – Focusing on “Build Security In”
Regine Bonneau, RB Advisory LLC
Reducing Attacker Dwell Time and Increasing Speed of Response
Vinod Vasudevan, Paladion
Scalable Bias-Resistant Distributed Randomness
Philipp Jovanovic, EPFL
Hacker Reconnaissance w/ OSINT
Candan Bolukbas, Normshield
Moving to HTTPS in 2017
Eric Lawrence, Google Chrome
The Rise of Potentially Unwanted Programs: Measuring its Prevalence, Distribution through Pay-Per-Install Services, and Economics
Juan Caballero, IMDEA
Encrypting the Internet of Things
David Puron, Silent Circle
Putting Security First in Web Application Development
Itzik Kotler, Safebreach
Navigating the Looming Cyber Threats on the Horizon
Brian Kelley, Portage County
Putting Security First in Web Application Development
Julia Ellefson, Mkacyber
Finding the Grumpy Old Troll - Using traditional cross device detection methods as a tool for blocking trolls
Jason Atlas, Adbrain
Secure Authentication using Face Verification
Joe Palmer, iProov Limited
The Typical Day in The Life of a CISO
Abbas Kudrati, KPMG Aus
How to Build a Threat Intelligence Program
Lonnie Benavides, McKesson
Firebase security rules - Protecting App Data from the Zombie Apocalypse
Jen Tong, Google Cloud
Data vs. the Bad Guys: Protecting the Consumer Web
David Freeman, Facebook
Why we need verifiable lotteries
Joseph Bonneau, Stanford
Will a False Sense of Security Make You the Victim of the Next Cyberattack?
Jinan Jaber, Telo Consulting
Navigating the Looming Cyber Threats on the Horizon
Brian Kelley, Portage County
Tor Browser and the fight for privacy on the Web
Arthur Edelstein, Tor Browser
The Cloud, IOT and Critical Infrastructure: It’s Not Too Late for 'The Cyber'
Mark Weatherford, vArmour
N different strategies to automate OWASP ZAP for Security Testing during Development
Marudhamaran Gunasekaran, Prowareness
Data Privacy in Machine Learning
Reza Shakri, NUS
ChaoSlingr: Introducing Security based Chaos Testing – “Security is Chaotic – Drive out failure and build software that is truly rugged with Security Chaos Engineering”
Aaron Rinehart, United Health Group
Threat Intelligence Sharing
Jaime Blasco & Chris Doman, AlienVault
Cyber Kill Chain, for Ultimate Cyber Defence
Abhjitt Mukharjji, CyberZest Pty Ltd.
Corrective Cloud Security in AWS with Lambda Functions
Brian Liceage, Evolve Security
Cyber Extortion: How to negotiate with Cyber Criminals
Moty Cristal, NEST Negotiation Strategies
Best Practices for An Industrial Control System Asset and Configuration Management Program
Gib Soreno, Leidos
An A.I. Cyber Defense Expert System for Active Cyber Defense and Trusted Information Sharing
Shawn Riley, Champion Technology Company Inc. -- www.DarkLightCyber.com
Building an Effective Cyber Defense Portfolio
Khadir Fayaz, Pearson
Max Bazaliy, Lookout