Bigezy works as a security analyst at a Fortune 500 Electric Utiltity in the United States. He has previously worked on securing the Financial Industry working for the largest Mutual Fund transfer agency in the US. Before that he founded one of the first Internet Service Providers in the Midwestern US.
Chema Alonso, is one of the most prominent names regarding Computer Security and hacking in the world. Ph.D in Information Security, Computer and Systems Engineer, he graduated from Universidad Politécnica de Madrid where he was honored as Ambassador. He has been awarded as a Most Valuable Professional in Enterprise Security by Microsoft. Before getting into Telefonica to manage the new innovative company “Eleven Paths” focus in creating security technologies, he was working Informatica64 to create FOCA, Evil FOCA, Dust RSS, or publishing hacking papers such as Connection String Parameter Pollution or Blind LDAP Injection Techniques.
Dominick Baier works as a security consultant at thinktecture (www.thinktecture.com). His main focus is security, identity and access control in distributed applications using the Microsoft technology stack. He’s the author of “Writing more-secure ASP.NET Applications” (MS Press) and the security curriculum lead at Developmentor. You can find his blog at www.leastprivilege.com.
Rodrigo Rubira Branco (BSDaemon) works as Principal Security Researcher at Intel Corporation and is the Founder of the Dissect || PE Malware Analysis Project. Held positions as Director of Vulnerability & Malware Research at Qualys and as Chief Security Research at Check Point where he founded the Vulnerability Discovery Team (VDT) and released dozens of vulnerabilities in many important software. In 2011 he was honored as one of the top contributors to Adobe Vulnerabilities in the past 12 months. Previous to that, he worked as Senior Vulnerability Researcher in COSEINC, as Principal Security Researcher at Scanit and as Staff Software Engineer in the IBM Advanced Linux Response Team (ALRT) also working in the IBM Toolchain (Debugging) Team for PowerPC Architecture. He is a member of the RISE Security Group and is the organizer of Hackers to Hackers Conference (H2HC), the oldest and biggest security research conference in Latin America. He is an active contributor to open-source projects (like ebizzy, linux kernel, others). Accepted speaker in lots of security and open-source related events as H2HC, Black Hat, Hack in The Box, XCon, VNSecurity, OLS, Defcon, Hackito, Ekoparty, Troopers and others.
Sergey Bratus is a Research Assistant Professor the Computer Science Dept. at Dartmouth College. His research interests include designing new operating system and hardware-based features to support more expressive and developer-friendly debugging, secure programming and reverse engineering; Linux kernel security (kernel exploits, LKM rootkits, and hardening patches); data organization and other AI techniques for better log and traffic analysis; and all kinds of wired and wireless network hacking.
Before coming to Dartmouth, he worked on statistical learning methods for natural text processing and information extraction at BBN Technologies. He has a Ph.D. in Mathematics from Northeastern University.
Claudio spends his work hours as principal consultant at Secure Network, a security firm based in Milan. He used to be a pure web application security guy and graduated with a master thesis on anomaly detection on web applications. He got interested in virtualization from a practical perspective as a penetration tester since its birth and has been doing research since then.
He’s a columnist at virtualization.info and a member of nibblesec.org.
Steve is the Chief Technology Officer and co-founder of PhoneFactor, a provider of phone-based authentication services. Steve is a regular speaker and writer on issues surrounding authentication.
Bryan K. Fite: A committed security practitioner and entrepreneur, Bryan is currently a Senior Cyber Physical Security Consultant at BT. Having spent over 25 years in mission-critical environments, Bryan is uniquely qualified to advise organizations on what works and what doesn't. Bryan has worked with organizations in every major vertical throughout the world and has established himself as a trusted advisor. "The challenges facing organizations today require a business reasonable approach to managing risk, trust and limited resources while protecting what matters."
He is also the creator of PacketWars™ (packetwars.com) the World’s premier Cyber Sport.
Martin Freiss is managing director of secunomic GmbH, a security and audit consultancy. In previous lifes, he was managing director of atsec information security GmbH, CISO at Vodafone TeleCommerce GmbH and consultant and team-leader for IT-Security at Siemens AG and Siemens Nixdorf AG in Paderborn and Cologne. He focuses on pragmatic project management for risk management, audits and compliance-management in large and small enterprises. He has authored several books and articles on security management, security certifications and penetration testing.
Sheran Gunasekera (chopstick) is a security professional that specializes in Web Application Security, Mobile Security and Digital Forensics. He is the Director of Research & Development for ZenConsult, a technology consulting firm based in the Asia Pacific region. Disliked by banking software vendors and now, possibly telcos, Sheran sees no need to sugar-coat findings from security assessments. A firm believer that information should be free, he releases his research and tools on his blog, Chirashi Security (chirashi.zensay.com), in the hopes that others can benefit from them.
About the Trainer Pete Herzog is a security professional, neuro-hacker and managing director for the non-profit security research organization, ISECOM. He created the first social engineering methodology for quantifiable testing of human security for OSSTMM 2.1 in 2002. By 2003 he created Trust Metrics for measuring the amount of trust one can put in anything in a quantifiable manner which was added to OSSTMM 3 in 2010. In 2009 Herzog began working with brainwave scanners and tDCS to directly manipulate the brain and understand how people learn and focus attention. In 2013 he released the Security Awareness Learning Tactics (SALT) project to specifically design security awareness based on the neuro research. You can read more about Pete here: http://en.wikipedia.org/wiki/Social_engineering_%28security%29#Notable_social_engineers http://en.wikipedia.org/wiki/Pete_Herzog https://www.linkedin.com/in/isecom
After having studied mathematics and computer science at the University of Mannheim in Germany, Ralf Hund joined the there resident Laboratory for Dependable Distributed Systems as a Ph.D. student. His research interests tend towards the practical aspects of computer security; more specifically, this particularly includes software reverse engineering, static and dynamic malware analysis, mobile malware, and P2P-botnets.
Ray has over 25 years of experience in technology leadership roles including 16 years in the US Air Force, 12 of which was installing, securing and maintaining voice and data communications circuits around the world. After leaving the Air Force he worked as National Field support Manager for Network Solutions, installing and maintaining communications links for government agencies throughout the US. He designed, installed and supported communications projects for companies including InterVoice, ENTEX, Telequoent Communications and Internet Security Systems. He is one of Q1 Labs earliest employees and has preformed many roles in pre and post sales as well as management positions.
Graeme Neilson, Chief Research Officer, RedShield Security. https://www.redshield.co
Founder of ERPScan, President of EAS-SEC.org project, accomplished R&D professional and Entrepreneur of the year. He is an expert at security for business-critical software like ERP, CRM, SRM and industry specific solutions. He has received due recognition having publishing over 100 vulnerabilities, as well as multiple whitepapers, such as annual award-winning "SAP Security in Figures”, surveys and a book devoted to information security research in SAP and Oracle. He has presented at more than 50 conferences in 20+ countries in all continents and held training sessions for the CISOs of Fortune 2000 companies, including SAP SE.
Marsh Ray is a Software Development Engineer at PhoneFactor, Inc., a maker of two-factor authentication software, where he is responsible for security software development.
Enno Rey @Enno_Insinuator is an old school network security guy who has been involved with IPv6 since 1999. In the last years he has contributed to many IPv6 projects in very large environments, both on a planning and on a technical implementation level.
Oliver Roeschke is a seasoned pentester and hacker with vast experience in corporate environments. Over the years he developed his own approach to attack technologies. For the last two years his research focuses on enterprise WLAN environments. Protocol design flaws and crucial implementation failures are most interesting for him to bring down security of large-scale WLAN deployments. In his free time he’s coding hacking tools that implement practical attacks on the vulnerabilities he found. Oliver is a frequent speaker at international security conferences and will happily share his knowledge with the audience.
Dr. Markus Schumacher is co-founder of Virtual Forge GmbH, an independent security product company based in Heidelberg, Germany. The members of the Virtual Forge team are leading experts for SAP® application security. Virtual Forge’s unique ABAP™ security knowledge has been captured into CodeProfiler, the first static code analysis tool for ABAP™ security and compliance testing. Markus Schumacher has a PhD in computer science and is a frequent speaker at international conferences. He co-authored numerous articles and books (recently: “Sichere ABAP Programmierung” published by SAP Press).
Marco Slaviero is the lead researcher at Thinkst. Marco has presented research at conferences all over the world on topics ranging from timing attacks to python shellcode. He is rumoured to harbor a personal dislike for figs.
Michael Thumann is Chief Security Officer and head of the ERNW application security team. He has published security advisories regarding topics like ‘Cracking IKE Preshared Keys’ and Buffer Overflows in Web Servers/VPN Software/VoIP Software. Michael enjoys sharing his self-written security tools (e.g. ‘tomas – a Cisco Password Cracker’, ‘ikeprobe – IKE PSK Vulnerability Scanner’ or ‘dnsdigger – a dns information gathering tool’) and his experience with the community. Besides numerous articles and papers he wrote the first (and only) German Pen-Test Book that has become a recommended reading at german universities.
In addition to his daily pentesting tasks he is a regular conference-speaker (e.g. Blackhat, HITB and RSA Conference) and has also contributed exploit code to the Metasploit Framework. With more than 10 years of experience in computer security Michaels’ main interest is to uncover vulnerabilities and security design flaws from the network to the application level and reverse almost everything to understand the inner working.
Tillmann Werner used to work as an incident handler at the German national CERT and is currently employed as a computer scientist at the University of Bonn. He is a member of the Honeynet Project and has been doing research in the area of network-based attacks for almost a decade.