All Speaker Bios

  • Alvarez Raul @raulr_alvarez

    TalkCreating Your Own Customized Metamorphic Algorithm

    “I joined Fortinet in 2004, and is currently working as a Senior Security Researcher/ AV Team Lead. I am also one of the Lead Trainer responsible for training the junior AV/IPS analysts in malware analysis and reverse engineering.

    I have presented in different conferences like BSidesVancouver, BSidesCapeBreton, OAS-First, BSidesOttawa, SecTor, DefCamp, BCAware, AtlSecCon, and BSidesCalgary.

    I am a regular contributor to the Fortinet blog and also in the Virus Bulletin publication, where I have published 22 articles.”


  • Bates Nathan @Brutes_

    TalkSplunking Dark Tools – A Pentesters Guide to Pwnage Visualizationu

    Nathan Bates (@Brutes_) applies his knowledge of the blue-side to defend against organized crime, nation-states and Bryce. Currently, leading the security centric big data initiatives for Adobe’s marketing cloud infrastructure to build large scale systems for security monitoring and incident response.


  • Brown Benjamin @ajnachakra

    TalkCryptocurrencies and Anonymity: The Good, The Bad, and The Future

    Benjamin Brown currently works on darkweb research, threat intelligence, incident response, and adversarial resilience at Akamai Technologies. He has experience in the non-profit, academic, and corporate worlds as well as degrees in both Anthropology and International Studies. Research interests include darkweb and deepweb ethnographic studies, novel and side-channel attack vectors, radio systems, the psychology and anthropology of information security, metacognitive techniques for intelligence analysis, threat actor profiling, and thinking about security as an ecology of complex systems.


  • Buening Jamie @JamieBuening

    TalkDetecting DNS Anomalies with Statistics

    Jamie Buening is a graduate of Purdue University with sixteen years of work experience in UNIX systems, networking, and information security. He currently works as an Information Security Analyst in the electric power industry. Responsibilities include Threat Intelligence and Incident Response. Jamie is a Certified Information Systems Security Professional (CISSP).


  • Gray Joe @C_3PJoe

    TalkOSINT For The Win – Tools & Techniques to Maximize Effectiveness of Your Social Engineering Attacks

    Training:   OSINT For Pen Testers: Maximizing Your Efficiency

    Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is an Enterprise Security Consultant at Sword and Shield Enterprise Security in Knoxville, TN. Joe also maintains his own blog and podcast called Advanced Persistent Security. He is also in the SANS Instructor Development pipeline, teaching SANS Security 504: Hacker Tools, Techniques, Exploits, and Incident Handling. In his spare time, Joe enjoys reading news relevant to information security, attending information security conferences, contributing blogs to various outlets, bass fishing, and flying his drone.


  • Johnson Haydn @haydnjohnson

    TalkTrials and Tribulations of setting up a Phishing Campaign – Insight into the how

    “Haydn has specialized in offensive security and cyber threat intelligence for over 4 years. He has extensive experience in Information Security, network/web penetration testing, vulnerability assessments, identity and access management and identifying near future threats that face organizations on the horizon. Haydn is considered an industry expert on Red Teaming, and has been published several times in online articles on this topic. Additionally, he has a Masters in Information Technology and holds the OSCP and GXPN certifications. Haydn regularly contributes to the infosec community, speaking at various conferences including HackFest, BsidesTO, BsidesLV and Sector.”


  • Kot Alex @alex_s_kot

    TalkNetwork manipulation on video games

    Currently work as a Security Engineer in a payment processing company in Atlanta. A video gamer who enjoys FPS on Xbox. Used to be big into console hacking. Hobbyist of SOHO router firmware and wireless technologies. I spoke BsidesHuntsville, Notacon, and BsidesCleveland.


  • Kuntz Bryce @tweetFawkes

    TalkSplunking Dark Tools – A Pentesters Guide to Pwnage Visualizationu

    Bryce Kunz (@TweekFawkes) applies his knowledge of the red-side to discover vulnerabilities which enable exploiting all the things! Currently, leading the tailored testing of Adobe’s marketing cloud infrastructure to discover security vulnerabilities. As an Ex-NSA, Ex-DHS employee who hold various certifications (OSCP, CISSP, etc…) my fervor for perfection drives me to share intriguing research.


  • Lee Keith @keith55

    TalkFinding Your Way to Domain Admin Access and Even So, the Game Isn’t Over Yet.

    Keith Lee is a Senior Security Consultant with Trustwave’s SpidersLabs Asia-Pacific. SpiderLabs is one of the world’s largest specialist security teams, with over 100 consultants spread across North America, South America, Europe and the Asia Pacific. SpiderLabs has a focus on original security research and regularly presents at conferences such as BlackHat, DefCon, OWASP, Hack In The Box and Ruxcon. Keith is based out of Singapore and has primary focus is on providing penetration testing, social engineering and incident response services to clients in the Asia-Pacific region.


  • Man Jeff @MrJeffMan

    TalkTales from the Crypt (analyst)

    Jeff is a respected Information Security expert, advisor, speaker, teacher, advocate, and curmudgeon. He has over 33 years of experience working in all aspects of computer, network, and information security, including risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing. He has held security research, management and product development roles with NSA, the DoD and private-sector enterprises and was part of the first penetration testing “red team” at NSA. For the past twenty years, he has been a pen tester, security architect, consultant, QSA, and PCI SME, providing consulting and advisory services to many of the nation’s best known companies.


  • Momot Falcon Darkstar @falcondarkstar

    TalkYou’re not old enough for that: A TLS extension to put the past behind us

    Falcon is a Shadytel tactical lineman and a Leviathan security consultant. He usually talks about LangSec, and recently published “The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them”.


  • Power Max @dontlook

    TalkOpen Sesamee

    Max Power has been working in IT as a jack of all trades but with an fascination for risk and what trust is actually based in. Four years ago he dove straight into the Locksport: running the Boston TOOOL chapter, helping with the lockpick villages at major cons, and actively working in the community. When not at work or picking locks he can found trying to load as much weight as possible on to the bar, training for powerlifting competitions, because nothing is more fun than not bending when the bar does.


  • Robertson Chad @chrooted

    TalkSee beyond the veil: Automating malicious javascript deobfuscation Chad Robertson is the Manager of Threat Analysis at Fidelis Cybersecurity. He has worked in incident response, security engineering, and the forensics field for over 10 years in a variety of roles. He has a Bachelors of Science from Purdue University.


  • Serper Amit @0xamit

    TalkPeakaboo – I own you: Owning hundreds of thousands of devices with a broken HTTP packet

    “Amit leads the security research at Cybereason’s Boston HQ. He specializes in low-level, vulnerability and kernel research, malware analysis and reverse engineering. He also has extensive experience researching attacks on large scale networks and investigating undocumented OS resources and APIs.

    Prior to joining Cybereason, Amit spent nine years leading security research projects and teams for the Israeli government, specifically in embedded system security. He’s presented at RSA, BSides Tel Aviv and LayerOne.”


  • Sweet Kat @TheSweetKat

    TalkTalky Horror Picture Show: Overcoming CFP Fears

    Kat Sweet is in her final semester of studying network security at Madison Area Technical College. When she’s not hacking for grades (or lulz), she feeds herself (and her brain) by blue teaming for her school, writing, and teaching at her friendly neighborhood hackerspace. She got her speaking start in the BSidesLV Proving Ground, where she returned last year as a presentation mentor. She currently serves as the CFP co-chair for CircleCityCon, as well as a founding board member of TiaraCon. Her speaking credits include BSidesLV, CircleCityCon, CypherCon, SkyTalks, BSides NoVA, and the DEF CON Wireless Village. A renaissance woman with too many hobbies, she enjoys long walks on the beach, bursting into song, and picking unsuspecting locks.


  • Troutman James @troutman

    TalkWhy is the Internet still working?

    Troutman is an Internet “Old Timer” & Engineer, having first been online via a “paper TTY” with a 300 bps acoustic coupler modem in 1982. He has been an active user of the Internet & UNIX since 1987, and has been tasked with building and running Internet infrastructure off and on since the early 90s. He has held a wide variety of roles in Internet operations, engineering, and management at various regional ISPs, CLECs, ILECs, cable TV companies, and web hosts. He is a Director of the non-profit Northern New England Neutral Internet Exchange (NNENIX.NET) in Portland, Maine but his day job is roaming the countryside as a self-employed infrastructure consultant, based out of the great state of Maine.


  • Williams Jeff @blu3wing

    TalkLeveraging Vagrant to Quickly Deploy Forensic Environmentshi

    Jeff Williams (blu3wing) is a Security Engineer working in Healthcare and specializes in DFIR and Malware Hunting. He currently is still an undergraduate at Eastern Michigan University where he plans to finish his last two remaining classes over the Summer and Fall 2017 semesters. He is passionate about all things InfoSec, and spends most of his free time researching and monitoring security related events and news.


  • Wong Caroline @carolinewmwong

    TalkApplication Security Metrics

    “Caroline Wong is the Vice President of Security Strategy at Cobalt. Cobalt delivers crowdsourced pen tests and private bug bounties to modern organizations.

    Caroline’s close and practical information security knowledge stems from broad experience as a Cigital consultant, a Symantec product manager, and day-to-day leadership roles at eBay and Zynga. She is a well known thought leader on the topic of security metrics and has been featured at industry conferences including RSA (USA and Europe), IT Web Summit (South Africa), OWASP AppSec, Metricon, the Executive Women’s Forum, ISC2, and the Information Security Forum.

    Caroline received a 2010 Women of Influence Award in the One to Watch category and authored the popular textbook Security Metrics: A Beginner’s Guide, published by McGraw-Hill in 2011. She graduated from U.C. Berkeley with a B.S. in Electrical Engineering and Computer Sciences.”