2022 Keynote Speakers


Alyssa Miller – CISO at Epiq Global

Alyssa Miller is a hacker who, in her pre-teens, bought her first computer and hacked her way into a paid dial-up community platform. She grew up in hacker culture, finding her hacker family in IRC channels during her adolescent years. While IT was not her original career plan, she ended up working as a developer and later a penetration tester in the financial services industry. As she moved into consulting, her focus on defending technology systems and personal privacy grew to the point where she was advising fortune 100 companies on how to build comprehensive security programs.

Alyssa is now the CISO at New York based Epiq Global. Still very much a hacker to this day, she’s built on that identity to grow her career. She is an internationally recognized public speaker and author of “Cybersecurity Career Guide”. She’s an advocate for helping others make a career out of their passion for hacking and security in general. She’s also a proponent for the open sharing of ideas and perspectives on improving our technologically connected world.

John Hammond – Sr. Security Researcher at Huntress


John Hammond is a cybersecurity researcher, educator and content creator. As part of the Threat Operations team at Huntress, John spends his days analyzing malware and making hackers earn their access. Previously, as a Department of Defense Cyber Training Academy instructor, he taught the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He has developed training material and information security challenges for events such as PicoCTF and competitions at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the US Naval Academy, and other online events including the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality showcasing programming tutorials, CTF video walkthroughs and other cyber security content. John currently holds the following certifications: Security+, CEH, LFS, eJPT, eCPPT, PNPT, PCAP, OSWP, OSCP, OSCE, OSWE, OSEP, and OSED (OSCE(3)).


Other Speakers


Adam Mashinchi – Principal Product Manager for Managed Detection and Response at Red Canary

Adam Mashinchi is the Principal Product Manager for Managed Detection and Response at Red Canary. Before Red Canary, Adam defined and managed the development of enterprise security and privacy solutions with an emphasis on adversary emulation and usable encryption at a global scale, leading numerous technical integration projects with a variety of partners and services.

Alissa Torres

Alissa Torres is a security leader/practitioner, specializing in advanced computer forensics and incident response. She discovered her passion of intrusion investigations while serving in the trenches as an incident analyst with a third-party remediation services company, and later, leading an incident response team for a global manufacturing company. Days are never dull! As a seasoned presenter, Alissa has spoken at various industry conferences and numerous B-Sides events. In addition to being a GIAC Certified Forensic Analyst (GCFA), she holds the GCFE, GCIH, GCIA, GSEC, GPEN, GREM, CISSP, EnCE, CFCE, MCT and CTT+.

Amanda Berlin – Lead Incident Detection Engineer at Blumira, CEO and Owner at Mental Health Hackers

Amanda Berlin is the Lead Incident Detection Engineer for Blumira and the CEO and owner of the nonprofit corporation Mental Health Hackers. She is the author of a Blue Team best practices book called “Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston through O’Reilly Media. She is a co-host on the Brakeing Down Security podcast and writes for several blogs. She has spent over a decade in different areas of technology and sectors providing infrastructure support, triage, and design. She now spends her time creating as many meaningful alerts as possible. Amanda is an avid volunteer and mental health advocate. She has presented at a large number of conventions, meetings and industry events. While she doesn’t have the credentials or notoriety that others might have, she hopes to make up for it with her wit, sense of humor, and knack for catching on quickly to new technologies.

Brian Halbach – Senior Security Consultant at InGuardians

Brian Halbach graduated from the University of Wisconsin-Stout with a degree in Information Technology Management and a Minor in Computer Science. During college, Brian spent several years working as a help-desk employee, which later led to a career as a Systems Administrator and then Network Engineer for both small companies and Fortune 5 companies. After realizing the lack of security that many organizations had Brian spent time as a lead Network Security Engineer helping organizations deploy the tools, technology, and processes to help make them more secure. After spending years helping defend organizations and realizing that companies still had problems seeing and understanding their security gaps, Brian switched over to red teaming and penetration testing, where he is able to use his knowledge and understanding of people, systems, and programming to bring new insights and intuition to his security testing. One of the things Brian enjoys the most about working in security consulting is being able to talk to clients about their issues and being able to help find answers to security questions when there is not an obvious solution.

Bronwen Aker – Technobabble Translator

Bronwen Aker (GSEC, GCIH, GCFE) likes to describe herself as a “constantly evolving geek.” She has worked with computers since elementary school when she was introduced to FORTRAN programming using bubble cards. As an adult, she worked for twenty years in web development, sharing her love and knowledge of computers and the Internet with others by working on the side as a technical trainer in Southern California. In 2017, she changed career paths to enter the world of cybersecurity. She currently holds a Bachelor of Science in Cybersecurity, is a graduate of the 2017 SANS CyberTalent Academy for Women, and is currently working on her Masters in Cybersecurity. She also works for Black Hills Information Security (BHIS) as a technical editor, reading and editing 200+ pentest reports a year, and for the SANS Institute as a Subject Matter Expert in OnDemand Student Support. During the pandemic, she stayed mostly sane thanks to her four dogs and Animal Crossing New Horizons.

Chris Culling – Senior Technical Success Manager at Gigamon

I currently work for Gigamon as a Senior Technical Success Manager. I’m retired U.S. Army (Military Intelligence), live in Stevensville, Maryland, and have been working as a government contractor for the last ten years in the areas of operations management, SOC operations, and CTI analysis. I’ve been married for 31 years to a very patient woman, have three adult children (two who are married and have yet to bless me with any grandkids), two cats, a dog, and a Vietnamese pot-bellied pig.

I’m also a recovering alcoholic. Once I finally received a diagnosis of severe ADHD, anxiety, and depression at age 48, I was able to stop self-medicating and receive the help I truly needed to overcome my addiction and begin understanding my neurodiversities.

Connor McGarr – Software Engineer at CrowdStrike

Connor is a software engineer at CrowdStrike, focusing on vulnerability research and detection. Connor enjoys writing exploits and blogging on the exploit development process. In his free time, he also enjoys history.

Corben Leo – Bug Bounty Hunter & Web3 Security at Zellic

Corben Leo is a cybersecurity researcher and bug bounty hunter. He won the the Department of Defense’s Hack the Army 2.0 Challenge, Hack the Army 3.0 Challenge, and Hack the Proxy Challenge. He has reported vulnerabilities to Facebook, Google, Microsoft, Apple, Netflix, PayPal, Yahoo, Epic Games, AT&T, Department of Defense, Starbucks, Ford, and many more global companies. He’s participated in numerous Live Hacking Events with HackerOne and BugCrowd. Now, he is securing blockchain companies with Zellic.

Corey Ham – Tester at Black Hills Information Security

Corey Ham is a tester at BHIS focused on Adversary Emulation and Red Teaming. Corey has been a penetration tester for nearly 10 years.

Dan DeCloss – Founder and CEO at PlexTrac

Dan brings over 15 years of experience in cybersecurity. Dan started his career in the Department of Defense then moved to private sector consulting where he worked at companies like Veracode as a Principal Consultant in Penetration Testing. He has also served as a Principal Security Engineer for the Mayo Clinic and a Sr. Security Advisor for Anthem. Prior to PlexTrac, Dan was the Director of Cybersecurity at Scentsy where he built the security program from infancy into a best-in-class program.

Dan has a Master’s Degree in Computer Science from the Naval Postgraduate School with an emphasis in Information Security. Dan holds the OSCP and CISSP certifications.

Darryl Baker – Security Consultant at Trimarc Security

Darryl G. Baker is a “swiss army knife of technology”. After serving in the U.S. army for 10 years, Darryl went on to pursue a career in technology. He has worked in a variety of roles ranging from back-of-the-house break/fix to data center manager and everything in between. Due to the prevalence of Active Directory misconfigurations in recent major cybersecurity attacks, Darryl shifted his focus towards security and understanding why these types of attacks are so common. For the last few years, Darryl has worked as a security consultant and researcher specializing in Active Directory. He has written blogs on AD security as well as spoken on the subject on multiple occasions. He is on the board of several cybersecurity organizations and is the host/creator of Identity Village (also known as AD Hacking Village). He currently holds several security certifications including CISSP, Certified Ethical Hacker, CCSP, and Certified Professional Forensic Analyst. When Darryl is not looking for new security vulnerabilities, he enjoys building radios/satellites, as well as playing competitive pool.

David Kennedy – Founder, Chief Hacking Officer at TrustedSec

David Kennedy is founder of Binary Defense and TrustedSec. Both organizations focus on the betterment of the security industry. David also served as a board of director for the ISC2 organization. David was the former CSO for a Diebold Incorporated where he ran the entire INFOSEC program. David is a co-author of the book “Metasploit: The Penetration Testers Guide”, the creator of the Social-Engineer Toolkit (SET), Artillery, Unicorn, PenTesters Framework, and several popular open source tools. David has been interviewed by several news organizations including CNN, Fox News, MSNBC, CNBC, Katie Couric, and BBC World News. David is the co-host of the social-engineer podcast and on several additional podcasts. David has testified in front of Congress on two occasions on the security around government websites. David is one of the founding authors of the Penetration Testing Execution Standard (PTES); a framework designed to fix the penetration testing industry. David was the co-founder of DerbyCon, a large-scale conference started in Louisville, Kentucky. Prior to the private sector, David worked for the United States Marine Corps and deployed to Iraq twice for intelligence related missions.

Dennis Pelton – Senior Cloud Security Engineer at Foghorn Consulting

Dennis Pelton is a hacker, a father, and a professional tinkerer. He currently works as a senior cloud security engineer for Foghorn Consulting, using his background in devops automation to streamline client security and evangelize the shift-left culture. He has been studying and researching information security for over a decade and a half and has built out infrastructure and automation in almost every sector including fintech, medical, defense, education, and manufacturing. This diverse background has shaped his style into a uniquely chaotic blend of security and automation with an eye for compliance.

In his spare time, Dennis designs and builds small electronics to automate attacks with a focus on culturally prevalent targets such as USB and wifi. His best known projects are unofficial defcon badges, and for his 2023 badge he plans to leverage his recent research into wifi. He enjoys learning, tinkering, paying with cats, and drinking dark heavy beers in no particular order.

Douglas Brush – Global Advisory CISO at Splunk

Douglas Brush is a Global Advisory CISO for Splunk and an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues. He also serves as a federally court-appointed Special Master and neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery.

He is the founder and host of Cyber Security Interviews, a popular information security podcast.

Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, and diversity, equity and inclusion, in the information security industry.

  • Personal Twitter: twitter.com/DouglasBrush
  • Podcast Twitter: twitter.com/CSI_Podcast
  • LinkedIn: linkedin.com/in/douglasabrush
  • Website: cybersecurityinterviews.com

Etizaz Mohsin – Sr. Security Consultant

Etizaz Mohsin, a Pakistani cyber security researcher who is the first to demonstrate the remote compromise of luxury hotels around the world putting millions of guests at risk demystifying the DarkHotel APT. His work has been featured by local and international media like Al Jazeera and TechCrunch. He has presented his research at multiple top-tier international cyber security conferences in United States, Canada, Europe, Middle East and East Asia including Defcon, Hitcon, Athack, Hacktivity, DeepSec, Sector, GreHack, HackFest, Arab Security Conference, Texas Cyber Summit, BSides etc. He has achieved industry certifications, the prominent of which are OSEE, OSWE, OSCE, OSCP, OSWP, CREST CRT, CPSA, EWPTX.

Geral Auger, PhD

Dr. Auger is a 17+ year cybersecurity professional, academic, and author with passion for his craft. His cybersecurity-themed YouTube channel, Simply Cyber, is all about good times and hosts a Daily Cyber Threat Briefing livestream. He has built information security programs from the ground up and loves helping businesses protect their assets. Dr. Auger also teaches in the Cyber Sciences department at the Citadel Military College. He holds a PhD in cyber operations and two Masters in Computer Science and Information Assurance. https://www.youtube.com/c/GeraldAuger https://twitter.com/Gerald_Auger https://www.linkedin.com/in/geraldauger/ https://simplycyber.io

Ian Garrett – CEO & Co-founder at Phalanx

Ian Y. Garrett is the CEO and co-founder of Phalanx, which provides human-centric data security through seamless, secure file transfers & storage.

Ian knows that the best security strategy starts with helping the users it will affect. Ian has gained this insight through his experience as a US Army Cyber officer, specializing in offensive operations and capabilities, and his work in the defense sector as a program manager and data scientist. He has spoken at numerous events and conferences on cybersecurity, artificial intelligence, and the effects of the future of work on cybersecurity.

Ian holds a B.S in Computer Science from West Point (United States Military Academy), an M.S in Computer Science from Johns Hopkins University, and conducts research in support of his Ph.D. in Computer Engineering from Virginia Tech with research focused on cybersecurity and artificial intelligence.

Jake Williams – Executive Director of Cyber Threat Intelligence at SCYTHE

Jake Williams is the Executive Director of Cyber Threat Intelligence at SCYTHE. He is an incident responder, a breaker of software, and a former government hacker probably wanted by all the cool countries. Likes: threat modeling, application security, threat hunting, and reverse engineering. Dislikes: self-proclaimed thought leaders and anyone who needlessly adds blockchain to a solution that was operating perfectly well without it.

Jason Downey – Security Consultant at Red Siege

Jason Downey is a security consultant at Red Siege where he spends 90% of his time hacking clients and 10% of his time cussing at Microsoft Word. With several years of experience shared between both offensive, defensive, and networking roles, he has a well rounded approach to security and enjoys combining knowledge and personality to come up with fun ways to convince people to do things they shouldn’t. When not on the internet, he spends his time kickboxing and bouncing around to random countries.

Jeff McJunkin – Founder at Rogue Valley Information Security, Principal Instructor at SANS Institute

Jeff McJunkin founded and consults at Rogue Valley Information Security, who helps businesses understand the business risk resulting from technical flaws, by emulating real-world, realistic adversaries in end-to-end engagements. Rogue Valley Information Security specializes in providing actionable steps for improvement in our reports, along with helping after the report is delivered. Jeff’s background is systems and network administration. He also teaches and authors courseware for the SANS Institute.

Joe Helle – Red Team Lead Penetration Tester at TCM Security

Joe is a former Army Airborne Infantry Sergeant and Veteran of the Iraq and Afghanistan wars. After serving his country he entered public service, working in a variety of non-profit roles, as well as being elected as mayor of his hometown.

After leaving elected office he set his eyes on cybersecurity, earning a bachelor’s in cybersecurity and information assurance from WGU, as well as several industry-standard certifications, including OSCP, eCPPT, SSCP, and many others.

As a Red Team Lead Joe regularly conducts external, internal, web application, and social engineering testing. Joe has discovered several zero-day vulnerabilities and holds recognition for five CVE’s. He is the creator of the popular Movement, Pivoting and Persistence and Powershell for Pentesters courses, where he teaches offensive penetration skills and techniques. He has also created three challenges on the TryHackMe platform – Gatekeeper, Internal, and Relevant.

In his free time, he researches and creates educational blog posts and video content. Joe is the developer of the Threader3000 and Oh365UserFinder tools, as well as several others.

Joff Thyer – Security Analyst at Black Hills Information Security

Joff Thyer has been a Penetration Tester and Security Analyst with Black Hills Information Security (BHIS) since 2013. He has an associate in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications (listed below). The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements. He has extensive experience covering intrusion prevention/detection systems, infrastructure defense, vulnerability analysis, defense bypass, source code analysis, and exploit research. When Joff isn’t working or co-hosting the Security Weekly podcast, he enjoys making music and woodworking.

John Askew – Security Researcher at Terrapin Labs / Senior Penetration Tester at Dean Dorton

John Askew is a penetration tester, software engineer, and occasional public speaker. He has worked full-time in offensive security since 2007, performing network and application penetration testing engagements for hundreds of clients, from local banks and small businesses to Fortune 100 companies. He is passionate about learning new skills and finding creative solutions to interesting problems, while educating and collaborating with others. Outside of work, he prefers hobbies that don’t involve a computer screen, such as outdoor running and playing the guitar.

Kathryn Carnell – Teacher at ThriveDX: UCF, NJIT

Hello, World!

Kathryn is currently an associate instructor at ThriveDX and graduated from UCF in Cybersecurity. She likes Star Wars, her cats, and living in the endless summer of southern Florida.

Katie Nickels – Director of Intelligence at Red Canary

Katie is the Director of Intelligence for Red Canary as well as a SANS Certified Instructor for FOR578: Cyber Threat Intelligence and a non-resident Senior Fellow for the Atlantic Council’s Cyber Statecraft Initiative. She has worked on cyber threat intelligence (CTI), network defense, and incident response for over a decade for the U.S. DoD, MITRE, Raytheon, and ManTech. Katie hails from a liberal arts background with degrees from Smith College and Georgetown University, embracing the power of applying liberal arts prowess to cybersecurity. Katie has shared her expertise with presentations, webcasts, podcasts, and blog posts, including her monthly livestream, the SANS Threat Analysis Rundown, as well as her personal blog, Katie’s Five Cents. She has received multiple awards, including recognition by SC Media as a Women in IT Security Advocate as well as the SANS Difference Maker Award and the President’s Award from the Women’s Society of Cyberjutsu.

Kelli Tarala

Kelli K. Tarala is a principal consultant and co-founder of Enclave Security, an information security and privacy consulting firm specializing in governance. As a security architect with privacy expertise, she specializes in IT audit, governance, policy library development and privacy strategies. With 25 years of experience in information technology, Ms. Tarala brings a wealth of knowledge to the three SANS courses she co-authors, and serves as one of the lead technical editors for the Center for Internet Security’s Critical Security Controls. She is also the lead author for many of the governance resources and creator of tools and policies at AuditScripts.com. You can follow her on Twitter @KelliTarala

Kellon Benson – Incident Handler at Red Canary

Kellon Benson is a Senior Incident Handler at Red Canary. They found their passion for information security working as a security analyst at their alma mater developing skills in digital forensics, compliance, network monitoring, threat hunting, and more. In their free time, Kellon likes getting away from the computer and enjoys board games, photography, cooking, and going to pop-punk and EDM concerts.

Ken Pyle – Partner & Exploit Developer at CYBIR, Graduate Professor of CyberSecurity. Polymath, Speaker, Researcher. Reverse Engineer, Cryptanalyst…. Mad Scientist

Ken Pyle is a partner of CYBIR, specializing in Information Security, exploit development, penetration testing and enterprise risk management.

Ken is a graduate professor of CyberSecurity at Chestnut Hill College. As an author, he has published several whitepapers and academic works on a wide range of topics including: Public Information and OSINT gathering via Social Networking, Advanced Social Engineering, Software Exploit Development, Reverse Engineering, Web Application & API hacking.

Ken is a highly rated and popular lecturer on Information Security having presented at industry events such as RSA, DEFCON, ShmooCon, Secureworld, HTCIA International, and others.

Ken is a frequently cited subject matter expert appearing in industry publications from Veracode, Accounting Today, Netdiligence, CyberScoop, and the New Jersey Law Journal.

Ken has discovered and published a large number of critical software vulnerabilities in products from companies such as Cisco, Dell, Netgear, Sonicwall, HP, Datto, Kaseya, ManageEngine, among many others.

He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design.

Matthew Toussain – Founder, Open Security

When he gets the chance, Matthew Toussain loves to take on an offbeat challenge. He’s turned a closet into a server room, a table into a computer, and a ’76 Mustang into an electric car. He’s also built an Alexa-enabled home entertainment system out of a car amp, a Raspberry Pi, a computer power supply unit, sheet metal, and plexiglass. It’s that ingenuity that underscores his work as a certified SANS instructor.

A graduate of the U.S. Air Force Academy with a B.S. in computer science and the SANS Technology Institute with an M.S. in information security engineering, he has served as the senior cyber tactics development lead for the U.S. Air Force (USAF) and worked as a security analyst for Black Hills Information Security. In 2014, he started Open Security, which performs full-spectrum vulnerability risk assessments.

An avid runner who also plays piano, guitar and violin, Matthew lives in Texas with a multitude of Cisco switches. In addition to teaching at SANS, he is an avid supporter of cyber competitions and participates as a red team member or mentor for the Collegiate Cyber Defense Competition (CCDC), the annual NSA-led event Cybersecurity Defense Exercise (CDX), and SANS Institute’s NetWars.

Michael Mimo – CSO at Copyright Clearance Center

Chief Security Office/ Sr. Director of Information Technology – Copyright Clearance Center
Prior to Copyright, Michael worked in the financial industry for over 15 years as a cyber security professional. His main experience is on cloud forensics, Computer Forensics, Incident Response, and Information Security compliance. He has been an Incident Responder in several major incidents. He currently holds GIAC certifications in GCIH, GCFE, GCFA, and GPEN. He is also a long-term member of High Technology Crime Investigation Association (HTCIA). Currently, secretary and board member of the New England HTCIA chapter.

Mike Saunders – Principal Consultant at Red Siege

Mike Saunders has worked in the ISP, financial, insurance, and agribusiness industries. He has held a variety of roles in his career including system and network administration, development, and security architect. Mike been performing penetration tests for nearly a decade. Mike is an experienced speaker, speaking at conferences such as DerbyCon, Circle City Con, regional BSides including Minneapolis, Kansas City, and Winnipeg, SANS Enterprise Summit, the NDSU Cyber Security Conference, and SANS and Red Siege webcasts.

Mishaal Khan – OSINT Investigator at Decisive Resources

A jack of all trades, master of some, Mishaal uses his Cybersecurity background along with his Privacy and OSINT skills to spread awareness, educate people and provide actionable next steps to help protect people and organizations from threats they may not be aware of.

With over 20 years of multinational experience, he’s a virtual CISO, certified Ethical Hacker, Social Engineer, the 1st IntelTechniques Certified OSINT Professional, Privacy consultant, coder, and a general problem solver.

His personal examples, anecdotes, and clear thought process allow him to connect with people effortlessly and explain complex matters in a simplified manner.

Momen Eldawakhly – Mid Senior Red Team Engineer at Cypro AB

Momen Eldawakhly (CyberGuy) is a Mid Senior Red Team Engineer/Lead at Cypro AB, with a demonstrated history of working as a Red Teamer, Penetration Tester, and Security Researcher. The author of the API Security Empire project, has has also discovered about 20xCVEs and holds the following certifications: eWPTXv2, OSWP, CRTO, CRTP. He has discovered critical and high-severity vulnerabilities in Google, Yahoo, Microsoft, AT&T, Yandex, and many more! Additionally he has volunteered as a Red Team Operator in the U.S. DoE Cyberforce competition, Security Researching in Dappy and in other IT industries..

Nick Powers – Adversary Simulation Consultant at SpecterOps

Nick is an operator and red teamer at SpecterOps. He has experience with providing, as well as leading, pentest and red team service offerings for a large number of fortune 500 companies. Prior to offensive security, Nick gained security and consulting experience while offering compliance-based gap assessments and vulnerability audits. With a career focused on offensive security, his interests and prior research focuses have included initial access techniques, evasive Windows code execution, and the application of alternate C2 and data exfiltration channels.

Phillip Wylie – Manager, Tech Evangelism & Enablement at CyCognito

Phillip Wylie is a cybersecurity professional and offensive security SME with over 18 years of experience, over half of his career in offensive security. Wylie is the Tech Evangelism & Enablement Manager at CyCognito. He is a former college adjunct instructor and published author. He is the concept creator and co-author of The Pentester Blueprint: Starting a Career as an Ethical Hacker and was featured in the Tribe of Hackers: Red Team.

Ray Davidson, PhD

Ray Davidson, PhD served as dean at the SANS Technology Institute during its founding,and now leads the Michigan Cyber Civilian Corps – the first completely civilian, state sponsored team of incident responders in the country. He continues to serve as a mentor, subject matter expert and technical reviewer for the SANS Institute, and for anyone else who will listen. He holds a doctorate in Chemical Engineering, and several infosec certifications. He has professional experience as as a newspaper carrier (on a bicycle!), telephone operator (Hello Ernestine!), pharmaceutical research scientist, and cybersecurity thought follower. He has been a college professor, and has cofounded a security startup. Mostly he is passionate about empowering others to do the right thing. And dance.

Rick Davis – Sr. CE – Cybersecurity at Microsoft

Rick Davis is currently a Senior Customer Engineer at Microsoft focusing on Cybersecurity. With over 20 years in the field he has worked in all industry verticals including public, private and federal sectors in roles ranging from architecture to red team as well as adjunct professor and guest lecturer in areas of statistics, number theory and cryptanalysis. In addition to proactively working with customers to deploy security tools, train staff and better defend their environments Rick works closely with Microsoft’s global Incident Response team responding to some of the largest threats, ransomware outbreaks and other cybersecurity events. He is a subject matter expert on key technologies such as PKI, Active Directory and the Microsoft Defender ecosystem.

Steven Flores – Adversary Simulation Consultant at SpecterOps

Steven is an experienced red team operator and former Marine. Over the years Steven has performed engagements against organizations of varying sizes in industries that include financial, healthcare, legal, and government. Steven enjoys learning new tradecraft and developing tools used during red team engagements. Steven has developed several commonly used red team tools such as SharpRDP, SharpMove, and SharpStay.

Surgey Chubarov

Sergey Chubarov is a Security and Cloud Expert, Instructor with 15+ years’ experience on Microsoft technologies. His day-to-day job is to help companies securely embrace cloud technologies. He has certifications and recognitions such as Microsoft MVP: Microsoft Azure, Offensive Security Certified Professional (OSCP), Offensive Security Experienced Penetration Tester (OSEP), Microsoft Certified Trainer, MCT Regional Lead, EC Council CEH, CPENT, LPT, CEI, CREST CPSA, CRT and more. Frequent speaker at local and international conferences like Global Azure, DEF CON, Wild West Hackin’ Fest, Security BSides, Workplace Ninja, Midwest Management Summit, Hack in the Box etc. Prefers live demos and cyberattacks simulations.

Travis Kaun – Senior Security Consultant at TrustedSec

Travis began his Information Security career-building *nix chops by managing firewalls and intrusion detection systems with a managed security services provider. After time spent on the defensive side in the corporate world, Travis put on an offensive cap for a consulting role and hasn’t looked back. Travis specializes in penetration testing, focusing on gaining a foothold and expanding to a large compromise while hunting for ‘crown jewels.’ Travis is a proud member of the TrustedSec Force team.