
Founder at Hackerware
- Soldering Village

Andy Giron is a Senior Security Researcher at Datadog by day, he focuses on threat cloud-landscape. By night he’s an Incident Response instructor in California.
- Devops and threat research walk into a bar...

Previously worked at AWS and Athinoula A. Martinos Center for Biomedical Imaging
Fan of research & software intersections
Background in Computer Science from Carnegie Mellon
- Devops and threat research walk into a bar...

Aviv Mussinger, an alumnus of the elite 8200 unit with a B.Sc. in Electrical Engineering and Computer Science from Tel Aviv University, is a seasoned innovator in tech. His R&D prowess spans designing units for Mellanox's first 1Gb switch to building high-frequency trading infrastructures. Notably, Aviv led the research and development at NSO Group, investigating the application layer for security flaws and building a solution around them. Now at Kodem, he leverages this expertise to bring an attacker's perspective to application security and build the world's first AI native application security platform.
- Adversarial Intelligence: Redefining Application Security through the eyes of an attacker

Bogdan's expertise includes penetration testing, vulnerability assessments, and securing Active Directory environments. He holds more than 20 cybersecurity certifications, such as CEH, OSCP, and CISM, reflecting his deep commitment to the industry. Barchuk is also active in the cybersecurity community, sharing insights and participating in events like OWASP, Pacific hackers, DEF CON and Black Hat
- SAST AI

Brian is a Solutions Architect for SUSE. He has been in the industry since the mid 90's helping customers understand the technology and how to best use it for their unique scenario. Brian has presented at many conferences and provided sessions for a variety of technical seminars.
- Layered Security for Kubernetes

Eoin Wickens is the Director of Threat Intelligence at HiddenLayer and specializes in AI security, threat research, and malware reverse engineering. He has authored numerous articles on AI security, co-authored a book on cyber threat intelligence, and spoken at conferences such as the SANS AI Cybersecurity Summit, BSides SF, LABSCON, 44CON, and delivered the 2024 ACM SCORED opening keynote. Eoin also serves as a co-lead of the OpenSSF Model Signing Project, an initiative under the Open Source Security Foundation's AI/ML Working Group, aiming to build a more secure AI supply chain. Eoin lives off the coast of mainland Ireland, and when he's not out at sea, he’s probably thinking about how to get back there.
- KEYNOTE

Eric is a seasoned professional with extensive experience in the tech industry, spanning from full stack development to Solutions Architecture. Throughout his career, he has gained hands-on expertise working on cutting-edge distributed systems projects. Leveraging his diverse background, Eric has recently transitioned into the AI Security space, where he tackles new and complex challenges. Outside of work, he enjoys spending time with his family, 3D printing with his son and indulging in his passion for cooking, especially barbecue.
- Rules Writers and Threat Hunters in the Age of AI

With over 7 years of experience, Erik has strong experience across a variety of proactive assessments including
penetration tests and application assessments. Erik is one of Mandiant’s experts in mobile application security,
having co-built and publically delivered Mandiant’s Practical Mobile Application Security course at BlackHat USA in
2022 and soon at BlackHat USA 2023 and BlackHat Asia 2023.
Erik also has extensive experience in embedded device assessessments across industries such as health care,
transportation, consumer goods, and financial technology. This includes public research and CVEs in IoT platforms
(https://www.mandiant.com/resources/blog/mandiant-discloses-critical-vulnerability-affecting-iot-devices)
- Tabletop War Gaming

I’ve been working as Head of Identity Threat Labs and Global Product Advocate at senhasegura, Founder at Black&White Technology, Cybersecurity Advocate, Snyk Ambassador, Application Security Specialist and Hacking is NOT a crime Advocate. International Speaker at Security and New technologies events in many countries such as US (Black Hat & Defcon), Canada, France, Spain, Germany, Poland, Black Hat MEA - Middle-East - and others, I’ve served as University Professor in Graduation and MBA courses at Brazilian colleges, in addition, I'm Creator and Instructor of the Course - Malware Attack Types with Kill Chain Methodology (PentestMagazine), PowerShell and Windows for Red Teamers(PentestMagazine) and Malware Analysis - Fundamentals (HackerSec).
- Vulnerability Exploitation in the Cloud: A Cross-Platform Graph-Based Attack

Jake Williams (aka MalwareJake) is a seasoned security researcher with decades of experience in the technology and security industries. Jake is a former startup founder, former senior SANS instructor and course author, and an intelligence community and military veteran. He loves forensics, incident response, cyber threat intelligence, and offensive methodologies. Today, Jake is an IANS faculty member, VP of R&D at Hunter Strategy, independent security consultant, and is performing security-focused research to benefit the broader community. He has twice won the DoD Cyber Crime Center (DC3) annual digital forensics challenge and is the recipient of the NSA Exceptional Civilian Service Award.
- KEYNOTE

Jason Haddix AKA jhaddix is the CEO and “Hacker in Charge” at Arcanum Information Security and the field ciso for flare.io. Arcanum is a world class assessment and training company.
Jason has had a distinguished 20-year career in cybersecurity previously serving as CISO of Buddobot, CISO of Ubisoft, Head of Trust/Security/Operations at Bugcrowd, Director of Penetration Testing at HP, and Lead Penetration Tester at Redspin. He has also held positions doing mobile penetration testing, network/infrastructure security assessments, and static analysis. Jason is a hacker, bug hunter and currently ranked 57th all-time on Bugcrowd’s bug bounty leaderboards. Currently, he specializes in recon, web application analysis, and emerging technologies. Jason has also authored many talks on offensive security methodology, including speaking at cons such as DEFCON, Bsides, BlackHat, RSA, OWASP, Nullcon, SANS, IANS, BruCon, Toorcon and many more.
- Attacking AI

Jason Kramer is a security researcher at ObjectSecurity, where he is dedicated to advancing the state of the art in binary vulnerability analysis, and secure and robust AI. With a bachelor's degree in computer science from San Diego State University, he is focused on ensuring trust, security, privacy, bias, and robustness of AI/ML models. Jason has led the development efforts of a commercial solution for the detection and repair of vulnerabilities in deep learning systems. His passion for improving the field has driven him to push the boundaries of what is possible and make a meaningful impact in the fields of cybersecurity and AI.
- Beyond SAST: Advancing Vulnerability Detection with Symbolic Execution

Cybersecurity and data analytics expert with 15+ years of experience and background in Digital Forensics and Mathematics. As Principal Consultant and Director of Security & Data Analytics at Fulcrum Technology Solutions, John leads cybersecurity operations and detection engineering. His expertise includes SIEM/SOC operations, vulnerability management, and big data. Founder of Next Gen Cyber Ed, a non-profit supporting K-12 cybersecurity education.
- Beyond Detection: Building a Living Security Knowledge Ecosystem with SNARF

Julian has a storied career in cybersecurity, initially focusing on offensive security. He has developed several popular open-source security tools, including statistics-based password-cracking methods. Julian also co-founded Truffle Security, creators of the widely used open-source tool TruffleHog. Recently, he established a new DEFCON village called GameHacking.GG promotes interest and awareness in-game security.
- GameHacking 101

Lisa is a seasoned cybersecurity executive with nearly two decades of global experience in high-growth
startups, where she has built business units, delivery functions, and customer-facing teams from the
ground up. She has led go-to-market efforts and driven long-term customer value.
A veteran of the Intelligence Directorate of the Israel Defense Forces, Lisa brings a mission-focused,
outcome-driven mindset shaped by her exposure to high-stakes, complex environments.
She is the CEO and Co-founder of ThreatLight. Previously, she was a founding executive at Cybereason
Japan, helping establish its presence and lead it to market leadership and later served as Global EVP of
Security Services Strategy & Planning, leading the design and growth of Cybereason’s Security services.
Based in Tokyo since 2013, Lisa sits on the Advisory Board of ISIC Japan. Most recently she was named
one of The Most Inspiring Women in Cybersecurity 2025.
- From pocket to Pwn: How we hacked a multinational corporation for $200 with just what’s in our pockets (and theirs)

As a Senior Solutions Engineer at Axonius, Lucas has worked with several multinational F500 organizations to obtain situational awareness on asset visibility and defensive posturing. Previously he represented notable Data Forensics and Incident Response organizations where he worked with commercial enterprises, the defense industrial base, and government institutions to deploy measures designed to defend against the world's most sophisticated attack groups.
- Breaking Down Silos: Unify Assets, Minimize Attack Exposure

Malcolm Harkins is Chief Security and Trust Officer at HiddenLayer. Harkins has more than two decades of experience in information security leadership roles at top technology companies, including Intel, Cylance, and others. He’s written multiple books on risk management, information security, and IT and earned awards from the RSA Conference, ISC2, Computerworld, and the Security Advisor Alliance. Harkins has testified before the Federal Trade Commission and U.S. Senate Committee on Commerce, Science, and Transportation. Harkins is a Fellow with the Institute for Critical Infrastructure Technology, a non-partisan think tank providing cybersecurity expertise to the House of Representatives, Senate, and various federal agencies. He holds a bachelor’s degree in economics from UC Irvine and an MBA from UC Davis. Harkins also previously taught at UCLA’s Anderson School of Management and Susquehanna University.
- KEYNOTE

With over 15 years in the private sector, Mr. Lombardi has a solid background in
networking and operating system administration. He has a thorough understanding of
malware, computer forensics, and tactics, techniques, and procedures that are leveraged
by attackers. He is also deeply experienced in mobile forensics.
Prior to joining Mandiant, Mr. Lombardi served as an independent consultant under his
own company for 15 years. There he led client engagements on internal security
initiatives and served as a digital forensics expert in a broad range of intellectual
property theft, network compromise, and internal investigations. Mr. Lombardi
frequently speaks at national and local security conferences on digital forensics and
incident response.
- Tabletop War Gaming

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEF CON, DEF CON China, Black Hat USA, HOPE, BSidesSF, BSidesLV, RSA, and many other conferences and colleges. He founded Infosec Decoded, Inc., and does corporate training and consulting for several Fortune 100 companies, on topics including Incident Response and Secure Coding.
- Securing Critical Infrastructure

Sunil Gottumukkala is a cybersecurity executive and engineer with deep experience securing operating systems and cloud-scale infrastructure. He is the co-founder and CEO of Averlon, an agentic AI platform built to help security teams surface, prioritize, and resolve cloud vulnerabilities at scale. Previously, he was SVP of Cybersecurity at Salesforce, where he led efforts to protect global cloud infrastructure. Before that, he drove core OS security initiatives at Microsoft, helping harden the Windows platform. He brings a rare blend of deep technical expertise and executive leadership, with an MS in Computer Science from NJIT and an MBA from Wharton.
- KEYNOTE

Tim is a highly experienced Cybersecurity expert with over two decades in both offensive and defensive cybersecurity, having built & led Incident Response (IR), Red Team, and Blue Team operations and developed technological platforms to revolutionize Incident response at scale.
A Major in the British Army Cyber Reserves, Tim serves as a Subject Matter Expert to the British Ministry of Defence (MoD) specializing in both defensive and offensive security.
Having led hundreds of engagements globally, Tim has a wealth of experience in both defending and exploiting every conceivable industry vertical along with an astute knowledge of what technologies and processes work and where gaps lay in existing solutions and security programs.
Prior to Co-founding ThreatLight, Tim’s career included significant technical and leadership positions in top cybersecurity and technology firms, such as Accenture, Cybereason, Symantec, Airbus and Thales, contributing to his broad knowledge and innovative approach in the field.
- From pocket to Pwn: How we hacked a multinational corporation for $200 with just what’s in our pockets (and theirs)

Toshiro Nagata Bolivar is an Offensive Security Lead at Open-Sec and a professor at the Catholic University of Santa María (UCSM). He has extensive experience in cybersecurity and holds multiple industry-recognized certifications, including Certified Red Team Operator (CRTO), Certified Network Defender (CND), DevSecOps Engineer (ECDE) from EC-Council, eLearnSecurity Certified Professional Penetration Tester (eCPPTv2), Web Application Penetration Tester (eWPT), Junior Penetration Tester (eJPT), Certified API Security Analyst (CASA), and Multi-Cloud Red Teaming Analyst (MCRTA), among others.
At Open-Sec, Toshiro specializes in offensive security, penetration testing, and vulnerability analysis, focusing on API security and the OWASP framework. His expertise includes web and infrastructure penetration testing in both internal and external networks, threat intelligence analysis, and real-world red teaming engagements. He is also involved in research on DLL Hijacking and API security exploitation, including advanced testing of RESTful, GraphQL, SOAP, and gRPC APIs.
As a professor at UCSM, Toshiro teaches cybersecurity, network infrastructure, and system security, contributing to the development of the next generation of security professionals. His work bridges the gap between theory and practice, applying real-world offensive security techniques to academic training and research.
- Exploitation Techniques in APIs: RESTful, SOAP ,GraphQL and gRPC,

Ulrich Lang received his PhD from the University of Cambridge Computer Laboratory (Security Group) on access policies for middleware in 2003 after having completed a master's degree in Information Security from Royal Holloway College (London) in 1997. With 20+ years in infosec, he is a renowned cybersecurity thought leader in OT security, binary analysis, trusted AI, access control policy etc. He was on the Board of Directors of the Cloud Security Alliance (Silicon Valley Chapter). He is responsible for the business and technical strategy, architecture and direction of ObjectSecurity and its product portfolio. He has published over 150 papers/presentations, 10+ patents, and has previously worked as a proposal evaluator, project evaluator, conference program committee, panel moderator, consultant, and book author.
- Beyond SAST: Advancing Vulnerability Detection with Symbolic Execution

Vlad is the co-founder and cybersecurity expert at ELLIO and President of the Anti-Malware Testing Standards Organization (AMTSO).
A true cybersecurity enthusiast, Vlad’s passionate about network security, IoT, and cyber deception. Before ELLIO, he founded and led the Avast IoT Lab (now Gen Digital), developing security features and researching IoT threats. He has spoken at many conferences, including Web Summit and South by Southwest (SXSW), where he demonstrated IoT vulnerabilities
- Netsec is dead(?): Modern Network Fingerprinting for Real-World Defense