Speakers
Very flexible shortcode, mix and match speakers anyway you wish
Default: 3 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Mick Baccio
Mick Baccio fell in love with the idea of cyberspace at nine years old after reading Neuromancer, which led him to pursue a c
Default: 4 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Mick Baccio
Mick Baccio fell in love with the idea of cyberspace at nine years old after reading Neuromancer, which led him to pursue a c
Default: 2 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Mick Baccio
Mick Baccio fell in love with the idea of cyberspace at nine years old after reading Neuromancer, which led him to pursue a c
Rounded Square: 3 cols
Laila ElGohary
Former Deputy CTO at Biden for President
Laila ElGohary is a technologist and political strategist with over a decade of experience driving unconventional solutions i
Mike Sager
CTO, CISO, EMILY's List
Mike Sager is the Chief Technology Officer and Chief Information Security Officer for EMILY’s List, overseeing technology i
Michael Kaiser
President and CEO of Defending Digital Campaigns (DDC)
Michael Kaiser is an internationally known cybersecurity and privacy expert. In the decade prior to becoming the President an
Mick Baccio
Mick Baccio fell in love with the idea of cyberspace at nine years old after reading Neuromancer, which led him to pursue a c
Square: 3 cols
Adam Bumgarner
Adam Bumgarner currently works as an intelligence analyst at Accenture Security and brings nearly 15 years of experience in
Andrea Little Limbago
Andrea Little Limbago is a computational social scientist specializing in the intersection of technology, national security,
Andrew Schoka
Andrew Schoka is a Cyber Operations Officer at the Department of Defense and has spent the last six years tending the office
Apurv Singh Gautam
Apurv Singh Gautam works as a Threat Researcher at Cyble. He commenced work in Threat Intel 3 years ago. He works on hunting
Asheer Malhotra
Asheer is a threat researcher specializing in malware analysis, reversing, detection technologies and threat disclosures with
Andrew Schoka
Andrew Schoka is a Cyber Operations Officer at the Department of Defense and has spent the last six years tending the office
James Niven
James is a Principal Threat Researcher at Recorded Future that researches Russian based ransomware.
Adam Bumgarner
Adam Bumgarner currently works as an intelligence analyst at Accenture Security and brings nearly 15 years of experience in
Custom size: 3 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Mick Baccio
Mick Baccio fell in love with the idea of cyberspace at nine years old after reading Neuromancer, which led him to pursue a c