Speakers
Very flexible shortcode, mix and match speakers anyway you wish
Default: 3 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Jon Mentzell
Jon Mentzell has been working in the computer industry for over 25 years, with a focus on Linux and Security. Jon switches b
Default: 4 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Jon Mentzell
Jon Mentzell has been working in the computer industry for over 25 years, with a focus on Linux and Security. Jon switches b
Default: 2 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Jon Mentzell
Jon Mentzell has been working in the computer industry for over 25 years, with a focus on Linux and Security. Jon switches b
Rounded Square: 3 cols
Amelie Koran
Amélie is a Senior Technology Advocate at Splunk, focused on helping organizations transform, grow and secure themselves in
Brianna Wu
Candidate for US House of Representatives
Brianna Wu is a Democratic candidate for the United States Congress in the Massachusetts 8th
District. She is a computer pro
Mike Sager
CTO, CISO, EMILY's List
Mike Sager is the Chief Technology Officer and Chief Information Security Officer for EMILY’s List, overseeing technology i
Michael Kaiser
President and CEO of Defending Digital Campaigns (DDC)
Michael Kaiser is an internationally known cybersecurity and privacy expert. In the decade prior to becoming the President an
Mick Baccio
Mick Baccio fell in love with the idea of cyberspace at nine years old after reading Neuromancer, which led him to pursue a c
Square: 3 cols
Adam Bumgarner
Adam Bumgarner currently works as an intelligence analyst with iDefense at Accenture Security and brings more than 10 years o
Adam Gilbert
Adam Gilbert is an avid security researcher and founder of AGDC Services, a boutique computer security firm which provides ma
Aelon Porat
Aelon Porat is an information security manager at Cision. He has extensive experience attacking and defending corporate envir
Ahmed Eissa
By day, Ahmed Eissa is a senior intelligence analyst with the Threat Analysis and Investigations team at LookingGlass Cyber S
Alan Stacilauskas
Mr. Stacilauskas has over 19 years of experience in information technology and cyber security. He specializes in continuous
Amelie Koran
Amélie is a Senior Technology Advocate at Splunk, focused on helping organizations transform, grow and secure themselves in
Wes Hurd
Wes is a member of the Intelligence team at Dragos, focused on collection, analysis, and automation for Industrial and ICS sp
Oana Enache
Oana has spent the past 5 years working on Identity Security and Azure Active Directory. Currently she works as Program Manag
Matt Bodman
Mr. Bodman is a Senior Counsel and Privacy Officer at Maryland cybersecurity company. He previously served over 22 years in
Marc Fruchtbaum
Marc Fruchtbaum is a Threat Hunter at IronNet Cybersecurity. Marc is also a 1LT in the Maryland Defense Force as the Hunt Tea
Pat Heaney
Pat is a CSOC Consultant with Security Risk Advisors. He joined SRA after graduating from The Pennsylvania State University,
Chujiao Ma
Chujiao Ma is a security research and development engineer at Comcast. Her research includes a wide range of topics from de-i
Adam Bumgarner
Adam Bumgarner currently works as an intelligence analyst with iDefense at Accenture Security and brings more than 10 years o
Custom size: 3 cols
Brian Baskin
Technical Director
Brian Baskin is a Technical Lead of Threat Research with VMware Carbon Black’s Threat Analysis Unit with a specialty in dig
Jim Elliott
Jim Elliott is a computer security researcher for the Dept of Defense, and brings over 15 years of experience in the field. H
Brittany Ash
Brittany Ash is a cybersecurity threat researcher engaging with both public and private sector organizations. Brittany has ov
Shawn Thomas
Shawn has spent many years in network defense as an analyst, incident responder, threat hunter, and an obsessive clicker of l
Jon Mentzell
Jon Mentzell has been working in the computer industry for over 25 years, with a focus on Linux and Security. Jon switches b