hiddenillusion edited this page Jan 15, 2016 · 7 revisions

Aaron Shelmire

While having “played around” with computers as Pittsburgh, PA far back as high school, Aaron held out hope to become a famous dj or video game creator in the 90s. It wasn’t until 2004 when he began his long twisted journey into information security, when the super computers he was working on at PSC were hacked by a dire and sophisticated threat that penetrated over a thousand organizations over a multi‐year period...that turned out to be a 16 year old kid in Uppsala, Sweden during the Stakkato attacks. Aaron switched gears, began piecing together a security practice at the PSC, went to grad school at Carnegie Mellon, and hopped gigs to go work at CERT/CC. He then began sharing his knowledge with graduate students at CMU as adjunct faculty. After a few years of “applied research”, he jumped gigs for more “applied”‐ness / less “research”‐ness in the Dell SecureWorks CounterThreatUnit’s Special Ops team, which created and operated an end point detection platform in Targeted Incident Response engagements. Recently he has been focused on sharing threat intelligence in a programmatic way at ThreatStream.

Dr. Ang Cui

Dr. Ang Cui, Founder & Chief Scientist of Red Balloon Security Inc., has focused on developing new technologies to defend embedded systems against exploitation. Dr. Cui is the inventor of the Software Symbiote technology and the creator of FRAK. During the course of his research, he has also uncovered a number of serious vulnerabilities within ubiquitous embedded devices like Cisco routers, HP printers and Cisco IP phones. He has received numerous awards on his work in defending and attacking ubiquitous commercial embedded devices and was recently named a 2015 DARPA Riser.

Chris Wysopal

Chris Wysopal, Co-founder and Chief Technology Officer of Veracode, is responsible for the security analysis capabilities of Veracode technology. Wysopal is recognized as an expert and a well known speaker in the information security field. He was recently named one of InfoWorld’s Top 25 CTO’s and one of the 100 most influential people in IT, by the editorial staffs of eWeek, CIO Insight and Baseline Magazine. Wysopal’s groundbreaking work in 2002 while at the company @stake, was instrumental in developing industry guidelines for responsibly disclosing software security vulnerabilities.

Clarence Chio

Clarence graduated with a B.S. and M.S. in Computer Science from Stanford University in 2014, specializing in data mining and artificial intelligence. He currently works at Shape Security, building a product that protects from malicious bots and automated attacks on Global 2000 customer websites. At Shape, he works on the big data analysis systems that are used to tackle this problem. Clarence has spoken at security conferences in Russia, Japan, Canada, and within the US. He is also the founder and organizer of the biggest data science and security meetup group in the San Francisco Bay Area.

Dino Dai Zovi

Dino Dai Zovi is the Mobile Security Lead at Square. He has been working in information security for over 15 years with experience in red teaming, penetration testing, software security, information security management, and cybersecurity R&D. Dino is also a regular speaker at information security conferences having presented his independent research on memory corruption exploitation techniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits at conferences around the world including DEFCON, BlackHat, and CanSecWest. He is a co-author of the books “The iOS Hacker’s Handbook” (Wiley, 2012), “The Mac Hacker’s Handbook” (Wiley, 2009) and “The Art of Software Security Testing” (Addison-Wesley, 2006). In 2008, eWEEK named him one of the 15 Most Influential People in Security. He is best known in the information security and Mac communities for winning the first PWN2OWN contest at CanSecWest 2007.

Dmitry Bestuzhev

Dmitry Bestuzhev serves as Head of Kaspersky Lab’s Global Research and Analysis Team for Latin America, where he oversees the anti-malware development and investigations of the company’s experts in the region. Dmitry joined Kaspersky Lab in 2007 as a Malware Analyst and was responsible for monitoring the local threat landscape and providing preliminary analyses before going on to become Senior Regional Researcher for the Latin American region in 2008. In 2010, he was appointed to his current role.

In addition to supervising the work of the network of experts in Latin America, Dmitry’s current role also includes producing reports and forecasts for the region and is frequently sought out by international media and organizations for his expert commentary on IT security. Dmitry’s wide field of expertise covers everything from online fraud, through the use of social networking sites by cybercriminals, to corporate security and cyberwar and cyber espionage. Additionally, Dmitry participates in various educational initiatives throughout Latin America.

Dmitry has more than 15 years of experience in IT security across a wide variety of roles and is fluent in English, Spanish and Russian.

Elad Yoran

Elad Yoran serves as CEO of Security Growth Partners (SGP) and Executive Chairman of KoolSpan. Elad’s nearly 20 years in the cyber security industry spans experience as an executive, investor, investment banker and a several-time successful entrepreneur. He works with leading cyber security companies and drives them to rapid growth. Elad serves as Executive Chairman of KoolSpan, and a Director at Infinidat, Red Owl Analytics and Mischel Kwon Associates.

Elad’s entrepreneurial experience includes Riptech, a provider of managed security services to governments and Fortune 500 corporations around the world, acquired by Symantec Corporation; MediaSentry, a provider of anti-piracy technology solutions to the motion picture, music and software industries, acquired by SafeNet; Sentrigo, a provider of database security acquired by McAfee; and Vaultive, a pioneering cloud encryption company. In addition, Elad was a strategic investor in and advisor to NetWitness (acquired by EMC/RSA), ThreatGrid (acquired by Cisco), and Insightix (acquired by McAfee).

Jason Trost

Jason Trost is the VP of Threat Research at ThreatStream, Inc. and leads ThreatStream Labs, the research team. He has worked in security for more than ten years, and he has several years of experience leveraging big data technologies for security data mining and analytics. He is deeply interested in network security, DFIR, honeypots, big data and machine learning. He is currently focused on building highly scalable systems for processing, analyzing, and visualizing high speed network/security events in real-time as well as systems for analyzing massive amounts of malware. He is a regular attendee of Big Data and security conferences, and he has spoken at Blackhat, BSidesSF, BSidesLV, BSidesDC, FloCon, and Hadoop Summit. He has contributed to several security and big data related open source projects including the Modern Honey Network (MHN), BinaryPig, ElasticSearch, Apache Accumulo, and Apache Storm. He has held senior technical positions with the U.S. Department of Defense, Booz Allen Hamilton, and Endgame Inc. He holds a M.S. in Information Security from Georgia Institute of Technology and a B.S. in Computer Science from Florida State University.

Joseph Zadeh

Joseph Zadeh studied mathematics in college and received a BS from University California, Riverside and an MS and PhD from Purdue University. While in college, he worked in a Network Operation Center focused on security and network performance baselines and during that time he spoke at DEFCON and Torcon security conferences.

Most recently he joined Caspida as a security data scientist. Previously, Joseph was part of the data science consulting team at Greenplum/Pivotal helping focused on Cyber Security analytics and also part of Kaiser Permanente’s first Cyber Security R&D team.

Lenny Zeltser

Lenny Zeltser is a seasoned business and tech leader with extensive experience in information technology and security. As a product management director at NCR Corp, he heads the software and services group that address customers’ data protection needs. Before NCR, Lenny led the enterprise security consulting practice at a major cloud services provider. He also trains professionals in digital forensics and malware combat at SANS Institute. In addition, Lenny is a Board of Directors member at SANS Technology Institute.

Lenny’s expertise is strongest at the intersection of business, technology, and information security and includes incident response, cloud services, and product management. He frequently speaks at conferences, writes articles, and has co-authored books on network security and malicious software. Lenny has an MBA degree from MIT Sloan, a Computer Science degree from the University of Pennsylvania and has earned the prestigious GIAC Security Expert designation from SANS Institute.

Rod Soto

Rod Soto has over 15 years of experience in information technology and security. Currently working as a Security Researcher at Splunk User Behavioral Analytics. He has spoken at ISSA, ISC2, OWASP, DEFCON, Hackmiami, Bsides and also been featured in Rolling Stone Magazine, Pentest Magazine, Univision and CNN. Rod Soto was the winner of the 2012 BlackHat Las vegas CTF competition and is the founder and lead developer of the Kommand && KonTroll competitive hacking Tournament series.

Stephen A. Ridley

Stephen A. Ridley is principal researcher at Xipiter. Stephen has more than 10 years of experience insoftware development, software security, and reverse engineering. Within that last few years, he has presented his research and spoken about reverse engineering and software security research on every continent except Antarctica. He’s been featured on NPR, SecurityWeek, Wired and numerous other publications.

Prior to his current work at Xipiter, Mr. Ridley previously served as the Chief Information Security Officer of a financial services firm. Prior to that, various information security researcher/consultant roles (Matasano, et al), Senior Security Architect at McAfee. Earlier in his career, Stephen was a founding member of the Security and Mission Assurance (SMA) group at a major U.S. Defense contractor where he did vulnerability research and reverse engineering in support of the U.S. Defense and Intelligence community.

Vera Sell

Vera Sell is the VP of Marketing and a co-founder at Senrio (http://senr.io/), an enterprise-grade security solution for connected embedded devices (aka “Internet of Things”) serving the industrial control, MedTech, and corporate IT industries. She is an active Angel investor with the Oregon Angel Fund and TiE Angels Oregon; serving as the TiE Angels Program Director and member of the screening committee throughout 2015. From this vantage point, Vera reviewed and screened 100+ investment applications, worked closely with entrepreneurs to get them pitch- and funding-ready, and personally invested in four local tech-startups. She is the Operational Partner in the TAP Fund, a side car fund investing alongside TiE Angels Oregon. Prior to her work at Senrio, Vera held product marketing and marketing communication positions at Tektronix, Biamp Systems and Avenra with a focus on connected and distributed technologies. Vera holds a Master of International Management from Portland State University and a Bachelor in International Business (Double Degree) from the University of Applied Sciences in Dresden and Plekhanov Russian University of Economics, Moscow, Russia.

Clone this wiki locally
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.