The speaker’s profile picture
-
  • Car Hacking Village
The speaker’s profile picture
-

InfoSec Battlebots

  • InfoSec Battlebots
The speaker’s profile picture
0xSeeker

I’m 0xSeeker, currently CTI & CTH analyst in the purple team @Gatewatcher. Part of my cybersecurity experience, I've spent 6 years focusing on red team and CTI on industrial area.

  • Healthcare’s Anatomy: dissection of Dicom, a protocol to Nmap your body!
The speaker’s profile picture
Alana Witten

Alana is a final-year student with a few years of industry experience, previously in threat intelligence and more recently as a security engineer.

When she is not nerd snipped by Bleeping Computer articles or CTF challenges, she can be found in a rock climbing gym or exploring new cafes, documenting them in an endless spreadsheet (https://brownbearsec.github.io).

  • What’s inside the open directory from 96 different threat actors?
The speaker’s profile picture
Alan O'Reilly

Alan is a 26 year old working as a community employment caretaker in Ireland, and a 3x winner of the TraceLabs Global CTF.

  • It's been a good run: why I stopped doing OSINT CTFs
The speaker’s profile picture
Alex Villegas

Cybersecurity graduate student at Central Washington University. Avid gamer and cybersecurity enthusiast. Currently living in Portugal as a Digital Nomad.

  • Gamihackation - Learning the Gaming Attack Surface
The speaker’s profile picture
Amanda Thomson

A recent graduate from a cyber security masters degree I have an interest in threat hunting, cryptography and future web technologies.

  • From Molecules to Malware: Visualising TLS Fingerprints with TMAP to Hunt Malicious Domains.
The speaker’s profile picture
Amankumar Badhel

Amankumar Badhel is a passionate threat researcher with a sharp focus on detection engineering. He brings deep insights from the frontlines of offensive security. Blends cutting-edge research with practical detection strategies to help organizations stay ahead of evolving threats.

  • Commanding Heights: Unmasking COM-Based UAC Bypass Techniques.
The speaker’s profile picture
Ana Maia

I am a Cyber Security Student from Manchester Metropolitan University in my second year of study. throughout my first year and carrying on into my second I have engaged in various projects with my university to bring more awareness to inclusivity and to help other students be more aware of those who are different to them. I'm always looking for new opportunities to learn and discover more about the cyber security world and to advocate for those that don't get the chance to.

  • Password Hell - accessibility challenges in Cyber Security
The speaker’s profile picture
Andy Smith

Andy Smith is a Principal Security Architect for an international energy firm, and teaches Defensible Security Architecture & Engineeering for SANS. In his spare time, Andy supports the OWASP LLM Top-10 project, and occasionally publishes cyber educational material on Youtube.

  • Post-Quantum Cryptography for 2025
The speaker’s profile picture
Archie Essien

Cyber Incident Response Analyst Archie Essien is a dynamic and skilled cyber security specialist. In his role at Solis, he focuses on investigating email compromises and ransomware attacks. With more than five years’ experience in the sector, Archie has a talent for understanding how cyber incidents occur and devising effective responses to mitigate their impact.

Archie’s enthusiasm for cyber security first took hold while he was studying for a degree in Computer Networks and happened to take a module on the topic. This new interest encouraged him to take a job in IT support with SS&C Technologies, where he gained valuable experience managing IT infrastructure and resolving technical issues.

Since joining Solis’ sister company CFC in 2021, Archie has focused on cyber incident response, earning respect for his thorough investigations and his ability to stay current with emerging cyber threats. His work primarily involves resolving complex cyber incidents and talking clients through what are often highly stressful situations, transforming initial anxiety into reassurance.

Archie brings an infectious energy and enthusiasm to every project he works on. Motivated by a longstanding passion for helping others, he works closely with clients - and with colleagues in Solis and CFC - providing crucial insights that help shape strategy and decision-making.

With his outstanding technical acumen and keen eye for detail, Archie plays a key role helping Solis clients recover from cyber incidents and build resilience against future threats.

  • Turning to the dark side – Utilizing offensive techniques in incident response
The speaker’s profile picture
Arthur Frost

My name is Arthur Frost and I work for Flutter intl. as a contractor on the blue team.
I also study my MSc in Cyber Security at Leeds Beckett, and I am part of the Leeds Ethical Hacking Society, too, where I help with CTFs.
My interests are varied, but within security, I am particularly interested in zero-days, how enterprise environments can secure themselves against advanced threats, and how AI can be leveraged defensively and offensively.
Apart from that, I am interested in economics, history, geopolitics, literature, and languages - I am fluent in English and Russian, and I am also learning Japanese - if you speak it then connect with me!

  • MITRE ATLAS - exploring AI vulnerabilities
The speaker’s profile picture
Bailey Williams

Bailey is a cybersecurity and political science student and contributor to the WhiteRabbitNeo open-source project. She is passionate about cybersecurity education and is excited about the growing integration of AI into cybersecurity.

  • Threat analysis in minutes and other AI super powers
The speaker’s profile picture
Balazs Bucsay

Balazs Bucsay is the founder & CEO of Mantra Information Security that offers a variety of consultancy services in the field of IT Security. With decades of offensive security experience, he is focusing his time mainly on research in various fields including red teaming, reverse engineering, embedded devices, firmware emulation and cloud. He gave multiple talks around the globe (Singapore, London, Melbourne, Honolulu) on different advanced topics and released several tools and papers about the latest techniques. He has multiple certifications (OSCE, OSCP, OSWP) related to penetration testing, exploit writing and other low-level topics and degrees in Mathematics and Computer Science. Balazs thinks that sharing knowledge is one of the most important things, so he always shares it with his peers. Because of his passion for technology, he starts the second shift right after work to do some research to find new vulnerabilities.

  • Defeating Encryption By Using Unicorn Engine
The speaker’s profile picture
@barsteward

After around 15 years of working on embedded systems, including writing ROM based secure bootloaders, I switched hats; now I try to ruin other people's release schedules by exploiting the security goals of microcontrollers, primarily using non-invasive physical attacks.

  • Roll your own vulnerabilities; an introduction to Fault-Injection for exploiting bug-free code in embedded systems.
The speaker’s profile picture
Becky Hall

Becky Hall is a recognised expert in cyber security, with a proven track record of over a decade in safeguarding digital ecosystems across diverse industries.
Her work focuses on blending technological innovation with robust security strategies, ensuring that individuals and organisations can navigate the digital landscape safely and effectively.

In addition to her professional expertise, Becky is the creator of the popular Garden to Grid article series, which explores the intersection of technology, sustainability, and security. Through her writing, she delves into how sustainable practices can be integrated into modern tech solutions, paving the way for a greener and more secure future.

Becky is passionate about mentoring the next generation of cybersecurity professionals and fostering an inclusive environment in the tech industry. With her combined focus on practical security measures and environmental awareness, she is uniquely positioned to contribute valuable perspectives to the future of technology and security.

  • From Garden to Grid: Lessons from Gardening for a Resilient Cybersecurity Strategy
The speaker’s profile picture
Cássio Pereira

Cassio Batista Pereira, a.k.a. @cassiodeveloper, is a Software Developer and Architect by formation. He acts as an AppSec Expert and thus helps companies and professionals to build safer solutions. He has two decades of experience in the IT market and Information Security in the most varied business segments, where he gained knowledge to work with different technologies, programming languages and processes. He is an evangelist for the Secure Development culture.

  • The AppSec lessons from Iron Man
The speaker’s profile picture
Craig S. Blackie

Hacker of all things.

  • Bypassing BitLocker by Sniffing the SPI Bus
The speaker’s profile picture
Daniel Crossley
  • SIEM: Escape and Evade
The speaker’s profile picture
Daniel Johnston

Daniel Johnston is a security researcher in the Imperva Threat Research group. Daniel holds a MSc in Cyber Security from Queen's University Belfast, and has over 7 years of experience in network and web application security. At Imperva Daniel specializes in web application security, bot detection, malware and threat intelligence research.

  • Unmasking APT Malware Activity: Real-World Malware Campaign Tracking Using Big Data Analytics and Machine Learning Clustering
The speaker’s profile picture
Darren

Pharmacist - 26 years
Nerd - 39 years

  • An introduction to Patient Medication Records
The speaker’s profile picture
Darren McDonald

Darren has been penetration testing for 16 years, spending the last 6 years running his own small penetration testing consultancy Cryptic Red. He's into red teaming, hardware hacking, and coding rust.

  • Bypassing BitLocker by Sniffing the SPI Bus
The speaker’s profile picture
David Kennedy

David is a Red Teamer at JUMPSEC. Before working in Cyber Security he has worked for many years in financial services IT focusing on trading systems. These days he is passionate about all things Adversary Simulation, especially exploring and researching the latest techniques in regards to modern Red Teaming infrastructure.

  • BYOTB - Bring Your Own Trusted Binary
The speaker’s profile picture
David Rushmer

David started his career in developing and operating large scale analytical platforms aimed at providing cyber defense. Over the following decade, that focus shifted to defensive research and operations, most notably at Cylance and Blackberry and was the Global Director of Threat Research but has always maintained a hands on approach.

  • Malware Unmasked: Supercharging Cyber Defense with Machine Learning Magic
The speaker’s profile picture
David V.

David V. has been working behind the scenes in cybersecurity for over a decade. He has worked for NCSC, supported Cabinet Office with the GBEST scheme; has been a Principal Security Tester at QinetiQ; managed dozens of red team engagements at LRQA (formerly Nettitude); is a qualified CCSAM and Crest Assessor; and is currently Head of Red Team at Prism Infosec.

Outside of security testing, David is a Form 1 LudoSport (an international Lightsaber combat sport) Instructor for LudoSport Gloucestershire; a family man; cat lover; amateur 3d printer enthusiast; photographer, and astronomer.

  • To you its a Black Swan, to me its a Tuesday
The speaker’s profile picture
David Willis-Owen

David Willis-Owen is the founder of AIBlade - the first blog and podcast focussed solely on AI Security. AIBlade has reached the top 200 Technology podcasts in the UK, and producing this has allowed David to gain deep technical knowledge on attacking and defending AI. David is an experienced presenter and has delivered over 20 talks on a variety of cybersecurity topics, both internally as a JP Morgan Security Engineer and externally as an Independent Security Researcher. Additionally, he has authored insightful articles for CIISec. In his spare time, David enjoys kickboxing, learning Spanish, and responsibly disclosing vulnerabilities to large organizations such as OpenAI.

  • The Practical Application of Indirect Prompt Injection Attacks: From Academia to Industry
The speaker’s profile picture
Dita Pesek

Dita is a former offensive cybersecurity consultant, now working as a social engineering consultant and therapist under her BrainHacker brand. Her long-term interest in technology and the human mind ultimately led her to venture into the field of cybersecurity. Her knowledge of hacking and human behavior inspired her to explore how companies and individuals are hacked in real life and what techniques criminals tend to implement.

  • Let’s Phish: How to Scam Everyone, Everywhere, All at Once
The speaker’s profile picture
Egonna Anaesiuba-Bristol

Egonna Anaesiuba-Bristol has recently completed her MSc in Cybercrime and Cybersecurity, successfully pivoting from over five years of experience in Law into the dynamic world of cybersecurity. Her unique background brings a fresh perspective to the industry, blending legal expertise with advanced technical knowledge.

Currently, she is enhancing her practical skills through a cybersecurity internship with Women in Cybersecurity (WiCyS), where she also serves as the founder and student chapter leader for the WiCyS Surrey Chapter. This dual role highlights her commitment to both professional growth and promoting diversity and inclusion in the field.

Her journey into cybersecurity has been marked by notable achievements, including winning a social engineering competition hosted by the Cybersecurity Infrastructure Security Agency (CISA). She has also gained valuable experience in Cyber Threat Intelligence (CTI), further expanding her skill set, and giving her valuable insights into the practical aspects of the field.

Drawing on her legal background and emerging cybersecurity expertise, she is passionate about guiding professionals through career transitions into the tech industry. She emphasizes the value of transferable skills, community engagement, and hands-on experience, demonstrating how individuals from non-technical backgrounds can make meaningful contributions to cybersecurity.

Her journey exemplifies the potential for diverse perspectives to tackle emerging challenges in the field, enriching the industry with unique insights and approaches.

  • From Zero to Cyber Hero: A Non-Techie's Guide to Breaking into Cybersecurity
The speaker’s profile picture
Emma Yuan Fang

Emma is a Senior Cloud Security Architect at EPAM, with extensive experience in cloud, DevSecOps, and security architecture & strategy. In her role, she designs and architects security solutions for her clients' cloud transformation projects. Formerly at Microsoft, she delivered cybersecurity projects and technical workshops to diverse clientele, from emerging tech startups to established FTSE 100 firms. She is passionate about cloud security, Zero Trust, and AI/ML security. Alongside her professional work, Emma is dedicated to advocate for a more diverse workforce in cybersecurity through mentorship and community programs. She is an international public speaker at various cybersecurity conferences across the Europe and the USA, and volunteers as the Executive Lead at WiCyS UK&I, driving the career advancement initiatives. She also serves as a member of Industry Advisory Board of the computer science faculty at the University of Buckingham.

  • The Past, Present and Future of Cloud-Native Security
The speaker’s profile picture
Felipe Solferini

Felipe is a senior (???) penetration tester and self-proclaimed security researcher. Most of the time, he’s mashing the wrong buttons, hoping for the worst but expecting the best, or just yoloing like there’s no tomorrow. Occasionally, he wonders if life is just a CTF.

  • Inside the Phish Tank: A Guide to Compromising Phishing Infrastructure
The speaker’s profile picture
Feroz Salam

Feroz Salam is a Security Architect at Isovalent, a Cisco company.

  • VEXatious vulnerabilities: CVE management for the overwhelmed security engineer
The speaker’s profile picture
George Chapman

Cyber Security Consultant specialising in Red Teaming

  • The Psychology of Cyber: Navigating a Crisis Like a Pilot
The speaker’s profile picture
Gurunatha Reddy G

Passionate Security Engineer with a love for building and breaking things

  • Continuous threat modelling using Large Language Models
The speaker’s profile picture
Guy Arazi

With a lifelong passion for security research, Guy has been deeply involved in both developing and testing applications from a young age. Having played diverse roles in both defensive and offensive security, he leverages this dual expertise to advance vulnerability discovery, detection, and mitigation across various sectors. Specializing in web applications and cloud services, he is dedicated to addressing critical security issues on a global scale. Guy is currently a researcher at the MSRC V&M group.

  • Elevate Your SSRF Game: Weaponize Internal DNS Records to Expose Hidden Endpoints
The speaker’s profile picture
Guy Kramer

Guy Kramer is a strategic technologist and founder of Cyber Intelligence & Advisory Ltd. With over 17 years of experience in the field, his expertise encompasses the design, development and implementation of security solutions. His in-depth knowledge of cybersecurity, combined with his hands-on approach, allows him to deliver effective guidance to executives and technical teams alike.

He has worked for high-profile clients in government as well as for globally recognised companies such as Rolls-Royce and Hewlett-Packard. A well-travelled individual who has advised on security best practices in 125 cities, Guy has led projects that have changed the shape of cyber security. Notably, he pioneered a ground-breaking technology (Global Adversary Signals Analytics) that has strengthened the defences of governments worldwide against sophisticated cyber threats.

With a fascination for cybersecurity innovation, Guy is dedicated to learning new attack and defensive techniques, mentoring talent and actively contributing to the information security community. His aim at Cyber Intelligence & Advisory Ltd is to build a globally respected firm that sets new standards of security in the industry.

  • Taking the garbage out!
The speaker’s profile picture
halfling

I'm a software engineering teacher and industrial cybersecurity researcher at a university in the Welsh capital. Navigating the usual shenanigans of being a doctoral candidate, while juggling the stress of being an academic staff member. I spend more time outdoors than indoors these days, ideally with a book in my hands, and I'm looking forward to getting my floppy hat!

  • Explaining ICS to a fool of a Took
The speaker’s profile picture
Han O’Connor

I am a SOC Analyst with a keen interest in threat intelligence and DFIR - love a good threat hunt too. Prior to this, I was a data manager in the NHS and completed both my undergraduate and postgraduate degrees in English and Languages.

  • Storytelling for SOC Analysts: Effective Investigation Notetaking and Report Writing (without ChatGPT!)
The speaker’s profile picture
Hugo Page-Turner
  • CyberHUMINT: Recruit, Deceive, Exploit
The speaker’s profile picture
Iain Smart

Iain Smart is a Principal Consultant at AmberWolf, where he reviews cloud-native deployments and performs offensive security engagements. He enjoys playing with new technologies, and if he’s not hacking a Kubernetes cluster or attacking a build pipeline he can probably be found writing new home automations to annoy his family.

  • Container Security and Hacking with Docker and Kubernetes
The speaker’s profile picture
Ilias

Embedded software engineer who transitioned from backend engineering; interested in wireless protocols and hardware & firmware security

  • BrakRPi: Crashing Bluetooth communications on Raspberry Pi with Braktooth
The speaker’s profile picture
James Patrick-Evans
  • Malware Unmasked: Supercharging Cyber Defense with Machine Learning Magic
The speaker’s profile picture
Jessica Crytzer

Jessica brings over 15 years of extensive experience in the cybersecurity sector, specializing in leading and scaling early-stage GTM (Go-To-Market) teams. As a seasoned revenue leader, she is deeply committed to fortifying both corporate entities and individuals against digital threats. Jessica actively mentors aspiring women in sales through WISE (Women In Sales Everywhere) and contributes her expertise to Mach37, an early-stage cybersecurity accelerator. Previously, she held leadership roles at HyperQube and ThreatSwitch, where she spearheaded teams to success.

Beginning her career within large Enterprise organizations, Jessica has traversed the landscape as both an individual contributor and a strategic leader. However, her true passion lies in fostering growth within entrepreneurial ventures, where she thrives on shaping and executing go-to-market and revenue expansion strategies.

Beyond her professional endeavors, Jessica finds solace in the outdoors, exploring new destinations, and immersing herself in live music experiences. Committed to making a difference, she dedicates her time to philanthropic causes, serving on the board of Becky's Fund and offering guidance as an advisor for Costumes for Courage.

  • Roll Your Own EDR/XDR/MDR
The speaker’s profile picture
Kai Harris

I am a narrow-boat-dwelling tech-enthusiast with professional experience in both the software and hardware world

  • Memoryless Peripherals and Secure Notebooks
The speaker’s profile picture
Kartik Adak

I am a security professional currently pursuing a Master’s in Cyber Security Management at the University of Warwick, specialising in digital forensics, threat hunting, pentesting and security monitoring.

I have been recognised in the Bug Bounty Hall of Fame by numerous organisations and acknowledged by India’s National Critical Information Infrastructure Protection Centre for responsible vulnerability disclosures. I hold a Bachelor of Engineering in Information Technology and several certifications, including Certified Red Team Operator.

I am actively engaged in projects like deploying honeypots for threat intelligence and building a digital forensics lab, which reflects my commitment to advancing cybersecurity practices.

  • OWASP Honeypot threat intelligence project
The speaker’s profile picture
Ken Westin

Ken Westin has been in the cybersecurity field for over 15 years working with companies to improve their security posture, through threat hunting, insider threat programs, and vulnerability research. In the past, he has worked closely with law enforcement helping to unveil organized crime groups. His work has been featured in Wired, Forbes, New York Times, Good Morning America, and others, and is regularly reached out to as an expert in cybersecurity, cybercrime, and surveillance.

Ken is an Oregon Native who splits his time between a house in the woods near Portland and a beach shack on the Oregon Coast with his wife, son, and two dogs. He holds a BA from Lewis & Clark College, a graduate degree from the University of Portsmouth UK, and several security certifications. He is a self-professed guitar and record hoarder and amateur musician.

  • Roll Your Own EDR/XDR/MDR
The speaker’s profile picture
Kyle Pearson

Kyle Pearson is a solutions engineer with Graylog who has worked on enough SIEM and Log Management deployments to know his way around. After cutting his teeth in financial services, he held consulting roles for several SIEM vendors and has worked extensively with public sector and financial services customers.

  • Taking the garbage out!
The speaker’s profile picture
Lena Yu

Lena Yu, also known as LambdaMamba, is the founder of World Cyber Health and Malware Village.

She created the MARC I (Malware Analysis Report Competition) at DEF CON, fostering contributions to open-source education in malware analysis. Additionally, she launched the Malware Monsters project, also known as Malmons.

Lena is the author of the ANY.RUN Malware Analysis blogs and has represented ANY.RUN at various events in the past.

Before venturing into malware analysis, Lena worked as a low-level developer specializing in computer architecture and RISC-V TEE research, where she authored several research papers.

  • Malware Village
The speaker’s profile picture
Lloyd Davies
  • Malware Unmasked: Supercharging Cyber Defense with Machine Learning Magic
The speaker’s profile picture
Mackenzie Jackson

Mackenzie is a security researcher and advocate with a passion for application security. As the co-founder and former CTO of a health tech company Conpago, he learned first-hand how critical it is to build secure applications with robust developer operations.

Today as an Advocate at Aikido Security, Mackenzie is able to share his passion for code security with developers and works closely with research teams to show how malicious actors discover and exploit vulnerabilities in code. Mackenzie is also a seasoned speaker having spoken at conferences in 29 countries, he is the host of The Security Repo podcast and a frequent contributor to various technical publications like Dark Reading and Security Boulevard.

  • From Code to Cloud: Securing the Stack with Open-Source Tools
The speaker’s profile picture
Marion McCune

I have been working in IT for thirty years, and IT security for fifteen. My recent experience is as a pen tester, where I was a director of a small consultancy company. I've lately become interested in containerization security and am starting to become involved in this field.
I live in the Scottish Highlands with my husband, three cats and occasional pine martens. My interests are history, art, DDO, cookery and the great outdoors - not necessarily in that order.

  • Container Security and Hacking with Docker and Kubernetes
The speaker’s profile picture
Matthew Steed

Matthew is a senior consultant at KPMG, working over the last 3 years on pentesting infra/web app, purple teaming and physical security.

  • Robert Redford Made Me Do It: Physical Security Stories and Tips
The speaker’s profile picture
Meet Bhorania

Currently an Google Developer Group Academy Ambassador at Anglia Ruskin University, Cambridge , I am immersed in a role that aligns with my Bachelor of Technology studies in Computer Science at Anglia Ruskin University. My engagement with the Google Developer Group London sharpens my AI proficiency, reflected in my victory at a TTP plc hackathon where we created 'Co-Pilot', an educational AI tool.

My technical foundation is bolstered by certifications in AWS and Google Cloud, complementing my hands-on experience as an Undergraduate Research Assistant. These experiences underscore my commitment to leveraging AI and neural networks in educational contexts, aiming to elevate learning through innovation and technology.

  • The Trustworthiness of Generative AI in Real-Time Decision-Making for IoT Devices
The speaker’s profile picture
Meletius Igbokwe

I’m a Modern Workplace Engineer with over five years of experience, I excel in securing and architecting cloud assets for a diverse range of organizations. My extensive experience includes a deep proficiency in Microsoft cloud technologies, as well as a good command of other leading cloud platforms. I specialize in designing and implementing robust security frameworks that protect critical data and ensure operational continuity. My career is marked by a proven track record of enhancing cloud security posture, navigating complex challenges, and delivering innovative solutions that align with organizational goals. This background equips me to offer valuable insights and actionable strategies for modernizing security practices in the ever-evolving digital landscape.

  • Adopt or Risk: Why Zero Trust is Key to Modern Cyber Defence
The speaker’s profile picture
Nazeef Khan

With a Master's from the University of Warwick, Nazeef stays at the forefront of offensive security techniques. He holds multiple industry-recognized certifications, including the Certified Red Team Operator (CRTO), HTB Certified Penetration Testing Specialist (CPTS), and Practical Network Penetration Tester (PNPT).

A dedicated learner, Nazeef actively contributes to the cybersecurity community by sharing his knowledge through public talks and technical discussions/blogs, inspiring others to explore the field. His expertise spans across various domains, including Red team Operations, and AI security.

  • LLM Security: Attacks and Controls
The speaker’s profile picture
Nick Dunn

Former software developer who became a security consultant. Interested in writing security tools and retro tech.

  • Using the OWASP Top 10 to Save the Astronauts from HAL
The speaker’s profile picture
Onyedikachi Ugwu

Onyedikachi Ugwu is a seasoned cybersecurity professional and passionate writer dedicated to empowering individuals with the knowledge to navigate the digital world safely. By day, I serve as a Threat Detection and Response Analyst at NormCyber, where I leverage my expertise to combat online threats. In my spare time, I share my insights on various cybersecurity topics.
Also as a Social Engineering SME, I am well-versed in the tactics used by scammers to manipulate their victims. My goal is to equip readers with the tools to identify and avoid these deceptive schemes, helping them find genuine connections online.

  • Unmasking the Deepfake Threat: Detection, Prevention, and Navigating the Future
The speaker’s profile picture
Ori Nakar

Security Researcher, Data Engineer, and Data Scientist at Imperva Threat Research Group. I specialize in application and database security, leveraging expertise in data analytics, data science, and automation to drive innovative security solutions.

  • Unmasking APT Malware Activity: Real-World Malware Campaign Tracking Using Big Data Analytics and Machine Learning Clustering
The speaker’s profile picture
Paavai Aram

Hello, this is Paavai Aram. I am currently pursuing MSc in Cybersecurity Engineering at the University of Warwick. My inception into Cybersecurity began with my inspiration of Richard Stallman and free open source software tools. I even built a Linux-themed website (https://killswitchp.github.io/) from scratch where I write cybersecurity and personal blogs. Apart from this, I like Active Directory penetration testing and Threat Hunting. Soon I will be doing some advanced red team certifications as well :)

  • Disabling Drones: Disruption and Forensic Data Analysis
The speaker’s profile picture
Patricia R
  • Is Your Approach to Pipeline Security Flawed? Rethinking CI/CD Security
The speaker’s profile picture
Pranay Sahith Bejgum
  • Continuous threat modelling using Large Language Models
The speaker’s profile picture
-Quantum Village

-Quantum Village

  • Quantum Village
The speaker’s profile picture
Richard Kirk

A results-driven information security professional with over 20 years of expertise and experience improving and evolving IT infrastructure and security processes. I drive businesses forward by applying robust security measures that defend companies, their brand, and their reputations.

I deliver positive outcomes by collaborating with senior executives and key stakeholders to optimise innovation and productivity and by executing appropriate control measures to reduce risk and distribution while aligning strategic roadmaps and risk appetites to overall objectives.

I’m a critical thinker who confidently manages conflict, navigates ambiguity, and challenges norms. I am currently on a Level 7 executive leadership course with Corndel University. I am about to be part of a fireside panel at a Microsoft event in London, discussing Co-Pilot and how it has helped our colleagues with neurodivergent conditions. I am also part of our group disability and neurodiversity committees, helping improve access to tools, coaching and support for all.

Seeking a senior position to continue to provide key performance measures, governance knowledge, and an independent mindset to identify business gaps and transform operations.

  • Can you SEE!! A risk approach to SIEM
The speaker’s profile picture
Rory McCune

Rory is a senior advocate for Datadog who has extensive experience with Cyber security and Cloud native computing. In addition to his work as a security reviewer and architect on containerization technologies like Kubernetes and Docker he has presented at Kubecon EU and NA, as well as a number of other cloud native and security conferences. He is one of the main authors of the CIS benchmarks for Docker and Kubernetes, a published author on the topic of Cloud Native Security, member of Kubernetes SIG-Security and CNCF TAG-Security. When he's not working, Rory can generally be found out walking and enjoying the scenery of the Scottish highlands.

  • Container Security and Hacking with Docker and Kubernetes
The speaker’s profile picture
Samira Ali

Samira is the Early Careers and Diversity & Inclusion Officer of the BCS London South Branch. She also serves on the BCS Council representing the Young Professional Constituency. Samira is neurodivergent and has over 12 years experience working in Human Resources , recruitment and career coaching.

  • CV workshop
The speaker’s profile picture
Shane Bourne

Shane has been a penetration tester for just over ten years, working in a wide range of environments. In recent years, he has worked for an internal security team, building deeper knowledge of Active Directory and Windows Internals.

  • Do loop back in anger
The speaker’s profile picture
Stephen Cravey

Stephen Cravey is a seasoned IT Security Leader with a MScf in Information Security and a CISSP certification. His career in cybersecurity started in 1995 with a unique request to the NSA for educational materials, setting the stage for a diverse and impactful professional journey.

Currently, Stephen plays a key role at a leading consulting firm, where he helps organizations navigate complex cybersecurity, governance, and espionage challenges, including ISO 27001 and NIST 800-53 focused compliance remediation initiatives. His technical expertise covers a broad spectrum, from detailed system architecture to foundational electronic principles, always with an eye on practical application and human factor root cause issues.

His research has explored practical integration techniques for emerging technologies, reinforcing his ability to blend advanced concepts with real-world solutions. Stephen is particularly skilled at identifying risks and leading strategic initiatives that enhance security processes and implement robust technical solutions in dynamic settings.

Known for his ability to connect with both technical teams and executive leaders, Stephen effectively aligns technological strategies with business goals, helping organizations enhance their security posture for today's demanding environments.

  • Software security issues for small IoT SoCs
The speaker’s profile picture
Suketu
  • Quantum Safe Cryptography - A Buzzword or Something More Serious?
The speaker’s profile picture
Tim Haynes

I've been in the wrong place at the right time for around 25 years, and on the way i've covered most areas in Security hands-on or leading across Banking, Insurance, Markets, Legal, Accounting, Technology, Emergency Services, Local Government, Government Nuclear, Charities, and Outsourcing.

I'm currently loving life as Director - Cyber Services for BSS - the Security Services Company

  • MSSP, MDR, MFA - So Why isn't Incident Response Solved?
The speaker’s profile picture
Tim Wadhwa-Brown

Tim joined Cisco as part of their acquisition of Portcullis for whom he worked for almost 12 years, primarily focussed on UK CNI. 8 years on, Tim has contributed to a number of Cisco’s services programmes relating to risk and compliance, secure development and threat-informed defense. In the last year, Tim has been focussed on developing Cisco's strategic response to the NIS2 Directive, DORA and the Telecom Security Act.

Outside of the customer driven realm of information assurance, Tim is also a prolific offensive researcher with papers on UNIX, Windows and web application security to his name. Tim is credited with publishing almost 150 vulnerability advisories and is a regular contributor to MITRE ATT&CK, acting as an SME for Linux techniques. Tim particularly like to bug hunt enterprise UNIX solutions.

  • Building the ATT&CK pipeline for Linux
The speaker’s profile picture
Tom

Throughout University and beyond , I've always had a a keen interest in how artificial intelligence and cyber security mix. Currently I have a keen interest in expanding home labs and learning about malware analysis.

  • Is AI the new big brother?
The speaker’s profile picture
Tom Philippe

Tom is a cybersecurity enthusiast who spends his days hacking things and his nights learning from other hackers. When he's not lost in his debugger trying to understand why his Hello World program crashes, he's leading the charge in offensive security at Responsible Cyber.

Tom's passion for all things cyber has led him down some interesting paths, including playing around with LLMs, spending way too much on cloud resources, or more recently diving deep into kernel-level operations for fun.

  • When the Hunter Becomes the Hunted: Using Minifilters to Disable EDRs
The speaker’s profile picture
Tony Gee

Tony has over 15 years of security experience, he has worked both as an internal blue team consultant within the finance industry and for the technology partner for the world leading Oyster card system and more latterly as an external security tester and auditor. He specialises in intelligence gathering, delivering intelligence and reconnaissance investigations. In addition, he is adept at socially engineered initial access. Including, cyber social engineering, such as phishing, smishing and vishing, or physical social engineering into organisations to install network implants and steal information. Alongside this Tony speaks the world over at technology events highlighting key risks with the internet of things, automotive and maritime, alongside delivering engaging and enthralling security awareness presentations. Drawing on his experience breaking into companies, Tony is able to illustrate and demonstrate critical issues in a way that audiences of all levels can understand.

  • CyberHUMINT: Recruit, Deceive, Exploit
The speaker’s profile picture
-TOOOL

Ever wondered how a lock works inside? Already know, and want to up your picking game? Come and meet the experts from TOOOL UK at the lockpicking village.
The Open Organisation Of Lockpickers are a multinational group dedicated to defeating locks for fun and games.
Learn to beat a pin tumbler lock, see inside various locks, padlocks and, er, even more locks! Come and play with locks!

  • Lock Picking Village
The speaker’s profile picture
-Train Hacking Village

Train Hacking Village

  • Train Hacking Village
The speaker’s profile picture
Umair Qamar

Umair is a Senior Cyber Security Responder working at JUMPSEC with 5 years of experience in Defensive Security including Incident Response, Threat Hunting, Security Operations and Security Engineering.

  • What happens after a Business Email Compromise (BEC)
The speaker’s profile picture
Vangelis Stykas

Vangelis Stykas began as a developer from Greece. Six years ago he realized that only his dog didn't have an API, so he decided to steer his focus towards security. That led him to pursue a PhD in Web Application Security with an extra focus on machine learning. He's still actively pursuing it. He currently applies his skills as a Chief Technology Officer at Atropos, and during his free time, Vangelis is helping start-ups secure themselves on the internet and get a leg up in security terms. His love of a simplistic approach to hacking by exploiting vulnerable APIs led him to publish research regarding API controlling ships, smart locks, IP cameras, car alarms, EV chargers, and many other IoT devices. Since our lives are nowadays extremely cyber-dependent, his goal is to convince all companies to never neglect their API security as a rush-to-market mentality is almost certain to lead to catastrophic security failure.

  • Inside the Phish Tank: A Guide to Compromising Phishing Infrastructure
The speaker’s profile picture
Victor Oriakhi Nosakhare

Victor Oriakhi holds a Bachelor's degree in Electrical and Electronic Engineering and a Master’s degree in Robotics and Automation, graduating with distinction. With practical experience spanning the power sector, SCADA systems, and IoT integration, Victor is currently an Electrical Instrumentation and Design Engineer. His work focuses on advancing automation and control systems in industrial environments.

In addition to his professional work, Victor is a dedicated mentor, actively involved with the University of East London and other platforms such as STEM Learning and Brightside. His passion for education and STEM advocacy extends further as the Project Manager of BeScience STEM, a non-profit organization committed to promoting science, technology, engineering, and mathematics in underserved communities.

A member of the Institution of Engineering and Technology (IET), Victor is working towards achieving Chartered Engineer status. He is also a researcher, continuously contributing to advancements in the fields of embedded systems, IoT, and robotics.

  • Securing Embedded Devices in Robotics and IoT: Bridging the Gap Between Innovation and Security
The speaker’s profile picture
Will Dollman

Security Engineer

  • A Minimal Talk on Distroless Containers
The speaker’s profile picture
Will Thomas
  • Five Years of Working in Cyber Threat Intelligence (CTI)
  • Currently a CTI Researcher and Threat Hunter at the Equinix Threat Analysis Center (ETAC)
  • Co-author of SANS FOR589: Cybercrime Intelligence
  • SANS Instructor
  • Co-founder of Curated Intelligence
  • Co-founder of the Bournemouth 2600 Group
  • Inside the Ransomware Toolbox: How to Beat Cybercriminals at Their Own Game
The speaker’s profile picture
winn schwartau

The “Civilian Architect of Information Warfare”
- Commodore Pat Tyrrell OBE Royal Navy, 1996
“Electronic Pearl Harbor Prophet”
- BankInfo Security, 2023
“National Security Imperative for Cognitive Defense:s We are defenseless.”
- The Art & Science of Metawar, 2024

Winn has lived Cybersecurity since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined “Electronic Pearl Harbor” while testifying before Congress in 1991. His seminal book, “Information Warfare,” showed the world how privacy would die and cyber-terrorism would be an integral part of the future (today’s present).

His new book, "The Art & Science of Metawar,” describes how to defend against AI-driven reality distortion, TMI/disinformation, manipulation, and algorithmic addictions by strengthening the mental immune system.
Increasingly impressive immersive technologies, active metacontent orchestration, and powerful feedback systems (OODA loops) exploit information overload and disseminate disinformation through believable online experiences. We are approaching the metapoint, where persistent immersive simulations will be indistinguishable from our default ‘reality.’ The security, privacy, ethics, and global policy implications are staggering.

His last book, “Analogue Network Security” is a time-based approach to justifiable security. “It will twist your mind.” “The Best Cybersecurity Book of All Time,” Cyber Defense Magazine.

• Fellow, Royal Society of the Arts
• Distinguished Fellow: Ponemon Institute
• International Security Hall of Fame: ISSA
• Lifetime Achievement Award, DefCon XXXI
• Top-20 industry pioneers: SC Magazine.
• Top 25 Most Influential: Security Magazine
• Top 5 Security Thinkers: SC Magazine.
• Power Thinker and one of the 50 most powerful people: Network World.
• 30 Year DefCon Goon (Ret.)
• Top Rated (4.85/5) RSA Speaker
• Top Rated Webinar: 4.56 (ISC2)
• .001% Top Influencer RSAC
• Global Power Speaker
• US Patent: 11,438,369 (Time-Based Security)

Author: “Time-Based Security,” “Pearl Harbor Dot Com” (Die Hard IV), the world's first novel-on-the-net 1993, Project Gutenberg), 3 volumes of “Information Warfare”, “CyberShock”, “Internet and Computer Ethics for Kids” (The Best Security Book Ever Written, Dr. Fred Cohen) and a few more.

Publisher: Weapons of Mass Destruction Terrorism, James K. Campbell ISBN: 0-962-8700-3-X, 1977
The Mind of the Hacker, Dr. Nick Chandler (Maj. Australian military intelligence) 1999

Executive Producer: “Hackers Are People Too”, “VR Babies in the Metaverse” premiers at the Getty in Oct. 2024.

Founder: The Security Awareness Company, Hacker Jeopardy, Security Experts, InfowarCon, et al. Former recording engineer and producer.

www.WinnSchwartau.com
@WinnSchwartau
https://en.wikipedia.org/wiki/Winn_Schwartau
https://www.linkedin.com/in/winnschwartau/

  • Cybersecurity’s New Imperative: Defending Enterprise and National Cognitive Infrastructures (by strengthening the mental immune system)
The speaker’s profile picture
Yash Akbari

Final year BEng Computer Science student focusing in embedded systems and cloud technologies. I have developed practical
skills through projects involving IoT, systems engineering, and data processing. My experience includes working with generative AI,
network management, and information security. These projects have provided me with a solid foundation in real-world technological
challenges and prepared me to tackle complex issues in the field.

  • The Trustworthiness of Generative AI in Real-Time Decision-Making for IoT Devices