Author

Kevin Mitnick

Kevin Mitnick

CEO and Chief 'White Hat' Hacker, Mitnick Security

Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin and his Global Ghost Team now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. Kevin’s books include ‘Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers’ and ‘Art of Deception: Controlling the Human Element of Security’, which are mandatory readings for security professionals.

Troy Hunt

Troy Hunt

Information Security Author & Instructor at Pluralsight

Troy Hunt is a Pluralsight Author and Instructor, Microsoft Regional Director and world-renowned Internet Security Specialist who travels the world speaking at events and training technology professionals. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications.

 

Michael Zalewski

Michael Zalewski

White-hat Hacker/ Former Google employee

Michał Zalewski, also known by the user name lcamtuf is a “white hat” hacker, computer security expert from Poland and a former Google Inc. employee. He has been a prolific vulnerability researcher and a frequent Bugtraq poster and has authored a number of programs for Unix-like operating systems.In 2005, Zalewski authored Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, a computer security book published by No Starch Press and subsequently translated into a number of languages. In 2011, Zalewski authored The Tangled Web: A Guide to Securing Modern Web Applications, also published by No Starch Press.For his continued research on browser security, he was named one of the 15 most influential people in security and among the 100 most influential people in IT. Zalewski was one of the original creators of Argante, a virtual open source operating system. Among other projects, he also created p0f and American fuzzy lop.

Jennifer J. Minella

Jennifer J. Minella

VP of Engineering and security, Carolina Advanced Digital

Jennifer Minella is currently VP of Engineering and Consulting CISO with Carolina Advanced Digital, Inc. In her engineering role, Minella leads strategic research and consulting for government agencies, educational institutions and Fortune 100 and 500 corporations. In addition to her normal business roles, Minella is a published Author, Editorial Contributor and trusted Adviser for information security topics to media. No stranger to public speaking, she’s presented at RSA Conference, NSA Trusted Computing Conference, Interop, Infosec World, Deep Sec, SecTor, CSI and many others.

Alejandro Ramos

Alejandro Ramos

Global Digital Security Officer, Telefonicatw

Security industry veteran and Chief Digital Security Officer at Telefonica. He previously spent five years at ING working on security strategy for Spain and Portugal. Earlier roles include security-manager-whatever, at SIA, a security services and product company based in Madrid. Associate professor at Universidad Europea de Madrid in the Master of Information Security degree for the subjects:Penetration Test, Forensics and Hardening (Linux)

Georgia Weidman

Georgia Weidman

Founder and CTO, Shevirah Inc.

Georgia Weidman is from Austin,Texas and the founder of Bulb Security. Prior to this she worked as an Security analyst in the companies like IBM, Gemini Security Solution, Neohapsis. She completed her education in Computer and network security from James Madison University. She provides security trainings, services and solution on Bulb Security. She is one of the well known name in the industry right now. She is the author of Penetration Testing: A Hands-On Introduction to Hacking from No Starch Press. She was the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award.

Wendy Nather

Wendy Nather

Director, Advisory CISOs, Duo security

Wendy Nather is Director of Advisory CISOs at Duo Security. She was previously the Research Director at the Retail ISAC, as well as Research Director of the Information Security Practice at independent analyst firm 451 Research. Nather led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), and served as CISO of the Texas Education Agency. She speaks regularly on topics ranging from threat intelligence to identity and access management, risk analysis, incident response, data security, and societal and privacy issues. Nather is Co-Author of The Cloud Security Rules, and was listed as one of SC Magazine’s Women in IT Security “Power Players” in 2014.

Anton Chuvakin

Anton Chuvakin

Research Vice President & Distinguished Analyst, Gartner

Anton Chuvakin is a Research VP at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies (SRMS) team. He is a recognized ecurity expert in the field of SIEM, log management and PCI DSS compliance. He is the Author of Security Warrior, PCI Compliance and Logging and Log Management, and he contributed to Know Your Enemy II, Information Security Management Handbook and others. Chuvakin has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, honeypots, etc. His blog securitywarrior.org was one of the most popular in the industry. In addition, Chuvakin taught classes and presented at many security conferences across the world; he recently addressed audiences in the US, UK, Singapore, Spain, Russia and more.

Bob Rudis

Bob Rudis

Chief Data Scientist, Rapid7

Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is a Chief Security Data Scientist at Rapid7. Bob is a serial tweeter (@hrbrmstr), avid blogger (rud.is), author (Data-Driven Security), speaker and regular contributor to the open source community (github.com/hrbrmstr). He currently serves on the Board of Directors for the Society of Information Risk Analysts, is on the editorial board of SANS Securing the Human program and was Co-chair of the 2014 Metricon security metrics/analytics conference. He holds a bachelor’s degree in computer science from the University of Scranton.

Theresa Payton

Theresa Payton

President & CEO, Fortalice Solutions

Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. As CEO of Fortalice Solutions, an industry-leading security consulting company, and co-founder of Dark Cubed, a cybersecurity product companyheresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff. Theresa was named one of the top 25 Most Influential People in Security by Security Magazine and One of Infosec’s Rising Stars and Hidden Gems by Tripwire. In 2005 she was honored as Charlotte, NC’s Woman of the Year.

Andrew Jaquith

Andrew Jaquith

Managing Director, Goldman Sachs

Andrew Jaquith is a senior information security and risk executive with a passion for quantifying risk. As Managing Director at Goldman Sachs, he manages the firm’s Technology Risk Analytics and Measurement program. Andrew has demonstrated success as a senior leader, with two successful startup exits, and as an implementer of data-driven analytics systems. He literally wrote the book on security metrics, used by a generation of risk professionals to connect security to the corner office.

Zane Lackey

Zane Lackey

Founder/CSO, Signal Sciences

Zane Lackey is the Co-Founder/Chief Security Officer at Signal Sciences and serves on the Advisory Boards of the Internet Bug Bounty Program and the US State Department-backed Open Technology Fund. Prior to Signal Sciences, Lackey was the Director of Security Engineering at Etsy and a Senior Security Consultant at iSEC Partners. He has been featured in notable media outlets such as the BBC, Associated Press, Forbes, Wired, CNET, Network World, and SC Magazine. A frequent speaker at top industry conferences, he has presented at Black Hat, RSAC, USENIX, Velocity, Microsoft BlueHat, SANS, OWASP, QCon, and has given invited lectures at Facebook, Goldman Sachs, IBM and the Federal Trade Commission.

Jared Carstensen

Jared Carstensen

CISO, CRH

Jared Carstensen is an internationally recognized information and cyber security professional with broad experience in the design, implementation and governance of security controls, business strategies and frameworks across global organizations, spanning multiple sectors. For the past 13 years, he has been advising Fortune 500, law enforcement and intelligence agencies, government and state departments, manufacturing, pharmaceutical, telecommunications, utilities and financial services entities on all areas of information and cybersecurity. He is the CISO for a FTSE 100 company located in Dublin, Ireland. He is a member of the IT Governance Institute Expert Panel, and is an author of the book “Cloud Computing: Assessing the Risks.” He has spoken at over 100 events globally.

Jake Kouns

Jake Kouns

CISO, Risk Based Security

Jake Kouns is the CISO for Risk Based Security that provides vulnerabilities and data breach intelligence. He previously oversaw the operations of the Open Sourced Vulnerability Database (OSVDB.org) and DataLossDB. Kouns has presented at many well-known security conferences, including RSA, Black Hat, DEF CON, DerbyCon, Bsides, CISO Executive Summit, IEEE, FIRST, CanSecWest, InfoSecWorld, SOURCE and SyScan.He is the co-author of Information Technology Risk Management in Enterprise Environments, Wiley, 2010, and The Chief Information Security Officer, IT Governance, 2011.He has briefed the DHS and Pentagon on Cyber Liability Insurance issues and is frequently interviewed as an expert in the security industry by Information Week, eWeek, Forbes, PC World, CSO, and CIO Magazine.