We are proud to feature talented professionals from all walks of the Information Security life. While some have been speaking at conferences for years, we are excited to hear from all of our first-time speakers as well!
StephRegional Information Security Analyst

For her day job, InfoSteph serves as a regional information security analyst. Outside of work, however, InfoSteph has filled her life with all kinds of cool activities. She serves as a Lead for WoSEC Houston and a Lead for WISP DEFCON 2019. She has also started speaking at conferences this year. She co-hosts a “happy hour” inspired podcast called Coolest Nerds in the Room, where conversation surrounding the lives of tech people are nurtured. She attends school full time, hoping to obtain her Bachelor’s by the end of the fall. She had the honor of being a delegate for Security Field Day 2. She writes blog posts on her website, StephAndSec.com, which is also her side business. And she is working on a course for LinkedIn Learning on Social Engineering and Security Awareness. Stephanie recognizes those that inspired her or helped her get to where she is today and hopes that everything she does moving forward does the same for others.

StephRegional Information Security Analyst

For her day job, InfoSteph serves as a regional information security analyst. Outside of work, however, InfoSteph has filled her life with all kinds of cool activities. She serves as a Lead for WoSEC Houston and a Lead for WISP DEFCON 2019. She has also started speaking at conferences this year. She co-hosts a “happy hour” inspired podcast called Coolest Nerds in the Room, where conversation surrounding the lives of tech people are nurtured. She attends school full time, hoping to obtain her Bachelor’s by the end of the fall. She had the honor of being a delegate for Security Field Day 2. She writes blog posts on her website, StephAndSec.com, which is also her side business. And she is working on a course for LinkedIn Learning on Social Engineering and Security Awareness. Stephanie recognizes those that inspired her or helped her get to where she is today and hopes that everything she does moving forward does the same for others.

closepopup
Mari GallowayFounder/CEO, Women's Society of Cyberjutsu (WSC)

Mari is the CEO and a founding board member for the Women's Society of Cyberjutsu (WSC), one of the fastest growing 501c3 non-profit cybersecurity communities dedicated to bringing more women and girls to cyber. WSC provides women with the resources and support required to enter and advance as a cybersecurity professional. Mari began her cyber career with Accenture where she excelled as a Network Engineer. With over 9 years of Information Technology, 8 of which are in cybersecurity, her experience spans network design, risk assessments, vulnerability assessments, incident response and policy development across government and commercial industries. She holds a variety of technical and management certifications (CISSP, GIAC, CCNA, etc) as well as a Bachelor’s degree in Computer Information Systems from Columbus State University and a Master of Science in Information Systems from Strayer University. Mari is currently a resident of Las Vegas working to secure the Gaming industry of the south west. She regularly contributes content to security blogs and training companies across the country. Outside of being a geek, Mari enjoys arts, puzzles, and legos!

Mari GallowayFounder/CEO, Women's Society of Cyberjutsu (WSC)

Mari is the CEO and a founding board member for the Women's Society of Cyberjutsu (WSC), one of the fastest growing 501c3 non-profit cybersecurity communities dedicated to bringing more women and girls to cyber. WSC provides women with the resources and support required to enter and advance as a cybersecurity professional. Mari began her cyber career with Accenture where she excelled as a Network Engineer. With over 9 years of Information Technology, 8 of which are in cybersecurity, her experience spans network design, risk assessments, vulnerability assessments, incident response and policy development across government and commercial industries. She holds a variety of technical and management certifications (CISSP, GIAC, CCNA, etc) as well as a Bachelor’s degree in Computer Information Systems from Columbus State University and a Master of Science in Information Systems from Strayer University. Mari is currently a resident of Las Vegas working to secure the Gaming industry of the south west. She regularly contributes content to security blogs and training companies across the country. Outside of being a geek, Mari enjoys arts, puzzles, and legos!

closepopup
Ell MarquezCommunity Architect

Ell Marquez has been part of the open-source family for a few years now. In this time, she has found the support needed from her mentorship relationships to grow from a Linux Administrator to a Community Architect helping to build Open Source Communities. Her current passions are podcasting with her co-host on Choose Linux and spreading the message that in tech, "It's Okay to Be New."

Ell MarquezCommunity Architect

Ell Marquez has been part of the open-source family for a few years now. In this time, she has found the support needed from her mentorship relationships to grow from a Linux Administrator to a Community Architect helping to build Open Source Communities. Her current passions are podcasting with her co-host on Choose Linux and spreading the message that in tech, "It's Okay to Be New."

closepopup
Rhonda LemkeDirector of IT at Culinary Health Fund

Rhonda Lemke is the Director of IT for the Culinary Health Fund here in Las Vegas. She has over 23 years of progressive IT operations experience, which started when she built a Help Desk for the Marketing Department for Accenture in 1996. She has worked at companies leading transformational efforts including Cars.com, Sears.com, University of Chicago Booth School of Business, Arthur J. Gallagher, JLL and ABN AMRO Clearing. She has a B.A. in Mathematics and Secondary Education from Northeastern Illinois University. She is a member of WITI (Women in Technology International) and ARA (Advance, Retain, Attract Women in Technology) and has been actively involved in supporting the growth of women in technology.

Rhonda LemkeDirector of IT at Culinary Health Fund

Rhonda Lemke is the Director of IT for the Culinary Health Fund here in Las Vegas. She has over 23 years of progressive IT operations experience, which started when she built a Help Desk for the Marketing Department for Accenture in 1996. She has worked at companies leading transformational efforts including Cars.com, Sears.com, University of Chicago Booth School of Business, Arthur J. Gallagher, JLL and ABN AMRO Clearing. She has a B.A. in Mathematics and Secondary Education from Northeastern Illinois University. She is a member of WITI (Women in Technology International) and ARA (Advance, Retain, Attract Women in Technology) and has been actively involved in supporting the growth of women in technology.

closepopup
Sam BowneInstructor at City College San Francisco

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at RSA, DEF CON in Las Vegas, DEF CON China, HOPE, BSidesSF, BSidesLV, LayerOne, Toorcon, and many other schools and conferences.

Credentials: PhD, CISSP, DEF CON Black Badge Co-Winner

Sam BowneInstructor at City College San Francisco

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at RSA, DEF CON in Las Vegas, DEF CON China, HOPE, BSidesSF, BSidesLV, LayerOne, Toorcon, and many other schools and conferences.

Credentials: PhD, CISSP, DEF CON Black Badge Co-Winner

closepopup
Manju MudeSecurity Leader at Verizon

Manju Mude is an industry Security leader with nearly 20 years of experience in building information security, risk management, security investigations, and vulnerability reduction programs. She is a “Paranoids” Security Leader at Verizon Media, where she helps lead an essential security team defend against adversaries to protect over a billion users. At Verizon Media, she leads Security Culture and Security Education programs focusing on risk-aware behavioral change, has launched “Paranoids University”, an internal training program that teaches all employees on building secure code and systems. Prior to joining Verizon via the Yahoo acquisition, Manju held several leadership positions, including Chief Security Officer of Splunk, Security Leader at Apple, RSA, and Bank of America. In 2019, Manju received an honorable mention as a Woman of Impact in Cybersecurity, in SC Magazine. She is an advocate for education in the workforce, strength through diversity and inclusion, boosting female representation in information security, and the intersection of security with human rights.

Manju MudeSecurity Leader at Verizon

Manju Mude is an industry Security leader with nearly 20 years of experience in building information security, risk management, security investigations, and vulnerability reduction programs. She is a “Paranoids” Security Leader at Verizon Media, where she helps lead an essential security team defend against adversaries to protect over a billion users. At Verizon Media, she leads Security Culture and Security Education programs focusing on risk-aware behavioral change, has launched “Paranoids University”, an internal training program that teaches all employees on building secure code and systems. Prior to joining Verizon via the Yahoo acquisition, Manju held several leadership positions, including Chief Security Officer of Splunk, Security Leader at Apple, RSA, and Bank of America. In 2019, Manju received an honorable mention as a Woman of Impact in Cybersecurity, in SC Magazine. She is an advocate for education in the workforce, strength through diversity and inclusion, boosting female representation in information security, and the intersection of security with human rights.

closepopup
Kat SweetInformation Security Analyst at Duo Security

Kat Sweet works for Duo Security, where her official title is information security analyst and her unofficial title is senior pun architect. On top of her primary mission of securing the securers by building out Duo's multifaceted security operations program, she coaches aspiring presenters in CFP writing and public speaking in an effort to amplify a more diverse pool of voices in the security space. She's also been the co-leader of the BSidesLV lockpick village since 2017. When she's not in security mode, you can find her picking unsuspecting locks or bursting into song, including as a member of the Duo band, Panic! at the Cisco.

Kat SweetInformation Security Analyst at Duo Security

Kat Sweet works for Duo Security, where her official title is information security analyst and her unofficial title is senior pun architect. On top of her primary mission of securing the securers by building out Duo's multifaceted security operations program, she coaches aspiring presenters in CFP writing and public speaking in an effort to amplify a more diverse pool of voices in the security space. She's also been the co-leader of the BSidesLV lockpick village since 2017. When she's not in security mode, you can find her picking unsuspecting locks or bursting into song, including as a member of the Duo band, Panic! at the Cisco.

closepopup
Whitney MaxwellSecurity Consultant at Rapid7

Whitney Maxwell has over 5 years of experience in security. She is currently working for Rapid7 as a security consultant with expertise in social engineering and red teaming. She received the Social Engineering CTF Black Badge from DEF CON in 2018 and she received her Masters of Technology degree with an emphasis in cyber security from Brigham Young University in December of 2017. Her previous experience includes working on the Office 365 red team at Microsoft where she pen tested network infrastructures, coded internal toolsets, and adjudicated cases for the O365 bug bounty. Along with her professional experience she was one of the founding members of the Cyber Security Research Lab red team at Brigham Young University.

Whitney MaxwellSecurity Consultant at Rapid7

Whitney Maxwell has over 5 years of experience in security. She is currently working for Rapid7 as a security consultant with expertise in social engineering and red teaming. She received the Social Engineering CTF Black Badge from DEF CON in 2018 and she received her Masters of Technology degree with an emphasis in cyber security from Brigham Young University in December of 2017. Her previous experience includes working on the Office 365 red team at Microsoft where she pen tested network infrastructures, coded internal toolsets, and adjudicated cases for the O365 bug bounty. Along with her professional experience she was one of the founding members of the Cyber Security Research Lab red team at Brigham Young University.

closepopup
Fatima AhmedSpecialist Technical Account Manager at Amazon Web Services

Fatima is a Cyber Security enthusiast with a focus on Cloud Security. She has lived in more than 5 countries having a wide range of experience working in multi-cultural environments. When she is not working, she is travelling in some part of the world or solving puzzles.

Fatima AhmedSpecialist Technical Account Manager at Amazon Web Services

Fatima is a Cyber Security enthusiast with a focus on Cloud Security. She has lived in more than 5 countries having a wide range of experience working in multi-cultural environments. When she is not working, she is travelling in some part of the world or solving puzzles.

closepopup
Gabrielle HempelSecurity Consultant at Accenture

Gabrielle E. Hempel, B.A., B.S. Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for Advarra Institutional Review Board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as an Information Security Analyst with Accenture while pursuing a certificate in Advanced Computer Security at Stanford. She serves as a mentor for a student cohort of cybersecurity analysts, and volunteers with various community organizations that encourage youth and minorities to pursue careers in STEM and information security.

Gabrielle HempelSecurity Consultant at Accenture

Gabrielle E. Hempel, B.A., B.S. Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for Advarra Institutional Review Board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as an Information Security Analyst with Accenture while pursuing a certificate in Advanced Computer Security at Stanford. She serves as a mentor for a student cohort of cybersecurity analysts, and volunteers with various community organizations that encourage youth and minorities to pursue careers in STEM and information security.

closepopup
Paulina Valdivieso

Paulina is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans for more than 10 years, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.

Paulina Valdivieso

Paulina is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans for more than 10 years, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.

closepopup
Laura WebbFounder at Wildcard Study

Laura is a national speaker with a varied career from art museums to remote work for a large online community. She's interested in Linux, security, making things better, and the next Mars mission.

Laura WebbFounder at Wildcard Study

Laura is a national speaker with a varied career from art museums to remote work for a large online community. She's interested in Linux, security, making things better, and the next Mars mission.

closepopup
Suzanne PereiraIndependent Business Consultant

Suzanne Pereira has over 12 years of experience working in InfoSec. Suzanne served as both a Director of Operations and Project Manager at InGuardians before working as an Independent Business Consultant. Suzanne has experience managing everyday business operations, working with management, clients and consultants.

Suzanne PereiraIndependent Business Consultant

Suzanne Pereira has over 12 years of experience working in InfoSec. Suzanne served as both a Director of Operations and Project Manager at InGuardians before working as an Independent Business Consultant. Suzanne has experience managing everyday business operations, working with management, clients and consultants.

closepopup
Megan CarneyIncident Handler at Target

Megan Carney has been an analyst/bad news giver in several different environments over the past ten years or so. She spends most of her time searching for all the places badness might hide. Can often be found staring into the abyss. It's true the abyss stares back.

Megan CarneyIncident Handler at Target

Megan Carney has been an analyst/bad news giver in several different environments over the past ten years or so. She spends most of her time searching for all the places badness might hide. Can often be found staring into the abyss. It's true the abyss stares back.

closepopup
Serenity SmileDiversity Immersion Academy Student at SANS Institute

Serenity Smile is a SANS Diversity Cybertalent Immersion
Academy Graduate. She holds the GIAC GSEC (GIAC Security Essentials),
GIAC GCIH (GIAC Certified Incident Handler), and GIAC GCIA (GIAC
Certified Intrusion Analyst) Certifications. Additionally, she’s
earned five different yoga and meditation teaching certifications and is a health and wellness consultant. She also co-directs Women Who Code in her city and is an avid cybersecurity researcher, chair of an Arboretum Board, a Coursera Beta-Tester, and an avid lifelong learner.

Serenity SmileDiversity Immersion Academy Student at SANS Institute

Serenity Smile is a SANS Diversity Cybertalent Immersion
Academy Graduate. She holds the GIAC GSEC (GIAC Security Essentials),
GIAC GCIH (GIAC Certified Incident Handler), and GIAC GCIA (GIAC
Certified Intrusion Analyst) Certifications. Additionally, she’s
earned five different yoga and meditation teaching certifications and is a health and wellness consultant. She also co-directs Women Who Code in her city and is an avid cybersecurity researcher, chair of an Arboretum Board, a Coursera Beta-Tester, and an avid lifelong learner.

closepopup
Andrea LimbagoChief Social Scientist at Virtru

Andrea Little Limbago is a computational social scientist specializing in the intersection of technology, national security, and society. She is the Chief Social Scientist at Virtru, an encryption and data privacy software company, where she researches and writes on the geopolitics of cybersecurity, global digital privacy trends, and usable security. Her writing has been featured in numerous outlets, and she frequently presents on a range of cybersecurity topics such as norms, attacker trends, computational propaganda, digital privacy, and workforce development. Andrea is also a Senior Fellow and Program Director for the Emerging Technologies Law and Policy Program at the National Security Institute at George Mason, and she contributes to numerous security conference program review committees. She previously was the Chief Social Scientist at Endgame. Prior to that, Andrea taught in academia and was a technical lead at the Department of Defense, where she received the top award for technical excellence. Andrea earned a PhD in Political Science from the University of Colorado at Boulder.

Andrea LimbagoChief Social Scientist at Virtru

Andrea Little Limbago is a computational social scientist specializing in the intersection of technology, national security, and society. She is the Chief Social Scientist at Virtru, an encryption and data privacy software company, where she researches and writes on the geopolitics of cybersecurity, global digital privacy trends, and usable security. Her writing has been featured in numerous outlets, and she frequently presents on a range of cybersecurity topics such as norms, attacker trends, computational propaganda, digital privacy, and workforce development. Andrea is also a Senior Fellow and Program Director for the Emerging Technologies Law and Policy Program at the National Security Institute at George Mason, and she contributes to numerous security conference program review committees. She previously was the Chief Social Scientist at Endgame. Prior to that, Andrea taught in academia and was a technical lead at the Department of Defense, where she received the top award for technical excellence. Andrea earned a PhD in Political Science from the University of Colorado at Boulder.

closepopup
Amber WelchPrivacy Technical Lead at Schellman & Co

Until she’s accepted for a Mars mission, Amber Welch is pursuing the advancement of personal information privacy and data protection as a Privacy Technical Lead for Schellman & Company. Amber has been assessing corporate privacy compliance programs for the past year and prior to that, managed security and privacy governance for a suite of SaaS products. She has previously worked in companies creating ERP, CRM, event planning, and biologics manufacturing software.

Amber WelchPrivacy Technical Lead at Schellman & Co

Until she’s accepted for a Mars mission, Amber Welch is pursuing the advancement of personal information privacy and data protection as a Privacy Technical Lead for Schellman & Company. Amber has been assessing corporate privacy compliance programs for the past year and prior to that, managed security and privacy governance for a suite of SaaS products. She has previously worked in companies creating ERP, CRM, event planning, and biologics manufacturing software.

closepopup
Xena OlsenCyber Threat Intel Analyst at Financial Services

Xena Olsen is a cyber threat intelligence analyst in the financial services industry. Graduate of SANS Women’s Academy with 6 GIAC certifications,an MBA in IT Management, and currently pursuing a D.Sc. Cybersecurity. She has over 15 years of business experience from start-ups to enterprise in management, technical projects, consulting, strategy, and leadership. Her current focus is malware analysis and paying it forward through her Women in Information Security Group.

Xena OlsenCyber Threat Intel Analyst at Financial Services

Xena Olsen is a cyber threat intelligence analyst in the financial services industry. Graduate of SANS Women’s Academy with 6 GIAC certifications,an MBA in IT Management, and currently pursuing a D.Sc. Cybersecurity. She has over 15 years of business experience from start-ups to enterprise in management, technical projects, consulting, strategy, and leadership. Her current focus is malware analysis and paying it forward through her Women in Information Security Group.

closepopup
Susan PeediyakkalCTI Lead Consultant at Booz Allen Hamilton

Susan Peediyakkal is a Cyber Threat Intelligence (CTI) Lead Consultant in Booz Allen Hamilton’s commercial team where she focuses on guiding clients on establishing and cultivating industry-leading CTI programs. With over 14 years of cybersecurity experience, Susan draws on her vast exposure to commercial and government domains to tailor advanced intelligence solutions for organizations in various industries. Susan has founded many new CTI programs for international and national-level intelligence capabilities across the globe. In March 2018, she was named one of “10 Women in Security You May Not Know But Should” by Dark Reading, one of the leading cybersecurity publications. Susan is a 17 year US Air Force veteran, is trained in Project Management Professional (PMP) and GIAC Cyber Threat Intelligence (GCTI), and is a certified Splunk power user. Susan is currently an inaugural board member for EC-Council's Global Advisory Board, DC Chapter President for the Women's Society of Cyberjutsu, and the Chief Wellness Officer for the non-profit Mental Health Hackers. Susan is a certified yoga instructor, avid traveler, and mentor for both college graduates and transitioning military members in her free time.

Susan PeediyakkalCTI Lead Consultant at Booz Allen Hamilton

Susan Peediyakkal is a Cyber Threat Intelligence (CTI) Lead Consultant in Booz Allen Hamilton’s commercial team where she focuses on guiding clients on establishing and cultivating industry-leading CTI programs. With over 14 years of cybersecurity experience, Susan draws on her vast exposure to commercial and government domains to tailor advanced intelligence solutions for organizations in various industries. Susan has founded many new CTI programs for international and national-level intelligence capabilities across the globe. In March 2018, she was named one of “10 Women in Security You May Not Know But Should” by Dark Reading, one of the leading cybersecurity publications. Susan is a 17 year US Air Force veteran, is trained in Project Management Professional (PMP) and GIAC Cyber Threat Intelligence (GCTI), and is a certified Splunk power user. Susan is currently an inaugural board member for EC-Council's Global Advisory Board, DC Chapter President for the Women's Society of Cyberjutsu, and the Chief Wellness Officer for the non-profit Mental Health Hackers. Susan is a certified yoga instructor, avid traveler, and mentor for both college graduates and transitioning military members in her free time.

closepopup
Jasmine JacksonBlogger/Owner at PassionForPentesting

Self-proclaimed Information Security Unicorn and cool nerd, Jasmine interest in Information Security started when she was 16 years old after she stumbled into a Yahoo! Group on Cryptography. Ten years later, Jasmine earned her Masters in Computer Science and a Graduate Certificate in Information Security and Privacy from University of North Carolina at Charlotte (UNCC). A life-long learner, Jasmine also has an assortment of security certifications - GSEC, GSSP-Java, GWAPT. In her spare time, besides hacking, she likes going to concerts, write on her blog - passionforpentesting.com, spoiling her furry daughter, and playing vintage video games on her Raspberry Pi.

Jasmine JacksonBlogger/Owner at PassionForPentesting

Self-proclaimed Information Security Unicorn and cool nerd, Jasmine interest in Information Security started when she was 16 years old after she stumbled into a Yahoo! Group on Cryptography. Ten years later, Jasmine earned her Masters in Computer Science and a Graduate Certificate in Information Security and Privacy from University of North Carolina at Charlotte (UNCC). A life-long learner, Jasmine also has an assortment of security certifications - GSEC, GSSP-Java, GWAPT. In her spare time, besides hacking, she likes going to concerts, write on her blog - passionforpentesting.com, spoiling her furry daughter, and playing vintage video games on her Raspberry Pi.

closepopup
Margaret LaytonDirector of Engineering at Symantec

Dr. Margaret Layton (Meg) is currently Director of Engineering for the Cyber Security Services organization of Symantec and has been working in technology for over two decades. In 2001, she joined a start-up company that was acquired by Symantec, and she has since been working in various roles within the company - both on products and working on the intelligence that fuels the front-line responders. Prior to joining Symantec, Meg worked as a Director of IT for a telecommunications company doing business in Africa, which is where she first discovered her passion for security. There is nothing like protecting networks in developing countries in the middle of a civil war to really drive forward what security needs. Meg maintains several certifications in the Cyber Security realm that she is passionate about, including both the CISSP and CSSLP certifications from ISC(2), and GIAC certifications for Incident Handling, Forensic Analysis, and Penetration Testing. She is CNSS 4011 and 4012 certified. In her role as Director of Engineering, she also holds Agile certifications.

Margaret LaytonDirector of Engineering at Symantec

Dr. Margaret Layton (Meg) is currently Director of Engineering for the Cyber Security Services organization of Symantec and has been working in technology for over two decades. In 2001, she joined a start-up company that was acquired by Symantec, and she has since been working in various roles within the company - both on products and working on the intelligence that fuels the front-line responders. Prior to joining Symantec, Meg worked as a Director of IT for a telecommunications company doing business in Africa, which is where she first discovered her passion for security. There is nothing like protecting networks in developing countries in the middle of a civil war to really drive forward what security needs. Meg maintains several certifications in the Cyber Security realm that she is passionate about, including both the CISSP and CSSLP certifications from ISC(2), and GIAC certifications for Incident Handling, Forensic Analysis, and Penetration Testing. She is CNSS 4011 and 4012 certified. In her role as Director of Engineering, she also holds Agile certifications.

closepopup
Alana StaszczyszynSecurity Consultant at Security Compass

Alana Staszczyszyn is a practicing security consultant. Her past and present work has focused on penetration testing as well as security governance in the public health sector. She is also heavily interested in various cultural, socioeconomic, and political aspects of cybersecurity, particularly on how the rise of the cyber-threat landscape has given rise to new risk dimensions in those domains.

Alana StaszczyszynSecurity Consultant at Security Compass

Alana Staszczyszyn is a practicing security consultant. Her past and present work has focused on penetration testing as well as security governance in the public health sector. She is also heavily interested in various cultural, socioeconomic, and political aspects of cybersecurity, particularly on how the rise of the cyber-threat landscape has given rise to new risk dimensions in those domains.

closepopup
Swathi JoshiSenior Technical Program Manager - Response at Netflix

Swathi Joshi is a Senior Technical Program Manager, on the Security Incident Response Team at Netflix where she works on advancing the crisis management program and maturing the incident response function. Previously she worked at Mandiant as an Engagement Manager and as an Escalations manager, managing and solving most critical technical efficiency and detection efficacy issues. She also held a variety of roles at different organizations as Associate Director of Information Security, Security Engineer and Security Analyst.

Swathi JoshiSenior Technical Program Manager - Response at Netflix

Swathi Joshi is a Senior Technical Program Manager, on the Security Incident Response Team at Netflix where she works on advancing the crisis management program and maturing the incident response function. Previously she worked at Mandiant as an Engagement Manager and as an Escalations manager, managing and solving most critical technical efficiency and detection efficacy issues. She also held a variety of roles at different organizations as Associate Director of Information Security, Security Engineer and Security Analyst.

closepopup
Elizabeth BiddlecomeInstructor at City College San Francisco

Elizabeth Biddlecome is a consultant and instructor, delivering technical training and mentorship to students and professionals. She leverages her enthusiasm for architecture, security, and code to design and implement comprehensive information security solutions for business needs. Elizabeth enjoys wielding everything from soldering irons to scripting languages in cybersecurity competitions, hackathons, and CTFs.

Elizabeth BiddlecomeInstructor at City College San Francisco

Elizabeth Biddlecome is a consultant and instructor, delivering technical training and mentorship to students and professionals. She leverages her enthusiasm for architecture, security, and code to design and implement comprehensive information security solutions for business needs. Elizabeth enjoys wielding everything from soldering irons to scripting languages in cybersecurity competitions, hackathons, and CTFs.

closepopup
Isaiah SarjuCo-owner at Revis Solutions

Isaiah Sarju is a red teamer. He has contributed to the Microsoft Security Intelligence Report, conducted numerous penetration/red team engagements, and taught students how to become top tier defenders. He plays tabletop games, swims, and trains Brazilian Jiu-Jitsu.

Isaiah SarjuCo-owner at Revis Solutions

Isaiah Sarju is a red teamer. He has contributed to the Microsoft Security Intelligence Report, conducted numerous penetration/red team engagements, and taught students how to become top tier defenders. He plays tabletop games, swims, and trains Brazilian Jiu-Jitsu.

closepopup
Shannon MorrisonSenior Security Engineer at Netflix

Shannon Morrison is a Senior Security Engineer at Netflix, where she builds data-driven detections. Previously, she was a data scientist building anomaly detection models and a container-based machine learning platform at a Fortune 50 insurance company. She also held a variety of roles supporting Splunk Enterprise Security, firewalls, and other infrastructure and security tools.

Shannon MorrisonSenior Security Engineer at Netflix

Shannon Morrison is a Senior Security Engineer at Netflix, where she builds data-driven detections. Previously, she was a data scientist building anomaly detection models and a container-based machine learning platform at a Fortune 50 insurance company. She also held a variety of roles supporting Splunk Enterprise Security, firewalls, and other infrastructure and security tools.

closepopup
Yolonda SmithLead Infosec Analyst at Target

Yolonda Smith is a Lead Infosec Analyst with Target Corporation’s Business Information Security Office (BISO), aligned with the Digital portfolio. In this role, she provides expert security consultancy to developers, business leaders and key stakeholders to ensure that Target's web and mobile applications are designed, developed and deployed with minimal risk to Target or its guests.

A security professional herself, she spent 8 years in the United States Air Force as a Cyberspace Operations Officer with duties and responsibilities varying from Mission Commander, (Advanced Network Operations) where her team planned and executed the first DoD Cyber Threat Hunting Missions to Flight Commander, (Cyber Defense Capabilities Development) where her team developed and fielded the first and only malware neutralization tool for the Predator Drone Weapon System. Additionally, she successfully completed multiple deployments in support of Operations Iraqi Freedom and Enduring Freedom where her teams delivered secure, reliable communications capabilities to forward-deployed units on-demand.

Yolonda holds a litany of degrees and certifications including a Bachelor of Science, Computer Science (University of Notre Dame, 2005), Master of Science, Information Technology, with a concentration in Information Assurance (University of Maryland, 2010) as well as GSEC (2008), GCIH (2011), and CISSP (2008) certifications.

Yolonda SmithLead Infosec Analyst at Target

Yolonda Smith is a Lead Infosec Analyst with Target Corporation’s Business Information Security Office (BISO), aligned with the Digital portfolio. In this role, she provides expert security consultancy to developers, business leaders and key stakeholders to ensure that Target's web and mobile applications are designed, developed and deployed with minimal risk to Target or its guests.

A security professional herself, she spent 8 years in the United States Air Force as a Cyberspace Operations Officer with duties and responsibilities varying from Mission Commander, (Advanced Network Operations) where her team planned and executed the first DoD Cyber Threat Hunting Missions to Flight Commander, (Cyber Defense Capabilities Development) where her team developed and fielded the first and only malware neutralization tool for the Predator Drone Weapon System. Additionally, she successfully completed multiple deployments in support of Operations Iraqi Freedom and Enduring Freedom where her teams delivered secure, reliable communications capabilities to forward-deployed units on-demand.

Yolonda holds a litany of degrees and certifications including a Bachelor of Science, Computer Science (University of Notre Dame, 2005), Master of Science, Information Technology, with a concentration in Information Assurance (University of Maryland, 2010) as well as GSEC (2008), GCIH (2011), and CISSP (2008) certifications.

closepopup
Kelley RobinsonDeveloper Evangelist at Twilio

Kelley works on the Account Security team at Twilio, helping developers manage and secure customer identity in their software applications. Previously she worked in a variety of API platform and data engineering roles at startups in San Francisco. She believes in making technical concepts, especially security, accessible and approachable for new audiences. In her spare time, Kelley is an avid home cook and greatly enjoys reorganizing her tiny kitchen to accommodate completely necessary small appliance purchases.

Kelley RobinsonDeveloper Evangelist at Twilio

Kelley works on the Account Security team at Twilio, helping developers manage and secure customer identity in their software applications. Previously she worked in a variety of API platform and data engineering roles at startups in San Francisco. She believes in making technical concepts, especially security, accessible and approachable for new audiences. In her spare time, Kelley is an avid home cook and greatly enjoys reorganizing her tiny kitchen to accommodate completely necessary small appliance purchases.

closepopup
Alyssa MillerManager - Information Security Solutions Practice at CDW

Alyssa is a former developer turned pen-tester and security evangelist with over 15 years of experience in the security industry. She has maintained a heavy focus on application security over the years, not only conducting application assessments, threat modeling exercises and secure code reviews, but also working with companies to develop comprehensive secure SDLC programs. Alyssa is also experienced in delivering security training at all levels from basic awareness to detailed secure coding practices. Currently, Alyssa is the Manager of the Information Security Solutions Practice for CDW, working with customers to deliver security assessment and advisory services. Alyssa has been published in multiple security publications, spoken at security conferences and events, and also holds a CISM certification from ISACA.

Alyssa MillerManager - Information Security Solutions Practice at CDW

Alyssa is a former developer turned pen-tester and security evangelist with over 15 years of experience in the security industry. She has maintained a heavy focus on application security over the years, not only conducting application assessments, threat modeling exercises and secure code reviews, but also working with companies to develop comprehensive secure SDLC programs. Alyssa is also experienced in delivering security training at all levels from basic awareness to detailed secure coding practices. Currently, Alyssa is the Manager of the Information Security Solutions Practice for CDW, working with customers to deliver security assessment and advisory services. Alyssa has been published in multiple security publications, spoken at security conferences and events, and also holds a CISM certification from ISACA.

closepopup
Wendy EdwardsProgrammer at ASPCA

Wendy is a programmer at a nonprofit who participated in the SANS Women’s Academy for security training and the NASA Datanauts program. She has one master’s degree in computer science and another in library and information science. She is active in local security groups CU2600 and DC217 and is especially interested in the applications of data science to security.

Wendy EdwardsProgrammer at ASPCA

Wendy is a programmer at a nonprofit who participated in the SANS Women’s Academy for security training and the NASA Datanauts program. She has one master’s degree in computer science and another in library and information science. She is active in local security groups CU2600 and DC217 and is especially interested in the applications of data science to security.

closepopup
Lauren RudmanResearcher at SecureData

Lauren started off working as a penetration tester for SensePost based in South Africa. She is currently working for their parent company SecureData in the SDLabs team conducting research. She is passionate about security and especially enjoys reverse engineering malware in her spare time. Lauren holds a MSc degree in Computer Science from Rhodes University.

Lauren RudmanResearcher at SecureData

Lauren started off working as a penetration tester for SensePost based in South Africa. She is currently working for their parent company SecureData in the SDLabs team conducting research. She is passionate about security and especially enjoys reverse engineering malware in her spare time. Lauren holds a MSc degree in Computer Science from Rhodes University.

closepopup
Jessica HydeDirector of Forensics at Magnet Forensics / Adjunct Professor at George Mason University

Jessica Hyde has experience performing computer and mobile device forensics in both the commercial and government sectors. Jessica earned an MS in Computer Forensics from George Mason University. She is the Director of Forensics for Magnet Forensics and an Adjunct Professor at George Mason University where she teaches Mobile Forensics. Prior to her current role, she was a Senior Mobile Exploitation Analyst and team lead for Basis Technology, was part of the Cyber Crime Investigations team at EY, and worked as a Senior Electrical Engineer for American Systems where she specialized in the analysis of damaged mobile devices. She is currently working on a book on Digital Forensics for the Internet of Things anticipated for release in 2019. Jessica is also a veteran of the United States Marine Corps.

Jessica HydeDirector of Forensics at Magnet Forensics / Adjunct Professor at George Mason University

Jessica Hyde has experience performing computer and mobile device forensics in both the commercial and government sectors. Jessica earned an MS in Computer Forensics from George Mason University. She is the Director of Forensics for Magnet Forensics and an Adjunct Professor at George Mason University where she teaches Mobile Forensics. Prior to her current role, she was a Senior Mobile Exploitation Analyst and team lead for Basis Technology, was part of the Cyber Crime Investigations team at EY, and worked as a Senior Electrical Engineer for American Systems where she specialized in the analysis of damaged mobile devices. She is currently working on a book on Digital Forensics for the Internet of Things anticipated for release in 2019. Jessica is also a veteran of the United States Marine Corps.

closepopup
Chloe MessdaghiSecurity Researcher Advocate at Bugcrowd

Chloé Messdaghi is Security Researcher Advocate, board member for 4 nonprofits, one of the Women in Security (WoSEC) founders & heads SF Chapter, founder of WomenHackerz online community, mentors women to enter infosec and remain, speaker on diversity and inclusion, bug bounty, and safe harbor in InfoSec, and Drop Labels founder.
https://www.chloemessdaghi.com

Chloe MessdaghiSecurity Researcher Advocate at Bugcrowd

Chloé Messdaghi is Security Researcher Advocate, board member for 4 nonprofits, one of the Women in Security (WoSEC) founders & heads SF Chapter, founder of WomenHackerz online community, mentors women to enter infosec and remain, speaker on diversity and inclusion, bug bounty, and safe harbor in InfoSec, and Drop Labels founder.
https://www.chloemessdaghi.com

closepopup
Mary WaddickCyber Engineer at Raytheon

Mary Anne is a Cyber Engineer at Raytheon in Indianapolis. She has a master’s Degree in Information Assurance with a focus on Cyber Security from Regis University. She has worked at Raytheon for 29 years, both with Software Engineering and Cyber Engineering. She helps them understand the importance of secure coding practices, and helps them use static code analysis tools for finding and understanding security issues.

Mary WaddickCyber Engineer at Raytheon

Mary Anne is a Cyber Engineer at Raytheon in Indianapolis. She has a master’s Degree in Information Assurance with a focus on Cyber Security from Regis University. She has worked at Raytheon for 29 years, both with Software Engineering and Cyber Engineering. She helps them understand the importance of secure coding practices, and helps them use static code analysis tools for finding and understanding security issues.

closepopup
Jordanne BarrettInformation Security Administration at Miva, Inc

Information Security Administrator for an eCommerce company who is passionate about educating others on security and how to get into the Information Security career field. I hold a Bachelor's degree from the University of South Florida in Information Studies and I am a graduate student at UMUC, along with a CompTIA Security Plus and SSCP certification holder. I am a firm believer in giving back, a CyberPatriots Mentor and volunteer within the Tampa Bay community. When I am not volunteering I co-host a podcast weekly discussing recent security news.

Jordanne BarrettInformation Security Administration at Miva, Inc

Information Security Administrator for an eCommerce company who is passionate about educating others on security and how to get into the Information Security career field. I hold a Bachelor's degree from the University of South Florida in Information Studies and I am a graduate student at UMUC, along with a CompTIA Security Plus and SSCP certification holder. I am a firm believer in giving back, a CyberPatriots Mentor and volunteer within the Tampa Bay community. When I am not volunteering I co-host a podcast weekly discussing recent security news.

closepopup
Vandana Verma SehgalSecurity Solutions Architect at IBM

Vandana Verma is an experienced Security Solutions Architect with IBM. Her work includes Vulnerability Assessments, Penetration Tests and Product Integrations. She is part of Open source communities like Chapter Leader OWASP Bangalore, OWASP Women In AppSec Committee Secretary, and Asia Volunteer Coordinator, Heading InfoSecGirls iN India. She has given talks and workshops at many colleges and security conferences including AppSec Europe, AppSec USA, NullCon, BSides Delhi, AppSec California c0c0n (Kerala Police Conference) and more. She also supports CyberDay4Girls to teach middle aged school girls from 5th - 9th Grade.

Vandana Verma SehgalSecurity Solutions Architect at IBM

Vandana Verma is an experienced Security Solutions Architect with IBM. Her work includes Vulnerability Assessments, Penetration Tests and Product Integrations. She is part of Open source communities like Chapter Leader OWASP Bangalore, OWASP Women In AppSec Committee Secretary, and Asia Volunteer Coordinator, Heading InfoSecGirls iN India. She has given talks and workshops at many colleges and security conferences including AppSec Europe, AppSec USA, NullCon, BSides Delhi, AppSec California c0c0n (Kerala Police Conference) and more. She also supports CyberDay4Girls to teach middle aged school girls from 5th - 9th Grade.

closepopup
Diana KelleyCybersecurity Field CTO at Microsoft

Diana is the Cybersecurity Field CTO for Microsoft and a cybersecurity architect, executive advisor and author. At Microsoft she leverages her 25+ years of cyber-risk and security experience to provide advice and guidance to CSOs, CIOs and CISOs at some of the world’s largest companies and is a contributor to the Microsoft Security Intelligence Report (SIR). In addition to her work at Microsoft, she serves on the ACM Ethics & Plagiarism Committee, is an Industry Mentor at CyberSecurity Factory, and guest lecturer at Boston College’s Master of Science in Cybersecurity program. Diana is CTO and Director of the non-profit Sightline Security, a member of the RSA US Program Committee for 2018 and 2019, was an IEEE “Rock Star of Risk” in 2016, keynotes frequently at major conferences, and co-authored the book Cryptographic Libraries for Developers. She worked at IBM where she built and managed the IBM Security Research publication process.

Diana KelleyCybersecurity Field CTO at Microsoft

Diana is the Cybersecurity Field CTO for Microsoft and a cybersecurity architect, executive advisor and author. At Microsoft she leverages her 25+ years of cyber-risk and security experience to provide advice and guidance to CSOs, CIOs and CISOs at some of the world’s largest companies and is a contributor to the Microsoft Security Intelligence Report (SIR). In addition to her work at Microsoft, she serves on the ACM Ethics & Plagiarism Committee, is an Industry Mentor at CyberSecurity Factory, and guest lecturer at Boston College’s Master of Science in Cybersecurity program. Diana is CTO and Director of the non-profit Sightline Security, a member of the RSA US Program Committee for 2018 and 2019, was an IEEE “Rock Star of Risk” in 2016, keynotes frequently at major conferences, and co-authored the book Cryptographic Libraries for Developers. She worked at IBM where she built and managed the IBM Security Research publication process.

closepopup
Katie NickelsATT&CK Threat Intelligence Lead at MITRE

Katie Nickels is the ATT&CK Threat Intelligence Lead at The MITRE Corporation, where she focuses on sharing how ATT&CK is useful for moving toward a threat-informed defense. She is also a SANS instructor for FOR578: Cyber Threat Intelligence. Katie has worked in network defense, incident response, and cyber threat intelligence for nearly a decade. She hails from a liberal arts background with degrees from Smith College and Georgetown University, embracing the power of applying liberal arts prowess to cybersecurity. With more than a dozen publications to her name, Katie has shared her expertise with presentations at BSidesLV, the FIRST CTI Symposium, multiple SANS Summits, Sp4rkcon, and many other events. Katie was also was a member of the 2019 SANS CTI Summit Advisory Board. She was the 2018 recipient of the President's Award from the Women's Society of Cyberjutsu and serves as the Program Manager for the Cyberjutsu Girls Academy, which seeks to inspire young women to learn more about STEM.

Katie NickelsATT&CK Threat Intelligence Lead at MITRE

Katie Nickels is the ATT&CK Threat Intelligence Lead at The MITRE Corporation, where she focuses on sharing how ATT&CK is useful for moving toward a threat-informed defense. She is also a SANS instructor for FOR578: Cyber Threat Intelligence. Katie has worked in network defense, incident response, and cyber threat intelligence for nearly a decade. She hails from a liberal arts background with degrees from Smith College and Georgetown University, embracing the power of applying liberal arts prowess to cybersecurity. With more than a dozen publications to her name, Katie has shared her expertise with presentations at BSidesLV, the FIRST CTI Symposium, multiple SANS Summits, Sp4rkcon, and many other events. Katie was also was a member of the 2019 SANS CTI Summit Advisory Board. She was the 2018 recipient of the President's Award from the Women's Society of Cyberjutsu and serves as the Program Manager for the Cyberjutsu Girls Academy, which seeks to inspire young women to learn more about STEM.

closepopup
Keira PatersonCo-Founder at eConvenor

Keira Paterson is a Django developer and co-founder of eConvenor.org and is passionate about diversity, equity, sustainability and empathy in technology.

Motivated by a desire to see automated tools improving the effectiveness of community organizers, Keira taught herself to code building eConvenor with her partner in 2012. In 2017 she made the jump into web development as a career, while continuing to develop and manage eConvenor.

Prior to development, Keira gained 10 years experience in people-focused work, as a trade union organizer, a political volunteer coordinator, staff manager and policy process manager. She now works in her spare time to bring these two worlds together - teaching people stuff to computer-people, and computer stuff to people-people in hopes of a more secure, equitable tech future.

Keira PatersonCo-Founder at eConvenor

Keira Paterson is a Django developer and co-founder of eConvenor.org and is passionate about diversity, equity, sustainability and empathy in technology.

Motivated by a desire to see automated tools improving the effectiveness of community organizers, Keira taught herself to code building eConvenor with her partner in 2012. In 2017 she made the jump into web development as a career, while continuing to develop and manage eConvenor.

Prior to development, Keira gained 10 years experience in people-focused work, as a trade union organizer, a political volunteer coordinator, staff manager and policy process manager. She now works in her spare time to bring these two worlds together - teaching people stuff to computer-people, and computer stuff to people-people in hopes of a more secure, equitable tech future.

closepopup
Emilie St-PierreSecurity Consultant at Rapid7

Émilie is a penetration tester who has been a part of the information security community for over 5 years. She specializes in testing technology from the point-of-view of a malicious actor- performing social engineering, web application, WiFi and network-based engagements. She currently organizes community workshops for FutureAda and has presented at conferences such as BSidesLV and Layer8.

Emilie St-PierreSecurity Consultant at Rapid7

Émilie is a penetration tester who has been a part of the information security community for over 5 years. She specializes in testing technology from the point-of-view of a malicious actor- performing social engineering, web application, WiFi and network-based engagements. She currently organizes community workshops for FutureAda and has presented at conferences such as BSidesLV and Layer8.

closepopup
Aunshul RegeAssociate Professor at Temple University

Aunshul Rege, PhD, is an Associate Professor with the Department of Criminal Justice at Temple University, USA. She holds a PhD and MA in Criminal Justice, an MA and BA in Criminology, and a BSc in Computer Science. She has been researching proactive cybersecurity in the context of cybercrimes against critical infrastructures for over 10 years. Specifically, her National Science Foundation funded (CAREER, CPS, EAGER) research examines adversarial and defender behavior, decision-making, adaptations, modus operandi, and group dynamics. Her has been published in the Journal of Information Warfare, Journal of Homeland Security and Emergency Management, the Security Journal, and the IEEE Intelligent Systems. Dr. Rege is also passionate about educating the next generation workforce across the social and hard sciences about the relevance of the human factor in cybersecurity through experiential learning.

Aunshul RegeAssociate Professor at Temple University

Aunshul Rege, PhD, is an Associate Professor with the Department of Criminal Justice at Temple University, USA. She holds a PhD and MA in Criminal Justice, an MA and BA in Criminology, and a BSc in Computer Science. She has been researching proactive cybersecurity in the context of cybercrimes against critical infrastructures for over 10 years. Specifically, her National Science Foundation funded (CAREER, CPS, EAGER) research examines adversarial and defender behavior, decision-making, adaptations, modus operandi, and group dynamics. Her has been published in the Journal of Information Warfare, Journal of Homeland Security and Emergency Management, the Security Journal, and the IEEE Intelligent Systems. Dr. Rege is also passionate about educating the next generation workforce across the social and hard sciences about the relevance of the human factor in cybersecurity through experiential learning.

closepopup
Mandy Logan

Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. She used her life hacking prowess from a non-traditional background (such as skipping five years of K-12 schooling while working on a ranch and then graduating from a giant, traditional high school in 2.5 years with a 4.2 GPA) to re-establish neuro control using her electrical system, her tongue against her teeth, and perseverance. Now, as a happy dyslexic autie (autistic person) she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, and Community, pressing forth to improve the lives of InfoSec professionals and long term ethical neuro tech for those unable to express themselves to their own satisfaction. She enjoys art, travel, naps, speaking, continuing and broadening her own recovery, and good people, and hopes to be half the person her service dog, Trevor, is.

Mandy Logan

Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. She used her life hacking prowess from a non-traditional background (such as skipping five years of K-12 schooling while working on a ranch and then graduating from a giant, traditional high school in 2.5 years with a 4.2 GPA) to re-establish neuro control using her electrical system, her tongue against her teeth, and perseverance. Now, as a happy dyslexic autie (autistic person) she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, and Community, pressing forth to improve the lives of InfoSec professionals and long term ethical neuro tech for those unable to express themselves to their own satisfaction. She enjoys art, travel, naps, speaking, continuing and broadening her own recovery, and good people, and hopes to be half the person her service dog, Trevor, is.

closepopup
Tash NorrisSenior Cloud Security Engineer at PhotoBox Group

Tash is a Senior Cloud Security Engineer at Photobox Group (which includes Moonpig, PosterXXL, Greetz! and Hofmann) and previously a threat modeling engineer in financial services. She is currently building tools and processes to automate all the things/ make the Cloud more secure. Currently she is also contributing to threat modeling projects and resources via OWASP and other community events.

Tash is also on the review panel for DevSecCon, an OWASP contributor and an avid advocate for Women in Tech/Cyber, appearing at various tech and security events and meetups to talk about both technical and behavioural topics.

Tash NorrisSenior Cloud Security Engineer at PhotoBox Group

Tash is a Senior Cloud Security Engineer at Photobox Group (which includes Moonpig, PosterXXL, Greetz! and Hofmann) and previously a threat modeling engineer in financial services. She is currently building tools and processes to automate all the things/ make the Cloud more secure. Currently she is also contributing to threat modeling projects and resources via OWASP and other community events.

Tash is also on the review panel for DevSecCon, an OWASP contributor and an avid advocate for Women in Tech/Cyber, appearing at various tech and security events and meetups to talk about both technical and behavioural topics.

closepopup
Joe GrayAdvanced Persistent Security

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is currently a Senior Security Architect and maintains his own blog and podcast called Advanced Persistent Security. In his spare time, Joe enjoys attending information security conferences, contributing blogs to various outlets, training in Brazilian Jiu Jitsu, and flying his drone. Joe is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe is a regular Forbes contributor and has contributed material for the likes of AlienVault, ITSP Magazine, CSO Online, and Dark Reading. Joe is an IBM Recognized Speaker/Presenter.

Joe GrayAdvanced Persistent Security

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is currently a Senior Security Architect and maintains his own blog and podcast called Advanced Persistent Security. In his spare time, Joe enjoys attending information security conferences, contributing blogs to various outlets, training in Brazilian Jiu Jitsu, and flying his drone. Joe is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe is a regular Forbes contributor and has contributed material for the likes of AlienVault, ITSP Magazine, CSO Online, and Dark Reading. Joe is an IBM Recognized Speaker/Presenter.

closepopup
Lodrina CherneInstructor at SANS Institute, Security Analyst at Cybereason

Lodrina Cherne is an instructor for the SANS Institute where she teaches Windows Forensic Analysis and helps students to advance their foundational understanding of DFIR. She also works as a Security Analyst at Cybereason helping protect organizations from attack through incident response, malware analysis, and security research. Throughout her 15 years in cybersecurity, she has been able to fight for people wrongly impacted by technology including her work investigating the “Sledgehammer” case in Turkey where she helped in the acquittal of more than 200 foreign imprisoned senior military officers after showing that the electronic documents used to indict them were forged.

Lodrina CherneInstructor at SANS Institute, Security Analyst at Cybereason

Lodrina Cherne is an instructor for the SANS Institute where she teaches Windows Forensic Analysis and helps students to advance their foundational understanding of DFIR. She also works as a Security Analyst at Cybereason helping protect organizations from attack through incident response, malware analysis, and security research. Throughout her 15 years in cybersecurity, she has been able to fight for people wrongly impacted by technology including her work investigating the “Sledgehammer” case in Turkey where she helped in the acquittal of more than 200 foreign imprisoned senior military officers after showing that the electronic documents used to indict them were forged.

closepopup
Miki DemeterSecurity Researcher at Intel

I am a writer and Public Speaker for technical subjects as well as Diversity & Inclusion and other social subjects. My passion lies with advocating for underrepresented communities in Tech. My career has encompassed everything from firmware to application space. I have worked with teams providing full stack development. My last 8 years have had Security focus as the Security Champion for the Open Source Technology Center @ Intel. My current position as a Security Researcher In the IPAS GO (formerly Security Center of Excellence) working on Secure Development Lifecycle governance and as Product Security Expert for Open Source Software. Working with outside organizations like Women Who Code, Women in Security and Technology, Portland Women in Tech, and the Diana Initiative to help drive diversity and true inclusion while advocating for women in the STEM fields.

Miki DemeterSecurity Researcher at Intel

I am a writer and Public Speaker for technical subjects as well as Diversity & Inclusion and other social subjects. My passion lies with advocating for underrepresented communities in Tech. My career has encompassed everything from firmware to application space. I have worked with teams providing full stack development. My last 8 years have had Security focus as the Security Champion for the Open Source Technology Center @ Intel. My current position as a Security Researcher In the IPAS GO (formerly Security Center of Excellence) working on Secure Development Lifecycle governance and as Product Security Expert for Open Source Software. Working with outside organizations like Women Who Code, Women in Security and Technology, Portland Women in Tech, and the Diana Initiative to help drive diversity and true inclusion while advocating for women in the STEM fields.

closepopup
Daryl PfeifFounder of Cyber Sleuth Science Lab

Daryl is a founding member of Digital Forensics Solutions, Digital Security Associates and DFRWS.org. She has been actively engaged in the field of digital forensics and cyber security since 2004. She has extensive experience in eDiscovery, digital investigation, incident response, social engineering, software engineering, training, penetration testing and application vulnerability assessment. She has served as a security and forensics consultant with an emphasis in the legal, financial, healthcare and technology industries. In her role as the C.O.O of DFRWS, Daryl organizes the leading International Conference specialized in Digital Forensics Research.

Daryl is also actively engaged as a mentor to support diversity in the Digital Forensics Community through participatory education and introducing women to careers the field of forensics. Her most recent venture is The Cyber Sleuth Science Lab a virtual learning environment designed to introduce young women in 9th -12th grade to the world of Digital Forensics and Cyber Security. Daryl is a member of the International Association of Computer Investigation Specialists, High Technology Crime Investigation Association and WIPP. When she is not working on computers she is restoring her vintage car, dancing or having a nice cup of tea!

Daryl PfeifFounder of Cyber Sleuth Science Lab

Daryl is a founding member of Digital Forensics Solutions, Digital Security Associates and DFRWS.org. She has been actively engaged in the field of digital forensics and cyber security since 2004. She has extensive experience in eDiscovery, digital investigation, incident response, social engineering, software engineering, training, penetration testing and application vulnerability assessment. She has served as a security and forensics consultant with an emphasis in the legal, financial, healthcare and technology industries. In her role as the C.O.O of DFRWS, Daryl organizes the leading International Conference specialized in Digital Forensics Research.

Daryl is also actively engaged as a mentor to support diversity in the Digital Forensics Community through participatory education and introducing women to careers the field of forensics. Her most recent venture is The Cyber Sleuth Science Lab a virtual learning environment designed to introduce young women in 9th -12th grade to the world of Digital Forensics and Cyber Security. Daryl is a member of the International Association of Computer Investigation Specialists, High Technology Crime Investigation Association and WIPP. When she is not working on computers she is restoring her vintage car, dancing or having a nice cup of tea!

closepopup
Clover TwombleySecurity Analyst at Target

Clover Twombley was lured into the security field about two years ago by the prospect of putting out fires and responding to nonstop alerts in an environment that never sleeps. Her previous life was split between accounting and putting out fires and responding to nonstop alerts while never sleeping in her role as a mother of six. So far it's been a surprisingly easy transition.

Clover TwombleySecurity Analyst at Target

Clover Twombley was lured into the security field about two years ago by the prospect of putting out fires and responding to nonstop alerts in an environment that never sleeps. Her previous life was split between accounting and putting out fires and responding to nonstop alerts while never sleeping in her role as a mother of six. So far it's been a surprisingly easy transition.

closepopup
Elizabeth BellStaff Application Security Engineer at CircleCI

Liz has been a librarian, soldier, waitress, garbage-sorter, and mystery diner. More recently, she's been a penetration tester, cryptanalyst, and network defense analyst, and has seen the clouds from both sides of the red/blue split. When she isn't guarding networks, she builds Nazi-hunting Twitter robots and picks locks.

Elizabeth BellStaff Application Security Engineer at CircleCI

Liz has been a librarian, soldier, waitress, garbage-sorter, and mystery diner. More recently, she's been a penetration tester, cryptanalyst, and network defense analyst, and has seen the clouds from both sides of the red/blue split. When she isn't guarding networks, she builds Nazi-hunting Twitter robots and picks locks.

closepopup
Seth VargoDeveloper Relations Engineer at Google

Seth Vargo is a Developer Relations Engineer at Google. Previously he worked at HashiCorp, Chef Software, CustomInk, and a few Pittsburgh-based startups. He is the author of Learning Chef and is passionate about reducing inequality in technology. When he is not writing, working on open source, teaching, or speaking at conferences, Seth enjoys spending time with his friends and advising non-profits.

Seth VargoDeveloper Relations Engineer at Google

Seth Vargo is a Developer Relations Engineer at Google. Previously he worked at HashiCorp, Chef Software, CustomInk, and a few Pittsburgh-based startups. He is the author of Learning Chef and is passionate about reducing inequality in technology. When he is not writing, working on open source, teaching, or speaking at conferences, Seth enjoys spending time with his friends and advising non-profits.

closepopup
Sarah YoungCloud Security Architect at Microsoft

Sarah is a cloud security architect working for Microsoft and based in Melbourne, Australia. She has a decade of experience in tech and is particularly interested in cloud security, container/orchestrator security and good ol' fashioned networking and infrastructure security (having previously worked as a network engineer). Sarah has spoken around the world at a variety of info sec conferences about a range of security and technical topics.

Sarah YoungCloud Security Architect at Microsoft

Sarah is a cloud security architect working for Microsoft and based in Melbourne, Australia. She has a decade of experience in tech and is particularly interested in cloud security, container/orchestrator security and good ol' fashioned networking and infrastructure security (having previously worked as a network engineer). Sarah has spoken around the world at a variety of info sec conferences about a range of security and technical topics.

closepopup
Emily Gladstone ColeSenior Security Engineer at Agari Data, Inc

Emily is currently a Senior Security Engineer for Agari Data, Inc., and spends a lot of time thinking about the ways that DevOps and Security intersect. Emily has performed critical organizational roles of security research, incident response, product security, devops engineer, system administrator, tech support, security expert, operations specialist, and project lead. Emily specializes in Unix security and is a co-author of a book on Solaris Security for the SANS Institute, and serves as a Mentor for SANS' CyberTalent Immersion Academy for Women. She holds GSEC, GCED, GPPA, GCIH, and ITIL certifications, and is a Certified Scrum Master.

Emily Gladstone ColeSenior Security Engineer at Agari Data, Inc

Emily is currently a Senior Security Engineer for Agari Data, Inc., and spends a lot of time thinking about the ways that DevOps and Security intersect. Emily has performed critical organizational roles of security research, incident response, product security, devops engineer, system administrator, tech support, security expert, operations specialist, and project lead. Emily specializes in Unix security and is a co-author of a book on Solaris Security for the SANS Institute, and serves as a Mentor for SANS' CyberTalent Immersion Academy for Women. She holds GSEC, GCED, GPPA, GCIH, and ITIL certifications, and is a Certified Scrum Master.

closepopup
Sapna SinghCyber Security Researcher

Sapna is a Security Professional with more than 9 years of experience in this cyber security domain. She comes with a background in Information Security where she worked as SME for critical incidents investigations, forensics, vulnerability assessment, penetrations testing and cloud security assessments for various organizations. She has earned her Master’s degree in “Information Security & Cyber law”. Prior to that she completed Masters and Post Graduate Diploma in Computer application.

She has given talks at SANS Summit, Kuwait University, for WTM & GDG and WiCSME sessions. Sapna is active member of ‘Women in Cyber Security Middle East’ group working to empower and mentor women in Cyber Security. She is driving the online knowledge sharing sessions to provide platform for women across Middle East countries, where they can express, share their knowledge and learn from each other. She is also co-organizer for Kuwait Cyber Security group.

Sapna SinghCyber Security Researcher

Sapna is a Security Professional with more than 9 years of experience in this cyber security domain. She comes with a background in Information Security where she worked as SME for critical incidents investigations, forensics, vulnerability assessment, penetrations testing and cloud security assessments for various organizations. She has earned her Master’s degree in “Information Security & Cyber law”. Prior to that she completed Masters and Post Graduate Diploma in Computer application.

She has given talks at SANS Summit, Kuwait University, for WTM & GDG and WiCSME sessions. Sapna is active member of ‘Women in Cyber Security Middle East’ group working to empower and mentor women in Cyber Security. She is driving the online knowledge sharing sessions to provide platform for women across Middle East countries, where they can express, share their knowledge and learn from each other. She is also co-organizer for Kuwait Cyber Security group.

closepopup
Christine McGarryPlatform Support at Arctic Wolf Networks

Christine McGarry is a former software tester who transferred 5 years experience in digital forensics to the world of cyber security. Christine earned a diploma from Conestoga College where she studied IT and an Honours BA from the University of Guelph. She is currently working at Arctic Wolf Networks in an internal technical support role where she assists both the software development and security services teams. She specializes in tools the Arctic Wolf Security Engineers use to deliver the AWN CyberSOC service.

Christine McGarryPlatform Support at Arctic Wolf Networks

Christine McGarry is a former software tester who transferred 5 years experience in digital forensics to the world of cyber security. Christine earned a diploma from Conestoga College where she studied IT and an Honours BA from the University of Guelph. She is currently working at Arctic Wolf Networks in an internal technical support role where she assists both the software development and security services teams. She specializes in tools the Arctic Wolf Security Engineers use to deliver the AWN CyberSOC service.

closepopup
Saba DeyhimConsultant Manager at Slalom

Saba is a consultant at heart who started her career in Semiconductor Engineering and through several pivots, she found her passion in Security and Infrastructure consulting. She leads the Slalom SF Security team and loves working with a talented group with experience spanning the strategic to execution in Security/ Devops/ Cloud Operations/ Automation. While she has traveled the world and supported clients in Europe and Asia in the past, she has found that the most rewarding impact is contributing to the growth of her local market. It helps to call the Bay Area home and to consultant at the heart of innovation. Saba completed undergrad in Applied and Engineering Physics at Cornell, and her MBA at the Tuck School of Business at Dartmouth College.

Saba DeyhimConsultant Manager at Slalom

Saba is a consultant at heart who started her career in Semiconductor Engineering and through several pivots, she found her passion in Security and Infrastructure consulting. She leads the Slalom SF Security team and loves working with a talented group with experience spanning the strategic to execution in Security/ Devops/ Cloud Operations/ Automation. While she has traveled the world and supported clients in Europe and Asia in the past, she has found that the most rewarding impact is contributing to the growth of her local market. It helps to call the Bay Area home and to consultant at the heart of innovation. Saba completed undergrad in Applied and Engineering Physics at Cornell, and her MBA at the Tuck School of Business at Dartmouth College.

closepopup
Brianne HughesTechnical Editor at Bishop Fox

As a technical editor for Bishop Fox, Brianne Hughes works on client reports, internal resource development, and ongoing consultant training. She compiled the style guide available at cybersecuritystyleguide.com and hosted SpellCheck: The Hacker Spelling Bee at HOPE and DEF CON in Summer 2018. As a historical linguist, she enjoys finding new cutthroat compounds and using vulgar examples in her talks. She is Associate Executive Secretary for the DSNA, an Odd Salon Fellow, and she is on the board of directors at Wordnik.

Brianne HughesTechnical Editor at Bishop Fox

As a technical editor for Bishop Fox, Brianne Hughes works on client reports, internal resource development, and ongoing consultant training. She compiled the style guide available at cybersecuritystyleguide.com and hosted SpellCheck: The Hacker Spelling Bee at HOPE and DEF CON in Summer 2018. As a historical linguist, she enjoys finding new cutthroat compounds and using vulgar examples in her talks. She is Associate Executive Secretary for the DSNA, an Odd Salon Fellow, and she is on the board of directors at Wordnik.

closepopup
Sylvia KillinenSenior QA Engineer at Worldpay

Sylvia joined a QA team at Mercury Payment Systems in 2009 and never looked back. Finding a SQL injection bug was the impetus to start studying information security, and she has turned an interest into a field of work. With a focus on finding the trail and making it easier to do the right thing, she has offered technical and theoretical training to other testers within the company.

Sylvia KillinenSenior QA Engineer at Worldpay

Sylvia joined a QA team at Mercury Payment Systems in 2009 and never looked back. Finding a SQL injection bug was the impetus to start studying information security, and she has turned an interest into a field of work. With a focus on finding the trail and making it easier to do the right thing, she has offered technical and theoretical training to other testers within the company.

closepopup
Jaime Lightfoot

Jaime is an electrical engineer turned software developer. Her experience spans from embedded systems to mobile apps to web development. She caught the infosec bug through playing CTFs with her team, BisonSquad. When she's not adding LEDs to things or volunteering with her local software community, she can be found taking her dog for overdue walks.

Jaime Lightfoot

Jaime is an electrical engineer turned software developer. Her experience spans from embedded systems to mobile apps to web development. She caught the infosec bug through playing CTFs with her team, BisonSquad. When she's not adding LEDs to things or volunteering with her local software community, she can be found taking her dog for overdue walks.

closepopup
Vanessa Redman

Vanessa Redman is a long time listener, first time speaker at a cyber conference. She considers herself a researcher first and foremost, and has interests in open source information gathering and adversary tactics and techniques. She is particularly interested in cyber threat intelligence and how to integrate algorithmic game theory to create a *proactive* defensive framework that can be easily specialized and used across the community. Her view of cybersecurity fundamentally changed while working for a Red Team, and she strongly believes that being able to think like a malicious actor is a key component in building a robust defensive posture. She holds a CompTia Security + certification, in currently finishing her B.S. in Computer Science, and is scheduled to take the GXPN Certification in the Fall of 2019.

Vanessa Redman

Vanessa Redman is a long time listener, first time speaker at a cyber conference. She considers herself a researcher first and foremost, and has interests in open source information gathering and adversary tactics and techniques. She is particularly interested in cyber threat intelligence and how to integrate algorithmic game theory to create a *proactive* defensive framework that can be easily specialized and used across the community. Her view of cybersecurity fundamentally changed while working for a Red Team, and she strongly believes that being able to think like a malicious actor is a key component in building a robust defensive posture. She holds a CompTia Security + certification, in currently finishing her B.S. in Computer Science, and is scheduled to take the GXPN Certification in the Fall of 2019.

closepopup
Yasmine Johnston-IsonSenior Threat Researcher at Fidelis

I started tinkering with webpage vulnerabilities when I was around 17 years old. I had no clue that tinkering was a real job. I was soon, purposefully, infecting my own computers with spyware to see what happens and how they work. Then I joined the military (around 19 years old) as a Signals Intelligence Analyst (National Guard 2003, active duty Army 2005, and ended my career last year in the reserves).
I've done some threat targeting downrange in Afghanistan and Iraq and even more targeting back here stateside. I left the targeting world for a short time when I worked at the Department of Energy as their Senior Reverse Engineer. While there, I had a great Team Lead who pushed my technical skills at every opportunity. Currently, I'm working at Fidelis as a Cyber crime Senior Threat Researcher.
As you can see, my career grew up in the shadows of digital conversations. I saw and learned so much. I understood how pieces fit together. I learned weaknesses in targets and how to exploit them. Sometimes I knew my target better than my family. I was trained to become an expert in the area I was assigned. Even as a contractor for the Department of Defense, I was still in this shadow. People's lives depended on my ability to put a puzzle together.
A target is a target and I had better have my facts right.
A network is a network - human or digital.
In the shadows, it's one in the same.
I live for hunting. Discovery of the unknown while staying unknown.

Yasmine Johnston-IsonSenior Threat Researcher at Fidelis

I started tinkering with webpage vulnerabilities when I was around 17 years old. I had no clue that tinkering was a real job. I was soon, purposefully, infecting my own computers with spyware to see what happens and how they work. Then I joined the military (around 19 years old) as a Signals Intelligence Analyst (National Guard 2003, active duty Army 2005, and ended my career last year in the reserves).
I've done some threat targeting downrange in Afghanistan and Iraq and even more targeting back here stateside. I left the targeting world for a short time when I worked at the Department of Energy as their Senior Reverse Engineer. While there, I had a great Team Lead who pushed my technical skills at every opportunity. Currently, I'm working at Fidelis as a Cyber crime Senior Threat Researcher.
As you can see, my career grew up in the shadows of digital conversations. I saw and learned so much. I understood how pieces fit together. I learned weaknesses in targets and how to exploit them. Sometimes I knew my target better than my family. I was trained to become an expert in the area I was assigned. Even as a contractor for the Department of Defense, I was still in this shadow. People's lives depended on my ability to put a puzzle together.
A target is a target and I had better have my facts right.
A network is a network - human or digital.
In the shadows, it's one in the same.
I live for hunting. Discovery of the unknown while staying unknown.

closepopup
Michelle BrennerSenior Backend Engineer at ChowNow

connecting them with customers to discover their delicious creations. She has previously served as both an engineer and a manager for the last 7+ years in entertainment technology. She has worked tirelessly to help movies and television get made faster and cheaper, saving productions millions of dollars. A Philadelphia native, she has a background in Media Arts and is a self-taught Python developer. Michelle is now working to give back to her community through mentorship and conference speaking.

Michelle BrennerSenior Backend Engineer at ChowNow

connecting them with customers to discover their delicious creations. She has previously served as both an engineer and a manager for the last 7+ years in entertainment technology. She has worked tirelessly to help movies and television get made faster and cheaper, saving productions millions of dollars. A Philadelphia native, she has a background in Media Arts and is a self-taught Python developer. Michelle is now working to give back to her community through mentorship and conference speaking.

closepopup
Kathleen MullinCISO at Healthmap Solutions

Kathleen (Kate) Mullin CISSP, MLSE, CCSFP
Kate Mullin is an influential information security practitioner with more than 30 years of experience in various accounting, audit, risk, governance, and information security roles. She has been a CISO at various organizations including publicly traded, private equity, not-for-profit, and governmental entities. Kate established the role of CISO at Tampa Airport and at Healthplan Services. Kate was the CISO for Adventist Health System and WageWorks and has a vast array of first-hand experience in various areas of information security from social engineering to presenting to Boards. Kate has a BSBA with a concentration in Accounting from St Joseph's College, Maine and an MBA from Florida Metropolitan University.
Kate is now a vCISO providing services for colleges and universities, third party administrators (TPA), and financial, and healthcare firms. Kate provides interim CISO, fractal CISO and vCISO services as well as DPO guidance.
Throughout her career, Kate has volunteered and participated in maturing information security as a profession. Kate is a former member of the ISACA CGEIT Certification and Credentials Committee and a past chapter president and CISA, CISM, CRISC, and CGEIT coordinator for West Florida ISACA. Kate has been a part of the CISO Coalition governing board, participating in their teams such as the one created for the EUGDPR and has moderated at several of their events. Kate is cited by publications as an expert in information security including governance, social engineering, and general security trends.
Kate serves internationally as a featured speaker and panelist at webinars, seminars, and conferences, delivering presentations on diverse topics including Reducing Compliance Risk, Commonly Accepted Standards, IT Audit Becoming a Trusted Advisor, Social Engineering, CISO Organizational placement, Audit Logging and Log Management, and Information Security Incident Response. Kate was one of the panelist to six startups for “Shark Tank” 2017 in San Francisco "Enterprise IT Security Demo Day" hosted by Glynn Capital Management, DocuSign, Silicon Valley Bank, and Dropbox. She spoke at the COSAC and SABSA conference Kildare, Ireland 2018 as well as DefCon 26 https://www.youtube.com/watch?v=F1sbd7hFFy4 Tampa BSIDES 2019, and is a regular presenter for AHIA and MISTI.

Kathleen MullinCISO at Healthmap Solutions

Kathleen (Kate) Mullin CISSP, MLSE, CCSFP
Kate Mullin is an influential information security practitioner with more than 30 years of experience in various accounting, audit, risk, governance, and information security roles. She has been a CISO at various organizations including publicly traded, private equity, not-for-profit, and governmental entities. Kate established the role of CISO at Tampa Airport and at Healthplan Services. Kate was the CISO for Adventist Health System and WageWorks and has a vast array of first-hand experience in various areas of information security from social engineering to presenting to Boards. Kate has a BSBA with a concentration in Accounting from St Joseph's College, Maine and an MBA from Florida Metropolitan University.
Kate is now a vCISO providing services for colleges and universities, third party administrators (TPA), and financial, and healthcare firms. Kate provides interim CISO, fractal CISO and vCISO services as well as DPO guidance.
Throughout her career, Kate has volunteered and participated in maturing information security as a profession. Kate is a former member of the ISACA CGEIT Certification and Credentials Committee and a past chapter president and CISA, CISM, CRISC, and CGEIT coordinator for West Florida ISACA. Kate has been a part of the CISO Coalition governing board, participating in their teams such as the one created for the EUGDPR and has moderated at several of their events. Kate is cited by publications as an expert in information security including governance, social engineering, and general security trends.
Kate serves internationally as a featured speaker and panelist at webinars, seminars, and conferences, delivering presentations on diverse topics including Reducing Compliance Risk, Commonly Accepted Standards, IT Audit Becoming a Trusted Advisor, Social Engineering, CISO Organizational placement, Audit Logging and Log Management, and Information Security Incident Response. Kate was one of the panelist to six startups for “Shark Tank” 2017 in San Francisco "Enterprise IT Security Demo Day" hosted by Glynn Capital Management, DocuSign, Silicon Valley Bank, and Dropbox. She spoke at the COSAC and SABSA conference Kildare, Ireland 2018 as well as DefCon 26 https://www.youtube.com/watch?v=F1sbd7hFFy4 Tampa BSIDES 2019, and is a regular presenter for AHIA and MISTI.

closepopup
Tanya JancaCloud Security Advocate at Microsoft

Tanya Janca is a senior cloud advocate for Microsoft, specializing in application and cloud security; evangelizing software security and advocating for developers and operations folks alike through public speaking, her open source project OWASP DevSlop, and various forms of teaching via workshops, blogs and community events. As an ethical hacker, OWASP Project and Chapter Leader, Women in Security and Technology (WIST) chapter leader, software developer and professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.

Tanya JancaCloud Security Advocate at Microsoft

Tanya Janca is a senior cloud advocate for Microsoft, specializing in application and cloud security; evangelizing software security and advocating for developers and operations folks alike through public speaking, her open source project OWASP DevSlop, and various forms of teaching via workshops, blogs and community events. As an ethical hacker, OWASP Project and Chapter Leader, Women in Security and Technology (WIST) chapter leader, software developer and professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.

closepopup
Olivia StellaSenior Cybersecurity Analyst

Olivia Stella is a senior cybersecurity analyst for a US airline. In her current role, she focuses on aviation security and vulnerability management including pen testing. She has over ten years of experience in software development and information security. Previously, she worked at an in-flight entertainment company in product security supporting incident response, risk & compliance, and as the bug bounty lead. She holds a bachelor's degree in computer science, masters in software engineering, CISSP & CISM. When she's not wearing her security hat, she loves to curl and is an avid toastmaster. (That's right, ice curling.)

Olivia StellaSenior Cybersecurity Analyst

Olivia Stella is a senior cybersecurity analyst for a US airline. In her current role, she focuses on aviation security and vulnerability management including pen testing. She has over ten years of experience in software development and information security. Previously, she worked at an in-flight entertainment company in product security supporting incident response, risk & compliance, and as the bug bounty lead. She holds a bachelor's degree in computer science, masters in software engineering, CISSP & CISM. When she's not wearing her security hat, she loves to curl and is an avid toastmaster. (That's right, ice curling.)

closepopup
Kathleen SmithCMO at CyberSecJobs.com

Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com, both veteran owned companies, she spearheads the community-building, and communications outreach initiatives catering to the both organizations' many audiences including security cleared job seekers, cybersecurity candidates and military personnel. Kathleen has presented at several security conferences on recruiting and job search within the cyber security world to include BSidesLV, BSidesTampa, BSidesDE, FedCyber. Kathleen volunteers in the cybersecurity community; she is the Director, HireGround, BSidesLV's 2 day career track. Kathleen is well respected within the recruiting community, is the co-founder and current President of recruitDC, the largest community of recruiters in the Washington DC area.

Kathleen SmithCMO at CyberSecJobs.com

Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com, both veteran owned companies, she spearheads the community-building, and communications outreach initiatives catering to the both organizations' many audiences including security cleared job seekers, cybersecurity candidates and military personnel. Kathleen has presented at several security conferences on recruiting and job search within the cyber security world to include BSidesLV, BSidesTampa, BSidesDE, FedCyber. Kathleen volunteers in the cybersecurity community; she is the Director, HireGround, BSidesLV's 2 day career track. Kathleen is well respected within the recruiting community, is the co-founder and current President of recruitDC, the largest community of recruiters in the Washington DC area.

closepopup
Karen WorstellCEO at W Risk Group LLC

Karen Worstell devotes her career to two things: cybersecurity and helping others succeed in the tech world. As a 30 year tech executive, including Silicon Valley CEO and serial CISO for companies including Microsoft, she understands the challenges of working in Tech cultures that are typically dominated by a non-diverse leadership team. Her experience as a successful technologist, consultant, top level executive coach, and care provider in crisis and trauma combined to develop and deliver workshop experiences for women and non-binary individuals in Tech roles that attendees call ""transformational."

Karen's background includes BS degrees in Chemistry and Molecular Biology, MS degrees in Computer Science and Theology, and advanced training in clinical pastoral care and executive coaching. Since 1990, she has spoken on cybersecurity in venues across Asia-Pacific, Europe and the US and is the founder of MOJO Maker for Women in Tech, a women's leadership program. She and her husband Craig live in Lone Tree, CO.

Karen WorstellCEO at W Risk Group LLC

Karen Worstell devotes her career to two things: cybersecurity and helping others succeed in the tech world. As a 30 year tech executive, including Silicon Valley CEO and serial CISO for companies including Microsoft, she understands the challenges of working in Tech cultures that are typically dominated by a non-diverse leadership team. Her experience as a successful technologist, consultant, top level executive coach, and care provider in crisis and trauma combined to develop and deliver workshop experiences for women and non-binary individuals in Tech roles that attendees call ""transformational."

Karen's background includes BS degrees in Chemistry and Molecular Biology, MS degrees in Computer Science and Theology, and advanced training in clinical pastoral care and executive coaching. Since 1990, she has spoken on cybersecurity in venues across Asia-Pacific, Europe and the US and is the founder of MOJO Maker for Women in Tech, a women's leadership program. She and her husband Craig live in Lone Tree, CO.

closepopup