Anna Collard is the SVP of Content Strategy and Evangelist for KnowBe4 Africa. She founded Popcorn Training, acquired by KnowBe4 in 2018, and holds a Master of Science in Cyber Psychology, alongside various security certifications such as CISSP, CISA, CIPP/IT, ISO 27k and PCI DSS QSA. Recognized among the Top 20 Women in Cyber (2024), she also won the Global Cybersecurity Women of the Year Award (2023). Anna is a member of the World Economic Forum’s Global Future Councils and co-founded the MiDO Cyber Academy Programme, focusing on closing the cyber skills gap in underserved communities
- Zen and the Art of Cognitive Defense: Zero-Trust Mindsets and Cyber-Mindfulness
Blessing is a cybersecurity consultant by day and a community-builder by night. As a recent Information Security graduate, Blessing now works with BDO Zimbabwe, navigating the complex world of cybersecurity risks as a penetration tester. A passionate advocate for all things cyber, Blessing is the founder of the Evolve Cybersecurity Club, where students transform from curious learners to security-savvy professionals.
When not dissecting vulnerabilities, you can find Blessing volunteering at BSides conferences, picking locks (in Capture the Flag games, of course), or playing RPGs to save virtual worlds. A serial volunteer and two-time Black Hat Asia & USA 2024 student scholarship recipient, Blessing is always on a quest for new knowledge, community connections, and the next sitcom to binge-watch.
- Rite of Passage: My Journey from BSides Volunteer to Black Hat Asia Attendee
I am a Cyber Security Researcher working for Nedbank. I'm a big fan of learning and pulling things apart. I have previously given talks on at BSides: "Securing the Industrial Internet of Things", "Hearing the Internet Background Radiation" and "Hashing the $#!+ out of firmware".
- LOLGrid: Don’t bring your own network, one already exists.
I'm Callian, also known as Kallie, a dedicated DevSecOps Engineer with a development background and are passionate about application security.
My journey is fueled by an enduring curiosity and a passion for embracing new challenges that foster both personal and professional growth.
As the leader of the DevSecCon Cape Town Community, I assist in bringing together developers, operations teams, and security practitioners to collaborate, share knowledge, and shape the future of secure development
- Find and fix Vulnerabilities within open source projects
Christine Gordon-Bennett is a passionate, creative, energetic and enthusiastic cyber security awareness expert currently working in the CISO Office at Nedbank. She has a passion for helping people understand the value of safe cyber security practices and educating them on human behavioural changes to avoid being the target in a cyber-attack at work, and in their personal lives.
Christine has thoroughly enjoyed developing and implementing a comprehensive security awareness programme at Nedbank over the past 8 years. Cyberpsychology, understanding human behaviour and the role mindfulness plays in securing organisations and the community is a topic she is deeply passionate about.
Christine is Project Management Professional (PMP) certified and holds her Security Awareness Professional (SSAP) certification through the SANS Institute.
- Zen and the Art of Cognitive Defense: Zero-Trust Mindsets and Cyber-Mindfulness
David is the Director of Research & Development at Whirly Labs, specialising in static program analysis. He develops automated tools for vulnerability detection and code exploration, used by both internal teams and external clients, including pentesters and SAST vendors. David has presented his research at leading international conferences like ICSE and ESORICS, and delivered his first BSides CPT talk in 2023.
- Attacking Pipelines: Large Scale Exploitation of Workflow Files
My name is Ethan Havinga, I recently finished high school and was lucky enough to join an internship at MWR CyberSec where I now work fulltime as a Cybersecurity Consultant with a focus in the web application security space.
I enjoy delving deep into obscure and often overlooked topics, I find that you often find the coolest things in the topics people tend to miss. In my free time I am somewhat of a reader, and enjoy the odd book on historical texts specifically that of religious philosophy.
- Breaking the Barrier: Exploring modern WAFs.
Cybersecurity consultant at MWR CyberSec
- Attack of the clones: Modern deepfake phishing
Jared is the Head of Security at Synthesis, where he specializes in enterprise cloud architecture. Jared is passionate and deeply committed to guiding large organizations through the complexities of architecting, securing and operationalizing enterprise cloud environments. Beyond Jared’s professional responsibilities, Jared is an enthusiastic advocate for community building, serving as the organizer of several local security events, including 0xcon, BSides Cape Town, and BSides Joburg. Jared’s research focuses on cybersecurity topics that intersect with national security and foreign policy issues such as encryption, privacy, surveillance, disinformation, and nation-state activity.
- Cloud Security Theater: Rising above the noise of misguided strategies
Jason Jordaan is leading digital forensics, incident response, and cybercrime investigation specialist. He has been acknowledged in as an expert witness in the High Court of South Africa. He began his digital forensics career in the early days of the development of the digital forensics discipline when he combined his love for computers and technology with his role as a police detective. He served as a detective with the South African Police Service Commercial Branch, before moving to the Special Investigating Unit, where he established their digital forensics laboratory. In 2014, after being instrumental in multiple high-profile investigations over 23 years of service, he resigned from his position as National Head of Cyberforensics to establish DFIRLABS. As the founder and Principal Forensic Analyst of DFIRLABS, Jason leads the practice, and continues to conduct high-level digital forensics engagements throughout the globe.
Jason is also an active academic, researcher, author, speaker, advisor, and trainer. He is a member of the faculty of the SANS Technology Institute. He teaches digital forensics, and is a course author, for the SANS Institute, and has taught digital forensics to some of the leading law enforcement agencies, intelligence services, and military units in the world, including the FBI, US Secret Service, London Metropolitan Police, UK National Crime Agency, US Special Operations Command, Australian Air Force, the German Army, and more. He is actively involved in mentoring law enforcement digital forensic practitioners as a member of IACIS. His author has been published in several peer reviewed journals, with his recent research focusing on quality assurance in digital forensics. Jason is also a co-author and contributing author to several books. He is a member of the Advisory Board for the University of Pretoria, the SANS Institute, and served as an advisor to the South African Deputy Minister of Justice for the development of the South African Cyber Crime Act. Jason is also an assessor for the Netherlands Register of Court Experts, where he is responsible for assessing the competence of digital forensic experts for the purposes of testifying in Dutch criminal trials.
Jason holds a MSc degree in Computer Science (Cum Laude), a MTech degree in Forensic Investigation, a BComHons degree in Information Systems, a BSc degree in Criminal Justice Computer Science (Summa Cum Laude), and a BTech degree in Policing. He is a member of several professional bodies and hold the following certifications and post-nominals: CFCE, CFE, MCSFS, PMIITPSA, FP (SA), and M.INST.D(SA). He also holds the following GIAC certifications: GBFA, GCFE, GCFA, GCIH, and GCCC.
- Ignorantia Juris Non Excusat - Understanding the Impact of the Law on the SA Hacker Community
I am a computer engineering graduate who joined MWR CyberSec in 2021 to dedicate myself to supporting and assisting people in becoming more secure. I have a particular fascination with artificial intelligence (specifically generative AI) that has led me to this intersection of security and machine learning. I have an inquisitive nature and love to question the security implications of emerging technologies.
- Attack of the clones: Modern deepfake phishing
I'm a technically inclined ocean enthusiast who looks forward to the day I can play video games on my surfboard. And then probably also try hack said surfboard.
- DevOps or DevOops? Securing a Pipeline Without Losing Your Mind
- Attacking GraphQL : A guide for penetration testers
Cybersecurity professional with a knack for securing systems—and breaking them (ethically, of course). Python’s my sidekick for scripting, hacking, and the occasional fun experiment. I'm also a community organizer and public speaker
- SpeedRunners: The Hackers of the Gaming World
Just a guy who likes talking about Cybersecurity and believes in helping others and building a strong cyber tribe.
- Going Beyond your own Barriers
I'm a cyber security consultant at MWR CyberSec where my main focus is Application Security.
I started looking at radio signals in University where I got a lot of exposure while studying BEng Computer Engineering. Taking that knowledge to a security company, I thought to myself "What happens when we hack these signals flying through the air?". That kick-started my hobby where I immediately started hacking my mom's car!
- Hacking the Airwaves: Beyond Relay Attacks!
Urgh, bios. Three things you don't know about me - 1) I wrote super emo poetry in the late 90s and an industrial/metal band used it as lyrics on one of their songs. 2) I have a real NSA challenge coin 3) I drove a yellow VW beetle in 1992.
For reals tho - https://www.osint-tool.com/conferences-talks-workshops/
- AI in OSINT - Zero snake oil
🔐 Software Developer and Security Professional, merging development expertise with offensive security skills. Transforming a childhood passion for Arduino tinkering into a career in tech innovation and application security.
💻 Technical Portfolio:
Full-stack development focusing on secure, scalable solutions
Extensive experience in Python, C++, C#, and Pascal
Web application security and exploitation specialist
Active CTF competitor and security researcher
🛠️ Beyond The Code:
Maker and hardware enthusiast: 3D printing, Fusion 360 design
Electronics and microcontroller projects
Automation engineering and IoT solutions
Started by copy-pasting Arduino code at age 12, evolved into architecting secure applications and hunting vulnerabilities. This journey from curious tinkerer to security-focused developer shapes my approach to every project: hands-on, creative, and security-first.
Currently, securing applications at Whirly Labs while pursuing continuous learning in emerging technologies. Always eager to collaborate on projects that push technical boundaries.
- Attacking Pipelines: Large Scale Exploitation of Workflow Files
Sharon Knowles, a seasoned cybersecurity professional, OSINT investigator, and keynote speaker with extensive experience in cyber threat intelligence and digital forensics. As the CEO of Da Vinci Forensics, Sharon Knowles has been at the forefront of cybersecurity business innovation and has a proven track record in assisting organisations with their cybersecurity posture. Sharon is a certified Cybercrime investigator,Certified Cybercrime Intelligence Analyst and Certified Cryptocurrency investigator. When Sharon retires it will be to a farm with donkeys, horses and goats where she will film them and make social media videos for everyone.
- Unmasking the Digital Shadows: OSINT Techniques for Cybersecurity Professionals
I am the Head of Consultancy at MWR and have a passion for deeply understanding how things work, taking them apart, and sometimes being able to put them back together.
- Dependable Red Teaming by using Confusion