Experienced cybersecurity professional with a solid background in penetration testing, red teaming and SOC analysis. Works closely with security engineers, SOC analysts, and development teams to deliver impactful results, while maintaining strong client relationships. Holds a Master’s in Informatics and Computer Engineering and is a Ph.D. candidate in Cybersecurity. Passionate about staying ahead of industry trends, contributing to the security community, and applying creative, customer-focused solutions to complex problems.
- From Node.js Malware on GitHub to Exposing Fake North Korean Companies
Guillaume Bossiroy is a Senior Security Consultant at Resilix with more than five years of experience in cloud security. His main focus is on Microsoft Azure and Microsoft 365, where he has built extensive expertise through numerous client engagements.
Guillaume helps organizations strengthen their cloud security posture by identifying and mitigating risks across cloud environments and interconnected platforms, combining offensive insights with practical defensive strategies.
- Bridging Clouds and Domains, Expanding Risks: An offensive and defensive journey across environments
25+ years in cyber security. Successful trade sale of SecureTest to NCC. Briefed boards of BoE, LSEG, Tesco. Regulatory / government: Briefed EU Parliament, UK Parliamentary groups, US gov agencies. He’s heavily involved in lobbying for regulatory change and sits on industry accreditation groups.
- All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship.
Dr. Kim Wuyts is a leading privacy engineer with close to 20 years of experience in security and privacy. Before joining PwC as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling framework. Her mission is to raise privacy awareness and get organizations to embrace privacy engineering best practices. She is a guest lecturer, experienced speaker, trainer, and invited keynote at international privacy and security conferences such as OWASP Global AppSec, RSA, Troopers, CPDP, and IAPP DPC.
Kim is also a co-author of the Threat Modeling Manifesto, and program co-chair of the International Workshop on Privacy Engineering (IWPE).
- I Know What You Did Last Summer: Lessons Learned from Privacy Breaches and Scandals
Koen Yskout is an associate professor in computer science at KU Leuven, campus Diepenbeek (Hasselt). He teaches courses on software engineering and security to bachelor and master students in Engineering Technology ("industrieel ingenieur" in Dutch). His research interests center around engineering secure and resilient software systems, with particular attention to (automated) threat modeling, capturing and applying reusable knowledge, and the human aspects of developing secure systems.
- Threat modeling in practice
Pedro, also known as "drop," is an Offensive Security Manager at PwC, specializing in Application Penetration Testing and a security researcher. Before transitioning into cybersecurity, he had a background in Data Analytics and Data Science.
As a security researcher, he has over 10 CVEs to his name and has identified more than 150 vulnerabilities through various bug bounty programs. He holds multiple offensive security certifications, including CBBH, eJPTv2, PJMT, and BSCP.
In 2024, he ranked among the top 3 at Belgium’s Hack the Government Live Hacking Event. He is an active voice in the bug bounty community and a HackerOne brand ambassador for Belgium.
- Up and Down Technique: Exposing Hidden Data from RAG Systems
- Hacking industrial environments and secure them safely
Stef is a researcher and PhD student in the DistriNet research group of KU Leuven (Belgium). His main research interests concern automated threat modeling, with a focus on producing more relevant and actionable results. This includes, among others, developing and evaluating tool support and analysis techniques to automatically reveal cause-effect relationships between security threats, and leveraging this information to allow automated attack scenario generation and traceable risk estimation with respect to business goals.
- Threat modeling in practice
Vito Rallo is Cyber security expert, visionary innovator, speaker, and Managing Director at Crimson7, with a long history in consulting and an experienced technical profile. Vito has been leading Redteam and pro-active delivery services within global organizations and is actively involved in research and cyber innovation.
Vito has worked for more than 25 years in technology, eighteen of which he's spent in the field of cybersecuri-ty with Financial, Industrial, and Utility sectors, and with a wide network of cybersecurity professionals. He has worked in both, offensive (pentest) proactive and reactive (incident response) security. He is a public event and keynote speaker; Vito is used to give talks at security conferences or roadshows.
- Red is the new Blue
