
Alberto Rodriguez is a security professional with a passion for security operations, red teaming, and automation. He has spoken at security conferences including BSides Augusta/Orlando, VetSecCON, and AvengerCON. He is a Managing Security Consultant at GuidePoint Security specializing in red teaming and purple teaming services. He is also a co-founder at Bad Sector Labs where he employs his passion for automation by helping infosec professionals hate infrastructure development a little less. Alberto previously worked for the Department of Defense.
- Kerberos Abuse: The Adventure Never Ends

Andréanne Bergeron, Ph.D., is the director of research at GoSecure, specializing in online attackers' behaviors. Her expertise delves into the intersection of criminology and cybersecurity. In addition, Andréanne holds an esteemed position as an affiliated professor in the Department of Criminology of Montreal University, bridging academia and industry. Involved in the cybersecurity community, she is a board member of the Canadian Cybersecurity Network and the co-VP of engagement and outreach for Northsec.
- From Pseudo-Anonymity to Attribution: Extracting Genuine IP Data from RDP to Map Attack Strategies

Andrew is a member of SixGen, where he works as an Offensive Cyber Operator that specializes in network and web application pentesting. Before joining SixGen, Andrew was part of the U.S. Army Cyber Command, where he contributed to the success of defensive cyber operations.
Andrew holds a Master of Science in Cybersecurity from Georgia Institute of Technology and a Bachelor of Science in Computer Science from the University of North Georgia. Andrew has also obtained multiple certifications, including OSEP, OSCP, CRTL, CRTO, and CISSP.
- Mischief Managed: Conjuring Google App Scripts

Interested in educating tomorrow’s leaders in Cybersecurity.
In 2021 I left the traditional workforce after 40+ years in IT and cybersecurity implementation and management.
My newly discovered energy is to encourage college and high school students to enter the Cybersecurity family. I am an Adjunct Professor of Cybersecurity at the University of South Carolina Aiken, and independent contractor and lecturer. I believe that like cybersecurity systems, students should have “security built-in” through an early introduction in the curriculum, and participation in professional organizations like National Cybersecurity Student Association, ISC2, ISSA, and SANS. I also feel strongly that students should obtain certificates prior to entering the workforce.
My career was primarily with large contractors in the US Government sector. The last 15 years took me on an exciting bottom to top journey planning, implementing, maintaining, and managing (as ISSO/ISSM) complex cybersecurity systems for two large facilities. These efforts included creation of policy and procedures, selecting, building and configuring technology infrastructure, production operations, and compliance monitoring prior to turnover to the Government customer.
- The Four Books that every cyber security expert should read

With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. He has over 25 years in the security industry as a security company entrepreneur, board advisor, investor, and author. After getting his start with the Defense Information Systems Agency (DISA) and later Bell Labs, Brian began the process of building security startups and taking multiple companies through successful IPOs and acquisitions, including Riptech, ArcSight, Imperva, McAfee, Solera Networks, Cylance, JASK, Verodin, and Mandiant.
Brian has worked in over 50 countries across six continents. He authored the book Enemy at the Water Cooler and co-authored Physical & Logical Security Convergence with former NSA Deputy Director William Crowell. He was featured in the cyberwar documentary 5 Eyes alongside General Michael Hayden, former NSA, and CIA Director. Brian writes for Forbes and regularly presents at conferences like Black Hat, RSA, OWASP, and BSides.
- Are Vulnerability Scanners Dead? Transcending CVEs for Vulnerability Management
Lieutenant Colonel Chase Hasbrouck currently serves as the Forensics and Malware Analysis Branch Chief at U.S. Army Cyber Command, leading a team investigating suspicious software on U.S. Army computers worldwide. He has previously served as the lead of one of the Army's elite Cyber Protection teams, as well as several key cybersecurity governance roles. Additionally, LTC Hasbrouck is part of DARPA’s Information Science and Technology Study Group, shaping future research directions for the DOD.
- Effective Enterprise Incident Response: Lessons from High-Profile Crises
Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research team at Lumen Technologies. Danny has tracked nation-state adversaries and cybercriminals using both open-source and proprietary datasets in various roles for over a decade. More recently he has focused on threats to ISPs, including campaigns in which actors targeted networking equipment, Linux servers, and DNS infrastructure. Prior to joining Lumen Technologies, Daniel worked at Cisco Talos. Danny has a bachelor’s degree in Diplomacy and International Relations from Seton Hall University.
- From HiatusRAT to Cuttlefish: the evolution of nation-state router malware

David McDonald is a researcher and software engineer with 3 years of digital forensics R&D experience. His passion for this field began with his involvement in the University of New Orleans CTF team, as well as through his time as a Systems Programming teaching assistant. After over two years of digital forensics research and development on Cellebrite's computer forensics team, he joined Volexity's Volcano team, where he now works to develop next-generation memory analysis solutions.
He believes deeply in sharing knowledge and helping others discover their abilities and interests through their own journeys in cybersecurity, and strives to pay forward the benefits of the mentorship that has opened so many doors for him.
- Hunting Fileless Malware with Tree-Sitter

Dustin is a technical marketing engineer for Corelight who loves information security and automation. He is currently the Team Lead for Corelight in the Black Hat NOC and has been an advocate of NSM for years. He was previously a part of the Security Onion Solutions team as an instructor and automation developer for the Army's DDS-M kit. Dustin lives with his four children in Marietta, GA, where he also currently serves as the senior Cyber warrant officer for the Georgia Army National Guard.
- Tales from Hunting in the Black Hat NOC

Fernando Tomlinson is a Technical Manager for Digital Forensics and Incident Response at Mandiant/ Google Cloud. Prior to that, he served in the U.S. Army where he retired as a Cyber Warrant Officer. While serving, he was the Senior Technical Advisor for forensics and malware analysis at the U.S. Army Cyber Command, responsible for the defensive actions of all U.S. Army systems. He also served as a Technical Director of a Cyber Operations Center and has led multi-level Digital Forensics and Incident Response and threat hunting teams. Additionally, he is an Adjunct Professor at the University of Arizona and enjoys contributing to the community.
- Forensic Analysis of Compromised VPN Appliances by Advanced Actors

Jake Coyne is a cybersecurity professional specializing in offensive security operations. He currently holds the position of Red Team Consultant at Mandiant. Before joining Mandiant, Jake worked as a Offensive operator at SIXGEN and was part of the U.S. Army Cyber Command and U.S. Cyber Command.
Jake earned a Master's degree in Cyber Security from Georgia Institute of Technology and a Bachelor's degree in Industrial Technology from Illinois State University. He holds several certifications in the field of cybersecurity, including Offensive Security Certified Professional (OSCP), Global Industrial Cyber Security Professional (GICSP), GIAC Response and Industrial Defense (GRID), and Certified Information Systems Security Professional (CISSP).
- Mischief Managed: Conjuring Google App Scripts
Jeff Lucovsky has been a core Suricata developer since early 2019. He is also a principal engineer at Corelight where he oversees all things Suricata and system performance.
Jeff's first post-college gig introduced him to system level networking and secure networking. He's had a role in many network appliances providing security functions.
- Suricata: Detect. Alert. Log

Dr. Kelley Misata, President of OISF (Suricata) and founder of Sightline Security, has carved a distinctive niche in the cybersecurity landscape. In her dual roles as President of OISF and Senior Director of Open Source at Corelight, she seamlessly bridges the technical with the strategic in vital cybersecurity dialogues. Articulate and insightful, Dr. Misata brings to the forefront pressing issues like the cybersecurity imperatives of nonprofits, the significance of open-source development, and the nuanced challenges of cyberstalking and privacy. Her expertise is enriched by her pioneering research on nonprofit cybersecurity and her personal experiences as a cyberstalking survivor. Armed with a Ph.D. in Information Security from Purdue University, Dr. Misata pairs holistic security acumen with strategic business understanding.
- Widening Our Lens on OSS: Insights from a Submission to the National Cyber Director

Ken is an independent consultant, a retired Cyber Defense Warrant Officer, an adjunct college professor, and head of security & compliance for Designer Shoe Warehouse (DSW) with almost two decades of security experience in both offensive and defensive roles.
Some of Ken’s achievements are a matter of public record. In 2016, CNN reported on Ken and his unit for contributing to the security of the 2016 Presidential election in Ohio via a penetration test and vulnerability assessment of the Ohio Board of Elections. The success of Ken and his team is evidenced by an independent Department of Homeland Security report concerning the unvarnished integrity of Ohio’s election system. Ken has also been awarded the Bronze Star Medal for revolutionizing combat zone operations using Information Technology resulting in reduced reaction time, fewer injuries to soldiers and civilians, and better planning through improved analytics.
Ken has a hunger for knowledge above and beyond his passion for information security. He routinely challenges himself to learn new skills across a wide array of disciplines and encourages his students to do the same.
Ken has completed numerous certifications with an emphasis on security (GSTRT, CISSP, GSNA, GCWN, GCFE, GCIH, GCIA, GSEC, RHCSA, VCP, Security+, CEH, CCNA Security, CCNA Route/Switch, and several Microsoft MCSA, MCSE, and MCTS offerings). Additionally, Ken has earned 4 SANS challenge coins (AUD 507, FOR 500, SEC 503, and SEC 504).
When he is relaxing, Ken is usually riding his motorcycle, playing his guitar, or trying not to set off the Lunk Alarm at Planet Fitness.
- Can Compliance Drive Security Now?

Security Consultant with Abricto Security that specializes in network penetration testing. LLM hacker as a side hobby. Former professional basketball player and father.
- PROMPT INJECTIONS V1T4L V3RN4CUL4R V3RB0S3LY V3X1NG

Mackenize Morris is a Senior Industrial Consultant at the industrial cybersecurity company Dragos, Inc. where he assists the professional services teams in conducting network and vulnerability assessments.
Prior to joining Dragos, Mackenize worked as a process controls engineer and system architect for a DOE contractor. In addition to his responsibilities he became the system administrator of the DCS system until fully switching over to an ICS cybersecurity position within the DOE complex.
Mackenize received his B.S. in Chemical Engineering and MBA from the University of South Carolina and his Masters in Information Security Engineering from the SANS Technology Institute. He currently holds the following certifications: GCPM, GCIP, GSEC, GDSA, GREM, GCCC, GRID, GCIA, GISCP, GPEN, GMON, GCIH, GWAPT and CISSP.
Mackenize lives in Aiken, South Carolina down the street from his brother’s horse farm where he keeps his horse, Riley. Besides riding horses, Mackenize fences as part of the Augusta Fencers Club and coaches the University of South Carolina Aiken’s League of Legends and Overwatch teams.
Mackenize’s name is pronounced like Mackenzie; the IZE spelling was a result of a spelling error on his birth certificate.
- Better, Not Best, Practices
Matt Domko is a security engineer with a passion for engineering excellence. He's worked at a lot of cool places, and stayed at a holiday in last night.
- Data On Demand - Part Deux: Managing an AI Privacy Program at Startup Speed

Michael Holcomb is the Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor, one of the world’s largest engineering, procurement, and construction companies. His current role provides him with the opportunity to work in securing some of the world’s largest ICS/OT environments, from power plants and commuter rail to manufacturing facilities and refineries. He has his Masters degree in ICS/OT cybersecurity from the SANS Technology Institute. Additionally, he maintains cyber security and ICS/OT certifications such as the CISSP, GRID, GICSP, GCIP, GPEN, GCIH, ISA 62443, and more.
As part of his community efforts, Michael founded and leads the UpstateSC ISSA Chapter and BSides Greenville conference. He also wrote and taught all six cyber security courses for Greenville Technical College's cyber security program which focused on helping educate the cyber security practitioners of tomorrow. In 2023, he was awarded CyberSC’s MG Lester D. Eisner Award for Cyber Excellence in Leadership for the State of South Carolina.
- Using ChatGPT to Write Defensive & Offensive Tools for ICS/OT & IT

N'dia Thomas is a Senior Security Analyst at the University of South Carolina where she works as an incident handler and threat hunter. Prior to USC, N'dia worked at Calyptix Security as a cybersecurity threat analyst, helping create and maintain threat feeds. She has a Masters in Computer Science from Georgia Tech (OMSCS).
- The call is coming from inside the house - how an identity attack led to a wild IoT chase

Robert is a recognized authority in the industrial cybersecurity community. He is CEO and co-founder of
Dragos, a global technology leader in cybersecurity for industrial controls systems (ICS)/operational
technology (OT) environments.
In addition, Robert serves on the Department of Energy's Electricity Advisory Committee as the Vice
Chair of the Department of Energy's Grid Resilience for National Security Subcommittee, and is a
member of the World Economic Forum's subcommittees on Cyber Resilience for the Oil & Gas and
Electricity communities.
Robert is routinely sought after for advice and input on cybersecurity for industrial infrastructure and is
regularly asked to brief national leaders. He testified to the U.S. House of Representatives Committee
on Energy and Commerce--Subcommittee on Oversight and Investigations, and to the U.S. Senate
Energy and Natural Resources Committee, to advise on policy issues related to critical infrastructure
cyber threats. He is a member on the Reserve Forces Policy Board, Office of the Secretary of Defense;
and also serves on the board of the National Cryptologic Foundation. He has also presented at the
World Economic Forum Annual Meeting in Davos, and industry leading conferences such as RSA,
SANS, BlackHat, and DefCon on the topic of industrial cybersecurity and threats.
Robert began his pioneering work in ICS/OT cybersecurity as a U.S. Air Force Cyber Warfare
Operations Officer tasked to the National Security Agency, where he built a first-of-its-kind mission
identifying and analyzing national threats to industrial infrastructure. He went on to build the industrial
community's first dedicated monitoring and incident response class at the SANS Institute (ICS515) and
the industry recognized cyber threat intelligence course (FOR578). Today he is a SANS Fellow.
SC Media named Robert the Security Executive of the Year for 2022. A business leader but also
technical practitioner, he helped lead the investigation into the 2015 attack on Ukraine's power grid, the
first time an electric system was taken down due to a cyberattack. With his team at Dragos he has been
involved in the most significant cyberattacks on industrial infrastructure, including the investigation and
analysis of the 2016 attack on Ukraine’s electric system, the 2017 TRISIS attack on a Saudi Arabian
petrochemical facility in the first attempt to try to kill people through malicious software, and the 2021
Colonial Pipeline ransomware attack. In 2022, his team at Dragos uncovered PIPEDREAM, a highly
flexible framework to attack industrial infrastructure globally. Robert’s work has been featured in the
book Sandworm and on 60 Minutes.
- Keynote Address
- Keynote Address
- Keynote Address
- Keynote Address

Robert Wilson is the Director of Security Operations at the University of South Carolina. He has worked in IT since 1995 in both the public and private sector. In his current role he oversees incident response for the University of South Carolina system in addition to helping future cybersecurity professionals be successful in their careers. He lives outside Lexington, SC with his family.
- The call is coming from inside the house - how an identity attack led to a wild IoT chase
Ryan O'Donnell is an Offensive Security Engineer at Microsoft. Over the last 13+ years, Ryan has been performing Penetration Tests, Red Team assessments, and Incident Response investigations. Ryan has conducted hands-on workshops at Hack Space Con, Bsides LV, and BSides NoVa. Ryan has a Masters in Cybersecurity from GMU and the following certifications: OSCP, OSEP, CRTO, and GREM.
- Modifying Impacket for Better OpSec

Ryan is a long-time offensive engineer, with a background in consulting. His primary expertise is in Red Team operations, offensive infrastructure, automated testing, and detection quality.
His current role involves leading detection quality management, running test platforms, and contributing to internal detection capabilities at Target Corp. At work, he's driven by finding hidden problems, and making good ideas great.
- Prevent Broken Detection with a Red Teamer Turned Detection (QA) Engineer

Thomas Scott (Tom) is the CEO and Founder of CyberSherpas, a virtual Chief Information Security Officer (vCISO) cybersecurity consulting firm. He currently serves as the Executive Director of the South Carolina Cybersecurity Association and Foundation. As the inaugural Director of the SC Cyber Consortium, he has been a key leader in the cyber education, cyber workforce development, and cyber protection efforts in both South Carolina and across the Nation.
With over 30 years of cybersecurity experience in both Florida and South Carolina, Tom has developed a wealth of knowledge and experience in protecting critical infrastructure and cyber assets. He currently holds certifications in information security, information auditing, security leadership, critical infrastructure protection, and project management – he is also recognized a FEMA Continuity of Operations Planning (COOP) Practitioner.
Tom is a member of the FBI’s InfraGard program and serves as an advisory board member for the Dutch Fork High School Cyber program. He has actively participated as a member of the MS-ISAC’s Executive Committee as well as the USC School of Law Cybersecurity Task Force. Tom currently serves the academic community through board service to the Industry Advisory Board for the USC Integrated IT program, and at Florence-Darlington Tech and Aiken Tech.
- How to Strategically Build a Cyber Community: Lessons from the Chessboard
Walt Schell is a developer and consultant with a focus in cybersecurity related tooling.
- TPM Next Steps