The speaker’s profile picture
Alex Sanders
  • Operational Wireless
The speaker’s profile picture
Anthony George

Anthony George is the CEO and Chief Engineer of George Consulting and Engineering (GCE), an Industry 4.0 integration company specializing in the digital transformation of small and medium manufacturers. With a career spanning industrial automation, cybersecurity, and military service, Anthony has dedicated his expertise to modernizing legacy systems using AI, machine learning, robotics, and industrial data operations.

Before founding GCE, Anthony served as a Cyber Warfare Operator with the Kansas Air National Guard, where he was trained to defend the nation’s most critical infrastructure against cyber threats. With 14 years of experience as a DoD Systems Engineer and CISSP certification, he has worked extensively in securing and optimizing industrial environments. His experience includes enabling manufacturers to implement smart factory technologies, deploying Operational Technology as a Service (OTaaS), and integrating cybersecurity best practices into industrial automation.

Anthony is also involved in academia and workforce development, serving as an Adjunct Professor of Advanced Cybersecurity at Wichita State University and a Project Manager for Smart Factory at WSU Tech. His mission is to bridge the gap between traditional manufacturing and modern technology, ensuring businesses remain competitive in the rapidly evolving industrial landscape.

  • Industrial Cybersecurity IT/OT convergance
The speaker’s profile picture
Chris Traynor

Chris is a Pentester at Black Hills Information Security (BHIS), where he is responsible for Pen Testing web apps, mobile app, APIs, and networks. He is also the owner of Ridgeback InfoSec (ridgebackinfosec.com) and has authored two cybersecurity classes (Offensive Tooling Foundations and Offensive Tooling for Operators) which he teaches via Antisyphon Training. Chris has nearly two decades of experience in Web/Mobile development, QA automation, and Penetration Testing.

Certifications:
GSEC: GIAC Security Essentials
GCIH: GIAC Certified Incident Handler
GWAPT: GIAC Web Application Pen Tester
GPEN: GIAC Penetration Tester

  • Pentest Pains
The speaker’s profile picture
codeneko

Isaiah Davis-Stober is bad at writing about himself. Isaiah got started doing security for fun about 6 years ago, loves cats, terrible Bash scripts, automating things in ways that should have never happened, lock picking/lock bypassing, and tearing apart white labeled IoT devices.

  • Extracting Secrets from IoT Devices
The speaker’s profile picture
Donovan Farrow

Donovan Farrow founded Alias in 2010 and serves as its CEO. With over 20 years of experience in IT, Information Security, Digital Forensics, and Incident Response, he has worked for companies like Schlumberger, Loves Travel Stops, Chesapeake Energy, and NTT Security. Farrow has provided digital forensic analysis in over 2,300 court cases and led 215 incident response engagements and 250 penetration tests. He is ACE, PCE, CCE, and GCFA certified.

Under his leadership, Alias was recognized in the Inc. 5000 List of Fastest Growing Companies in 2022. Farrow was named one of Oklahoma’s Most Admired CEOs in 2022 and received the “Young Entrepreneur of the Year” Award in 2018. He also serves on the Oklahoma City Community College Advisory Board.

  • Open Source Your Incident Response
The speaker’s profile picture
Jeff Krakenberg

As a technical trainer and security researcher, it is my goal to spread awareness and knowledge. Experience includes: lecturing about cybersecurity, moderating open discussions about vulnerabilities, and building hacking labs for students. Like many others, I often delve too deep into the weeds of the internet.

  • Digital Certificate: Fails and Flounders
The speaker’s profile picture
Jered Bare

Jered Bare is a Cyber Security Engineer and serves part time as a Cyber Defense Expert with the Missouri Air National Guard. With deep expertise in CMMC 2.0, NIST 800-171, and cybersecurity compliance, he has educated numerous contractors and institutions through the complexities of securing Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

Beyond compliance, Jered has an extensive background in cyber threat defense, incident response, and vulnerability management. His expertise has been recognized internationally, including an invitation from the Panamanian government to lead an advanced packet analysis course for threat hunting.

  • CMMC is Now Implemented, Now What? A Primer on What is Happening and What is to Come
The speaker’s profile picture
John Tuckner

John has been a security practitioner that tries to solve the hardest problems for as many teams as possible. He has experience across many domains working at enterprise organizations and security vendors involving SIEM, SOAR, networking, and cloud. He recently founded Secure Annex to protect people and organizations from the risks posed by malicious browser extensions.

  • Extended threat: how your browser betrays you
The speaker’s profile picture
Jonny5

Jonny5 is a father, security researcher, and automation evangelist that likes to Lego/DJ/Rollerskate/Homelab and share

  • Responsive Home Lab
The speaker’s profile picture
Lillian Ash Baker

Lillian Ash Baker is a Product Security Engineer with The Boeing Company and Wisk Aero. Her work is instrumental in securing the next generation of civil aviation aircraft. She has over 15 years of experience in the full lifecycle of certified avionics development. Lily has spoken at multiple cybersecurity conferences specifically on the challenges autonomy brings to the Advanced Air Mobility sector and the importance of Safety and Security in aircraft systems design. When not working on next generation aircraft, she volunteers with the Aerospace Village. Lily is passionate about educational outreach that inspires the next generation of aerospace cybersecurity professionals.

  • Securing the Skies: The Challenges of Safety and Security in Aviation
  • Tag Team Match! Traditional vs. Non-Traditional Entries into Cybersecurity
The speaker’s profile picture
Mak Foss
  • Detections and Dragons: Creating Logic that Scales
The speaker’s profile picture
Mark Overholser

Mark has worked for Silicon Valley tech companies for over ten years, and moonlights as a threat hunter in the Black Hat conference Network Operations Center since spring of 2023, traveling to three Black Hat conferences every year around the world. Prior to working for Silicon Valley tech companies, He was a Threat Hunter, Security Engineer, Incident Responder, and Information Security Team Lead for a multi-billion-dollar enterprise.

  • Measure What Matters
The speaker’s profile picture
Peyton Smith

Peyton has spent 10 years in cyber security and focuses on Red Team, Incident Response, and Threat Intelligence. He was a member of CrowdStrike Services from 2018 - 2023, where he was a first responder to numerous e-crime and nation state cyber intrusions and successfully hacked into 20+ Fortune 1000 organizations.

  • AI Agents: Augmenting Vulnerability Analysis and Remediation
The speaker’s profile picture
Rachel Schwalk

Rachel is a Sales Engineer at Red Canary. Before moving to Sales Engineering, she spent over three years on the Detection Engineering team building out logic and hunting for threats in a wide variety of environments.

  • Detections and Dragons: Creating Logic that Scales
The speaker’s profile picture
Reet Kaur

With over 24 years of hands-on experience in information security and IT, specializing in developing security programs with a focus on risk management, I've consistently delivered value for Fortune 100 and 500 companies, as well as the public sector. As the former CISO at Portland Community College, I orchestrated the alignment of security initiatives with the organization's mission and objectives. My expertise spans all three lines of defense, including security strategies, engineering and security innovation, security operations and incident response, threat intelligence, vulnerability management governance, risk and compliance (GRC), internal and external audit and Board reporting. I've successfully cultivated high-performing security and GRC teams, devised and executed security roadmaps and frameworks, and adhered to industry best practices to ensure compliance, resilience, and excellence.

  • Hacking the Machine: Unmasking the Top 10 LLM Vulnerabilities and Real-World Exploits
The speaker’s profile picture
Travis Lowe

Travis spends most of his days working in the cloud/container/Kubernetes security space. He has worked in security for ~15 years. Most importantly, he is one of the select few individuals to be recognized with an official certification from Microsoft as a Microsoft Office User Specialist in Microsoft Access 2000.

  • Kubernetes For Incident Responders