The speaker’s profile picture
Benjamin Spencer

Ben Spencer is currently a Director at Truesec, where he has been building out the North American MDR
practice for the past year. Before that, he was a member of Truesec’s Incident Response team, as well as
the forensics lead for North America. Ben has a proven track record of practical experience in helping
companies defend against cyber threats. Ben has a strong commitment to sharing that experience with
others, and to help facilitate that, he has previously spoken at Kernelcon as well as VetSecCon.

  • Building a SOC
The speaker’s profile picture
Caprico

Caprico is a seasoned Penetration Tester with experience in Incident Response and Open Source Intelligence Investigations. Currently he is working with critical infrastructure non-for-profits to ensure risks are identified and mitigated before a catastrophic kinetic attack can be achieved.

  • Report Like You're Crazy
The speaker’s profile picture
Cosette Mazet

Cosette Mazet is a security contractor and an amateur RF hacker who loves to explore the fields of space, math, and quantum computing. She graduated with an Associate Degree in Computer Science/Information Systems - Secure Systems Administration & Engineering from Metropolitan Community College of Kansas City and also studied Electrical Engineering at the University of Nevada Reno for a few years. She is currently involved in several organizations that promote the growth and development of women and hackers in cybersecurity, such as Security of Kansas City, Women in Security-Kansas City, and Badge Pirates LLC. She enjoys making badges for fun and no profit with the Badge Pirates, a company that specializes in computers and electronics manufacturing. She also volunteers for events that inspire the next generation of female IT security professionals, such as WiS-KC . Cosette Mazet is a passionate and talented individual who strives to make a positive impact in the world of cybersecurity.

  • Unlocking the Power of the Flipper Zero: Exploring the features and Exploiting Wireless Security
The speaker’s profile picture
David Tocco

I've worked in Information Security for approximately 15 years with concentrated focuses on detection, response, application, and network security. I've also worked in security roles across multiple industries including Software, Defense, Retail, and Healthcare. I'm passionate about security, most specifically building and improving defensive capabilities.

  • Guardians of the Logs: Monitoring SaaS with the Event Maturity Matrix
The speaker’s profile picture
Derin Beechner

Derin Beechner is Sr. Information Security Analyst at Black & Veatch, a board member at (ISC)² KC Chapter, a cybersecurity evangelist and a tabletop board gamer.

  • Be Kind Online
The speaker’s profile picture
Faisal Tameesh

Faisal Tameesh (@primal0xF7) is an information security researcher and red team operator. He focuses on researching offensive strategies and creating offensive tooling for the Penetration Testing team under Aon. He holds the OSEE, OSWE, OSCE, OSWP, and OSCP certifications.

Faisal also performs Windows-based vulnerability research and exploit development. Recently, he published “EGREGIOUS MAGE”, a UAF N-Day RCE exploit: https://primalcerebral.com/blog/egregious-mage-nday-rce-exploit-zdi-17-836.php

At BSides KC in 2019, Faisal presented five vulnerabilities in a popular glucometer application that led to the compromise of ~5 million users’ health data: https://www.youtube.com/watch?v=4F1k83S8_mU

  • DUALITY – Advanced Red Team Persistence through Self-Reinfecting DLL Backdoors for Unyielding Control
The speaker’s profile picture
Jake Knowlton

Jake is a Principal Consultant for a large tech company, and specializes in leading incident response and forensic investigations. He is an Air Force veteran and on the board of directors for a 501c3 non-profit called VetSec.

  • Building a SOC
The speaker’s profile picture
Jerome de las Alas (JD)

Jerome (JD) de las Alas is a Product Security Architect from Kimberly-Clark. He has 13 years of experience in the cyber security industry - with background in application security, secure software development, and IoT security. He holds industry certifications such as CISSP, GWAPT, GPEN, GMOB, C|EH, C|SP, and ITIL Foundations. Outside cyber security, his interests include astrophotography and sports.

  • This is the Way: Navigating the Security Challenges of Generative AI in the Corporate Sector
The speaker’s profile picture
JJ Widener

J.J. Widener has over 15 years in IT and 10 years in information security. He has served as a CIO and CISO in Higher Education and has security leadership experience at healthcare and insurance organizations. He earned an MBA in Information Assurance and multiple information security and privacy certifications including CISSP, CISM, CISA, CRISC, CIPP/E, CIPM, and is an active member of ISC2, ISACA, and IAPP. J.J. also holds nine Azure certifications focused on Cybersecurity, compliance, data science, and artificial intelligence.

  • This is the Way: Navigating the Security Challenges of Generative AI in the Corporate Sector
The speaker’s profile picture
Jordan Bush

Jordan is an embedded software engineer working at a government contractor. He’s active in the SecKC community and is known for reverse engineering weather balloons. In the past, Jordan has previously spoken about RF replay attacks and tracking weather balloons. Outside of those he likes to participate in CTF competitions, create badges and learn about wireless security.

  • Unlocking the Power of the Flipper Zero: Exploring the features and Exploiting Wireless Security
The speaker’s profile picture
Josh Rickard

Josh Rickard is a Senior Software Engineer at AppOmni focused on threat detection at scale. He is an expert in PowerShell and Python, and has presented at multiple conferences including DerbyCon, ShowMeCon, BlackHat Arsenal, CircleCityCon, Hacker Halted, and numerous BSides. In 2019, Josh was awarded an SC Media Reboot Leadership Award in the Influencer category and is featured in the Tribe of Hackers: Blue Team book. You can find information about open-source projects that Josh creates on GitHub at https://github.com/MSAdministrator

  • Guardians of the Logs: Monitoring SaaS with the Event Maturity Matrix
The speaker’s profile picture
Matthew Moses

I am currently a Red Teamer at Walmart. I am passionate about all things related to offensive security. I have built and deployed incident response tooling to aid in cyber investigations. I am a long time programmer and I love doing development in Golang, Python, and JavaScript. I have experience with a number of other programming and scripting languages. I also help organize events for ArkanSec, a local hacker/infosec group in my area.

  • Building my first SAO: A beginner’s guide to building and distributing your own SAO
The speaker’s profile picture
Matthew Rose

Matt has over 20 years experience in software development, sales engineering, consulting, and technical leadership roles. During this time, Matt has helped some of the largest organizations in the world in a variety of industries, regions, and technical environments implement secure software development programs using cutting edge application security technologies. Matt's extensive background in application security, programming, and solution architecture has been key to many speaking engagements for organizations like OWASP, ISSA, and ISACA. In addition Matt has been the host of a successful application security podcast, been quoted in many industry articles, and is very well known for his video glass board series called Reversing Glass

  • The monsters in your software supply chain that traditional app sec tools can't find
The speaker’s profile picture
Michael-Angelo A Zummo

Michael-Angelo Zummo is the NA Intelligence Manager at Cybersixgill. He is a US Marine Corps veteran that started his career as a cryptologic linguist and intelligence analyst. He served at the NSA (National Security Agency) where he supported national security efforts against foreign threats. Zummo earned his Masters in Cybercrime Investigations and Cybersecurity from Boston University, where he transitioned from national security to digital forensics, dark web intelligence, and law enforcement

  • Going Undercover in the Underground - A Practical Guide on How to Safely Infiltrate and Engage
The speaker’s profile picture
Rachel Schwalk

With a background primarily in blue team operations, Rachel spent several years working as a Cybersecurity Analyst on an Incident Response team. During this time, she became fascinated with digital forensics and threat detection. She is now on the Detection Engineering team at Red Canary, where she spends her time hunting for evil across customer environments and developing new methods of detection.

  • Misbehaving Binaries: Methods to Detect LOLBin Abuse
The speaker’s profile picture
Sam Wallace

I'm an Infosec Practitioner with a love for automation. I'm well versed in most Cyber Operations, but my general area of focus is all things AppSec, and how an adversarial mindset can be used to reduce risk to the business.

I have a deep passion for learning and I enjoy working with others who share this passion.

  • AI in CyberSecurity: How to be a 10x Engineer
The speaker’s profile picture
Sara Anstey

Sara Anstey is the Director of Data Analytics and Integration at Novacoast who is passionate about empowering businesses to use everyday data to make strategic business decisions. She believes that the intentional adoption of a data-driven culture can be a key differentiator to companies in today’s security climate. Sara has experience in custom web development, artificial intelligence, data analytics, business intelligence, and applied statistics.

  • The Algorithmic Advantage: Optimizing Cybersecurity with Computer Science
The speaker’s profile picture
Tim Medin

Tim is the CEO of Red Siege, a company focused on offensive security, penetration testing, and red teaming. Tim is also a Senior Instructor and course author (SEC560) at The SANS Institute. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. Tim has gained information security experience in a variety of industries including previous positions in control systems, higher education, financial services, and manufacturing. Tim is an experienced international speaker, having presented to organizations around the world. Tim is the creator of the Kerberoasting, a widely utilized Red Team penetration test technique to extract Kerberos tickets in order to offline attack the password of enterprise service accounts.

  • Keynote
The speaker’s profile picture
(void *)Huxley Barbee

(void *)Huxley Barbee is the organizer for BSidesNYC and security evangelist at runZero. Huxley previously worked at Datadog, where he formulated their Cloud Security Platform. Earlier at Cisco, he led a team that automated SecOps and IR playbooks. He holds both the CISSP and CISM certifications.

  • Shining a light into the security blackhole of IoT and OT
The speaker’s profile picture
Walt Powell

Walt Powell is an accomplished cybersecurity expert and executive coach who specializes in providing executive guidance around risk, governance, compliance, and IT security strategies.
Walt has more than a decade of experience as a cyber practitioner and security leader. He is currently the Lead Field CISO at CDW and a founding member of the CDW Global Security Strategy Office. Prior to CDW Walt was the owner and a vCISO at Left Brain Security. Through these roles, he has had the opportunity to learn from and contribute to hundreds of CISOs and their programs. Walt holds dozens of professional certifications including CISSP, CISM, Carnegie Mellon - Heinz CISO, the Stanford Advanced Cybersecurity Certificate, and many more. He taught CISSP and CISM boot camps for years and is a member of several certification exam development committees. Walt is also an accomplished musician and father who loves to spend time with his kids.

  • Your Board Deck Sucks!: Why you can't get buy-in for your security program
The speaker’s profile picture
Yaamini Barathi Mohan

My name is Yaamini Mohan, I am a Vulnerability response champion working with PSIRT in Dell Technologies, also I am currently a board member of the WiCyS (Women in Cybersecurity) Austin chapter and Head of the events committee. I am a passionate cybersecurity professional with a MS in Cybersecurity from Johns Hopkins University and spend my spare time volunteering in cybersecurity communities, updating my knowledge in the field, organizing security talks and events.

  • Incident Response Playbook- 101