Black Hat USA is the world's leading information security event, that provided attendees with the very latest in research, development, and trends. This year, over 20,000 InfoSec professionals from around the world came together for innovative research, skill-developing courses and community building. Watch the conference for more information right now!
James Kettle is Head of Research at PortSwigger Web Security, where he designs and refines vulnerability detection techniques for Burp Suite's scanner. Recent work has focused on techniques to detect unknown classes of vulnerabilities, and break into internal networks by exploiting reverse proxies with malformed requests. James has extensive experience cultivating novel attack techniques, including server-side RCE via Template Injection, client-side RCE via malicious formulas in CSV exports, and abusing the HTTP Host header to poison password reset emails and server-side caches. He has spoken at numerous prestigious venues including both Black Hat USA and Europe, and OWASP AppSec USA and EU.
She is best known for her work measuring the technology process and as the lead investigator on the largest DevOps studies to date. She has been a professor, sysadmin, and performance engineer. Nicole’s work has been published in several peer-reviewed journals. Nicole earned her PhD in Management Information Systems from the University of Arizona, and is a Research Affiliate at Clemson University and Florida International University.
Director of Cybersecurity Initiatives at US Department of Commerce, NTIA
Allan Friedman is Director of Cybersecurity at National Telecommunications and Information Administration in the US Department of Commerce. He coordinates NTIA's multistakeholder processes on cybersecurity, focusing on addressing vulnerabilities in IoT and across the software world. Prior to joining the Federal Government, Friedman spent over 15 years as a noted InfoSec and tech policy scholar at Harvard's Computer Science Department, the Brookings Institution and George Washington University's Engineering School. He is the co-author of the popular text Cybersecurity and Cyberwar: What Everyone Needs to Know, has a degree in computer science from Swarthmore College and a PhD in public policy from Harvard University, and is quite friendly for a failed professor-turned-technocrat.
applying artificial intelligence, automated program repair, continuous iterative development, continuous iterative development and deployment practices, cybersecurity, deployment practices, high assurance software-defined, software development
Host committee: Registration & General Information, email@example.com, 18662038081
With ConferenceCast.tv, you get access to our library of the world's best conference talks.
7406 hours of content