Speakers

Sort by
Newest
Trending
1-30 of 70
Filter
Joe Slowik
Principal Adversary Hunter at Dragos
attention, authentication, black cat, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blowout (well drilling), botnet, computer hardware, cyber security, definition, educational technology, engineering, experience, feeling, futurama, global surveillance disclosures (2013–present), health, hyperbaric medicine, ics, ics certification, industrial control systems, industrial security, information, information security, internet, knowledge, meme, mental disorder, mental health, nerc, nerc certification, nerc cip, network security, news, observation, patch (computing), point of sale, post-traumatic stress disorder, psychological trauma, rape, reason, research, risk, sans ics, sans institute, sansics, scada, security, self-esteem, software supply chain attack, solarwinds, stress (biology), stuxnet, supply chain, supply chain attack, supply chain attacks, surgery, syndrome, system, traffic flow, zoom (software)
Steve Jones
DevOps Advocate at Redgate Software
amazon web services, application software, automation, beach, bit, blog, booting, botnet, camera, chess, child, china, clock, commissioner, communication, community, computer data storage, conversation, coronavirus disease 2019, data virtualization, database, database schema, denver, desk, devops, devops mindset, engineer, fence, honey, internet, interview, kansas, kansas city, missouri, kilt, knowledge, kubernetes , localhost, lunch, microsoft, microsoft azure, microsoft sql server, miniskirt, model–view–controller, nothing, oracle database, package manager, pandemic, pat summitt, rain, redgate, reggae, seattle, skirt, social media, software , software development, software repository, sql, steve jones (musician), t-shirt, technology, twitter, united kingdom, united rentals, united states, version control, virtualization, world wide web
Kevin Livelli
Director of Threat Intelligence at BlackBerry
64-bit computing, adware, android (operating system), backdoor (computing), botnet, cross-platform software, debian, denial-of-service attack, economics, equation group, google play, hard coding, hcl domino, internet, internet of things, kaspersky lab, leadership, linux, linux malware, malware, md5, rootkit, world wide web, x86-64, xor ddos
Jason Cook
Chief Operating Officer at Cyber Defense Labs
anti-spam techniques, bluetooth, botnet, brave new world, closed-circuit television, cloud computing, computer network, computer security, computer virus, conference call, consultant, counter-terrorism, counterintelligence, email filtering, email spam, end-user, expert, general data protection regulation, industrial control system, information security, infrastructure, innovation, internet of things, malware, mind, multi-factor authentication, password, payment card industry data security standard, penetration test, phishing, privacy, product lifecycle, regulatory compliance, right to privacy, rights, risk, risk management, social norm, surveillance, system, telecommuting, understanding, usb, vulnerability (computing), web conferencing
Federico Campbell
Vice President at Cyber Defense Labs
bluetooth, botnet, brave new world, closed-circuit television, cloud computing, computer network, computer security, computer virus, end-user, general data protection regulation, industrial control system, information security, internet of things, malware, multi-factor authentication, password, penetration test, privacy, product lifecycle, risk management, surveillance, system, usb, vulnerability (computing)
Gavin Robertson
Chief Technology Officer and Senior Vice President at WhamTech
bluetooth, botnet, brave new world, closed-circuit television, cloud computing, computer network, computer security, computer virus, end-user, general data protection regulation, industrial control system, information security, internet of things, malware, multi-factor authentication, password, penetration test, privacy, product lifecycle, risk management, surveillance, system, usb, vulnerability (computing)
Kate Kuehn
Senior Vice President at vArmour
anti-spam techniques, bluetooth, botnet, brave new world, closed-circuit television, cloud computing, computer network, computer security, computer virus, conference call, consultant, counter-terrorism, counterintelligence, email filtering, email spam, end-user, expert, general data protection regulation, industrial control system, information security, infrastructure, innovation, internet of things, malware, mind, multi-factor authentication, password, payment card industry data security standard, penetration test, phishing, privacy, product lifecycle, regulatory compliance, right to privacy, rights, risk, risk management, social norm, surveillance, system, telecommuting, understanding, usb, vulnerability (computing), web conferencing
Mark Baggett
Technical Advisor to the Department of Defense at SANS Institute
bittorrent, botnet, database, domain name registrar, domain name system, entropy (information theory), hostname, intelligence, internet bot, machine learning, malware, name server, penetration test, powershell, punycode, regular expression, security onion, security onion solutions, transport layer security, twitter, unicode, web application, web server, website, windows 10, world wide web
Brad Duncan
Threat Intelligence Analyst at Palo Alto Networks Unit 42
activex, adobe flash, bios, botnet, computer network, cryptocurrency, domain name system, email, email spam, handshaking, hypertext transfer protocol, internet, internet explorer, linux distribution, malware, microsoft powerpoint, port (computer networking), public key certificate, security onion, security onion solutions, server message block, transmission control protocol, transport layer security, trojan horse (computing), user datagram protocol, wireshark, world wide web
Paul Ebersman
Principal Software Engineer at Neustar, Inc.
active directory, anycast, botnet, captive portal, certificate authority, cloudflare, computer network, cryptocurrency, cryptography , digital signature, digital signature algorithm, dns hijacking, dns over https, dns spoofing, domain name, domain name registrar, domain name system, domain name system security extensions, dynamic host configuration protocol, elliptic curve digital signature algorithm, firefox, google chrome, google search, http strict transport security, https, hypertext transfer protocol, internet control message protocol, internet protocol, key (cryptography), load balancing (computing), mozilla, name server, public-key cryptography, root name server, time to live, transmission control protocol, transport layer security, tunneling protocol, verisign, world wide web, zone file
Damian Menscher
Security Reliability Engineer at Google
botnet, computer network, database, denial-of-service attack, domain name system, handshaking, incentive, internet, internet privacy, internet protocol, mind, mirai (malware), moore's law, netflow, network time protocol, password, physics, privacy, router (computing), routing, server (computing), spoofing attack, telecommunication, transmission control protocol, user datagram protocol
Pons Arun
Director of Products (Security Analytics) at Citrix
active directory, analytics, authentication, automation, big data, botnet, brute-force attack, business, citrix synergy 2019, cloud, collaboration, computer security, dark web, email, enterprise, exploit (computer security), internet of things, machine learning, mentorship, mobile phone, mobility, networking, password, plug-in (computing), risk, risk assessment, secure communication, sim card, software , technology, the avengers (2012 film), understanding, virtualization
Martin Zugec
Senior Architect - Technical Marketing at Citrix
active directory, analytics, app store (ios), authentication, authenticator, authorization, automation, best practice, big data, biometrics, botnet, brute-force attack, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer file, computer security, dark web, desktop virtualization, email, end user, enterprise, exploit (computer security), facebook, gmail, google account, google chrome, google voice, group policy, internet of things, legacy system, login, machine learning, man-in-the-middle attack, mentorship, microsoft windows, mobile app, mobile phone, mobility, multi-factor authentication, nap, networking, ntfs, one-time password, operating system, password, plug-in (computing), powershell, qr code, replay attack, risk, risk assessment, secure communication, security token, shell (computing), sim card, single sign-on, social media, software , start menu, taskbar, technology, the avengers (2012 film), thin client, time-based one-time password algorithm, understanding, universal windows platform, universal windows platform apps, user (computing), virtualization, windows 10, windows 7, windows xp, workspace
Robin Manke-Cassidy
Director, Product Management at Citrix
amazon web services, android (operating system), apple inc., application security, botnet, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer network, database, denial-of-service attack, end user, enterprise, gmail, google search, home network, internet bot, internet of things, ios, keystroke logging, kubernetes , load balancing (computing), man-in-the-middle attack, microservices, microsoft, microsoft azure, mobility, multi-factor authentication, netscaler, networking, operating system, platform as a service, proxy server, public key certificate, remote desktop services, single sign-on, socks, software , software as a service, spyware, sql injection, technology, transport layer security, virtual private network, virtualization, vulnerability (computing), web application, web browser, web crawler, web portal, website, world wide web
Akhilesh Dhawan
Director of Product Marketing at Citrix
access control, android (operating system), apple inc., authenticator, botnet, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer network, desktop virtualization, end user, enterprise, firefox, gmail, google chrome, home network, information security, internet explorer, internet of things, ios, keystroke logging, load balancing (computing), malware, man-in-the-middle attack, mobility, multi-factor authentication, networking, office 365, one-time password, operating system, password, proxy server, public key certificate, remote desktop protocol, remote desktop services, rsa securid, single sign-on, socks, software , spamming, spyware, steam (service), technology, virtual private network, virtualization, web browser, web portal
Chi-en Shen
Senior Researcher at FireEye
advanced persistent threats, apt, apt attack, apt groups, backdoor (computing), botnet, cisco security, communication protocol, computer data storage, computer file, crowdstrike, cyber defense summit, cyber security, cybersecurity, data, database, domain name, domain name system, download, email, fireeye, fireeye cyber defense summit, fireeye cybersecurity, fireye cyber security, fortinet, hard disk drive, https, hypertext transfer protocol, ice fog, icefog, kaspersky lab, macintosh, malware detection, memory, microsoft windows, mongolia, news, palo alto networks, phishing, roaming, screenshot, social networking service, splunk, symantec, zero day exploit, zero-day
Alex Holden
CISO at Hold Security
advanced persistent threats, apt, apt attack, botnet, botnets, cisco security, credential, credit card, crowdstrike, cyber defense summit, cyber security, cybercrime, cybersecurity, dark web, database, debit card, demography, denial-of-service attack, email, end user, facebook, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, http cookie, internet, laptop, malware, malware detection, palo alto networks, password, personal data, ransomware, social engineering (security), social media, splunk, symantec, text file, visa inc., world wide web, zero day exploit, zero-day
Tyler Croy
Main guy? at The Jenkins Project
amazon elastic compute cloud, application software, botnet, cloud computing, cloudbees, continuous delivery, continuous integration, devops, devops world, devops world | jenkins world 2018, documentation, exploit (computer security), github, google chrome, google nest, internet, internet of things, jenkins, jenkins evergreen, jenkins world, kubernetes , microsoft windows, openshift, openstack, patch (computing), plug-in (computing), r tyler croy, server (computing), snapchat, software , system administrator, vulnerability (computing), windows 10, windows update
Gleb Naumenko
Researcher at Chaincode Labs
accessibility, bandwidth (computing), bitcoin, bitcoin core, bitcoin network, bittorrent, blockchain, botnet, computer, cryptocurrency, cryptographic hash function, distributed computing, internet, latency (engineering), network switch, network topology, node (networking), php, podcast, privacy, proprietary software, recession, research, tax, web crawler
Paul Vixie
CEO at Farsight Security
4g, ad blocking, android (operating system), application software, botnet, cache (computing), cloudflare, computer network, computer security, content delivery network, cybersecurity, denial-of-service attack, dns over https, domain name system security extensions, dynamic host configuration protocol, end user, firefox, firewall (computing), google chrome, html, https, hypertext transfer protocol, information, infosec, javascript, malware, man-in-the-middle attack, mozilla, name server, network address translation, opendns, operating system, port (computer networking), proxy server, rsa, rsa (cryptosystem), rsac, rsaconference, safari (web browser), security, socks, transmission control protocol, transport layer security, verisign, virtual hosting, virtual private network, web browser, world wide web
Johannes Ullrich
Dean of Research at SANS Technology Institute
android (operating system), antivirus software, apple inc., authenticator, bluetooth, botnet, certificate authority, computer network, computer security, computer virus, content delivery network, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, gmail, google account, hackers & threats, hostname, https, hypertext transfer protocol, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, let's encrypt, malware, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, rootkit, rsa, rsac, rsaconference, security, security token, simple network management protocol, supply chain attack, transport layer security, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Alan Paller
President at SANS Technology Institute
android (operating system), antivirus software, apple inc., applied mathematics, authenticator, bluetooth, botnet, budget, certificate authority, computer hardware, computer network, computer security, computer virus, content delivery network, curriculum, cyber security, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, emmy award, future, gmail, google account, hacker, hackers & threats, hero, hostname, https, hypertext transfer protocol, ics, ics certification, industrial control systems, industrial security, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, johns hopkins university, lawyer, let's encrypt, malware, master's degree, mathematics, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, national merit scholarship program, nerc, nerc certification, nerc cip, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, reason, reconnaissance, reverse engineering, rootkit, rsa, rsa conference, rsac, rsaconference, sans ics, sans institute, sansics, scada, science, security, security token, simple network management protocol, software , supply chain attack, test (assessment), transport layer security, understanding, united states academic decathlon, university of california, berkeley, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Ed Skoudis
Instructor at SANS Institute
android (operating system), antivirus software, apple inc., authenticator, bluetooth, botnet, certificate authority, computer network, computer security, computer virus, content delivery network, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, gmail, google account, hackers & threats, hostname, https, hypertext transfer protocol, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, let's encrypt, malware, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, rootkit, rsa, rsac, rsaconference, security, security token, simple network management protocol, supply chain attack, transport layer security, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Heather Mahalik
Director of Forensics Engineering at ManTech
android (operating system), antivirus software, apple inc., authenticator, bluetooth, botnet, certificate authority, computer network, computer security, computer virus, content delivery network, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, gmail, google account, hackers & threats, hostname, https, hypertext transfer protocol, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, let's encrypt, malware, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, rootkit, rsa, rsac, rsaconference, security, security token, simple network management protocol, supply chain attack, transport layer security, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Muoi Tran
Ph.D. student in Network Security at National University of Singapore
beauty, border gateway protocol, botnet, china, communication protocol, covid-19 pandemic, denial-of-service attack, emotion, experience, filling station, internet, jazz, light, music, observation, question, reason, router (computing), routing, singapore, slate, taiwan, taxicab, traceroute, truth
Carlos Osorio-Murillo
Software Engineer at Esri
analytics, application software, arcgis, bit, botnet, cube, cut, copy, and paste, data, data analysis, esri, esri events, geographic information system, gis, github, hexagon, hue, information, microsoft visual studio, password, polygon, python (programming language), queue (abstract data type), rain, rain gauge, space, spacetime, taxicab, time geography
Mark Janikas
Product Develope at Esri
64-bit computing, analytics, application software, arcgis, bit, botnet, c++, cloud computing, computer programming, computing, cube, cut, copy, and paste, data, data analysis, econometrics, email, esri, esri events, geographic information system, gis, github, graphics processing unit, hexagon, hue, information, integral, linear regression, matrix (mathematics), microsoft azure, microsoft visual studio, password, polygon, porting, program optimization, project jupyter, python (programming language), queue (abstract data type), r (programming language), rain, rain gauge, raster graphics, regression analysis, space, spacetime, sql, statistics, taxicab, time geography, usability, vector graphics, vector space, world wide web
Jan Kaltoun
iOS Platform Lead at STRV
apple inc., best buy, booting, botnet, classic mac os, conference, dotswift, duck, ghana, graphical user interface, hosta, human–computer interaction, interaction, ios, look and feel, macos, macos mojave, marshmallow, marzipan, menu (computing), menu bar, microsoft windows, mobile app, steve jordan (drummer), swift, uikit, virus, whatsapp
Bryan Payne
Director of Engineering, Product & Application Security at Netflix
appsec, appseccali, best practice, botnet, classified information, computing, denial-of-service attack, devops, engineering, food and drug administration, george westinghouse, google chrome, hypertext transfer protocol, image scanner, internet, internet explorer, internet of things, mind, nikola tesla, owasp, proxy server, risk, stuxnet, thomas edison, thought, transport layer security, web browser, world wide web
Eyal Doron
Solution Architect at Amazon Web Services
300 - advanced, a case of identity, amazon web services, android (operating system), authentication, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, bigfix inc, botnet, cloud, cloud computing, cloud security, cloud security community, compliance, computer keyboard, cybercrime, data protection, data type, detective controls, dr. watson, eyal doron, general data protection regulation, governance, ibm cloud computing, identity, incident response, infrastructure security, key management, learning conference, lock screen, login, mobile app, mobile phone, online and offline, phishing, privacy, risk, security, security best practices, security pioneers, sep326, session, siri, software bug, trusteer, virtual private cloud, war of the currents, world wide web
1 2 3