Speakers

Sort by
Newest
Trending
1-30 of 55
Filter
Kelvin Lee
Researcher at Massachusetts Institute of Technology (MIT)
astrochemistry, astronomical interferometer, astronomy , astronomy and astrophysics, astrophysics, automated workflows, brute-force attack, database, deep learning, determinism, electromagnetic spectrum, event horizon telescope, harvard–smithsonian center for astrophysics, interferometry, interstellar medium, mathematics, metadata, observational astronomy, optics, parameter, pattern recognition, probability, probability distribution, python, radio telescope, radio telescopes, reproductability, rotational spectroscopy, sampling (statistics), statistical inference, telescope
Sun-Li Beatteay
Senior Software Engineer at DigitalOcean
brute-force attack, concept, cryptography , data at rest, encryption, euler's totient function, factorization, handshaking, hypertext transfer protocol, integer factorization, internet security, key (cryptography), modular arithmetic, number, one-way function, password, privacy, public-key cryptography, question, server (computing), ssh (secure shell), symmetric-key algorithm, transport layer security, trapdoor function
Jonathan S. Katz
Vice President of Platform Engineering at Crunchy Data
2017, active directory, authentication, brute-force attack, client–server model, cryptographic hash function, cryptography , handshaking, hmac, kerberos (protocol), key derivation function, lightweight directory access protocol, login, man-in-the-middle attack, md5, multi-factor authentication, password, pgcon, pgcon 2020, pgcon2020, postgresql, public key certificate, salt (cryptography), salted challenge response authentication mechanism, server (computing), sha-2, snapchat, string (computer science), transport layer security
Jo Van Bulck
PhD candidate at imec-DistriNet, KU Leuven
advanced encryption standard, arm architecture, brute-force attack, clock rate, cryptography , ddr3 sdram, ddr4 sdram, dynamic frequency scaling, ecc memory, encryption, gaming computer, intel, laptop, modular arithmetic, openssl, operating system, password, pointer (computer programming), prime number, public-key cryptography, random-access memory, row hammer, rsa (cryptosystem), software guard extensions, world wide web
David Oswald
Senior Lecturer (associate professor) in the Centre for Cyber Security and Privacy at The University of Birmingham
advanced encryption standard, arm architecture, brute-force attack, clock rate, cryptography , ddr3 sdram, ddr4 sdram, dynamic frequency scaling, ecc memory, encryption, gaming computer, intel, laptop, modular arithmetic, openssl, operating system, password, pointer (computer programming), prime number, public-key cryptography, random-access memory, row hammer, rsa (cryptosystem), software guard extensions, world wide web
Kit Murdock
PhD in Computer Science at The University of Birmingham
advanced encryption standard, arm architecture, brute-force attack, clock rate, cryptography , ddr3 sdram, ddr4 sdram, dynamic frequency scaling, ecc memory, encryption, gaming computer, intel, laptop, modular arithmetic, openssl, operating system, password, pointer (computer programming), prime number, public-key cryptography, random-access memory, row hammer, rsa (cryptosystem), software guard extensions, world wide web
Daniel Gruss
PostDoc at Graz University of Technology
advanced encryption standard, advanced micro devices, application software, arm architecture, array data structure, attention, bit, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, brute-force attack, central processing unit, clock rate, cloud computing, computer, computer architecture, computer data storage, computer file, computer program, cryptography , ddr3 sdram, ddr4 sdram, dependent and independent variables, dynamic frequency scaling, ecc memory, encryption, exorcism, file system, gaming computer, instruction pipelining, instruction set architecture, intel, intel core, kernel (operating system), laptop, latency (engineering), meltdown (security vulnerability), memory refresh, microarchitecture, modular arithmetic, openssl, operating system, out-of-order execution, page table, paging, password, patch (computing), personal identification number, pointer (computer programming), prime number, process (computing), program optimization, programmer, public-key cryptography, random-access memory, row hammer, rsa (cryptosystem), ryzen, security, software , software guard extensions, spectre (security vulnerability), superuser, virtual memory, wechat, world wide web
Frank Piessens
Professor at imec-DistriNet, KU Leuven
advanced encryption standard, arm architecture, brute-force attack, clock rate, cryptography , ddr3 sdram, ddr4 sdram, dynamic frequency scaling, ecc memory, encryption, gaming computer, intel, laptop, modular arithmetic, openssl, operating system, password, pointer (computer programming), prime number, public-key cryptography, random-access memory, row hammer, rsa (cryptosystem), software guard extensions, world wide web
Flavio Garcia
Professor of Computer Security at The University of Birmingham
advanced encryption standard, arm architecture, brute-force attack, clock rate, cryptography , ddr3 sdram, ddr4 sdram, dynamic frequency scaling, ecc memory, encryption, gaming computer, intel, laptop, modular arithmetic, openssl, operating system, password, pointer (computer programming), prime number, public-key cryptography, random-access memory, row hammer, rsa (cryptosystem), software guard extensions, world wide web
Ruben Merre
CEO at NGRAVE.io
adolescence, algorithm, backdoor (computing), backup, bit, bitcoin, blockchain, brute-force attack, camera, central processing unit, computer, computer hardware, cryptocurrency, cryptography , decentralization, encryption, face id, facebook, feeling, future, google, hacker, heat, market (economics), martin hellman, mind, money, outsourcing, ownership, password, personal identification number, privacy, public-key cryptography, qr code, quantum computing, ralph merkle, random number generation, randomness, risk, sensor, tamper-evident technology, thought, universe, whitfield diffie
Marcus Fowler
Director of Strategic Threat at Darktrace
ai, ai4, ai4 2020, artificial, artificial intelligence, brute-force attack, communication, computer intelligence, computer security, cyber, cyber ai, cyber security, cybersecurity, darktrace, data science, database, deep learning, disability, email, human, intelligence, learning, machine, machine learning, marcus fowler, ml, monero (cryptocurrency), phishing, psychological resilience, ransomware, salesforce, security, statistics, strategy, technology, telecommunication, threat intelligence, understanding, virtual private network
Alex Fauvel
General Partner at TwoHop Ventures
alex fauvel, apple inc., asset, authentication, bitcoin, bitcoin sv, blockchain, brute-force attack, bsv, coinbase, coingeek, coingeek conference, communication protocol, company, competition, computer data storage, concept, contract, cray, cryptocurrency, cut, copy, and paste, data, database transaction, digital asset, digital rights management, encryption, evidence, facial recognition system, general data protection regulation, gmail, identity management, information, internet, know your customer, lastpass, money, on-chain, outsourcing, password, password manager, public-key cryptography, sabbath, seoul, single sign-on, social media, software , software release life cycle, south korea, soviet union, space, startup company, steganography, technology, trail, twitter
Pons Arun
Director of Products (Security Analytics) at Citrix
active directory, analytics, authentication, automation, big data, botnet, brute-force attack, business, citrix synergy 2019, cloud, collaboration, computer security, dark web, email, enterprise, exploit (computer security), internet of things, machine learning, mentorship, mobile phone, mobility, networking, password, plug-in (computing), risk, risk assessment, secure communication, sim card, software , technology, the avengers (2012 film), understanding, virtualization
Martin Zugec
Senior Architect - Technical Marketing at Citrix
active directory, analytics, app store (ios), authentication, authenticator, authorization, automation, best practice, big data, biometrics, botnet, brute-force attack, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer file, computer security, dark web, desktop virtualization, email, end user, enterprise, exploit (computer security), facebook, gmail, google account, google chrome, google voice, group policy, internet of things, legacy system, login, machine learning, man-in-the-middle attack, mentorship, microsoft windows, mobile app, mobile phone, mobility, multi-factor authentication, nap, networking, ntfs, one-time password, operating system, password, plug-in (computing), powershell, qr code, replay attack, risk, risk assessment, secure communication, security token, shell (computing), sim card, single sign-on, social media, software , start menu, taskbar, technology, the avengers (2012 film), thin client, time-based one-time password algorithm, understanding, universal windows platform, universal windows platform apps, user (computing), virtualization, windows 10, windows 7, windows xp, workspace
Barry Vengerik
Technical Director, Advanced Practices at FireEye
advanced persistent threats, antivirus software, apt, apt attack, backdoor (computing), brute-force attack, certificate authority, certificate revocation list, cisco security, code signing, code signing certificates, crowdstrike, cyber defense summit, cyber security, cybersecurity, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, group policy, hacking team, javascript, kernel (operating system), malware, malware detection, microsoft smartscreen, online certificate status protocol, openoffice.org, palo alto networks, portable executable, public key certificate, public key infrastructure, scripting language, specification (technical standard), splunk, symantec, vbscript, visual basic for applications, windows script host, windows vista, x.509, xml, zero day exploit, zero-day
Raymond Leong
Principal Threat Analyst, Advanced Practices at FireEye
advanced persistent threats, apt, apt attack, apt groups, apt41, brute-force attack, cisco security, communication protocol, computer network, computer virus, crowdstrike, cyber security, cyberattack, cybersecurity, cyberwarfare, data protection api, device driver, dynamic-link library, file system, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, international mobile subscriber identity, kernel (operating system), malware, malware detection, mobile phone, palo alto networks, password, phishing, reverse engineering, rootkit, shellcode, sms, splunk, surveillance, svchost.exe, symantec, transmission control protocol, tunneling protocol, zero day exploit, zero-day
Daniel Perez
Principal Threat Analyst, Advanced Practices at FireEye
advanced persistent threats, apt, apt attack, apt groups, apt41, brute-force attack, cisco security, communication protocol, computer network, computer virus, crowdstrike, cyber security, cyberattack, cybersecurity, cyberwarfare, data protection api, device driver, dynamic-link library, file system, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, international mobile subscriber identity, kernel (operating system), malware, malware detection, mobile phone, palo alto networks, password, phishing, reverse engineering, rootkit, shellcode, sms, splunk, surveillance, svchost.exe, symantec, transmission control protocol, tunneling protocol, zero day exploit, zero-day
Joshua Bass
Product Management, Email Security at FireEye
accounts payable, advanced persistent threats, amazon alexa, antivirus software, apt, apt attack, automation, brute-force attack, cisco security, cloud computing, computer security, crowdstrike, cyber defense summit, cyber security, cybersecurity, economic growth, email, email security, email spam, fireeye, fireeye cyber defense summit, fireeye email, fireeye email security, fortinet, gmail, innovation, internet, machine learning, malware, malware detection, market (economics), microsoft, mind, news, office 365, palo alto networks, password, phishing, productivity, simple mail transfer protocol, sms, splunk, symantec, zero day exploit, zero-day
Fredrik Berntsson
Head of IT Security Operations at Ericsson
accounts payable, advanced persistent threats, amazon alexa, antivirus software, apt, apt attack, automation, brute-force attack, cisco security, cloud computing, computer security, crowdstrike, cyber defense summit, cyber security, cybersecurity, economic growth, email, email security, email spam, fireeye, fireeye cyber defense summit, fireeye email, fireeye email security, fortinet, gmail, innovation, internet, machine learning, malware, malware detection, market (economics), microsoft, mind, news, office 365, palo alto networks, password, phishing, productivity, simple mail transfer protocol, sms, splunk, symantec, zero day exploit, zero-day
Masha Sedova
Co-Founder at Elevate Security
attention, behavior, bit, brand, brute-force attack, chief executive officer, competition, computer security, concept, culture, cybersecurity, data, elevator, feedback, hierarchy, information, infosec, innovation & startups, mining, organization, productivity, quiz, reinforcement, risk, rsa, rsac, rsaconference, science, security, technology, the wall street journal, wall street
Florian Grunow
Secure Web Applications at ERNW GmbH
brute-force attack, case studies, code, coding, computer file, computer security, conference, congress, cross-site scripting, database, developer, developing, education, europe, fixes, future, http cookie, it, javascript, login, motivation, object-oriented programming, parameter (computer programming), patch (computing), penetration test, people, php, prepared statement, programmer, programming, programming language, software , sql injection, string (computer science), tech, technology, tester, testing, theory, user (computing), vulnerability, wearedevelopers, wearedevs, web applications, web portal, wordpress, world wide web
Stepan Ilyin
Co-Founder at Wallarm
amazon (company), api, appsec, brute-force attack, cloud computing, criminal record, cryptography , datasheet, denial-of-service attack, email, google, honeypot (computing), http cookie, intelligence, internet, kubernetes , machine learning, messaging apps, microservices, neural network, nginx, owasp, proxy server, snapchat, statistics, telegraphy, twitter
Vincent Hopson
Field Applications Engineer at CodeDx
apache tomcat, application security, appsec, blitzkrieg, brute-force attack, call stack, defence in depth, entry point, hacker, hypertext transfer protocol, infiltration tactics, java (programming language), login, owasp, password, penetration test, proxy server, rifle, scripting language, software , software testing, tank, trench warfare, visualization (graphics), web application, white hat (computer security), world wide web
Kevin Gosschalk
CEO and Founder at Arkose Labs
3d modeling, adoption, android (operating system), apple inc., appsec, appseccali, auction, australia, authentication, battle, biometrics, brute-force attack, canada, captcha, chargeback fraud, chief executive officer, china, computer, concept, consumer behaviour, counterfeit, credit card, customer experience, data, dog, experience, feedback, fence (criminal), fingerprint, fraud, have i been pwned?, identity theft, image stitching, industry, internet, internet of things, kinect, lemon, low-cost carrier, machine, machine learning, market (economics), mind, mindset, mobile device, multi-factor authentication, multi-touch, northern goshawk, online and offline, optical character recognition, owasp, password, payments, paypal, price, primesense, proverb, recaptcha, risk, security token, self-driving car, social media, spamming, streaming media, takeover, tax, thought, tree, usability, user agent, warrior, williamsport, pennsylvania, xbox
Patrick McCorry
Full-time Admin at Pisa Research Ltd
api, array data structure, attention, bank, bitcoin, bloackchain, blockchain, blockchain 2020, blockchain technologies, blockhaine hackathon, brute-force attack, competition, consensus (computer science), contract, crypto 2020, cryptocarrency event, cryptocurrency, cryptocurrency investments, cryptocurrency investments 2020, cryptographic hash function, currency, decompiler, dynamic array, eth2020, ethereum, ethereum 2020 , ethglobal, ethlondon, ethlondonuk 2020, fee, fintech conference 2020, for loop, frozen (2013 film), function (mathematics), gossip, hackathon eth, hackathon ethereum, hard coding, investments 2020, java (programming language), javascript, lease, lol, memory, mind, money, news, package manager, payment, price, property, public-key cryptography, receipt, research, return statement, signature, smart contract, string (computer science), tax, utility, world wide web, youtube
Todd Resudek
Senior Software Engineer at Weedmaps
airline, authentication, beam (nautical), boolean data type, brute-force attack, command-line interface, computer file, curling, database, debugging, ecosystem, elixir, elixir (programming language), engineer, entry point, environment variable, erlang, erlang (programming language), executable, functional programming, hex, hypertext transfer protocol, information security, language, library, library (computing), london borough of hackney, master p, modular programming, multi-factor authentication, online and offline, password, reserved word, ruby (programming language), shortcut (computing), signature, software bug, solution, string (computer science), subroutine, syntax, template (c++), variable (computer science), web application, weedmaps
Jacob Baines
Research Engineer at Tenable
brute-force attack, communication protocol, computer security, con, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, file transfer protocol, firewall (computing), hacker, hacker community, hacker conference, hackers, hacking conference, honeypot (computing), image scanner, internet forum, internet protocol, ios, ip address, library (computing), malware, password, patch (computing), router (computing), security conference, security conference 2019, shell (computing), shell script, software release life cycle, symbolic link, transmission control protocol, wayback machine, web search engine, world wide web, zero-day (computing)
Ce Qin
Security Researcher at Tencent Security Xuanwu Lab
application software, brute-force attack, classic mac os, computer security, con, conference speakers, cross-site scripting, cyber security, dc27, def, def con 2019, def con 27, defcon, desktop metaphor, domain name system, email, google analytics, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, html, hyperlink, hypertext transfer protocol, java (programming language), javascript, library (computing), localhost, macintosh, password, scripting language, security conference, security conference 2019, web browser, wechat
Junyu Zhou
Security Researcher at Tencent Security Xuanwu Lab
application software, brute-force attack, classic mac os, computer security, con, conference speakers, cross-site scripting, cyber security, dc27, def, def con 2019, def con 27, defcon, desktop metaphor, domain name system, email, google analytics, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, html, hyperlink, hypertext transfer protocol, java (programming language), javascript, library (computing), localhost, macintosh, password, scripting language, security conference, security conference 2019, web browser, wechat
Jianing Wang
Security Researcher at Tencent Security Xuanwu Lab
application software, brute-force attack, classic mac os, computer security, con, conference speakers, cross-site scripting, cyber security, dc27, def, def con 2019, def con 27, defcon, desktop metaphor, domain name system, email, google analytics, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, html, hyperlink, hypertext transfer protocol, java (programming language), javascript, library (computing), localhost, macintosh, password, scripting language, security conference, security conference 2019, web browser, wechat
1 2