Speakers

Sort by
Newest
Trending
1-27 of 27
Filter
Maddie Stone
Security Researcher at Google
64-bit computing, algorithm, android (operating system), android application package, arm architecture, array data structure, bhusa, black hat, black hat 2018, black hat briefings, black hat usa, black hat usa 2018, blackhat, blog, buffer overflow, c++, call stack, class (computer programming), command-line interface, compiler, computer file, control flow, covariance and contravariance (computer science), cryptography , debugging, emulator, engineer, exploit (computer security), facebook, firefox, firmware, goal, google play, google search, hypothesis, interface (computing), internet explorer, ios, ios jailbreaking, java (programming language), java native interface, javascript, just-in-time compilation, kotlin (programming language), library (computing), linux kernel, machine code, malware, microsoft excel, microsoft windows, mind, mobile app, mozilla, parameter (computer programming), patch (computing), pointer (computer programming), reason, research, reverse engineering, runtime (program lifecycle phase), runtime system, signature, source code, string (computer science), subroutine, tomato, variable (computer science), whatsapp, windows 7, windows api, windows update, zero-day (computing)
Daniel Feller
Lead Workspace Architect at Citrix
active directory, android (operating system), authentication, authenticator, authorization, biometrics, bluetooth, business, chromebook, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, dropbox (service), email, end user, enterprise, facebook, firefox, firewall (computing), gmail, google account, google chrome, google drive, google play, google voice, ios, ios jailbreaking, itunes, man-in-the-middle attack, mobility, multi-factor authentication, networking, office 365, one-time password, onedrive, operating system, password, phishing, qr code, replay attack, security token, single sign-on, social media, software , tablet computer, technology, time-based one-time password algorithm, transport layer security, url redirection, user (computing), virtualization, windows 10, workspace, world wide web
Ana Ruiz
Technical Marketing Architect at Citrix
access control, active directory, algorithm, analytics, android (operating system), bluetooth, business, chromebook, citrix cloud, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, command-line interface, computer file, data, database, dropbox (service), email, end user, enterprise, facebook, firefox, firewall (computing), google chrome, google drive, google play, ios, ios jailbreaking, itunes, machine learning, malware, microsoft windows, mobility, networking, office 365, onedrive, operating system, phishing, proxy server, ransomware, sas (software), single sign-on, software , splunk, tablet computer, technology, transport layer security, url redirection, virtualization, web application, web browser, whitelisting, windows 10, workspace, world wide web, yahoo!
Josh Judd
Systems Analyst at ONEOK
analytics, android (operating system), apple inc., bitlocker, business, business software, citrix synergy 2019, citrix systems, cloud, collaboration, desktop virtualization, enterprise, gmail, google chrome, icloud, internet privacy, ios, ios jailbreaking, linux, microsoft outlook, mobility, networking, office 365, operating system, ransomware, sharefile, single sign-on, slack (software), software , tablet computer, technology, virtual private network, virtualization, wi-fi, windows 10
Jeroen J.V Lebon
Senior Technical Product Marketing Manager at Citrix
analytics, android (operating system), apple inc., bitlocker, business, business software, citrix synergy 2019, citrix systems, cloud, collaboration, desktop virtualization, enterprise, gmail, google chrome, icloud, internet privacy, ios, ios jailbreaking, linux, microsoft outlook, mobility, networking, office 365, operating system, ransomware, sharefile, single sign-on, slack (software), software , tablet computer, technology, virtual private network, virtualization, wi-fi, windows 10
Amandeep Nagra
Senior Manager, Product Marketing Cybersecurity at Citrix
active directory, analytics, android (operating system), apple inc., authentication, big data, bitlocker, business, business software, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer file, computer network, computer security, desktop virtualization, enterprise, fee, gmail, google chrome, icloud, internet privacy, ios, ios jailbreaking, kernel (operating system), linux, metadata, microsoft outlook, mobility, multi-factor authentication, networking, office 365, operating system, privacy, privilege escalation, ransomware, sharefile, sim card, single sign-on, slack (software), social media, software , splunk, tablet computer, technology, tim hortons, touch id, virtual private network, virtualization, wi-fi, windows 10, zero-day (computing)
Ed Skoudis
Instructor at SANS Institute
android (operating system), antivirus software, apple inc., authenticator, bluetooth, botnet, certificate authority, computer network, computer security, computer virus, content delivery network, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, gmail, google account, hackers & threats, hostname, https, hypertext transfer protocol, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, let's encrypt, malware, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, rootkit, rsa, rsac, rsaconference, security, security token, simple network management protocol, supply chain attack, transport layer security, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Alan Paller
President at SANS Technology Institute
android (operating system), antivirus software, apple inc., applied mathematics, authenticator, bluetooth, botnet, budget, certificate authority, computer hardware, computer network, computer security, computer virus, content delivery network, curriculum, cyber security, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, emmy award, future, gmail, google account, hacker, hackers & threats, hero, hostname, https, hypertext transfer protocol, ics, ics certification, industrial control systems, industrial security, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, johns hopkins university, lawyer, let's encrypt, malware, master's degree, mathematics, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, national merit scholarship program, nerc, nerc certification, nerc cip, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, reason, reconnaissance, reverse engineering, rootkit, rsa, rsa conference, rsac, rsaconference, sans ics, sans institute, sansics, scada, science, security, security token, simple network management protocol, software , supply chain attack, test (assessment), transport layer security, understanding, united states academic decathlon, university of california, berkeley, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Johannes Ullrich
Dean of Research at SANS Technology Institute
android (operating system), antivirus software, apple inc., authenticator, bluetooth, botnet, certificate authority, computer network, computer security, computer virus, content delivery network, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, gmail, google account, hackers & threats, hostname, https, hypertext transfer protocol, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, let's encrypt, malware, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, rootkit, rsa, rsac, rsaconference, security, security token, simple network management protocol, supply chain attack, transport layer security, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Heather Mahalik
Director of Forensics Engineering at ManTech
android (operating system), antivirus software, apple inc., authenticator, bluetooth, botnet, certificate authority, computer network, computer security, computer virus, content delivery network, cybersecurity, cyberwarfare, data exfiltration, dns over https, domain name, domain name system, gmail, google account, hackers & threats, hostname, https, hypertext transfer protocol, information, information security, infosec, intelligent platform management interface, internet of things, internet privacy, intrusion detection system, ios, ios jailbreaking, javascript, let's encrypt, malware, mobile & iot security, mobile app, mobile device management, mobile security, multi-factor authentication, network time protocol, opendns, operating system, out-of-band management, password, proxy server, public key certificate, rootkit, rsa, rsac, rsaconference, security, security token, simple network management protocol, supply chain attack, transport layer security, virtual private network, virtualization, web browser, website, whatsapp, world wide web
Damian Malarczyk
Software Engineer at Guardsquare
adobe inc., adobe photoshop, android (operating system), app store (ios), apple, application software, computer, computer programming, digital rights management, duolingo, encryption, engineering, evernote, ios, ios jailbreaking, ipad, iphone, keychain (software), library (computing), microtransaction, mobile app, replication (computing), reverse engineering, singapore, strava, streaming media, youtube
Sven Schleier
Principal Cyber Security Consultant at Standard Chartered Bank
android (operating system), apple, backup, class (computer programming), face id, ios, ios jailbreaking, ipad, iphone, json web token, library (computing), macos, man-in-the-middle attack, mobile security, penetration test, personal identification number, property list, public key certificate, reverse engineering, runtime system, safari (web browser), security token, singapore, software testing, swift (programming language), test automation, touch id, transport layer security, x.509
Nolen Scaife
Assistant Professor at University of Colorado Boulder
android (operating system), apache cordova, automated teller machine, bluetooth, bluetooth low energy, brand, browser security, cohen's kappa, credit, credit card, credit card fraud, debit card, decompiler, encryption, gasoline, ios, ios jailbreaking, mac address, mastercard, mobile app, personal identification number, property, serial port, spectre (security vulnerability), xamarin
Leon Jacobs
Researcher at SensePost
android (operating system), computer file, computer security, con, conference speakers, cyber security, database, dc27, def, def con 2019, def con 27, defcon, file manager, file system, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hypertext transfer protocol, imessage, ios, ios jailbreaking, jar (file format), java (programming language), json, keychain, mobile app, objective-c, pointer (computer programming), rooting (android), screenshot, security conference, security conference 2019, sideloading, snapchat, statistics, web server, world wide web
Natalie Silvanovich
Security Researcher at Google
64-bit computing, apple inc., application software, assembly language, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, client (computing), compiler, email, email address, email client, exploit (computer security), google, imessage, instruction set architecture, internet, internet message access protocol, interpreter (computing), ios jailbreaking, java (programming language), javascript, jpeg, language, machine code, magic number (programming), memory, mind, modular programming, multimedia messaging service, music, object (computer science), page (computer memory), pointer (computer programming), program optimization, property list, reserved word, scripting language, serialization, server (computing), sms, software bug, subroutine, variable (computer science), visual voicemail, voicemail, vulnerability (computing), web browser, webassembly, world wide web
Jonathan Mezman
Software Engineer at Google
abstraction, c++, control flow, font, frozen (2013 film), fuzzing, google chrome, heap overflow, html, infinite loop, interpreter (computing), ios, ios jailbreaking, javascript, language, linear subspace, memory management, open-source software, parsing, reason, reserved word, software bug, sql, syntax (programming languages), web browser
Dave Randall
Sr Program Manager at Microsoft
android (operating system), api, application software, channel9, facebook platform, github, hypertext transfer protocol, information retrieval, internet, intune api, ios, ios jailbreaking, json, microsoft azure, microsoft graph, microsoft notepad, microsoft onenote, microsoft outlook, microsoft windows, patch (computing), powershell, representational state transfer, scrollbar, sharepoint, web portal, windows mobile, windows phone
Liang Chen
Team Manager at Tencent Keen Security Lab
64-bit computing, application software, array data structure, computer file, copy-on-write, exponentiation, floppy disk, function (mathematics), income, input–output memory management unit, instruction set architecture, internet, internet explorer, ios, ios jailbreaking, memory management unit, memory protection, microsoft windows, operating system, pointer (computer programming), privilege escalation, snapshot (computer storage), subroutine, virtual function
Andrew Blaich
Security Researcher at Lookout
android (operating system), bit, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, computer file, database, database index, email, facebook, google pay, hypertext transfer protocol, identifier, internet, ios, ios jailbreaking, metadata, mobile app, php, pinterest, social engineering (security), spyware, surveillance, united arab emirates, web shell, world wide web, youtube
Michael Flossman
Security Researcher at Lookout
android (operating system), bit, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, computer file, database, database index, email, facebook, google pay, hypertext transfer protocol, identifier, internet, ios, ios jailbreaking, metadata, mobile app, php, pinterest, social engineering (security), spyware, surveillance, united arab emirates, web shell, world wide web, youtube
Alejandro Hernandez
Senior Security Consultant at IOActive
android (operating system), bank, bhusa, black hat, black hat 2018, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blockchain, bloomberg l.p., computer, computer network, computer security, contract for difference, credit, credit card, database, dynamic-link library, economics, email, embedded system, finance, financial information exchange, https, hypertext transfer protocol, interactive brokers, investor, ios, ios jailbreaking, market data, memory leak, metatrader 4, mobile web, multi-factor authentication, open outcry, password, research, retail, robinhood (company), security (finance), security token, session (computer science), software , speculation, stock, stock exchange, stock market, telephone, transmission control protocol, transport layer security, website, windows 10, world wide web, xmlhttprequest
Matt Soseman
Security Architect at Microsoft
active directory, android (operating system), antivirus software, authenticator, bios, booting, bring your own device, cloud computing, computer network, g suite, gmail, google drive, google slides, ios jailbreaking, login, malware, master boot record, multi-factor authentication, password, proxy server, windows defender, world wide web, zero trust, zoom (software)
Pedro Franceschi
Co-founder at Brex
american express, app store (ios), apple inc., bank, cash, central bank, credit, credit card, financial technology, ios, ios jailbreaking, language, mastercard, nothing, oculus vr, payment, reason, siri, startup company, thought, twitter, valuation (finance), visa inc.
Paul Rogers
Independent Software Developer at IT
api, coprime integers, cryptography , diffie–hellman key exchange, digital signature, euler's totient function, https, internet of things, ios jailbreaking, key exchange, key-agreement protocol, login, martin hellman, password, proxy server, public key infrastructure, public-key cryptography, representational state transfer, rsa (cryptosystem), secure remote password protocol, symmetric-key algorithm, the shadow brokers, transport layer security, whitfield diffie
Cory Doctorow
Science fiction author at craphound.com
accessibility, ajit pai, at&t, copy protection, digital millennium copyright act, dvd, edward snowden, facebook, facebook messenger, high-bandwidth digital content protection, internet service provider, ios jailbreaking, mass surveillance, messaging apps, national security agency, net neutrality, net neutrality in the united states, photosensitive epilepsy, proprietary software, robbery, sarbanes–oxley act, surveillance, telemetry, tim wu, verizon communications
Jaime Wren
Senior Software Engineer at Google
autocomplete, bracket, checkbox, commander shepard, compiler, computer keyboard, computer mouse, conditional (computer programming), dart (programming language), event (computing), filename, html, intellij idea, ios, ios jailbreaking, jetbrains, json, menu (computing), nothing, operating system, reason, research, shortcut (computing), windows phone
Alex Doroshko
Software Engineer at JetBrains
autocomplete, bracket, checkbox, commander shepard, compiler, computer keyboard, computer mouse, conditional (computer programming), dart (programming language), event (computing), filename, html, intellij idea, ios, ios jailbreaking, jetbrains, json, menu (computing), nothing, operating system, reason, research, shortcut (computing), windows phone
1