Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-25 of 25
1-25 of 25
Filter
Terry Cox
Director at Bootstrap Ltd
accuracy and precision, bias, continuous integration, decision support system, decision-making, deployment environment, devops, infrastructure, laptop, learning, machine learning, osi model, property, quality management, regulatory compliance, science, software , software development, specification (technical standard), system, test (assessment), training, usb flash drive, user interface, version control
Jim Keller
CTO & President at Tenstorrent Inc.
booting, central processing unit, communication protocol, computer data storage, computer hardware, computer network, computer vision, computing, cray-1, data type, graphics processing unit, instruction set architecture, intel, internet protocol suite, jim keller, locality of reference, machine learning, matroid, matroid company, microarchitecture, ml conference, moore's law, operating system, osi model, processor register, program optimization, scaledml, scaledml2020, semiconductor fabrication plant, software , technical conference, tensorflow, vector processor, virtual memory
Rick Bleszynski
CEO at Zocial
amazon (company), audit, bank, blockchain, cash, communication protocol, computer file, computer network, content delivery network, cryptography , design, facebook, google, internet, internet explorer, internet protocol suite, mobile app, netscape, operating system, osi model, property, public-key cryptography, social media, software , usability
Jordan French
Executive Editor at Grit Daily News
abra, alon goren, amazon (company), art, audit, avery akkineni, bank, bartek sibiga, bitcoin, blockchain, blocktelegraph, brand, business, cash, central bank, commissioner, commodity futures trading commission, commodity market, communication protocol, computer file, computer network, conference, consumer behaviour, content delivery network, creating nfts, credit card, crypto, cryptocurrencies, cryptocurrency, cryptography , currency, data analytics, dcentral, dcentral event, dcentral miami, dcentral miami defi, dcentral miami event, dcentral miami nft, dcentralcon, decentralization, decentralized finance, defi, derivative (finance), design, digital currency, digital security, discord (software), draper goren holm, draper venture network, economy, ethereum, euro, event, experience, facebook, fanadise, finance, financial regulation, firefox, futures contract, gala games, google, grit daily, hester peirce, initial coin offering, instagram, internet, internet celebrity, internet explorer, internet protocol suite, investment, jonathan blanco, jordan french, josef holm, la blockchain summit, la blockchain week, marketplace, matt boseo, millennials, mind, mobile app, money, mozilla, netscape, network effect, nft community, nft stage, nft stage miami, nftcon by gala games, nftcon stage, nftcon stage by gala games, nftcon2, nfts, nfts for big brands, niftmint, nothing, operating system, osi model, price, property, public-key cryptography, risk, sec, securities market, security (finance), social media, software , stablecoin, stock, stock market, suku, summit, tim draper, twitter, u.s. securities and exchange commission, united states dollar, united states securities regulation, usability, utility, vayner nft, vaynernft, what is defi, what is nft, wisdom, world wide web, yonathan lapchik
Pooja Shah
Product Lead at Protocol Labs
amazon (company), audit, bank, blockchain, cash, communication protocol, computer file, computer network, content delivery network, cryptography , design, facebook, google, internet, internet explorer, internet protocol suite, mobile app, netscape, operating system, osi model, property, public-key cryptography, social media, software , usability
Steven Becker
President & COO at MakerDAO
accessibility, adam levy, alon goren, amazon (company), audit, autonomy, bank, bitcoin, blockchain, cash, chief operating officer, coinbase, communication protocol, computer file, computer network, concept, conference, content delivery network, crypto, cryptocurrencies, cryptocurrency, cryptography , currency, decentralization, decentralized finance, defi, demand, design, digital security, draper goren holm, draper venture network, economic equilibrium, economy, education, entrepreneurship, ethereum, etoro, event, facebook, factoring (finance), finance, google, governance, ideology, interest, internet, internet explorer, internet protocol suite, jesus, josef holm, la blockchain summit, la blockchain week, law, lawsuit, makerdao, mark zuckerberg, medium of exchange, microsoft, mind, mobile app, money, mortgage-backed security, motivation, netscape, news, online community, operating system, osi model, property, public-key cryptography, reason, risk, social issue, social media, software , stablecoin, startup company, summit, supply and demand, supply-side economics, technology, tether (cryptocurrency), tim draper, truth, understanding, usability, use case
Hima Bindu Vejella
Core Member at CyberPsy
activity tracker, body area network, chain of custody, closed-circuit television, cloud computing, communication protocol, computer data storage, computer security, database, digital evidence, digital forensics, electronic voting, fitbit, google nest (smart speakers), internet of things, metadata, mobile device forensics, network forensics, osi model, personal data, privacy, smart city, whatsapp
Graig Wright
Chief Scientist at nChain
advertising, aibcsummit, bernie madoff, bitcoin, bitcoin cash, bitcoin network, bitcoin sv, bitcoinsv, blackmail, blockchain, bounty (reward), bribery, bsv, btc, capitalism, child, child pornography, coingeek, coingeek london, coingeek london conference, communication protocol, computer, computer network, conference, contract, corruption, craig wright, craig wright satoshi, craigwright, credit card, crime, crypto, cryptocurrency, currency, cypherpunk, decentralization, developers, digital currency, digital signature, distributed computing, double-spending, ecology, electronic lock, email, encryption, eos.io, ethereum, evidence, explanation, exponential growth, facebook, fee, fentanyl, fiat money, financial transaction, fintech, fintect, fireside chat, firewall (computing), fraud, gateway (telecommunications), hacker, hbgary, heroin, hope, hyundai motor company, information, initial coin offering, internet, internet of things, internet protocol, internetwork packet exchange, investment, ip address, jimmy nguyen, julian assange, jurisdiction, kidnapping, law, liberty reserve, life imprisonment, london, malware, man-in-the-middle attack, message, micropayment, mining, monero, money, multiplayer video game, nakamoto, network packet, novell, online and offline, osi model, payment, paypal, peer-to-peer, pornography, price, privacy, proof of work, public key infrastructure, punishment, realsatoshi, reason, satoshi, satoshi nakamoto, security hacker, sentence (law), seoul, server (computing), silk road (marketplace), sms, south korea, statute of frauds, stock exchange, subsidy, taekwondo, technology, time, transmission control protocol, transport layer, u.s. securities and exchange commission, uk, ukraine, user datagram protocol, visa inc., web of trust, wikileaks, world of warcraft, world wide web
Matthew Wood
Senior Data Scientist and Machine Learning Engineer at Facebook
automation, border gateway protocol, c++, cascading style sheets, communication protocol, computer network, facebook, facebook platform, go (programming language), hackathon, internet, internet control message protocol, internet protocol, javascript, machine, machine learning, osi model, printed circuit board, reachability, resource reservation protocol, router (computing), traceroute, traffic shaping, transmission control protocol, user datagram protocol
Paul Mockapetris
Computer Scientist, Internet Pioneer & Co-inventor at DNS
5g, apple inc., arpanet, asynchronous transfer mode, bob kahn, central processing unit, chromecast, circuit design, communication protocol, denial-of-service attack, email, email spam, ethernet, firewall (computing), integrated circuit, integrated circuit design, intel, internet, internet of things, invention, moore's law, mos technology 6502, osi model, vint cerf
Carson Zimmerman
Senior Security Service Engineering Lead at Microsoft
advanced persistent threats, analytics, application software, apt, apt attack, asset, attention, bart simpson, behavior, book, cisco security, cloud computing, common vulnerability scoring system, computer network, crowdstrike, feeling, fireeye, fireeye cyber defense summit 2019, fireeye cyber security, fortinent, inventory, law, leverage (finance), malware detection, microsoft excel, osi model, palo alto networks, poverty, reason, science, security operations center, service-level agreement, soc, soc metrics, splunk, spreadsheet, technology, time, vulnerability (computing), whatsapp, zero day exploit, zero-day
Sofia Hmich
Board Member at Cervest
apple inc., artificial, augmentation, austria, blockchain, challenge, computer hardware, corporate spin-off, engineering, entrepreneurship, event, facial recognition system, festival, future, health technology in the united states, human, humanity, innovation, intelligence, interest, life, logistics, mergers and acquisitions, osi model, physics, pioneers, prototype, risk, robot, robotics, robots, science, software testing, startup company, startups, tech, technology, time, unicorn (finance), venture capital, vienna
Gemma Milne
Tech & Science Writer at Freelance
algorithm, alphafold, analytics, apple inc., artificial, artificial intelligence, astronomy , astrophysics, attention, augmentation, austria, autoencoder, big bang, big data, black hole, blockchain, brain, brand, capitalism, central processing unit, challenge, closed-circuit television, collective intelligence, communication, commuting, computer, computer cluster, computer hardware, computer science, computing, conceptual model, convolutional neural network, corporate spin-off, creativity, data center, data ethics, data science, decentralization, deep learning, diabetic retinopathy, distributed computing, dystopia, engineering, entrepreneurship, event, facial recognition system, festival, forecasting, future, genie (feral child), god, graphics processing unit, gravitational wave, green belt, health technology in the united states, human, human nature, humanity, idea, image segmentation, information, information content, innovation, inspection, intelligence, interest, internet, intuition, laptop, learning, life, light rail, logistics, machine learning, meg griffin, mergers and acquisitions, mind, moore's law, multi-core processor, nvidia, octopus, openai, optical flow, osi model, pack (canine), perception, pessimism, physics, pioneers, poaceae, prediction, privacy, project jupyter, property, prototype, reason, regression analysis, regular expression, research, revelation, rights, risk, robot, robotics, robots, science, sense, separation of powers, server (computing), social media, soft robotics, software , software testing, springfield (the simpsons), startup company, startups, supercomputer, supermassive black hole, tactile sensor, tech, technological singularity, technology, telecommuting, tensorflow, text messaging, the alan turing institute, time, transport, turing, ucl centre for advanced spatial analysis, understanding, unicorn (finance), venture capital, vienna, visual object recognition (animal test), visualization (graphics)
Benjamin Joffe
Partner, HAX at SOSV
apple inc., artificial, augmentation, austria, blockchain, challenge, computer hardware, corporate spin-off, engineering, entrepreneurship, event, facial recognition system, festival, future, health technology in the united states, human, humanity, innovation, intelligence, interest, life, logistics, mergers and acquisitions, osi model, physics, pioneers, prototype, risk, robot, robotics, robots, science, software testing, startup company, startups, tech, technology, time, unicorn (finance), venture capital, vienna
Christophe Jurczak
Founder and Partner at Quantonation, Quantum investors
apple inc., artificial, augmentation, austria, blockchain, challenge, computer hardware, corporate spin-off, engineering, entrepreneurship, event, facial recognition system, festival, future, health technology in the united states, human, humanity, innovation, intelligence, interest, life, logistics, mergers and acquisitions, osi model, physics, pioneers, prototype, risk, robot, robotics, robots, science, software testing, startup company, startups, tech, technology, time, unicorn (finance), venture capital, vienna
Patrick Shuff
Chief Technology Officer at eFuse
address resolution protocol, border gateway protocol, certificate authority, communication protocol, computer network, denial-of-service attack, domain name system, http strict transport security, internet control message protocol, internet protocol, ip address, ipv4, ipv6, linux, maximum segment size, name server, network switch, networking, osi model, port (computer networking), root name server, router (computing), sysop, transmission control protocol, user datagram protocol, wide area network
Yonatan Ryabinski
Chief Enterprise Architect at Vanguard
300 - advanced, amazon elastic compute cloud, amazon web services, anonymous function, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, cloud, cloud computing, cloud security, cloud security community, command-line interface, compiler, compliance, computer programming, cryptography , data protection, database, delimiter, detective controls, domain name, encryption, governance, hypervisor, identity, incident response, infrastructure security, learning conference, load balancing (computing), microservices, osi model, postgresql, python (programming language), regular expression, reliability engineering, return statement, risk, robert mccarthy, runtime system, scope (computer science), scripting language, security, security best practices, security pioneers, sep309-r, session, string (computer science), template (c++)
Ken Beer
General Manager at AWS
300 - advanced, amazon elastic compute cloud, amazon web services, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, block cipher mode of operation, cipher suite, ciphertext, cloud, cloud computing, cloud security, cloud security community, compliance, computer network, computer security, data at rest, data protection, detective controls, domain name system, encryption, fnd310-r, governance, https, identity, incident response, infrastructure security, ipsec, ken beer, key management, learning conference, lightweight directory access protocol, load balancing (computing), osi model, password, patch (computing), public key certificate, public-key cryptography, representational state transfer, risk, rsa (cryptosystem), security, security best practices, session, software bug, the foundation, transport layer security, virtual private network
Scott Southworth
Medical IoT Integration at Scale / Data Visualization / Application Architecture at HCA
anonymous function, api, associative array, bracket, communication protocol, compiler, css , cut, copy, and paste, database, electronic health record, elixir, erlang, erlang (programming language), extract, transform, load, floating-point arithmetic, forth (programming language), functional programming, game engine, health informatics, health level 7, healthcare, html, internet, internet of things, interoperability, javascript, jquery, json, lexical analysis, lua (programming language), machine learning, node.js, object-oriented programming, osi model, proprietary software, real-time computing, rick scott, roblox, scripting language, second life, sepsis, significant figures, software , virtual machine, xml
Sneha Inguva
Software Engineer, CNS Networking at DigitalOcean
communication protocol, computer network, connection-oriented communication, data link layer, encapsulation (networking), ethernet, ethernet frame, firewall (computing), frame (networking), https, hypertext transfer protocol, internet protocol, internet protocol suite, ip address, ipv4, ipv6 packet, network packet, network socket, osi model, port (computer networking), port scanner, protocol stack, transport layer, user datagram protocol
Jeff Moss
Commissioner at Global Commission on the Stability of Cyberspace
agile software development, android (operating system), anonymity, anycast, automation, bill booth, black hat, black hat 2018 briefings, black hat 2019, black hat briefings, black hat briefings 2018, black hat keynote, black hat usa, black hat usa 18, black hat usa 2018, black hat usa 2019, blackhat, blackhatusa, blame, christopher krebs, cisa, cold war, compliance (psychology), computer security, con, conference speakers, conversation, corbin souffrant, culture, cyberattack, cyberjunkie, cyberwarfare, decentralization, def, def con 2019, def con 27, defcon, denial-of-service attack, devops, digital journalism, dino dai zovi, disclosure, discovery (law), education, edward snowden, engineer, expert, federal bureau of investigation, feeling, firefox, freebsd, fuzzing, hacker conference, hackers, high-yield debt, international humanitarian law, internet, internet protocol suite, javascript, jennifer granick, ken thompson, kernel (operating system), law, linux, mind, multics, multistakeholder governance model, net neutrality, nothing, operating system, osi model, pablo breuer, privacy, punishment, pwn2own, reason, reasonable doubt, reciprocity (social psychology), request for comments, research, research and development, risk, root name server, runa sandvik, security conference, signal, software bug, software engineering, software engineering institute, software testing, subpoena, thought, time-sharing, tor (anonymity network), transparency (behavior), understanding, united nations, united states department of homeland security, unix, vulnerability (computing), web browser, whatsapp, windows xp, witness
Janna Hilferty
Senior DevOps Engineer at TriNet, Inc
anonymous (group), botnet, cloudflare, computer network, conference, denial-of-service attack, dns root zone, dns spoofing, domain name system, http cookie, internet of things, memcached, mirai (malware), network socket, open access, osi model, password, spoofing attack, ssh (secure shell), technology, transmission control protocol, transport layer, transport layer security, universal plug and play, usenix, user datagram protocol, wi-fi, world wide web
James Wickett
Head of Research at Signal Sciences
apache tomcat, application security, application software, appsec, asynchronous i/o, audit, chaos engineering, cloud computing, code refactoring, cognition, computer science, continuous delivery, continuous testing, crash at crush, database, devops, domain-specific language, doubt, experiment, information privacy, insurance, kinetoscope, linkedin learning, lunar phase, mind, nuclear fallout, osi model, owasp, privacy, reason, red team, regulatory compliance, research, risk, risk management, science, software , software bug, software framework, source lines of code, system, thomas edison, thought, twitter, understanding, web application
Eiichi Kitagawa
Software Engineer at Docker
computer, computer network, internet protocol suite, internet relay chat, kubernetes , metadata, mind, network socket, observation, osi model, overlay network, pipeline (unix), problem solving, reality, routing table, scientific method, shell (computing), software , ssh (secure shell), system, theory, time, transmission control protocol, troubleshooting, user datagram protocol
Ada Mancini
Technical Support Engineer at Docker
computer, computer network, internet protocol suite, internet relay chat, kubernetes , metadata, mind, network socket, observation, osi model, overlay network, pipeline (unix), problem solving, reality, routing table, scientific method, shell (computing), software , ssh (secure shell), system, theory, time, transmission control protocol, troubleshooting, user datagram protocol
1
1-25 of 25