Events Add an event Speakers Talks Collections
 

Conference Speakers

Sort by
Newest
Trending
481-510 of 35910
481-510 of 35910
Filter
Alejandro Hernandez
Senior Security Consultant at IOActive
android (operating system), bank, bhusa, black hat, black hat 2018, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blockchain, bloomberg l.p., computer, computer network, computer security, contract for difference, credit, credit card, database, dynamic-link library, economics, email, embedded system, finance, financial information exchange, https, hypertext transfer protocol, interactive brokers, investor, ios, ios jailbreaking, market data, memory leak, metatrader 4, mobile web, multi-factor authentication, open outcry, password, research, retail, robinhood (company), security (finance), security token, session (computer science), software , speculation, stock, stock exchange, stock market, telephone, transmission control protocol, transport layer security, website, windows 10, world wide web, xmlhttprequest
Ryan Johnson
Senior Director, R&D at Kryptowire
Mohamed Elsabagh
Research Director at Kryptowire
Xinyu Xing
Assistant Professor at Pennsylvania State University
algorithm, association football, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, capitalism, captcha, child, china, chinese martial arts, chocolate, common law, computer, conceptual model, covid-19 pandemic, deep learning, dementia, earth, emoji, evaluation, expert, export, feeling, forest, global variable, goal, golf, hacker, inference, information, inspection, intelligence, internet, kernel (operating system), knowledge, law, learning, machine learning, matter, median, memory, memory management, microsoft windows, neural network, news, observation, patch (computing), penalty kick (association football), petroleum, police, real-time strategy, reason, research, reverse engineering, risk, simulation, snapshot (photography), statics, statistics, strategy game, strategy guide, tax, technology, texas hold 'em, text messaging, the first tee, theory, unsupervised learning, use case, variable (computer science), youtube
Zhenpeng Lin
Security Researcher at Open Source Security, Inc.
Yueqi Chen
Ph.D. Student at Pennsylvania State University
Antonio Cocomazzi
Threat Intelligence Researcher at SentinelOne
Xiling Gong
Senior Security Researcher at Tencent Blade Team
android (operating system), bit, boston, central processing unit, chicken, clock, coconut, coffee, computer data storage, computer hardware, computer keyboard, computer security, con, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, fallacy, father, fax, firmware, franciscans, god, google, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hartford, connecticut, hong kong, kitchen, kona district, hawaii, lagoon, linux, maginot line, mandalay, mandalay bay, map, modem, netflix, osprey, pointer (computer programming), qualcomm, qualcomm snapdragon, router (computing), santa claus, security conference, security conference 2019, smartphone, tattoo, text messaging, the smiths, united states, venus, web browser, wheel, wi-fi, youtube
Michail Maniatakos
Associate Professor at New York University Abu Dhabi
Dimitrios Tychalas
Offensive Security Researcher at Intel Corporation
Vitaly Kamluk
Principal Security Researcher at Kaspersky Lab
Vandana Verma
Security Architect at IBM India Software Labs
app migration, appsec, asynchronous, audit, authentication, authorization, automation, belief, caching patterns, cgroups, christian louboutin, cloud computing, cloud computing security, cloud sidecar, clusters gitops, computer data storage, computer network, computer security, creativity, cybercrime, data lakes, distributed database, encryption, endpoint security, fintech, flagger , fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, gender, general data protection regulation, god, graalvm, graviton2, hacker, hdfs, health check, iam reliability, ibm cloud computing, ibm india, identity management, information security, infrastructure drift, internet of things, jumpstart, justice, kerala, key (cryptography), key management, kotlin, kubernetes , kubernetes cloud, life-cycle assessment, mentorship, microservice, millennials, mind, multi-cloud magic, multi-factor authentication, need for speed, opa, open liberty, open-source intelligence, operating system, owasp, pipelines ci/cd, poilcy-as-code, product lifecycle, psychology, public cloud, quarkus, risk management, security hacker, server (computing), serverless, single sign-on, social engineering (security), social exclusion, social media, space, telemetry, thought, transgender, understanding
Lidia Giuliano
Information Security Professional at Financial Servives
Jeff Wilson
Director, Market Intelligence at Palo Alto Networks
Ty Miller
Managing Director at Threat Intelligence Pty Ltd
Pamela O'Shea
Principal Security Consultant at Shea Security
Mika Devonshire
Cybersecurity Advisor at Blackpanda
Asuka Nakajima
Security Researcher at NTT
Seungjoo Kim
Professor of School of Cybersecurity at Korea University
Ashley Shen
Security Engineer, Threat Analysis Group at Google
Ryan Flores
Senior Manager at Trend Micro
Xena Olsen
Senior Cybersecurity Analyst at Financial Services Fortune 500
Xiaokun Huang
Software Engineer at Alibaba Cloud
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 16 17 18 ... 1197
481-510 of 35910