Chloé Messdaghi is the VP of Strategy at Point3 Security. She is a security researcher advocate who strongly believes that information security is a humanitarian issue. Besides her passion to keep people safe and empowered online & offline, she is driven to fight for hacker rights. She is the founder of WomenHackerz & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine's The Uncommon Journey, and runs the Hacker Book Club.
Princess of Thieves: Hacking Bank APIs by Example
Alissa Knight is a recovering hacker of 20 years, blending hacking with a unique style of written and visual content creation for challenger brands and market leaders in cybersecurity. Alissa is a cybersecurity influencer, content creator, and community manager that provides vendors go-to market and content strategy for telling brand stories at scale in cybersecurity. She achieves this through ideation to execution of content strategy, storytelling, and execution of influencer marketing campaigns that take decision makers through a brand’s custom curated journey to attract and retain them as long-term partners. Alissa is also a published author, having published the first book on hacking connected cars.
As a serial entrepreneur, Alissa has started and sold two cybersecurity companies to public companies in international markets and now sits as the Managing Partner of Knight Ink, a content marketing and community management company in cybersecurity and is also the group CEO of Brier & Thorn, a managed security service provider.
Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры
Allie Mellen has spent several years in cybersecurity and has been recognized globally for her security research. She has ten years of experience in various engineering, development, and consulting roles in the technology sector and has received a B.S. degree in Computer Engineering. Now, she writes about security and research at Cybereason. Over the past two years, Allie has helped organize and execute multiple election security tabletop exercises with participants from the FBI, Secret Service, Department of Homeland Security, and state law enforcement. In these sessions, it’s hackers versus law enforcement as an exercise in what attackers can do to disrupt Election Day and what the government is prepared to do - or should be prepared to do - to stop them.
Naked & Unafraid: The Basics of Securing Your Private Photos
Allie Barnes is San Antonio-born and raised, seasoned Linux/DevOps Engineer who began her career in 2012 at Rackspace. After learning “how to Linux” she quickly expanded her role to include helping manage the Rackspace Private Cloud, leveling up her career with several certifications along the way. In 2019, Infocyte recruited Allie as a Cloud Operations Engineer, specializing in cloud infrastructure management, security, and automation. Allie is a regular at industry conferences as a speaker and attendee, and enjoys contributing to the Linux and InfoSec communities. She’s also an active volunteer and CTO for BADASS ARMY—a nonprofit dedicated to supporting victims of abuse through education, advocacy, and legislation.
Trends for Security Researchers
Dr. Amit Elazari is a Director, Security and Trust Policy at Intel Corporation and a Lecturer at UC Berkeley’s School of Information Master in Information and Cybersecurity. She holds a Doctoral Degree in the Law (J.S.D.) from UC Berkeley School of Law and graduated summa cum laude three prior degrees. Her research in information security law and policy has appeared in leading technology law and computer science journals, presented at conferences such as RSA, Black Hat, USENIX Enigma, USENIX Security, BsidesLV, BsidesSF and DEF CON Villages, and featured at leading news sites such as The Wall Street Journal, The Washington Post and the New York Times. In 2018, she received a Center for Long Term Cybersecurity grant for her work on private ordering regulating information security, exploring safe harbors for security researchers. She practiced law in Israel.
You want to Kubernetes? You MUST know Containers!
Angel started his career as an US Air Force Space Systems Operations specialist in Cape Canaveral AF Station where he realized his passion for technology and software development. He has extensive experience in the private, public and military sectors and his technical experience includes military/space lift operations, technical writing, software development, SRE/DevOPs engineering. He also has a wealth of experience in defense and federal sectors such as contracting, information systems security and management.
You can usually find him speaking at or organizing local tech meetups and hackathons where he enjoys engaging with developers.
Angel’s passions are positive disruption, learning, teaching, mentoring but most of all inspiring all forms of technologists & building awesome tech communities.
Ayse Bilge Gunduz
Attacking Web Applications Business Logic & Authorization
Ayse is a Ph.D. candidate in Computer Science and passionate about cybersecurity and Data Science. Also, she writes blog posts, works as a volunteer in summer schools. In her free time, she does Muay Thai or Yoga, reads books, and travels around the world.
Hack Wifi Networks With Bettercap
Chantel is a lover of all things Offensive Security related. She is the Hack The Box: Chicago Ambassador. She is preparing to sit for the OSCP (Offensive Security Certified Professional). *Certified Penetration Tester & CompTIA Security+ holder.
Chantel is a certified penetration tester and is currently preparing to sit for the OSCP exam. When she is not (legally) breaking into boxes, she spends time with her wife and their cat named Frog. She also enjoys beautifying her backyard, being an Aunt and Godmother to 9 kiddos, walks in the park, motivating other women to enter the security field, and watching lots of Matt D’Avella youtube videos lol.
Security architect at OnezeroIT in the Netherlands, passionate about cooking, baking and
her cat Grace.
Red, Blue, EQ
Deidre Diamond has combined her 25 years of experience working in technology and staffing with her love for the cyber security community to create CyberSN, a company transforming the way cybersecurity professionals approach job searches. Deidre is also the Founder of Secure Diversity, a 501(c)3 non-profit organization dedicated to addressing the cybersecurity talent shortage.
Dr. Catherine J. Ullman
Incident Communications 101 - Breaking the Bad News
Dr. Catherine J. Ullman is a security researcher, speaker, and Senior Information Security Analyst at University at Buffalo with over 20 years of highly technical experience. In her current role, Cathy is a data forensics and incident response (DFIR) specialist, performing incident management, intrusion detection, investigative services, and personnel case resolution in a dynamic academic environment. She additionally builds security awareness amongst faculty and staff via a department-wide program which educates and informs users about how to prevent and detect social engineering threats, and how to compute and digitally communicate safely. Cathy has presented at several information security conferences including DEF CON and Hacker Halted. In her (minimal) spare time, she enjoys visiting her adopted two-toed sloth Flash at the Buffalo zoo, researching death and the dead, and learning more about hacking things to make the world a more secure place.
Outbreak! Virus vs. Virus: How We Can Apply Current Legislation and Handling of the COVID-19 Pandemic to the Spread of Malware
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She started her career in pharmaceutical development and regulatory compliance, and led specialized committees targeting Phase I, infectious diseases, and emergency research. She still serves on a board as a regulatory/genetic science consultant for NIH studies utilizing recombinant DNA, synthetic nucleic acid molecules and genetic engineering.
She moved to cybersecurity in 2018 and currently works as a Cloud Security Engineer in healthcare. She continues to pursue education through a graduate program in Advanced Computer Security at Stanford, and has recently obtained her Certified Human Trafficking Investigator and Certified Expert in Cyber Investigation designations through the McAfee Institute. She collaborates with a variety of law enforcement entities and task forces in order to use digital forensics and offensive security to combat trafficking and exploitation.
She has spoken at numerous national conferences on medical device security. Her continued areas of research include embedded/vehicle security, IoT vulnerabilities, and medical device security.
Gyle dela Cruz
Purple Thinking - How Adopting the Hacker Mindset has Helped me as a SOC Analyst
Gyle works as a Cyber Threat Analyst in a SOC team which are composed of mostly pen testers. She has embraced the purple team mindset after several months of working with this wonderful group of people. She shifted to tech from a psychology background and started doing tech support. She then moved into networking with the idea of specializing in security with a focus on digital forensics. Gyle got into a SOC role with a team of people who are pentesters and their practices and approach to security has helped her improve her skill set. She likes to share her journey with newbies in the field.
Hima Vejella Veeramachaneni
Digital Forensics - Adversary to Opportunities
Hima Bindu Veerarmachaneni – Co-Founder for WiCSP Women in Cyber Security and Privacy,. She won hackathons organized by NASSCOM & HYSEA Author, Speaker, Toastmaster, Security Evangelist with 17+ years of experience in the IT industry. She is currently working as Sr. Engineering Manager, Leading ‘EnCase™ Forensics’, eDiscovery and Security. She has implemented Entitlement Management Framework that supported all Fixed Income & equity ‘Capital Markets’ products of complex trading systems, built production environment with multiple auto fail overs to BCP with no outage for leading bank. She Motivated many professionals @ various global events on Security, Forensics and Cyber Security from virtual to real. She was recognized as Lady Legend, International Microsoft MVP Awardee for her voluntary exceptional community contributions in technology 8 times in a row. She is Global speaker at technical events and communities, MVP Summit, Tech-ED, Microsoft Innovation Summit, Virtual Tech Days & Community Tech Days both in person and virtual. She has been a Core member of Data Security Council of India (DSCI) , Hyderabad chapter,Author at PC Quest, Simple-Talk. She holds the Guinness Book – World Record for Microsoft APP Fest – Windows8 Hackathon. She was recognized as the governing body for Gudlavalleru Engineering College, invited as evaluator for Cyber Electrothon an APITA -AP State Government initiative. She is a Volunteer in Girls in Tech, Workaway.info and brand ambassador for DevOps institute. Hima is passionate about giving back to the community and Women in Computing.
Secure by Design: Usable Security Tooling
Hon is a security engineer who specializes in usable security. She started off her career in tech as a software engineer but recently pivoted to security after discovering a passion for digital safety. She is currently employed at Cruise where she builds security tooling. Outside of work she enjoys art, baking, and trying new things.
IoT Honeypots and taming Rogue appliances
Based in Pittsburgh and a natural creature of winter, you can typically find Kat sipping Grand Mayan Extra Anejo whilst simultaneously defending her systems using OSS, magic spells and Dancing Flamingos. Honeypots & Refrigerators are a few of her favorite things! Fun Fact: She rescues Feral Pop Tarts and has the only Pop Tart Sanctuary in the Pittsburgh area.
Hacking Emotions: Bypassing The Systems That Silence Your Voice at Work
Keirsten Brager is a Lead Security Engineer at a Fortune 500 power utility company and was recently named one of Dark Reading’s top women in security quietly changing the game. She is also the author Secure The InfoSec Bag: Six Figure Career Guide for Women in Security. She produced this resource to help women strategically plan their careers, diversify their incomes, and fire bad bosses. Keirsten holds a M.S. in Cybersecurity and several industry certifications, including Splunk & CISSP. As an active member of the Houston security community, Mrs. Brager has participated in a number of panels and public speaking engagements promoting strategies for success. In her free time, she loves sharing career advice, studying Black history, and convincing women not to quit the industry.
Setting up Malware Dissection Box
Khaula is a newbie trying to pave a new path for women alike so they don’t face the same challenges she had to for being accepted as a female Pentester, since very few female Pentesters are found in her locality. As a result of her curiosity and enthusiasm, she changed fields from Telecommunication to Information Security. Other than staring at black screens, I am a very social person and a tea monster.
Elizabeth (Liz) Wharton
Face/Off – Mask/On: Updating Plans for Perils & Privileges of Facial Recognition
Suchi is a data privacy and cybersecurity lawyer. She was supposed to be a doctor but instead wound up in law school arguing about the CFAA. After years of cybersecurity firefighting on behalf of clients at a law firm, Suchi is currently Director of Privacy and Business Affairs at Rally Health, Inc.
Elizabeth (Liz) Wharton is a technology-focused business and public policy attorney who has advised researchers, startups, and policymakers at the federal, state, and local level. She is the Chief of Staff at SCYTHE as well as a member of the Technology & Innovation Council with Business Executives for National Security and a member of the DEFCON CFP Review Board. In addition to serving as the former technology attorney for the World’s Busiest Airport, she also hosted the “Buzz Off with Lawyer Liz” podcast.
Challenges with penetration testing: Enterprises vs Hackers
Magda Chelly is a former Chief Information Security Officer. She has a Ph.D. in Telecommunication Engineering and is a Certified Information Systems Security Professional. Following 6 different countries, and her own entrepreneurial journey, she is currently leading the Cyber Risk Consulting Services in Asia for Marsh, based out of Singapore. Chelly has been supporting companies across the world as a vCISO during her career, building cyber security strategies, and technical roadmaps for continuously changing technological landscapes. She has been a keynote speaker for international conferences, and is recognized as an international influencer, globally.
Dotnet Model Fuzzing
Melissa Benua has worked in nearly every software development role—dev, test, DevOps, and program management—at companies big and small and somewhere in-between. She's created and run high availability, high-quality services for PlayFab, Bing, Cortana, and Xbox One, and now for mParticle's enormous data platform. Melissa discovered her love of massively-scaled systems while growing the Bing backend, where she honed the art of keeping highly-available complex systems up while undergoing significant code churn. Now a director of engineering with mParticle, she’s passionate not only about maximizing efficiency both in her product code and in her developer tools but also about sharing best practices among colleagues and the tech world at large.
Being The WoMan In the Middle (WITM) - Tips I've Learned for Keeping SecOps and BizOps speaking the same language.
Maggie is finishing up her masters in Computer Science at the University of Virginia. During her time at UVA she was co-founder and captain of the Cyber Offense team as well as captain of the Cyber Defense team. She has competed with her team at ISTS, CPTC, CCDC and many more. For the past year she has been interning for Randori and trying to figure out her place in infosec.
Hacking OAuth: Pitfalls and Remedies
Micah Silverman is a Senior Developer Advocate for Okta. With 25 years of Java Experience (yup, that’s from the beginning), he’s authored numerous articles, co-authored a Java EE book and spoken at many conferences. He’s a maker, who’s built full size MAME arcade cabinets and repaired old electronic games. He brings his love of all things Java and Developer Evangelism to a
conference near you!
Miki Demeter aka 0r3g0nV1x3n
Choosing More Secure Open Source Packages:
Lessons from the Real World
Miki is a writer and Public Speaker for technical subjects, as well as, Diversity & Inclusion and other social subjects. Her passion lies with advocating for underrepresented communities in Tech. Her career has encompassed everything from firmware to application space. She has worked with teams providing full stack development. Her last 8 years have had Security focus as the Security Champion for the Open Source Technology Center @ Intel. Her current position as a Security Researcher and a Product Security Expert for Open Source Software. She is a TrevorChat Crisis Counselor and working with outside organizations like Women Who Code, Women of Security, Portland Women in Tech (PDXWIT Speaker of the year 2019), and the Diana Initiative to help drive diversity and true inclusion while advocating for women in the STEM field.
What it is like to be an ADHD mom in cybersecurity during a global pandemic and what it means to you
Jennifer has been an information security professional for the past 20 years and is currently a Security Intelligence Analyst and Innovation Lead. Her experience includes reverse engineering malware, penetration testing, vulnerability analysis, threat intelligence, and incident response. She is currently pursuing her doctorate degree in computer science with a specialization in cybersecurity. Her current research encompasses quantum computing and machine learning applications in securing cyber-physical systems. She is an active member of the biohacking community, teaches piano, and has several patents filed with the USPTO. She is an avid fan of the Detroit Tigers, William Shakespeare, and the oxford comma. She is very grateful you are here.
Securing your code with CodeQL
Sasha is a Product Manager at GitHub, focused on helping engineers be successful with using GitHub for work as well as for open source.
In her career, Sasha has worked in development, operations, consulting, and cloud architecture. Sasha is a chair of DeliveryConf, an organizer of DevOpsDays Chicago, and a published author.
Cloud Security Automation: Don’t giveaway Low hanging fruits to Cyber Criminals
Sapna Singh is a cybersecurity professional with more than 10 years of experience in the cybersecurity domain. She comes with a background where she worked as SME for critical incidents investigations, forensics, vulnerability assessment, penetrations testing and cloud security assessments for various organizations. She has given talks at various global conferences i.e. RSA Conference, Dianainitiative, SANS Summit and Lehack. She is technical stream lead for “Women in Cyber Security Middle East” group and co-organizer for Kuwait affiliate of WiCSME group, working to empower and mentor women in cybersecurity domain. She is driving online and physical knowledge sharing sessions for students and professionals across Middle East countries. She is Deloitte Women in Cyber Leader and W-CS (ISSA India) core team member.
Purple is the new black: Modern Approaches to Application Security
Tanya Janca, also known as ‘SheHacksPurple’, is the founder, security trainer and coach of SheHacksPurple.dev, specializing in software and cloud security. Her obsession with securing software runs deep, from starting her company, to running her own OWASP chapter for 4 years in Ottawa, co-founding a new OWASP chapter in Victoria, and co-founding the OWASP DevSlop open-source and education project. With her countless blog articles, workshops and talks, her focus is clear. Tanya is also an advocate for diversity and inclusion, co-founding the international women’s organization WoSEC, starting the online #CyberMentoringMonday initiative, and personally mentoring, advocating for and enabling countless other women in her field. As a professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.
Staying motivated: The story of a wannabe white hat hacker
A PhD student in cybersecurity with a BSc in Computer Science that wants to become a white hat hacker. I like trying new things, and am a tea lover.
How to Keep Kickass Women - Take a Lesson from Snowboarding
Toni (she/her) is a snowboarder turned software engineer turned security consultant. She won a few scholarships in her quest to get more women into tech and she is really good at supporting others to do ‘all the things’. She is a firm believer in ‘you need to see it to be it’ and she puts herself out there so others will step up and challenge the status quo.
Initiating an AppSec Program with OWASP Projects
Vandana Verma is a seasoned security professional with over 14 years of experience ranging from application security to infrastructure and now dealing with Product Security. She has been Keynote speaker / Speaker / Trainer at various public events ranging from Global OWASP AppSec events to BlackHat events to regional events like BSides events in India.
She is part of the OWASP Global board of directors. She also works in various community towards diversity initiatives InfosecGirls, WoSec and null.
She has been recipient of multiple prestigious awards like Global cybersecurity influencer among IFSEC Global's "Top Influencers in Security and Fire" Category for 2019, Cybersecurity Women of the year award by Women Cyberjutsu Society in the Category “Secure Coder”. She has also been listed as one of the top women leaders in this field of technology and cybersecurity in India by Instasafe.
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
Xena Olsen is a threat intelligence analyst in the financial services industry. A graduate of SANS Women’s Academy with 7 GIAC certifications, an MBA IT Management, and a doctoral student in Cybersecurity at Marymount University.
Thank you to all of the speakers!