Ali Abdollahi a Network and Information security consultant with over 8 years of experience working in a variety of security fields. Currently the cyber security division manager, Board of review at Hakin9, Pentest & eForensic magazine and instructor at eForensic magazine. Ali is a self-confessed bug hunter, publisher of many vulnerabilities and CVEs and author of two books and some articles in field of cyber security.
Asuka Nakajima is a researcher at the NTT Secure Platform Laboratories. She studied at the Faculty of Environment and Information Studies at the Keio University. Her research interests include reverse engineering, vulnerability discovery, and IoT security. Since 2014, she has been a member of the executive committee of SECCON (SECurity CONtest, the largest CTF organizer in Japan). She is also a founder of “CTF for GIRLS”, the first security community for women in Japan.
She has presented at various security conferences and events including BlackHatUSA 2019, PHDays VI, AsiaCCS 2019, and AIS3(Advanced Information Security Summer School in Taiwan). Asuka also serves as a Review Board member for Black Hat Asia 2018/2019, and BlueHat Shanghai 2019. She is also an author of the best seller book called "Cyber Attack" in Japan. (Bluebacks, 2018)
Arun is a Founder and Director of Amynasec labs company which is specialized in Vehicle/Iot/ICS and he also Hardware, IOT and ICS Security Researcher. His areas of interest are Hardware Security, SCADA, Automotive security, Fault Injection, RF protocols and Firmware Reverse Engineering. He also has experience in performing Security Audits for both Government and private clients. He has presented a talk at the nullcon 2016,2017,2018 Goa, GNUnify 2017, Defcamp 2017, 2018 Romania, BsidesDelhi 2017, c0c0n x 2017, EFY 2018, x33fcon2018, BlackHat USA 2018, Defcon USA 2018, OWASP Seasides 2019 Goa. Also Trainer for Practical Industrial Control Systems (ICS) hacking training, delivered in x33fcon2018,2019, HIP 2018 and also delivered training for IoT hacking in HITB 2017, HIP 2017, BlackHat Asia 2018 and private clients in London, Australia, Sweden, Netherlands etc. He is an active member of null open community.
Bletchley Chen is currently a senior researcher in Cycraft. His research focuses on network attack and defense, machine learning, software vulnerability, malware and program analysis. He earned his PHD degree of Computer Science and Engineering from National Chiao-Tung University (NCTU). He also dedicates to security education. Founding of NCTU hacker research clubs, he trains students to participate world-class security contests, and has experience of participating DEFCON CTF. Besides, he has presented technical presentations in non-academic technique conferences, such as HITCON and VXCON. As an active member in Taiwan security community, he is in the review committee of HITCON conference (Vice Chief in 2019 HITCON CMT), and member of CHROOT - the top private hacker group in Taiwan. He organized BambooFox Team to join some bug bounty projects and discover CVEs in COTS software and several vulnerabilities in campus websites.
Inndy Lin is a researcher in Cycraft, mainly focuses on malware reversing and supporting advanced malware research. He is also an active member in Taiwan student community, who delivered many technique talks in HITCON, SITCON and TDOH. As a leader of Security Club in National Taiwan University of Science and Technology, He also acted as TA in AIS3, which is the largest student infused training project.
Jeswin Mathai is a Researcher at Pentester Academy and Attack Defense. He has presented/published his work at DEF CON China, Blackhat Arsenal and Demo labs (DEFCON). He has a Bachelor's degree from IIIT Bhubaneswar. He was the team lead at InfoSec Society IIIT Bhubaneswar in association with CDAC and ISEA, which performed security auditing of government portals, conducted awareness workshops for government institutions. He was also the part of team Pied Piper who won Smart India Hackathon 2017, a national level competition organized by GoI. His area of interest includes Malware Analysis and Reverse Engineering, Cryptography, WiFi security and Web Application Security.
Joe McCray is a US Air Force Veteran and has been in the IT Security field for over 15 years. He has worked extensively with the medical community, the financial industry, retail, the federal sector, the Department of Defense, 3-letter agencies, and several foreign governments. His technical background is very broad with over 20 industry certifications and experience covering networks, web applications, binary applications, mobile applications and his expertise is in bypassing IT Security Systems.
Jay Rosenberg is a Senior Security Researcher on the GReAT team at Kaspersky Lab. Before joining Kaspersky, he led the research at Intezer Labs. From the tender age of 12, he began programming and reverse engineering. He has spoken at various conferences around the world, identified new threats, and published his threat intelligence research on some of the largest cyberattacks.
Nikhil is an Automotive expert in Safety and Security. His areas of interest are ECU security, CAN, LIN Network Security. He also has experience in Security Design, Implementation in Automotive products. He has 13 years of experience in Automotive product development. In his tenure, he worked with Hella, Tata Elxsi, Continental for many Car manufacturer BMW, Honda, VW. Currently, He is working with Lear Corporation. He also delivered a workshop at OWASP Seasides 2019 Goa on CAR Hacking.
Nishant Sharma is a R&D Manager at Pentester Academy and Attack Defense. He is also the Architect at Hacker Arsenal where he leads the development of multiple gadgets for WiFi pentesting such as WiMonitor, WiNX and WiMini. He also handles technical content creation and moderation for Pentester Academy TV. He has 6+ years of experience in information security field including 4+ years in WiFi security research and development. He has presented/published his work at Blackhat USA/Asia, DEF CON China, Wireless Village, IoT village and Demo labs (DEFCON USA). Prior to joining Pentester Academy, he worked as a firmware developer at Mojo Networks where he contributed in developing new features for the enterprise-grade WiFi APs and maintaining the state of art WiFi Intrusion Prevention System (WIPS). He has a Master's degree in Information Security from IIIT Delhi. He has also published peer-reviewed academic research on HMAC security. His areas of interest include WiFi and IoT security, AD security, Forensics and Cryptography.
Magda Lilia Chelly
Magda Lilia Chelly is a CISO On Demand. She reviews technical architectures, cloud migrations, and digital transformations. She has a PhD and a CISSP. Magda is known for hacking passion in her spare time. With her expertise, and technical background provides a 360 degrees cyber security support for companies; from governance to incident management, she coordinates and builds resilient businesses. Magda' latest two projects covered the roles of an ISO Lead Implementer for a Fortune 500 and a business information security officer role for a MAS regulated Fortune 500 company covering 13 countries in Asia Pacific.
Redsand aka Tim Shelton
Tim Shelton is the founder and Chief Technology Officer of HAWK. In his role, Mr. Shelton is responsible for the overall product strategy and integration strategies of the company. Mr. Shelton is a heavily experienced IT Security practitioner having served in such roles with several companies, most notably ACS(Xerox). While at ACS, Mr. Shelton was recognized as one the thought leaders in developing the security service delivery models and back end processes. Tim has been a critical visionary for the company's technology and sales (go-to-market) strategies.
Mr. Shelton is widely recognized in the industry as an expert on 0 Day exploits and countermeasures to defend against them. He is a frequent speaker at Black Hat and other security focused events. Mr. Shelton attended Dallas Baptist University's School of Computer Science.
Shivam Bathla is a Security Researcher at Pentester Academy and Attack Defense. He has a Bachelor's degree from NIT Delhi. He secured 5th rank in GCCS Peace-a-thon Contest. His area of interest includes Malware Analysis and Reverse Engineering, Cryptography, WiFi security, Forensics and Web Application Security. He also has experience in Linux Kernel Exploitation.
Soya Aoyama is a security researcher at Fujitsu System Integration Laboratories Limited. Soya has been working for Fujitsu for more than 20 years as a Windows software developer, and had been developing NDIS drivers, Bluetooth profiles, Winsock applications, and more. About four years ago, soya started security research, and has gave presentation in BSidesLV, GrrCON, ToorCon, DerbyCon and HackMiami in the past. Soya is also the organizer of BSides Tokyo.
Viral is a dedicated Principal Security Consultant and a Penetration Tester at Threat Intelligence Pty Ltd in Australia with over 7 years of experience in information security and management. Prior to joining Threat Intelligence, he held senior positions at KPMG and Ernst & Young. He has provided security consulting services including infrastructure (internal - external), application penetration testing, vulnerability assessments, wireless penetration testing, social engineering, red team engagements, API testing, Thick & Thin client testing and cloud architecture security reviews to numerous clients across various industries in the APAC region. He was involved with the RISC (RMIT Information Security Collective) Club while at University and worked as a developer for firewall security at Biarri Networks where he developed a visualisation algorithm to solve the issue of firewall rules management. He has participated in number of bug bounty programs and won awards for responsible disclosure of security vulnerabilities in web and mobile applications from companies such as Adobe, Apple, Google Chromium, IBM, C2FO, Blinksale, Appfog, TEDmed and many more. In his leisure time, he enjoys developing security tools and maintains number of projects on the Github. He has achieved industry certifications such as Offensive Security Certified Professional (OSCP) and SANS GPEN - Network Penetration Testing.
Vishal Chauhan is a Security Engineering Lead in the Microsoft Security Response Center (MSRC) team. All his time at Microsoft, he has delved into everything security from Systems to Web and anything in between. Lately he has been exploring various facets of cloud and web security.