Ali Abdollahi a Network and Information security consultant with over 8 years of experience working in a variety of security fields. Currently the cyber security division manager, Board of review at Hakin9, Pentest & eForensic magazine and instructor at eForensic magazine. Ali is a self-confessed bug hunter, publisher of many vulnerabilities and CVEs and author of two books and some articles in field of cyber security.
Asuka Nakajima is a researcher at the NTT Secure Platform Laboratories. She studied at the Faculty of Environment and Information Studies at the Keio University. Her research interests include reverse engineering, vulnerability discovery, and IoT security. Since 2014, she has been a member of the executive committee of SECCON (SECurity CONtest, the largest CTF organizer in Japan). She is also a founder of “CTF for GIRLS”, the first security community for women in Japan.
She has presented at various security conferences and events including BlackHatUSA 2019, PHDays VI, AsiaCCS 2019, and AIS3(Advanced Information Security Summer School in Taiwan). Asuka also serves as a Review Board member for Black Hat Asia 2018/2019, and BlueHat Shanghai 2019. She is also an author of the best seller book called "Cyber Attack" in Japan. (Bluebacks, 2018)
Arun is a Founder and Director of Amynasec labs company which is specialized in Vehicle/Iot/ICS and he also Hardware, IOT and ICS Security Researcher. His areas of interest are Hardware Security, SCADA, Automotive security, Fault Injection, RF protocols and Firmware Reverse Engineering. He also has experience in performing Security Audits for both Government and private clients. He has presented a talk at the nullcon 2016,2017,2018 Goa, GNUnify 2017, Defcamp 2017, 2018 Romania, BsidesDelhi 2017, c0c0n x 2017, EFY 2018, x33fcon2018, BlackHat USA 2018, Defcon USA 2018, OWASP Seasides 2019 Goa. Also Trainer for Practical Industrial Control Systems (ICS) hacking training, delivered in x33fcon2018,2019, HIP 2018 and also delivered training for IoT hacking in HITB 2017, HIP 2017, BlackHat Asia 2018 and private clients in London, Australia, Sweden, Netherlands etc. He is an active member of null open community.
Bletchley Chen is currently a senior researcher in Cycraft. His research focuses on network attack and defense, machine learning, software vulnerability, malware and program analysis. He earned his PHD degree of Computer Science and Engineering from National Chiao-Tung University (NCTU). He also dedicates to security education. Founding of NCTU hacker research clubs, he trains students to participate world-class security contests, and has experience of participating DEFCON CTF. Besides, he has presented technical presentations in non-academic technique conferences, such as HITCON and VXCON. As an active member in Taiwan security community, he is in the review committee of HITCON conference (Vice Chief in 2019 HITCON CMT), and member of CHROOT - the top private hacker group in Taiwan. He organized BambooFox Team to join some bug bounty projects and discover CVEs in COTS software and several vulnerabilities in campus websites.
Syue-Siang Su (Boik Su) has four-year experience in Web Security and actively using OSS to create or manage tools for his research in the field. He has not only devoted himself to research but also received some awards from CTFs, been the speaker at AVTokyo 2017 and 2018, Taiwan Modern Web 2017, OSCON 2018, and the lecturer at HITCON Training and National Center for Cyber Security Technology in Taiwan.
Christopher Elisan Christopher Elisan, Director of Intelligence at Flashpoint, is a seasoned Reverse Engineer, Malware Researcher and published Author. He speaks at conferences around the world and frequently provides expert opinion about malware, botnets and advance persistent threats for leading industry and mainstream publications. Elisan’s published works include Hacking Exposed: Malware and Rootkits, 2 ed.
Inndy Lin is a researcher in Cycraft, mainly focuses on malware reversing and supporting advanced malware research. He is also an active member in Taiwan student community, who delivered many technique talks in HITCON, SITCON and TDOH. As a leader of Security Club in National Taiwan University of Science and Technology, He also acted as TA in AIS3, which is the largest student infused training project.
Jeswin Mathai is a Researcher at Pentester Academy and Attack Defense. He has presented/published his work at DEF CON China, Blackhat Arsenal and Demo labs (DEFCON). He has a Bachelor's degree from IIIT Bhubaneswar. He was the team lead at InfoSec Society IIIT Bhubaneswar in association with CDAC and ISEA, which performed security auditing of government portals, conducted awareness workshops for government institutions. He was also the part of team Pied Piper who won Smart India Hackathon 2017, a national level competition organized by GoI. His area of interest includes Malware Analysis and Reverse Engineering, Cryptography, WiFi security and Web Application Security.
I am currently working as a Security Researcher at Adobe. I previously worked at Rocket Fuel as an Application Security Engineer where I was mangaging the security programme for the company. I was responsible for building security processes, managing the bug bounty program and security vendors, working with legal for compliance and strengthening the security posture of the organization. I completed my under graduation in Computer Science and pursued my Masters in Security Informatics from Johns Hopkins University. I enjoy coding and I have developed open source tools like pwdfly, Expunger.
Nikhil is an Automotive expert in Safety and Security. His areas of interest are ECU security, CAN, LIN Network Security. He also has experience in Security Design, Implementation in Automotive products. He has 13 years of experience in Automotive product development. In his tenure, he worked with Hella, Tata Elxsi, Continental for many Car manufacturer BMW, Honda, VW. Currently, He is working with Lear Corporation. He also delivered a workshop at OWASP Seasides 2019 Goa on CAR Hacking.
Nishant Sharma is a R&D Manager at Pentester Academy and Attack Defense. He is also the Architect at Hacker Arsenal where he leads the development of multiple gadgets for WiFi pentesting such as WiMonitor, WiNX and WiMini. He also handles technical content creation and moderation for Pentester Academy TV. He has 6+ years of experience in information security field including 4+ years in WiFi security research and development. He has presented/published his work at Blackhat USA/Asia, DEF CON China, Wireless Village, IoT village and Demo labs (DEFCON USA). Prior to joining Pentester Academy, he worked as a firmware developer at Mojo Networks where he contributed in developing new features for the enterprise-grade WiFi APs and maintaining the state of art WiFi Intrusion Prevention System (WIPS). He has a Master's degree in Information Security from IIIT Delhi. He has also published peer-reviewed academic research on HMAC security. His areas of interest include WiFi and IoT security, AD security, Forensics and Cryptography.
Magda Lilia Chelly
Magda Lilia Chelly is a CISO On Demand. She reviews technical architectures, cloud migrations, and digital transformations. She has a PhD and a CISSP. Magda is known for hacking passion in her spare time. With her expertise, and technical background provides a 360 degrees cyber security support for companies; from governance to incident management, she coordinates and builds resilient businesses. Magda' latest two projects covered the roles of an ISO Lead Implementer for a Fortune 500 and a business information security officer role for a MAS regulated Fortune 500 company covering 13 countries in Asia Pacific.
Shivam Bathla is a Security Researcher at Pentester Academy and Attack Defense. He has a Bachelor's degree from NIT Delhi. He secured 5th rank in GCCS Peace-a-thon Contest. His area of interest includes Malware Analysis and Reverse Engineering, Cryptography, WiFi security, Forensics and Web Application Security. He also has experience in Linux Kernel Exploitation.
Soya Aoyama is a security researcher at Fujitsu System Integration Laboratories Limited. Soya has been working for Fujitsu for more than 20 years as a Windows software developer, and had been developing NDIS drivers, Bluetooth profiles, Winsock applications, and more. About four years ago, soya started security research, and has gave presentation in BSidesLV, GrrCON, ToorCon, DerbyCon and HackMiami in the past. Soya is also the organizer of BSides Tokyo.
Viral is a dedicated Principal Security Consultant and a Penetration Tester at Threat Intelligence Pty Ltd in Australia with over 7 years of experience in information security and management. Prior to joining Threat Intelligence, he held senior positions at KPMG and Ernst & Young. He has provided security consulting services including infrastructure (internal - external), application penetration testing, vulnerability assessments, wireless penetration testing, social engineering, red team engagements, API testing, Thick & Thin client testing and cloud architecture security reviews to numerous clients across various industries in the APAC region. He was involved with the RISC (RMIT Information Security Collective) Club while at University and worked as a developer for firewall security at Biarri Networks where he developed a visualisation algorithm to solve the issue of firewall rules management. He has participated in number of bug bounty programs and won awards for responsible disclosure of security vulnerabilities in web and mobile applications from companies such as Adobe, Apple, Google Chromium, IBM, C2FO, Blinksale, Appfog, TEDmed and many more. In his leisure time, he enjoys developing security tools and maintains number of projects on the Github. He has achieved industry certifications such as Offensive Security Certified Professional (OSCP) and SANS GPEN - Network Penetration Testing.
Vishal Chauhan is a Security Engineering Lead in the Microsoft Security Response Center (MSRC) team. All his time at Microsoft, he has delved into everything security from Systems to Web and anything in between. Lately he has been exploring various facets of cloud and web security.