Independent cyber security researcher @ back.engineering. Interested in all things low level: hypervisors, bootkits, pcie firmware, software protectors etc. I will be presenting my VMProtect 2 research here at ROOTCON.
An experienced python developer and student by day & offensive security researcher by night. I love to make tools focused on offensive security, and I love to tinker around web exploitation & reverse engineering.Currently a part of AX1AL reverse engineering community.
Chimmy Arian Hilis is a Software Security Engineer working for Emerson's PSS Technology Group. Her current role led to her interest in looking for solutions to further secure Industrial Control Systems as they transition to Industry 4.0. Her past work as an application security tester for Micro Focus Fortify (formerly known as HP), and as a member of the Vulnerability Management Team for a telco and an oil & gas company greatly contributed to her desire in helping developers build applications with security in mind. She is a self-confessed Swiftie.
Chloé Messdaghi is an award-winning changemaker who is innovating tech and information security sectors to meet today and future demands by accelerating startups and providing solutions that empower organizations and people to stand out from the crowd. She is an international keynote speaker at major information security and tech conferences and events, and serves as a trusted source to reporters and editors, such as Forbes and Business Insider. Additionally, she is one of the Business Insider’s 50 Power Players. Outside of her work, she is the co-founder of Hacking is NOT a Crime and We Open Tech. Learn more: https://www.standoutintech.com
Emil has experience in many cybersecurity trades —including R&D, cybersecurity operations, governance, policies and regulations, and consultancy. Emil is an active contributor in the cybersecurity ecosystem. He plays an active role in catalysing cybersecurity conversations and thought leadership in the community. Amongst many things, he co-founded Division Zero (Div0) —a cybersecurity community group in Singapore—, and Infosec In the City, SINCON —a techno-centric cybersecurity conference. Emil is also often found speaking under various spotlights —including 44CON, Black Hat Asia, BSides London, Hack In the Box (HITB) Singapore, The Honeynet Project Workshop, and at universities and many various cybersecurity plenaries.
Eric is a Cyber Security professional who has been working as a TI Analyst focused on CTI Collection, OSINT, HUMINT, Criminal Underground monitoring and tools development and automation. After working at iSight Partners and FireEye, he joined the Fox-IT InTELL team in The Netherlands. He is also the founder of Rightsec, a cyber security solutions and services provider based in Manila, Philippines.
I’ve been working Principal Security Engineer and Security Researcher at Talkdesk and Security Researcher and Instructor at Hacker Security…I’m Hacking is NOT crime Advocate. I’m part of the Staff team of DEFCON Group São Paulo-Brazil, International Speakers in Security and New technologies events in many countries such as US, Canada, Germany, Poland and others, I’ve been served as University Professor in Graduation and MBA courses at brazilian colleges, in addition, I'm Creator and Instructor of the Course Malware Attack Types with Kill Chain Methodology (PentestMagazine) and Malware Analysis - Fundamentals (HackerSec Company).
Harshit Agrawal is currently working as a Radio Security Researcher. He is enthusiastic about SIGINT, Drone Pentesting, and IoT Security. He presented his research at International Security conferences like RSAC USA, DEFCON, HITB Cyberweek, HITB Amsterdam, etc. Previously, he was President at CSI Chapter and Vice President for Entrepreneurship cell at MIT, where he also headed the team of security enthusiasts, giving him a good insight into cybersecurity and increased his thirst to explore more in this field. Learn more: https://www.linkedin.com/in/harshitnic/
A child of a Pastor & School Teacher, IJ is an Information Security Professional with ~6 years of experience in the field. He specializes in Vulnerability Assessment & Penetration Testing (VAPT) primarily focusing on Host, Web & Mobile Assessments as a member of the Synack Red Team & with his current employer. He is also skilled in Digital Forensics & Incident Response (DFIR), having handled multiple incidents in his previous employments & testifying as an expert witness in a case involving Computer-related Grave Threats & Unjust Vexation. Albeit in a long hiatus, he occasionally plays CTFs with hackstreetboys & TheManyHatsClub CTF Team. Recently, he's taken a bit of interest in Web Development & Graphics Design to help with the ministry started by his parents.
Juan Karlo Licudine is currently employed as a Cyber Security Engineer where he uses his programming and technical skills in helping companies protect themselves from cyber threats. In his free time, he works on cybersecurity-related programming projects like malware analysis tools and remote access tools. He jumps between the red or blue camps depending on which project currently interests him.
Kamel Ghali is a veteran of the automotive cybersecurity community, having spent over 3 years as an expert car hacker, technical trainer, and contributor to worldwide industry-focused communities such as the SAE, ASRG, and the Car Hacking Village. His particular areas of focus within vehicle security are IVN, Bluetooth, RF, and in-vehicle networks. He currently works at White Motion – subsidiary of the global automotive supplier Marelli – where he leads the vehicle security research team, assessing vehicle systems and training customers in state-of-the-art car-hacking techniques. He has presented at numerous security conferences and communities including DefCON, ASRG, GRIMMCon, and more – sharing his automotive security expertise with audiences of every background.
A programmer in JS , C# and student by day & security researcher & ROM maintainer for Raphael, Raphaelin by night. I love to build custom ROMs as my hobby and breaking android applications, Currently a part of AX1AL reverse engineering community.
I had a genuine interest in offensive security ever since the first years of university. Amazed with the exciting and original assignments for the relevant course, it wasn't long before I landed my first job in the infosec industry, which brought me to sunny Cyprus, where I learned a lot, attended conferences and earned certifications. Nowadays, I live in the fascinating, though less sunny city of Manchester in the UK, working as a security consultant at F-Secure, which I followed and admired from the MWR years. Beyond helping clients globally keep their web, mobile and network infrastructure safe, this position has also allowed me to perform lots of research, which resulted in several CVEs for well known products by companies like Cisco and Xiaomi.
Lloyd Kenneth Tugbo works for Emerson's PSS Technology group as a Software Security Engineer, where he leads on researching and implementing security needs in hybrid technologies such as Distributed Control Systems and SCADA.
He is a former resource speaker and college instructor with a passion for Automation, Instrumentation and Control, and Systems Security. A SAFe Certified Architect with a granted US Patent [11,042,147] related to Blockchain, which is the technology he is now focusing on. Khen (his nickname) is also an online gamer wannabe! :)
Luis Ángel Ramírez Mendoza (@larm182luis) is a colombian electronic engineer, hacker and speaker. He spoke at DragonJAR Colombia (Biggest hacking spanish speaking conference in LATAM), DEF CON Las Vegas, GrayHat USA and P0SCon Iran.
Mauro Eldritch is an Argentine Hacker & Speaker, Founder of BCA and DC5411.
He was a Speaker at DEF CON (six times!), ROADSEC (LATAM’s biggest security conference), DEVFEST Siberia, DragonJAR Colombia (biggest spanish-speaking conference in LATAM), P0SCON Iran, Texas Cyber Summit and EC-Council Hacker Halted among other conferences (25+).
Mazin Ahmed is a security engineer that specializes in AppSec and offensive security. He is passionate about information security and has previously found vulnerabilities in Facebook, Twitter, Linkedin, and Oracle to name a few. Mazin is the developer of several popular open-source security tools that have been integrated into security testing frameworks and distributions.
Mazin also built FullHunt.io, the next-generation continuous attack surface security platform. He’s is also passionate about cloud security where he has been running dozens of experiments in the cloud security world.
Nafiez (@zeifan) is an independent security researcher, enthusiast with memory corruption and found dozens of security vulnerabilities in various applications from open to closed source. He has passion in vulnerability research, fuzzing and reverse engineering. Occasionally blog about his security findings in http://zeifan.my. Nafiez has been part of HITB organizing international Capture The Flag (CTF) events and local (Malaysia) CTF, Wargames.MY.
Rizan is a passionate information security professional with more than 20 years of experience. He loves anything Linux or open-sourced. He had spent over 13 years securing one of the largest oil and gas company in the world from cyber threats. He holds several industry relevant certifications including OSCP, OSCE, OSWE, CISSP & CREST CRT. He had reported security bugs to the US Department of Defense (US DoD), Spotify, Amazon, General Motors, Toyota, Alibaba, Airbnb, Dell, Starbucks & Rockstar Games.
Rizan was also part of a cyber security surveillance group supporting law enforcement agencies globally in the area of lawful interception for mobile and desktop technologies. Prior to his current assignment, he worked at Telenor as a Cyber Security Advisor specializing in offensive security. He has conducted dozens of on-site and remote penetration tests in Sweden, Finland, Thailand, Bangladesh, Malaysia and Myanmar.
Sheng-Hao Ma (aaaddress1) has over 10-year experience in reverse engineering, machine language, and Intel 8086. He has published articles about Windows vulnerability, and Reverse Engineering analysis, and was invited as a guest speaker at Black Hat, DEFCON, HITB, HITCON (Hackers In Taiwan Conference), VXCON, CYBERSEC events, and more. On top of all this, Sheng-Hao Ma is a core member of CHROOT Security Group in Taiwan and is an instructor of HITCON, Ministry of National Defense, and Ministry of Education for Windows Exploit and Malware Analysis.
Low level programmer, undergrad student by day & malware reversing guy by night . Founder & currently leading AX1AL a reverse engineering community.
Vandana is a Security Relations leader at Snyk with current focus on DevSecOps. In her previous experience, she has dealt with Application security, Vulnerability management, SOC, Infrastructure security and Cloud Security.
She is a seasoned speaker / Trainer and presented at various public events ranging from Global OWASP AppSec events to BlackHat events to regional events like BSides events in India. She is part of the OWASP Global board of directors (Vice - Chair). She also works in various communities towards diversity initiatives InfosecGirls, InfosecKids and WoSec .
Vandana is a member of the Black Hat Asia Review Board as well as multiple other conferences including Grace Hopper India, OWASP AppSec USA to name a few. She is also one of the organisers of BSides Delhi.
She has been the recipient of multiple prestigious awards like Resilient CISO award by Dynamic CISO, Cyber Security Woman of the Year Award 2020 by Cyber Sec Awards, Application Security Influencer 2020 by Whitesource to name a few. She has also been listed as one of the top women leaders in this field of technology and cybersecurity in India by Instasafe.