Aaron Aubrey Ng serves as Strategic Threat Advisor at Crowdstrike. He is responsible for CrowdStrike’s Threat Intelligence business across Asia-Pacific and the Middle East & North Africa regions. Aaron focuses on helping customers operationalise and integrate threat intelligence within their organisation's cybersecurity strategy. Additionally, he represents the Crowdstrike Intelligence ecosystem and frequently speaks at Security Conferences, sharing insights into the latest threat trends and developments.
Aaron got his start in Security and Threat Intelligence in the Singapore Armed Forces as a Military Intelligence Officer. He concluded 12 years of Active Duty in 2019 and has served in multiple Command Appointments in classified Intelligence Units, and garnered staff experience in the areas of Strategic Planning and Policy Development. In his penultimate tour of duty, Aaron was instrumental in establishing the Defence Cyber Organisation (DCO), which is akin to Singapore’s Cyber Command.
Aden is a penetration tester with BAE Systems based in Malaysia and has 6 years of experience in the field of Cybersecurity. He is responsible for delivering red teaming exercise and various penetration testing for numerous industries and reported critical vulnerabilities in their application and infrastructure. He holds CRTO, OSCP, CREST-CRT, CEH and industry certifications. Apart from projects, He also contributed in bug bounty program for health and financial industries and vulnerability research program for internet spaces.
With more than 20 years of experience in ransomware and information security, Allan Liska has improved countless organizations’ security posture using more effective intelligence. Liska provides ransomware-related counsel and key recommendations to major global corporations and government agencies, sitting on national ransomware task forces and speaking at global conferences. Liska has worked as both a security practitioner and an ethical hacker at Symantec, iSIGHT Partners, FireEye, and Recorded Future. Regularly cited in The Washington Post, Bloomberg, The New York Times, and NBC News, he is a leading voice in ransomware and intelligence security. Liska has authored numerous books including “The Practice of Network Security, Building an Intelligence-Led Security Program;” “Securing NTP: A Quickstart Guide;” “Ransomware: Defending Against Digital Extortion;” “DNS Security: Defending the Domain Name System;” and “Ransomware: Understand.Prevent.Recover.”
A purple teamer in the making, Ariz (also known as ar33zy) is an Information Security Professional with 5 years of experience in the field and is currently leading the Red Team Operations at THEOS Cyber Solutions. Before transitioning as a full-time penetration tester and red teamer, he worked as a SOC Analyst and Incident Responder where he gained and developed his skills in Threat Hunting and DFIR. Currently, he is holding multiple certifications such as GCDA, CRTP, CRTE, CRTO, OSCP, and OSEP.
He is also a member of hackstreetboys, a Filipino CTF team competing in different events such as ROOTCON CTF and DEFCON Red Team/Blue Team Village CTFs.
I am an information security researcher working at Microsoft and earlier built complete end-to-end information security in a couple of startups. I love to break application logic and find vulnerabilities in them, which have been - acknowledged by various MNCs like Google, Yahoo, NASA, Vmware, MongoDB, and other top companies. I am also an active blogger where I write about interesting vulnerabilities, data privacy issues, and everything security. Some of my articles and interviews have been published in various news media like Forbes, BBC, Techcrunch, Economic times, Huffingtonpost, Hindustan times, ZDNet, Hakin9, Hackerone, etc. I am also a cybersecurity speaker, love to share my views on various infosec threads.
I'm a student at the University of Massachusetts Dartmouth and am a cybersecurity enthusiast. Currently the Social Chair at the Cybersecurity Education Club @ UMass Dartmouth. I like researching about radio and wireless security! I love CTF's and often spend my free time on HackTheBox.
An GCFA-certified specialist working as Lead Security Researcher with Global Research and Analysis Team (GReAT). At Kaspersky since 2014. He specialized on targeted attacks research, reverse engineering and malware analysis. Denis regularly providing trainings for the customers on these matters. He got his degree at cybernetics and applied mathematics facility of Moscow State University in 2002 with diploma topic related to information security. Then he started his career as a programmer in different public and commercial companies. He presented his researches at RSA, HITB, SAS, VirusBulletin, MBLT Dev.
I'm a penetration tester and an application security expert in BI.ZONE with over 3 years of experience in the IT security field.
I'm an alumnus of NRNU MEPhI, Department of Cryptology and Cybersecurity (#42).
I'm keen on the security research on Windows OS and open-source projects.
My research results have been presented at the 2022 ADFSL conference (USA).
Hrishikesh has been a speaker/trainer in International Information Security conferences such as c0c0n, Bsides Delhi 2019, Bsides Ahmedabad 2021, Defcamp Romania 2019, HackFest Canada 2021. He is OWASP Nagpur Chapter leader and has a keen interest in Hardware and RF Security.
James is a recent graduate of Champlain College who joined a Fortune 50 tech company in 2020 as an early professional and joined their elite family of Incident Response Consultants. Ever since he got his first computer in 2008 then broke it, James has been troubleshooting his life into what some have been calling the one of an artificial intelligence, who learns to walk by tripping up the stairs. But he’s just getting started! You can find him @j3st3rjam3s on most of the things, recording Youtube videos at bit.ly/TheJestersCastle, and blogging on jameskainth.com
I have been in OS security research for more than 10 years working on various areas related to Windows and Linux kernel security, rootkit detection, memory forensics, bare-metal hypervisors.
I apply theoretical knowledge and practical expertise to make computer systems secure and reliable.
My research results were presented at numerous conferences all over the world: BlackHat 2021 (UK), Texas Cyber Summit 2021 (USA), IEEE SP SADFE 2021 (USA), HITB 2020 (Singapore), BlackHat 2018 (UK), REcon 2016 (Canada), six ADFSL conferences 2014-2019 (USA), and RusCrypto 2011 (Russia).
You can find my results in my blog - https://igorkorkin.blogspot.com
I am a bachelor of the National Research Nuclear University MEPhI. My specialization program is information security. I am doing research in fuzzing of various applications, and I have already taken part in some events. For example, in 2020 I participated in the national Information security forum "INFOFORUM - 20" (Russia) as a speaker with the report "Various methods of cyber warfare". After that, in July 2022, I have placed in the annual conference on digital forensics, security and law (adfsl - 2022, USA) with a report, on the topic of which I've prepared an article entitled "Human Controlled Fuzzing With AFL" and it has been sent for publication in journal (JDFSL, USA).