@CaptnBanana enjoys reverse engineering and exploit development. He blogs regularly about these topics at his blog bananamafia.dev. Recently he got into the field of game hacking and is here to present his research. Also, @CaptnBanana is a red teamer and penetration tester at @codewhitesec. He likes bananas.
Asif Hameed Khan is an independent OT/ICS Cybersecurity Researcher. He has an expertise in OT/ICS Cybersecurity, ISA 62443 Audit and Compliance, Cyber Threat Intelligence, Digital Forensics and Incident Response, Malware Analysis, and Honeypots. He published research papers in the field of Artificial Intelligence and Cryptography. He is currently exploring areas where concepts of Blockchain, Artificial Intelligence and Swarm Intelligence are applicable in Cybersecurity. He runs the platform namely OTISP- OT Threat Information Sharing Platform on LinkedIn, Github, and Twitter.
Chloé Messdaghi is the VP of Strategy at Point3 Security. She is a security researcher advocate who strongly believes that information security is a humanitarian issue. Besides her passion to keep people safe and empowered online & offline, she is driven to fight for hacker rights. She is the founder of WomenHackerz & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine's The Uncommon Journey, and runs the Hacker Book Club.Twitter: @ChloeMessdaghi
JunWei is a Security Researcher at Telecom Technology Center, Taiwan. A paranoid Pythonista who focuses on cybersecurity, reverse engineering, and malware analysis. And as a CPython contributor, PyCon TW Review Board, presented at HITBSecConf, PyCon Taiwan, PyCon Korea, PyCon Malaysia. He’s the co-founder of Quark-Engine and a security research group, TWBGC.
Kaustubh is a Device security Assurance Manager at Reliance Jio Infocomm limited, his main work include Securing JIO’s Cutting Edge Enterprise, Consumer, and SMB(small,Medium,Big) business products. His main area of interest is Device security,Reverse engineering, discovering RCE,Priv-esc bugs in proprietary or close source devices. He was Null champion, He had deliver more than dozens of talk in null meet and he was champion for 3 years in null community. Also he is a speaker at Owasp SeaSide 2020,Some of his works are published in SecurityWeek, ExploitDB, 0day.today and have more than Dozens of CVE, Recently he was the winner of SCADA CTF @ nullcon 2019.
KunYu Chen is a security researcher at Telecom Technology Center, Taiwan. Since 2014, he has been engaged in honeynet system research and the automation of malware analysis. Also, he’s an open source activism who contributes to CPython, viper-framework and the founder of Quark-Engine and a security research group, TWBGC. He presented at HITCON CMT 101, PyCon Korea, PyCon Taiwan and COSCUP.
Project Nexus is the Information Security Officer and Architect of Security & IT Compliance at a leading Financial Technology institution. When he isn't busy being a Bugcrowd Ambassador, Project Nexus's interests include cracking clouds, modeling complex systems, developing massive software-defined infrastructures, automating deceptive incident responses, accelerating stories at conferences, and is the outlier in your risk model.