Tanya Janca, also known as SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion, and kindness, which shines through in her countless initiatives.
Thomas Schreck is a Professor for IT-Security at the Munich University of Applied Sciences. Prior he was a Principal Engineer for IT-Security at Siemens and the Head of Siemens CERT. He served on the Board of Directors of Forum of Incident Response and Security Teams between 2015 and 2021and was the Chairman from 2017 to 2019.
He holds a PhD in Computer Engineering from the Friedrich Alexander University Erlangen-Nuremberg and a Diploma in Computer Science from the University of Applied Sciences Landshut.
Andrey Konovalov is a security researcher focusing on the Linux kernel. Andrey is a contributor to several security-related Linux kernel subsystems and tools: KASAN — a bug detector and a security mitigation, KCOV — a coverage collection subsystem, and syzkaller — a production-grade kernel fuzzer. Andrey also found and exploited a number of vulnerabilities in the Linux kernel.
Arnold Osipov has been a security researcher at Morphisec for the last 3 years. He specializes in malware research and threat intelligence. Prior he was a malware researcher at Check Point.
Ashikka is a junior year student at VIT Vellore. She takes a keen interest in anything cybersecurity-related. She is currently working as a Security Research + Technical Writing Intern at CloudSEK, India where she heads the content department for BeVigil, the world’s first security search engine. In her free time, she enjoys reading, hiking, and building cool projects.
Security engineer with a special focus on Cloud security.
Claudia works as penetration tester at NVISO where she focuses on web and mobile application security. Apart from spotting vulnerabilities in applications, she enjoys helping and training developers and IT staff to better understand and prevent security issues.
Connor Morley is a senior security researcher at F-Secure. A keen investigator of malicious TTP’s, he enjoys experimenting and dissecting malicious tools to determine functionality and developing detection methodology. As a researcher and part time threat hunter he is experienced with traditional and ‘in the wild’ malicious actors’ behaviour.
Daniel Feichter works since a few years as red teamer and penetration tester in Austria. His focus is on Windows environment red teaming, pentesting and research. Among other things, he is intensively engaged in AV/EDR systems under Windows OS. At the end of 2021 he decided to start his own company which is called Infosec Tirol (https://www.infosec.tirol), with which he focus on product independent offensive security services to improve the IT-Security in companies in Austria.
I work as application security engineer at [REDACTED] and I’m active collaborator of OWASP Guatemala chapter hosting the OWASP nights and also as leader of HackTheBox Guatemala meetup. I like code, I’m way better at reading than writing it, but I feel competent in python. I like all-the-things-computers and currently I’m day dreaming about becoming a hacker :D
<?php // Silence is golden.
Dominik is a Penetration Tester at NVISO, where he is the Solution Lead for Web Applications.
Ethan Briggs is an automotive security engineer that enjoys analyzing systems to understand what runs “under the hood”, and finding ways to improve or compromise them. This includes the electronic side of vehicles as well as mechanical aspects as well.
Hans-Martin Münch is the CEO of MOGWAI LABS, a small German infosec boutique.
I started my way as a Cyber Security Researcher at the Israeli military. After serving for three years I moved to work at Morphisec as a Malware Researcher. As a blue teamer, I’m fascinated with everything related to malware, threat hunting and Windows internals.
Masters Student, Graduate School of Information Security, KAIST
Javier is a hardware security expert that has been working in automotive security for several years. He is an experienced training instructor and has published numerous impactful tools and techniques in the automotive security sector.
SoftSec Lab in KAIST
Marcus is a security consultant in his own company with the focus on the combination of attack and defense.
He is passionate in deep dive anlysis of security relatied things and automating stuff. For this purposes Python is always a good friend.
In his former life he studied computer science and IT security. During this time he worked in different scientific projects and researched topics like malware analysis and reverse engineering.
After that he focused on the offensive site of cyber security, while he developed his own toolsets for the sake of efficiency and fun.
I am an Open Source Intelligence (OSINT) Researcher with a robust Cyber Security and Threat Intelligence background.
For the last 12 years, I have been working in Security Engineering, developing cyber defense programs and infrastructure technologies responsible for protecting government and corporate interests.
I am passionate about Cybersecurity, OSINT, Developing Python scripts to automate as much as possible, and Data Science.
Moritz is a security consultant working in the Software and Security assessment team at NVISO. He is an ICS and IoT enthusiast, getting into the latest technologies in both fields. He loves to program, reverse engineer and break stuff.
Software engineer at Furiosa AI
Nico has worked in IT security for over 15 years as security consultant and penetration tester. For the past years, his focus has been on all several aspects of OT security. At NVISO Germany, he leads the security assessment team.
Director at Cyber Security Research Center and Professor at Graduate School of Information Security, KAIST
After successfully completing my Master of Science in IT Security at the Ruhr-Universität Bochum, I started working as a penetration tester at NSIDE Attack Logic in Munich. Since I wrote my master’s thesis on automating security analysis of Bluetooth Low Energy enabled IoT devices, my main focus is on the IoT area. Having experienced first-hand how complex the Bluetooth Low Energy protocol can be for beginners, I wanted to share some of my experiences.
Sebastian is a Senior Research Engineer at Quantstamp Inc. and the Managing Director of Quantstamp Germany GmbH. He holds a Ph.D in Computer Science from the Technical University of Munich. His research spans several areas of computer security such as smart contract analysis, cyber-insurance, reverse engineering, malware detection, software protection, and privacy. Before joining Quantstamp, Sebastian worked as a security specialist at BMW. Before Pursuing his Ph.D he also worked as a security engineer at Philips TV in the Netherlands. In his free time, he enjoys building Lego sets with his son.
I am a vehicle security researcher at Desay SV, Singapore. I have a master’s degree in Information security from Carnegie Mellon University.
I’m doing professional software development since 1992. Since 2001 I’m working at genua GmbH, a german producer of security products for public sector, critical infrastructure and other sectors. After 10 years of developing firewalls and 8 years of security research, my focus as a technology fellow is now strategic development.
Yohann Sillam is a researcher from Imperva. He continuously monitors cyber security attacks detected in the wild, publishes blog articles about hidden ones and finds innovative ways to tackle them. He has more than 3 years of experience in cyber security, especially in malware analysis.