Black Hat USA

Review Board

Please press or click a member's name for more information.

Heather Adkins

Security Engineering

Heather Adkins has over 25 years of security experience, currently serving as head of Google’s Office of Cybersecurity Resilience and deputy chair of CISA’s Cyber Safety Review Board. She is co-author of Building Secure and Reliable Systems (O’Reilly, 2020). Heather has a passion for maintaining an open and interoperable internet, and finding new ways to solve classes of vulnerabilities in order to make technology fundamentally more secure for everyone.

David Adrian


David Adrian works on the Chrome Security team at Google. Previously, he cofounded Censys, a security data startup. David has a PhD from the University of Michigan, and is a maintainer of ZMap and its associated open-source Internet-measurement projects.

Sheila A. Berta

Head of Research

Dreamlab Technologies

Sheila Berta is a cybersecurity specialist with over 15 years of experience. She is a dedicated and passionate professional in the field of information security, with a particular focus on hacking and offensive security. Self-taught from a young age, she boasts in-depth knowledge and expertise in a wide range of areas, including hardware hacking, reverse engineering, exploit dev, network security, cloud security, big data and blockchain. Furthermore, she is a versatile developer, proficient in ASM, C/C++, Go, and Python. Sheila has shared her knowledge by teaching classes on cybersecurity at universities in Argentina and by speaking at many of the top conferences such as Black Hat USA, DEF CON, HITB, Ekoparty, HackInParis, and IEEE ArgenCon. Currently, she holds the position of Head of Research at Dreamlab Technologies.

Justine Bone


Ridge Partners

Justine Bone is an experienced leader and board advisor serving the healthcare, defense, and financial sectors. Her areas of expertise include hacking, risk management, cybersecurity communications, and strategy development for technology companies. She serves as a member of HP Inc.’s Security Advisory Board, the Review Board of Blackhat, as a faculty member of IANS and is the co-founder of several cybersecurity companies. Justine also previously led as CISO of Bloomberg and Dow Jones. Her training was as a computer hacker and security analyst for the USA’s NSA and New Zealand’s GCSB. In addition to technology, Justine credits her creative interests to her international background and early career as a classical ballet dancer.

Thomas Brandstetter

Professor, Co-Founder and Managing Director

Limes Security

Thomas Brandstetter is a recognized OT cybersecurity expert, with more than 20 years of background in the industry. He is currently active as co-founder and managing director of Limes Security, a major European OT cyber security company. He also is Professor for IT Security at University of Applied Sciences, St. Poelten and Honorary Professor for Cyber Security at DeMontfort University. His past career track record includes being the Stuxnet incident handler for Siemens and founding the Siemens ProductCERT. He often is a keynote and invited guest speaker on the topic of OT and critical infrastructure security. He co-founded and still supports many security community events and initiatives such as the ICS Village at DEFCON/BruCON, IT-SECX and ICS-CSR.

Jamie Butler

Jamie Butler, with more than 25 years of experience in computer security, is currently the Head of Runtime Protection and Response Strategy at Sysidg. Prior to joining Sysdig, Jamie was at Elastic where he was a Distinguished Engineer and Tech Lead focused on detection and its efficacy. Prior to Elastic, he was the Chief Technology Officer of Endgame, leading engineering, product, and research focused on the convergence of the EPP and EDR. Jamie has directed research teams at some of the most prominent security companies of the past two decades including as Chief Architect and Fellow at FireEye and Chief Researcher at Mandiant. He began his career as a computer scientist at the National Security Agency.

A writer, Jamie co-authored the bestseller Rootkits: Subverting the Windows Kernel. He was also a regular speaker and trainer at major industry security conferences, and he serves as a Review Board member for Black Hat. Jamie’s focus areas include operating system security, cloud and container runtime security, forensics, reverse engineering, malware, threat intelligence, and enterprise security.

Katriel Cohn-Gordon

Research Scientist


Katriel Cohn-Gordon is a research scientist at Facebook, with a PhD from the University of Oxford in applied cryptography. His current work is on privacy engineering for data access and deletion infrastructure, and he wrote the public paper on how Meta ensures deletion correctness. Previous research formalised the security of some of the protocols underlying today's Internet; including the Messaging Layer Security IETF standard for encrypted group messaging and a formal analysis of the Signal messaging protocol used by WhatsApp and many others. He's also been seen writing fuzzers for WebRTC at Google's Stockholm office, holds a master's degree in mathematics and computer science, and has reviewed papers for various top academic conferences.

Deirdre Connolly

Cryptographic Engineer

Deirdre Connolly is a cryptographic engineer most recently at the Zcash Foundation, writing production-quality privacy-protecting software. She is fascinated with quantum-resistant cryptography, especially the isogeny-based kind, and will talk your ear off about it. Deirdre has a BS in electrical engineering and computer science from MIT, and over 10 years of experience writing and deploying production-quality distributed systems at scale.

Daniel Cuthbert

Global Head of Security Research

Daniel Cuthbert loves doing security research. With a career spanning over 20 years on both the offensive and defensive side, he's seen the evolution of hacking from a small groups of curious minds to organized criminal networks and nation state we see today. He is the original co-author of the OWASP Testing Guide, released in 2003 and now the co-author of the OWASP Application Security Verification Standard (ASVS) and sits on the UK Government Cybersecurity Advisory Board.

Sherri Davidoff


LMG Security

Sherri Davidoff is the CEO of LMG Security and the author of three books, including “Ransomware and Cyber Extortion” and “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by the New York Times. Sherri has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien.” She is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and received her degree in Computer Science and Electrical Engineering from MIT.

Mika Devonshire

Security & Compliance Specialist

Google Cloud

Mika Devonshire advises security go to market strategies for Google. She specialized in response and forensic investigations after spending her first career decade building or implementing controls, IAM apps, offensive capabilities, and loss ratio algorithms for insurance. Prior to Google, Mika served as Director of Strategic Development for the APAC based DFIR firm, Blackpanda, and was the founding responder in Hong Kong.

Mika holds a Masters in Digital Forensics from George Washington University, a Bachelors in Comparative Literature from Princeton University, a CISSP and GCFA among other certifications. She regularly engages with the infosec community as a speaker or speaker coach, and loves working with those seeking to pivot from non-technical fields. She is a guest lecturer at Northwestern Pritzker School of Law and a willing mentor.

Matt Devost

CEO and Co-Founder


Matt Devost is a technologist, entrepreneur, and international security expert specializing in counterterrorism, critical infrastructure protection, intelligence, risk management and cybersecurity issues.

Currently, Mattt is CEO and Co-Founder of OODA LLC. Previously Matt was a Managing Director at Accenture where he led the Global Cyber Defense practice. Matt joined Accenture following their 2015 acquisition of the global cybersecurity consultancy FusionX LLC where he had served as President & CEO since 2010.

Matt was an Adjunct Professor at Georgetown University for fourteen years where he taught a graduate course on Information Warfare and security, is a Founding Director of the Cyberconflict Studies Association, and served as a special advisor to the Department of Defense. Matt founded the Terrorism Research Center, Inc. (TRC) in 1996, where he served as President and CEO until November 2008. Previously, Matt has also held leadership positions at iSIGHT Partners, Technical Defense, Security Design International, iDEFENSE and SAIC. Mr. Devost has been a speaker at hundreds of international conferences and a contributor/author to several books on terrorism and information security.

Christopher Domas

Security Researcher


Christopher Domas (@xoreaxeaxeax) is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor. His more relevant work includes the sandsifter processor fuzzer, rosenbridge backdoor, the binary visualization tool ..cantor.dust.., and the memory sinkhole privilege escalation exploit.

Stephanie Domas

Chief Information Security Officer (CISO)


Stephanie Domas started her career with over 10 years of ethical hacking, reverse engineering, and advanced vulnerability analysis as a defense contractor and has a deep knowledge and passion for the hacker mindset.

Pivoting her offensive skills to the defense she built and led two successful cybersecurity businesses focused on defense of embedded systems, medical devices and the healthcare industry.

Stephanie is currently the Chief Information Security Officer (CISO) at Canonical, the maintainers of the world’s most popular Linux operating system, Ubuntu. Previously she was the Security Technology Strategist for Intel (Fortune 50), where she owned the cross Intel security technology strategy, formulating and implementing strategies that helped accelerate Intel’s strength, competitiveness, and revenue growth in the area of Security.

Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.

Mark Dowd

Founder, Director

Azimuth Security

Mark Dowd is an expert in application security, specializing primarily in host and server based Operating Systems. He is currently the director of Azimuth Security, a botique security company he founded that specializes in code review and cutting edge security research. Prior to starting Azimuth, his professional experience includes several years as a senior researcher at a fortune 500 company, where he uncovered a variety of major vulnerabilities in ubiquitous Internet software. He also worked as a Principal Security Architect for McAfee, where he was responsible for internal code audits, secure programming classes, and undertaking new security initiatives. Mark has also co-authored a book on the subject of application security named "The Art of Software Security Assessment," and has spoken at several industry-recognized conferences.

Chris Eng

Chief Research Officer


Chris Eng is Chief Research Officer at Veracode. A founding member of the Veracode team, he is responsible for all research initiatives including applied research and product security, as well as advising on product strategy and M&A. Chris is a frequent speaker at industry conferences and serves on the review board for Black Hat USA. He is also a charter member of MITRE's CWE/CAPEC Board. Bloomberg, Fox Business, CBS, and other prominent media outlets have featured Chris in their coverage. Previously, Chris was technical director at Symantec (formerly @stake) and an engineer at the National Security Agency. Chris holds a B.S. in Electrical Engineering and Computer Science from the University of California.

Eric Evenchick

Co-Founder and Managing Partner

Tetrel Security

Eric Evenchick is a co-founder and Managing Partner at Tetrel Security, specializing in embedded device security and bespoke tool development. His journey into embedded systems began with the development of research vehicles at the University of Waterloo in collaboration with General Motors and the US Environmental Protection Agency.

This experience propelled him into roles involving the development of automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors. Prior to co-founding Tetrel Security in 2023, Eric served as Technical Director at NCC Group and as Principal Research Consultant at Atredis Partners. In these capacities, he conducted security assessments on diverse hardware and software targets, encompassing automotive systems, medical devices, cloud infrastructure, and mobile devices.

Eric holds a Bachelor of Applied Science in Electrical Engineering from the University of Waterloo. He has been a featured presenter at numerous technology and security conferences, including Black Hat, escar, SecTor, ToorCon, NorthSec, and PyCon USA. His work has garnered recognition in publications such as Wired and Forbes. Since 2019, Eric has been delivering training sessions on reverse engineering embedded systems at Black Hat conferences worldwide.

Valerie Anne Fenwick

OASIS PKCS#11 (Open Standards Based Crypto API) technical committee

Valerie Anne Fenwick has over two decades of experience in computer security, from coding to leading teams at Sun Microsystems, Oracle and Intel. She helped to design and develop the cryptographic framework for the Oracle Solaris operating system, and previously worked as a developer on the SunScreen Firewall. She was the secretary for the OASIS PKCS#11 (Open Standards Based Crypto API) technical committee. Valerie has a B.S. in Computer Science from Purdue University. She is a co-author of the Solaris 10 Security Essentials book and writes a blog on bicycling, beer and security. In her spare time, she enjoys performing at community theaters, riding her bike, and skiing.

Joe FitzPatrick

Trainer and Researcher

Joe FitzPatrick (@securelyfitz) is a Trainer and Researcher at (@securinghw). Joe has spent most of his career working on low-level silicon debug, security validation, and penetration testing of CPUs, SoCs, and microcontrollers. He has spent the past decade developing and delivering hardware security related tools and training, instructing hundreds of security researchers, pen testers, and hardware validators worldwide. When not teaching Applied Physical Attacks training, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects, which he regularly presents at all sorts of fun conferences.

Trey Ford



Trey Ford is a strategic advisor to enterprise leaders and corporate directors. Today Trey serves as Executive Director of Cyber Security in Vista Equity Partners’ Consulting Group. With twenty years focused on the offensive, defensive, and programmatic leadership aspects of security, he is well grounded in public cloud, abuse, application, network, and platform security.

Previously Trey was CISO of the Heroku platform at Salesforce, General Manager of Black Hat, held strategic advisory and global consulting roles, and still apologizes for time served as an auditor.

Lidia Giuliano

Security Architect

Lidia Giuliano has been involved in the information security field for over 20 years working in the financial, defence, retail and health care sector. Lidia has an extensive background in security with a key focus on defensive and cloud security. She enjoys ensuring security is involved in every stage of an initiative and BAU lifecycle, finding new and repeatable ways of doing things, and solving complex problems. She holds a BAppSci (CS), MAppSci (IT), various security and cloud certifications, has spoken internationally and nationally and been published in various media.

She is involved as an active review board member for various conferences internationally and locally, involved in speaker coaching program for Black Hat USA and BSides Melbourne, AWSN mentoring program and enjoys being part of the InfoSec community to help others.

Aanchal Gupta

Deputy CISO and Corporate Vice President


Aanchal Gupta is the Deputy CISO and Corporate Vice President at Microsoft. Previously, as Chief Information Security Officer for Novi (Calibra) at Facebook, she led a team responsible for assessing and mitigating security risks across Facebook's cryptocurrency initiative. Aanchal joined Facebook in 2016 after serving as Chief Information Security Officer at Microsoft for Skype and Skype for Business. Prior to Microsoft, Aanchal led Yahoo's Global Identity team, contributing to various authentication and authorization open standards such as OpenID and OAuth.

Aanchal was named one of Business Insider’s “Most powerful female engineers of 2018”. She serves on the board of Silvergate Capital Corporation (NYSE:SI), Internet Security Research Group (ISRG), and is a fellow at the RSA (Royal Society for the encouragement of Arts, Manufactures and Commerce). She also serves on Silicon Valley CISO Investments’ (SVCI) board and invests in and guides cybersecurity startups. Aanchal is also a staunch advocate for building diverse teams and serves on the review board for the Grace Hopper, Enigma, and Black Hat conferences.

Jason Haddix

CEO, Hacker & Trainer

Arcanum Information Security

Jason Haddix, also known as jhaddix, leads as CEO and “Hacker in Charge” of Arcanum Information Security, a premier firm specializing in assessments and training. Currently, he is also the Field CISO for and a Strategic Advisor to Bugcrowd. With a distinguished 20-year tenure in cybersecurity, Jason has previously held notable positions such as CISO at Ubisoft, Head of Trust at Bugcrowd, Director of Penetration Testing at HP, and Lead Penetration Tester at Redspin. He has expertise across nearly all cybersecurity domains and is ranked 57th all-time on Bugcrowd’s bug bounty leaderboards. A prolific speaker, Jason has delivered numerous talks on offensive security methodologies at major conferences including DEFCON, Black Hat, RSA, OWASP, Nullcon, SANS, IANS, BruCon, and Toorcon, among others.

Nathan Hamiel

Senior Director of Research

Kudelski Security

Nathan Hamiel is Senior Director of Research at Kudelski Security where he leads the fundamental and applied research team. Part of the Innovation group working to define the future of products and services for the company, his team focuses on privacy, advanced cryptography, emerging technologies, and special projects. He is also responsible for the research function at the company, connecting the dots between the various business units and focusing on collaboration both internal and external to the company. For over 20 years, he has helped customers worldwide solve complex security challenges and accelerate innovation.

Nathan spends his time focusing on emerging and disruptive technologies and their intersection with information security. This research includes new approaches to difficult security problems and the safety, security, and privacy of artificial intelligence. He is a proponent of agility and simplification and their application in solving security challenges. Nathan is a regular public speaker and has presented his research at global security events, including Black Hat, DEF CON, HOPE, ShmooCon, SecTor, ToorCon, and many others. He is also a veteran member of the Black Hat review board, where he serves as the track lead for the AI, ML, and Data Science track.

Jason Healey

Senior Research Scholar

Columbia University's School for International and Public Affairs

Jason Healey is Senior Research Scholar at Columbia University's School for International and Public Affairs, specializing in cyber conflict and risk. He started his career as a US Air Force intelligence officer, before moving to cyber response and policy jobs at the White House and Goldman Sachs. He was founding director for cyber issues at the Atlantic Council where he founded the Cyber 9/12 Strategy Challenge for cyber policy students and is the editor of the first history of conflict in cyberspace, A Fierce Domain: Cyber Conflict, 1986 to 2012. He is on the DEF CON review board and served on the Defense Science Board task force on cyber deterrence.

Charles Henderson

Executive Vice President of Cyber Security Services


Charles Henderson is located in Austin, Texas. He is the Executive Vice President of Cyber Security Services at Coalfire. Throughout his career, Charles and the teams he has managed have specialized in threat intelligence, incident response, penetration testing, adversary simulation, vulnerability management, and vulnerability research. Formerly leading IBM X-Force and Trustwave SpiderLabs, Charles has spoken at numerous security conferences, including Black Hat and RSA Conference. He has also appeared in various television and print media coverage.

Jeff Horne

Head of Security


Jeff Horne is the Head of Security at Skydio, a leading drone company specializing in autonomous vehicles. Jeff is responsible for security direction both within Skydio products and internal security. Prior to Skydio Jeff was the VP of Information Security for Optiv where he was responsible for all Security Operations, Governance Risk and Compliance, Endpoint, Internal Incident Response, and Physical Security. Before Optiv, he was the Senior Director of Information Security for SpaceX where he was responsible for the overall security strategy as well as managing the Information Security, Compliance (ITAR), Security Operations, and Physical Security groups. Jeff is an accomplished security professional with over 20 years of experience and a strong background in reverse engineering, exploitation, and malware research. He has authored several vulnerability disclosures and patents throughout his career.

Vincenzo Iozzo



Vincenzo Iozzo is the CEO and Co-founder of SlashID. Vincenzo was previously Founder & CEO of IperLane (acquired by CrowdStrike), co-authored the “iOS Hacker’s Handbook” (Wiley) and presented the winning attacks against Firefox, iOS and Blackberry OS at Pwn2Own (2010-2012).

Bill Jaeger

Executive Director, ISG Product Security Office


Bill Jaeger leads Lenovo's Infrastructure Solutions Group (ISG) Product Security Office and works with Lenovo's global product teams and industry partners to enhance and align the security of Lenovo's product offerings with enterprise customer needs. He is a founding member of Lenovo's Corporate and ISG Product Security Offices and has been instrumental in driving product security strategy and security "firsts" at Lenovo. Bill was awarded Lenovo's top honor in recognition for his transformative achievements.

Prior to joining Lenovo, Bill spent 20+ years solving complex security, operational, and technical challenges for commercial and government customers.

Bill is an author, speaker, and inventor with security-related patents issued and pending. He is also a member of the Astronaut Scholarship Foundation's board of trustees.

Jeff Jarmoc

Staff Product Security Engineer


Jeff Jarmoc is a Staff Product Security Engineer at GitHub. Prior to joining GitHub, in his past, Jeff has held various roles at Salesforce, Matasano Security, NCC Group, and SecureWorks. He's also worked in security teams within healthcare and financial organizations. Jeff has presented his research work at several security conferences, including: Black Hat USA & EU, DEF CON, 44Con, Derbycon, and Thotcon.

Maggie Jauregui

Offensive Security Researcher

Intel Corporation

Maggie Jauregui (@_m46s) is a firmware and hardware FPGA offensive security researcher for Intel's Programmable Solutions Group with over 10 years of experience focused mainly on low level platform security. Maggie is also President of Security BSides Portland, the non-profit organization that puts together BSidesPDX. Throughout her career, Maggie has presented her research and delivered technical training on firmware and physical attack security topics at conferences around the world including DEFCON, Black Hat, CanSecWest, and DerbyCon among others.

Monnappa K A

Principal Security Researcher

Monnappa K A is a Security professional with over 15 years of experience in incident response and investigation. He previously worked for Microsoft & Cisco as a threat hunter, mainly focusing on threat hunting, investigation, and research of advanced cyber attacks. He is the author of the best-selling book "Learning Malware Analysis."He is the review board member for Black Hat Asia, Black Hat USA, and Black Hat Europe. He is the creator of the Limon Linux sandbox and the winner of the Volatility plugin contest 2016. He co-founded the cybersecurity research community "Cysinfo". He has conducted training sessions on malware analysis, reverse engineering, and memory forensics at Black Hat, BruCON, HITB, FIRST (Forum of Incident Response and Security Teams), SEC-T, OPCDE, and 4SICS-SCADA/ICS cybersecurity summit. He has presented at various security conferences, including Black Hat, FIRST, SEC-T, 4SICS-SCADA/ICS summit, DSCI, National Cyber Defence Summit, and Cysinfo meetings on various topics related to memory forensics, malware analysis, reverse engineering, and rootkit analysis. He has also authored various articles in eForensics and Hakin9 magazines. You can find some of his contributions to the community on his YouTube channel, and you can read his blog posts at

Ellen Cram Kowalczyk

Security Engineering Manager


Ellen Cram Kowalczyk is a long time security practitioner with a specialization in human factor security including social engineering. She is currently focused on securing Google's use of GCP. Previously, she has held various roles in large organizations, including leading the AWS EC2 Security team at Amazon, and the AppSec, SRE Security, Usable Security/Fraud and Abuse teams at Microsoft. She has spoken at many conferences including RSA and multiple B-Sides. Ellen lives in Seattle with her family and two ridiculous French Bulldogs.

Marina Krotofil

Security Researcher

Marina Krotofil is a cyber security professional with over a decade of hands-on experience in securing Industrial Control Systems (ICS) and Industrial Internet of Things (IIoT). She managed and executed diverse technical projects around the world across a variety of industrial domains. She is also an experienced Red/Blue Teamer who researched numerous novel attack vectors, exploitation techniques, designed novel defence methods and led complex incident responses. Marina frequently collaborates with international organizations on the topics of critical infrastructure security, she is also a regular speaker at the leading conference stages worldwide and is a frequent reviewer of academic manuscripts and grant proposals. At Black Hat Marina leads Cyber-Physical Systems track. Marina holds MSc. in Telecommunications, MSc. in Information and Communication Systems and an MBA in Technology Management.

Anthony Cheuk Tung Lai


VXRL (Valkyrie-X Security Research Group)

Anthony Cheuk Tung Lai works at VX Research Limited on malware investigation, incident response, and offensive security testing. He began hacking after playing Chroot wargame and Beist CTF, reading 2600, and China hacker magazines. He has spent the last 20 years working in the risk and security areas of MNCs in the financial industry.

Anthony is a hobbyist bug hunter and creator of CTF challenges who hacks for fun and belief. In addition to VXCON, which he founded and chairs, he also spoke at Black Hat, DEFCON, Secuinside, AVTokyo, Hack In the Box, HITCON, and DFRWS.

He earned his doctorate from HKUST, where he also worked in the cybersecurity lab and focused on malware and vulnerability research. His credentials additionally include SANS GREM (Gold), GXPN, GCIH, and Offsec OSEE.

Zach Lanier

Security Researcher

Zach Lanier is a security researcher, specializing in various bits of network, application, mobile, and embedded security. Most recently, Zach was a Managing Principal Research Consultant and Embedded:IoT Practice Lead with Atredis Partners, and previously served as Director of Research with Cylance. He has spoken at a variety of security conferences, such as Black Hat, DEF CON, CanSecWest, INFILTRATE, Countermeasure, and SummerCon, and is a co-author of the "Android Hackers' Handbook" (Wiley, 2014).

Federico Maggi

Security Researcher

Federico Maggi has more than a decade of research experience in the cybersecurity field and has worked on offensive and defensive projects in web applications, network protocols, embedded systems, radio-frequency control systems, industrial robots, cars, and mobile devices.

Some of his research work has been featured on mainstream and media outlets such as Bloomberg, Wired, Reuters, Forbes, Hackread, ZDNet, and MIT Technology Review.

Currently employed as a Security Engineer at AWS with focus on server firmware and hardware, Federico has been a Research Expert in the Huawei AI4Sec Research team, and a Senior Researcher with Trend Micro. Previously, Federico was an Assistant Professor at Politecnico di Milano, one of the leading engineering technical universities in Italy. Aside from his teaching activities, Federico co-directed the security group and has managed hundreds of graduate students.

Federico has given several lectures and talks as an invited speaker at international venues and research schools, and also serves in the review or organizing committees of well-known academic and industry conferences.

More info about Federico and his work is available online at

Maria Markstedter

Founder and CEO, Azeria Labs

Maria Markstedter is the founder and CEO of Azeria Labs, a company that provides training services to some of the world's top tech companies and law enforcement agencies. In addition, Maria is the author of the book "Arm Assembly Internals and Reverse Engineering - Blue Fox Edition", published in May 2023. With a Bachelor's degree in Corporate Security and a Master's degree in Enterprise Security, Maria has held key positions in various startups, including her role as the Chief Product Officer for Arm virtualization startup Corellium. In 2018, Maria was honored as a Forbes "30 under 30" in technology and has since been featured in Vogue Business Magazine. Her expertise in Arm reverse engineering and binary exploitation earned her the title of Forbes Person of the Year in Cybersecurity 2020. Maria has collaborated with Arm on exploit mitigation research in Cambridge and continues to empower security researchers and developers globally to effectively attack and defend Arm-based software.

Marion Marschalek

Security Engineer


Marion Marschalek is a Security Engineer at AWS. Prior to that she worked at Intel and held different positions in the threat detection industry, as a malware reverse engineer and incident responder. Her most noteworthy contribution is her analysis work on the malware ‘Babar' and other representatives of a collection of French nation state malware, which was cited by a number of international news outlets and also got her listed as one of Forbes' "30under30” talents in the Technology Europe division in 2016. Marschalek is a frequent speaker at major security conferences, including Black Hat, DEF CON, HITB, RSA, and SyScan, among others. Until recently she was teaching reverse engineering classes at University of Applied Sciences St. Poelten, from where she graduated in 2011 with a Master's Degree in Information Security. In 2015 she started a hacker bootcamp for women titled BlackHoodie, which over the years established itself as a global initiative to attract more diverse talent to the security industry.

Allison Miller

CISO and VP of Trust


Allison Miller is the CISO (Chief Information Security Officer) and VP of Trust at Reddit, where she leads teams tasked with protecting Reddit's customers and systems. Miller is an industry expert and innovator, having spent the past 20 years scaling teams and technology that protect people and platforms, and pioneering the development of real-time risk prevention and detection systems running at internet-scale. She has also led major initiatives to engineer the defenses for core payment and e-commerce systems and technologies that protect consumers from online threats, having held technical and leadership roles at Bank of America, Google, Electronic Arts, Tagged/MeetMe, PayPal/eBay, and Visa International. Miller speaks internationally on security, fraud and risk and has held board roles with the Center for Cyber Safety and Education, ISC2, SIRA, and Keypoint Credit Union.

Asuka Nakajima

Senior Security Research Engineer


Asuka Nakajima is a cyber security researcher and engineer based in Tokyo, Japan. With over a decade of experience in computer security, her expertise includes software security, reverse engineering, and cyber security research and development. She has presented at numerous security conferences and events, such as Black Hat USA/Europe/Asia Briefings, AsiaCCS, ROOTCON, AIS3, and PHDays, and serves on the Review Board for Black Hat USA and Asia.

In addition, Asuka is the founder and leader of CTF for GIRLS, the first infosec community for women in Japan, and also the author of the bestselling book "Cyber Attack" (Bluebacks, 2018). Currently, she works as a Senior Security Research Engineer at Elastic Security, focusing on endpoint security R&D.

Lucas Nelson

Founding Partner

Lytical Ventures

Lucas Nelson is a Partner at Lytical Ventures and member of its investment committee where he oversees day-to-day fund operations. This includes deal sourcing, technical diligence and deal structuring. Lucas is also responsible for working with the companies in the investment portfolio (including any board responsibilities), as well as managing relationships with limited partners, the venture ecosystem and the back office.

Prior to joining Lytical Ventures, Lucas was a Principal at Evolution Equity and a Principal at Gotham Ventures. Lucas was also a Venture Partner at Antecedent Ventures, a Sr. Manager of Secure Software Engineering at Adobe and a pen tester at @Stake. Lucas holds an MBA from Dartmouth and a BS in computer science from Purdue University. He is also a Kauffman Fellow.

Dr. Pamela O'Shea


Shea Security

Dr. Pamela O'Shea is the head of Shea Information Security which provides security consulting, training and penetration testing services to some of Australia's most prominent tech companies. Pamela has a Ph.D. in computer science and has presented at security conferences including Black Hat Asia, BSides Canberra and OWASP. She has lectured at the Royal Melbourne Institute of Technology (RMIT) and is the founder of the haXX group which provides technical classroom training and mentorship to women starting out in the security field. Outside of consulting, teaching and research, Pamela enjoys HAM radio and satellite communications and runs the Melbourne CyberSpectrum meetup on Software Defined Radio (SDR).

Kymberlee Price

Engineering Response

Founder + CEO, Zatik Security

Kymberlee Price is a dynamic engineering leader known for developing high-performing multidisciplinary teams responsible for the security and integrity of software products, services, and infrastructure. A recognized expert in the information security industry, she has over 20 years experience in product and application security, incident response and investigations, coordinated vulnerability disclosure and bug bounties, Secure Development Lifecycle (SDL), Open Source Security strategy, and Security Community, Culture and Gamification models.

Ms. Price speaks regularly at conferences around the world and is currently on the content review boards for Black Hat USA and LocoMocoSec.

Thomas Ptacek



Thomas Ptacek is a principal at Latacora, which runs security teams for startups.

A software security practitioner since 1995, Thomas worked at Secure Networks, Network Associates, McAfee, and Arbor networks before cofounding Matasano Security, which is now part of NCC Group.

Enno Rey



Enno Rey is a long-term network security enthusiast with lots of practical experience in the space, both from an offense and a defense perspective.

Tom Ritter

Security Engineer


Tom Ritter is a distinguished security engineer and recovering consultant now at Mozilla, working on anti-exploitation, Tor, and other new and evolving security features. Previously, he did all manner of security consulting at NCC Group and iSEC Partners, including managing the Cryptography Services practice and pioneering the production of fully-public audit reports. While consulting, Tom participated in numerous public audit reports including TrueCrypt and Tor Browser; presented talks and trainings at security conferences in Europe, North, and South America; and presented his research NPR, CNN, and other media outlets. He is actively involved in the advancement of secure messaging, IETF & W3C Standards Groups relating to secure protocols, public key infrastructures, metadata protection, and self-hosting data.

Jen Savage

Offensive Security Consultant


Jen Savage is an Offensive Security Consultant for ACTIVECYBER, LLC. She has over a decade of experience in tech including penetration testing, vulnerability assessment, vulnerability management, software development, technical management, and consulting services for companies ranging from startups to the Fortune 100. Her primary research interests are in Application Security and the Internet of Things.

Adam Shostack

Shostack + Associates

Adam Shostack is a leading expert on threat modeling, and a consultant, entrepreneur, technologist, author and game designer. He helped create the CVE and many other things. He has decades of experience delivering security. His experience ranges across the business world from founding startups to nearly a decade at Microsoft. While there, he fixed Autorun for hundreds of millions of systems. Beyond consulting and training, Adam is the author of Threat Modeling: Designing for Security, Threats: What Every Engineer Should Learn from Star Wars, and the co-author of The New School of Information Security. He's also an Affiliate Professor at the Paul G. Allen School of Computer Science and Engineering at the University of Washington.

Anant Shrivastava


Cyfinoid Research

Anant Shrivastava is the founder of Cyfinoid Research. He has experience in Security (both offense and defense), Development, and Operations. He has a rich history of engagement with renowned conferences as both a trainer and a speaker, including Black Hat (USA, Asia, EU), Nullcon, and c0c0n, among others. Anant leads open-source projects, notably the Tamer Platform and CodeVigilant, and curates the Hacking Archives of India. When not engaged in official work, Anant contributes to open communities with a shared goal of spreading information security knowledge, such as the null community, Garage4Hackers, hasgeek, and OWASP.

Natalie Silvanovich

Team Lead & Security Engineer

Google Project Zero

Natalie Silvanovich leads Google Project Zero's North American team. Her current research focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.

Ryan Smith

CTO & Co-Founder


Ryan Smith is the CTO and a Co-Founder of Halcyon, the first anti-ransomware and cyber resilience platform. Prior to Halcyon, Ryan was a co-founder of the next-generation cyber defense contractor Boldend. Ryan previously acted as VP of Research at Cylance (now blackberry), where he led threat research and product security for Cylance’s popular endpoint products. As Chief Scientist of Accuvant Labs (now Optiv), Ryan’s work went into protecting a large percentage of the Fortune 500’s crucial products and infrastructure. Ryan has also served as the CTO of Exodus Intelligence.

Ryan has spent over 25 years in information security and is a recognized expert in reverse engineering, vulnerability research, exploitation, product security, threat intelligence, machine learning, and secure software development. He is a frequent speaker at information security conferences and has responsibly disclosed dozens of vulnerabilities.

Window Snyder

Founder & CEO

Thistle Technologies

Window Snyder is a security industry veteran and former Chief Security Officer at Square, Fastly and Mozilla. She previously spent five years at Apple responsible for security and privacy strategy and features for OS X and iOS. Other roles include Chief Software Security Officer at Intel, Chief Security Something-or-Other at Mozilla and a founder at Matasano, a security services and product company based in New York City, acquired by NCC Group in 2012.

As a senior security strategist at Microsoft in the Security Engineering and Communications organization, she managed the relationships between security consulting companies and the Microsoft product teams and the outreach strategy for security vendors and security researchers. Previously she was responsible for security sign-off for Windows XP SP2 and Windows Server 2003.

Ms. Snyder was Director of Security Architecture at @stake. She developed application security analysis methodologies and led the Application Security Center of Excellence. She was a software engineer for 5 years focused primarily on security applications, most recently at Axent Technologies, now Symantec.

Ms. Snyder is co-author of Threat Modeling, a manual for security architecture analysis in software.

Dr. Jason Staggs

Cyber Security Researcher, Adjunct Assistant Professor of Computer Science

The University of Tulsa

Dr. Jason Staggs is a Cyber Security Researcher and Adjunct Assistant Professor of Computer Science at The University of Tulsa. Jason's research interests include critical infrastructure protection, telecommunications security, embedded systems security engineering, penetration testing and digital forensics. Jason has spoken at national and international conferences, authored various peer-reviewed publications and lectured undergraduate and graduate level courses on a variety of cyber security topics. In his spare time, Jason enjoys reverse engineering proprietary network stacks in embedded devices and diving through ancient RFCs to demystify obscure network protocols. Jason attended graduate school at The University of Tulsa where he earned his MS and PhD degrees in Computer Science.

Emily Stark

Senior Staff Software Engineer


Emily Stark is a software engineer and manager working on the Google Chrome web browser. She leads Chrome’s secure web and network team, which includes Chrome's root CA program, TLS and crypto libraries, new web security features, and HTTPS adoption initiatives. She also leads a cross-functional team of usable security experts who provide consulting and security reviews across Chrome. Emily holds a bachelor’s degree from Stanford University and a master’s degree from MIT, both in computer science, and has spoken and published at top conferences like Real World Crypto and USENIX Security.

Maddie Stone

Security Researcher

Maddie Stone is a Security Researcher who has spent the last 5 years specializing in 0-days actively exploited in-the-wild. Previously, she worked on Google's Project Zero and Threat Analysis Group (TAG). Maddie has found vulnerabilities in many major platforms including Safari, Chrome, Android, and Windows. She also previously worked as a reverse engineer and team lead on the Android Security team. In 2020, Maddie was named to the "Wired25: People Who Are Making Things Better".

Robert J. Stratton III

Principal & Strategist, Polymathics LLC

Venture Partner, NextGen Venture Partners

Robert Stratton is a security strategist, technologist, venture capitalist and business advisor. He has had a hand in bringing some of the earliest security products to market in several categories including VPNs and network intrusion detection, and established one of the first dedicated security organizations within a tier-1 Internet service provider at UUNET.

He was a founding General Partner of the Mach37 Cyber Accelerator, and the first Director of Technology assessment at In-Q-Tel, a private venture capital firm investing for the benefit of the U.S. Intelligence Community.

Robert served as Chief Strategy & Security Officer at Witopia, and Director of Government Research at Symantec Research Labs. As a co-founder and Chief Technologist of Security Design International, he was doing multinational and critical infrastructure security architectures, penetration testing, digital forensics, and incident response before they were cool.

Robert is a Member of the IEEE, the ISSA, the IEEE Computer Society, and IEEE Working Group P7014, developing a Standard for Ethical Considerations in Emulated Empathy in Autonomous and Intelligent Systems.

Chris Thompson

Global Head of X-Force Red


Chris has extensive experience performing red teaming operations against defense contractors, nuclear power plants, critical industries, and many of the world's largest banks and financial services firms. His background includes working as a contract Computer Network Exploitation (CNE) operator providing training, and capability development for various government defense partners and lawful intercept/foreign intel programs. He founded the X-Force Adversary Services team in 2018, responsible for simulating real-world attacks by sophisticated threat actors. Chris has presented his research at many conferences such as DEF CON, Black Hat, ToorCon, SecTor, BSides, SANS, and Wild West Hacking Fest.

Yuji Ukai



Yuji Ukai is the chief executive officer of FFRI, Inc, known as a technical opinion leader in Japanese security industry.

After completing his Ph.D. in computer science at the National University of Tokushima, he began his employment at Kodak research and development center in Japan where he worked on research and development for digital device and embedded security.

In 2003, he moved to United States and started working on development of vulnerability scanner product at eEye Digital Security as a Senior Software Engineer. He also worked for research of vulnerability analysis, vulnerability auditing, malware analysis, embedded system security, P2P network security, etc. as a Senior Research Engineer at eEye research group. In 2007, he moved back to Japan and became a co-founder of Fourteenforty Research Institute, Inc. Over the last several years, he discovered many critical security vulnerabilities affecting various software products as well as pioneered vulnerability analysis and exploitation of embedded system based on real time operating systems.

Nico Waisman


Nico Waisman is a leader and innovator in the field of cybersecurity. With a passion for addressing complex security challenges, Nico has dedicated his career to advancing the protection of digital assets and systems. Prior to his current role at <Stealth Company>, Nico was the CISO at Lyft overseeing security and privacy for millions of customers. With over two decades of experience in the security industry, Nico has held esteemed security leadership positions at renowned organizations such as GitHub, Semmle, Cyxtera, and Immunity. He is widely recognized as a security expert and has imparted his knowledge to government and commercial sector students worldwide through private and public classroom settings. His expertise has been showcased at prestigious conferences, including Black Hat, Pacsec, Syscan, Ekoparty, among others.

Nico enjoys engaging with the community, sharing insights and best practices to empower individuals and organizations to safeguard their digital assets.

Steve Weis

Senior Staff Security Engineer


Steve Weis is a security engineer at Databricks working on data security and privacy. Previously, Steve was co-founder & CTO of PrivateCore, a security startup acquired by Facebook in 2014. In the past, Steve was a technical director at AppDirect and a member of the applied security team at Google. Steve received a PhD in cryptography from MIT.

Jos Wetzels


Midnight Blue

Jos Wetzels is a co-founding partner at Midnight Blue. His research has involved reverse-engineering, vulnerability research and exploit development across various domains ranging from industrial and automotive systems to IoT, networking equipment and deeply embedded SoCs. He has discovered zero-day vulnerabilities across tech stacks ranging from bootloaders and RTOSes to proprietary protocol implementations.

At Midnight Blue, he has consulted to government agencies, grid operators, and Fortune 500 companies worldwide and has been involved in the first ever public analysis of the TETRA radio standard used by police and critical infrastructure globally - uncovering several critical vulnerabilities.

Prior to founding Midnight Blue, he worked as a security researcher and reverse engineer at Forescout where he developed state-of-the-art intrusion detection capabilities for Operational Technology (OT) environments. Jos is a regular conference speaker and has presented at events such as Black Hat, DEF CON, CCC, Usenix, HITB, OffensiveCon, ReCon, EkoParty, and others.

Kenn White

Security Principal


Kenneth White is a security engineer whose work focuses on networks and global systems. He is co-founder and Director of the Open Crypto Audit Project and led formal security reviews on TrueCrypt and OpenSSL. He currently leads applied encryption engineering in MongoDB's global product group. He has directed R&D and security Ops in organizations ranging from startups to nonprofits to defense agencies to the Fortune 50. His work on applied signal analysis has been published in the Proceedings of the National Academy of Sciences. He created software powering the largest clinical trial & cardiac safety research networks in the world. His work on network security and forensics has been cited by the Wall Street Journal, Reuters, Wired, and the BBC.

Kyle Wilhoit

Director, Threat Research

Palo Alto Networks

Kyle Wilhoit is an internationally recognized security researcher and threat intelligence leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of world renowned threat researchers that identify, track and unearth technical intelligence related to threat actor groups, attack frameworks, targeted attack campaigns, and malware.

At his previous role at Palo Alto Networks, Kyle was a Principal Threat Researcher, focusing on nation state actors and their related tactics, techniques, and procedures. Prior to Palo Alto Networks, Kyle performed a litany of roles focusing specifically on threat hunting, malware analysis and research at companies such as Domaintools, Trend Micro, Fireeye and others.

Kyle has presented at over 50 cybersecurity conferences around the globe, with Kyle actively serving on the Review Board for Black Hat US since 2017, where he’s responsible for assisting in the selection of several conference tracks. Kyle has consulted several worldwide governmental bodies, including the International Atomic Energy Agency (IAEA), US Congress, the US Department of Commerce and others. His research has supported investigative stories in several publications, including ABC, CNN, BBC, CNN, The New York Times, WIRED, MIT Technology, and many additional outlets. Additionally, Kyle is a co-author on two books- Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions in addition to the book Operationalizing Threat Intelligence.

Neil R. Wyler (a.k.a. Grifter)

Vice President of Defensive Services


Neil R. Wyler (a.k.a. Grifter) is the Vice President of Defensive Services for Coalfire. He has spent over 20 years as a security professional, focusing on penetration testing, physical security, incident response, and threat hunting. He has been a staff member of the Black Hat Security Briefings for 22 years and a member of the Senior Staff at DEF CON for 23 years. Neil has spoken at numerous security conferences worldwide, including Black Hat, DEF CON, and the RSA Conference. He has been the subject of various online, print, film, and television interviews, and has authored several books on information security. In his free time, Neil keeps himself busy as a member of both the DEF CON, and Black Hat CFP Review Boards, the Black Hat Training Review Board, the founder of DC801, and founder of his local hackerspace, 801 Labs.

Chris Wysopal

CTO and Co-Founder


Chris Wysopal is the founder and CTO at Veracode with responsibility for security research, product security and information security. Prior to joining Veracode, Chris worked as a software developer before diving into security research and security consulting. He had security research roles at several companies, including Symantec, @stake and the hacker think tank, L0pht where he was one of the original vulnerability researchers in the 1990s. He has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He is also the author of "The Art of Software Security Testing" published by Addison-Wesley.

Stefano Zanero

Professor, Dipartimento di Elettronica, Informazione e Bioingegneria

Politecnico di Milano

Stefano Zanero received a PhD in Computer Engineering from Politecnico di Milano, where he is currently a professor with the Dipartimento di Elettronica, Informazione e Bioingegneria. His research focuses on malware analysis, cyberphysical security, and cybersecurity in general. Besides teaching "Computer Security" and "Digital Forensics and Cybercrime" at Politecnico, he has an extensive speaking and training experience in Italy and abroad. He co-authored over 100 scientific papers and books. He is a Senior Member of the IEEE and of the Computer Society, which has named him a Distinguished Visitor and Distinguished Contributor; he is a lifetime senior member of the ACM, which has named him a Distinguished Speaker; and has been named a Fellow of the ISSA (Information System Security Association). Stefano also co-founded Secure Network, a leading cybersecurity assessment firm, and BankSealer, a startup in the FinTech sector that addresses fraud detection through machine learning techniques.

Sustaining Partners