Training Review Board

Please press or click a member's name for more information.

Daniel Cuthbert

Global Head of Security Research

Banco Santander

Daniel Cuthbert is the Global Head of Security Research for Banco Santander. With a career spanning over 20 years on both the offensive and defensive side, he's seen the evolution of hacking from a small groups of curious minds to organized criminal networks and nation state we see today. He is the original co-author of the OWASP Testing Guide, released in 2003 and now the co-author of the OWASP Application Security Verification Standard (ASVS).


Sam Davison

Head of Security and Privacy Engineering

Etsy

Sam Davison is a Security, Privacy, and Trust & Safety leader. She is currently the Head of Security and Privacy Engineering at Etsy, helping keep commerce human, secure, and privacy preserving. Davison has held leadership roles at the Krebs Stamos Group, Robinhood, Lyft, Snap Inc., and Uber where she led efforts with a particular emphasis on behavioral engineering, offensive security, and trust & safety. Before working in Silicon Valley, she conducted extensive research on the efficacy of security engagement and co-led a consulting firm that built behavioral-based programs for 15+ Fortune 500 companies. Davison has volunteered throughout her career, lending her expertise to victims of online harassment and election protection efforts.


Ping Look

Program Manager, Detection and Reaction Team (DART)

Microsoft, Enterprise Cybersecurity Group

Ping Look has over a decade of experience building, promoting and managing events in the IT space including two of the most iconic and massively influential IT security events: The Black Hat Briefings+Training and DEF CON. At Black Hat she managed the growth of brand from obscurity to profitability and grew the event from a three track, two day event to a six day, 11 track and training intense event that brought together the best and the most relevant (and occasionally the most obscure) speakers and content providers to Black Hat events in Asia, Europe, the Middle East and the US. During her tenure at Black Hat she was often referred to as the "The One You Don't Want to Piss Off (or you will die)".

Prior to entering the information security and events space, she worked in brand development and management in publishing, textiles and consumer products. She has extensive experience in design and marketing as well as product development.

Ping is currently engaged at Accuvant LABS working with one of the most technically proficient pentest and research teams in the world.


Andrew MacPherson

Andrew MacPherson has been working in infosec for over a decade, most predominately at Paterva where he worked on building Maltego for 10+ years. He holds a bachelors in Information Science and hails from sunny South Africa. He has spoken at many different conferences including Blackhat, DEF CON and ZaCon as well as having taught more than 16 different Black Hat courses. He enjoys cat memes and punk rock.


Maria Markstedter

Founder and CEO, Azeria Labs

Maria Markstedter is the founder and CEO of Azeria Labs, a company that provides training services to some of the world's top tech companies and law enforcement agencies. In addition, Maria is the author of the book "Arm Assembly Internals and Reverse Engineering - Blue Fox Edition", published in May 2023. With a Bachelor's degree in Corporate Security and a Master's degree in Enterprise Security, Maria has held key positions in various startups, including her role as the Chief Product Officer for Arm virtualization startup Corellium. In 2018, Maria was honored as a Forbes "30 under 30" in technology and has since been featured in Vogue Business Magazine. Her expertise in Arm reverse engineering and binary exploitation earned her the title of Forbes Person of the Year in Cybersecurity 2020. Maria has collaborated with Arm on exploit mitigation research in Cambridge and continues to empower security researchers and developers globally to effectively attack and defend Arm-based software.


Matteo Memelli (A.K.A. RYUJIN)

Senior Security Engineer

Amazon Web Services (AWS)

Matteo Memelli (a.k.a. ryujin) is an information security professional with over 15 years of experience in researching and exploiting vulnerabilities. Matteo is currently with Amazon Web Services as a Senior Security Engineer, where he spends his days fuzzing network protocols, firmwares and application software that make up the AWS network infrastructure.

Specialized in binary exploitation and reverse engineering, Matteo has spent more than a decade of his career also developing cutting edge infosec educational content for Offensive Security. He has delivered courses for not only BlackHat, but for private clients as well. While working with Offensive Security, Matteo was the original architect of the "Advanced Windows Exploitation" course, as well as the "Offensive Security Certified Expert" and "Offensive Security Exploitation Expert" certifications. He also conducted a number of security assessments against mature and hardened targets; developing 0-day exploits and logical attack chains against metropolitan law enforcement departments, foreign central banks, and other non-traditional commercial clients.


Jonathan Squire

Principal Security Architect

Jonathan Squire is the Principal Security Architect of a well-known publishing and media company. With over 15 years in the security industry, Jonathan's expertise covers a wide range of skills including security architecture, incident response, attack and defense techniques, reverse engineering, and extreme curiosity in how everything works. While working at his day job, Jonathan is credited with accomplishments that include developing an Information Security model for the enterprise, architecting a secure, centralized credit card processing solution, and guiding the design of the security infrastructure deployed throughout many customer facing properties. Mr. Squire is also responsible for providing direction in governance and industry best practices. In his spare time, Jonathan is known to enjoy disassembling, abusing, and reassembling any piece of technology to understand all of its capabilities. Jonathan has presented on many of these creations and the flaws that allowed the security to be bypassed at conferences including Black Hat.


Etienne Stalmans

Security Architect and Researcher

Aiven

Etienne Stalmans is a Security Architect for Aiven, a multi-cloud, database as a service company. These days he spends his time finding ways to secure multi-cloud environments and improve Open Source security. With a keen interest in protocol reversing and discovering ways to exploit logic flaws, he has found numerous bugs in products such as Outlook, Postgres, Git, Docker and the underlying languages such as Ruby and Golang. He has presented at numerous security conferences and was a frequent BlackHat trainer.


Bart Stump

Sales Engineer

CDW

Bart Stump is a Sales Engineer working for CDW and living in Salt Lake City, Utah. He has been working in security for over 17 years working for some of the top vendors and companies in the industry. He has been a Black Hat staff member for 14 years and was a goon at DEF CON for 11 years and is involved with many local security groups and meetups. Follow him on Twitter @theStump3r.


Veronica Valeros

Researcher & Project Leader

Stratosphere Laboratory, Czech Technical University in Prague

Veronica is a researcher and intelligence analyst from Argentina. Her research strongly focuses on helping people. She specializes in malware network traffic analysis, threat intelligence, and profiling of attackers. She is currently the director of the Civilsphere project at the Czech Technical University, dedicated to protecting civil organizations and individuals from targeted attacks. She's also the project leader at the Stratosphere Laboratory, a research group at the Czech Technical University dedicated to studying and researching at the intersection of cybersecurity, machine learning, and helping others. She co-founded the MatesLab hackerspace and the Independent Fund for Women in Tech. She has presented her research at international conferences such as BlackHat, EkoParty, Botconf, Virus Bulletin, Deepsec, and others.


Neil R. Wyler (a.k.a. Grifter)

Global Lead of Active Threat Assessments

IBM-X Force

Neil R. Wyler (a.k.a. Grifter) is an Information Security Engineer and Researcher located in Salt Lake City, Utah. Neil is currently with IBM-X Force as Global Lead of Active Threat Assessments. He has spent over 15 years as a security professional, focusing on vulnerability assessment, penetration testing, physical security, and incident response. He has been a staff member of the Black Hat Security Briefings for over 15 years and is a member of the Senior Staff at DEF CON. Neil has spoken at numerous security conferences worldwide, including Black Hat, DEF CON, and the RSA Conference. He has been the subject of various online, print, film, and television interviews, and has authored several books on information security. Neil is a member of the DEF CON CFP Review Board and Black Hat Training Review Board.

Sustaining Partners