Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 23 speakers matching your filters
SOC analyst
IDDA
Baku,Azerbaijan
I often deliver technical security content to professional and executive level audiences. For example, as a SOC Analyst at IDDA, I directly presented our SOAR (Security Orchestration, Automation and Response) platform to Ministry of Security representatives. I gave a technical walkthrough of the platform architecture, incident automation workflows, threat correlation mechanisms, and presented real world use cases. Subsequent to the presentation, the product received considerable interest from multiple stakeholders and potential investors.I've also attended vendor meetings with Palo Alto and Forcepoint DLP, presenting technical assessments and making workflow recommendations to help optimize the deployment of security products and their integration into the corporate environment.Besides this type of enterprise-level presentation, I've also been the guy on the team to go to an international hackathon. I presented AI security and automation concepts at an innovation event in Georgia. I gave a presentation to a technical evaluation panel, detailing the design of the system, the model for threat detection, and the architecture of the data pipeline.I also took part in the Google AI Hackathon in Kazakhstan, where I presented a detailed technical pitch including model architecture, implementation strategy, and deployment aspects to judges and business representatives.These occasions implied explaining intricate technical details in a digestible form, addressing immediate technical inquiries, justifying architecture choices, and discussing security compromises. I feel at ease presenting deeply technical information to both engineering communities and business leaders.
India
Blackhat Asia 2026 - https://blackhat.com/asia-26/briefings/schedule/#the-curious-case-about-apple-and-its-intelligence-on-demand-only-50679 "Investigating macOS Ransomware" (Black Hat Middle East & Africa 2025) - https://blackhatmea.com/speaker/bhargav-rathod"macOS Lockdown Mode: A DFIR Odyssey" (Nullcon Goa 2025 and SANS DFIR Summit 2025) - https://www.youtube.com/watch?v=UaNXEad-CPQ"Investigating a WSA Endpoint" (SANS DFIR Summit 2023) - https://www.sans.org/presentations/investigating-a-wsa-endpointBSides Ahmedabad 2023 - Catch me if you Can
Researcher
LOONG
HK
Captain, founder of LOONG Community, is an independent security researcher. He focuses on hardware security researches, penetration test, incidents response and digital forensics analysis. He was the first and the only Asian leading a group of white-hat hackers to hold an in-depth, hands-on hardware hacking village in BLACK HAT and DEFCON. He is also a frequent speaker and trainer in different top-notch security and forensics conferences including SANS, HTCIA, DFRWS, GCC, CodeBlue, HITB, SINCON, AVTokyo and HITCON.
SME
Self Employed
Tangerang, Banten, IDN
EXPERTISE:- Experienced Cyber Security with a demonstrated history of working in the several industry. Skilled in Penetration testing, XDR, EDR, DFIR, Threat Hunting, and OSINT.- Advanced Ethical Hacking:Proficient in various hacking methodologies, including but not limited to network penetration testing, (web, API, Infra, mobile) application testing, wireless network exploitation, and social engineering.- Deep Knowledge of Security Frameworks: Expertise in industry- standard security frameworks such as OWASP, NIST, and PTES, with the ability to apply their guidelines effectively
Computer Security Researcher
Spectroblock
Iraq
Diyar Saadi Ali is a formidable force in the realm of cybersecurity, renowned for their expertise in cybercrime investigations and their role as a certified SOC and malware analyst. With a laser-focused mission to decode and combat digital threats, Diyar approaches the complex world of cybersecurity with precision and unwavering dedication. At the core of their professional journey lies real-time security event monitoring a task Diyar executes with exceptional vigilance and expertise. As a respected MITRE ATT&CK Contributor, they have made invaluable contributions to the global cybersecurity community, sharing insights and strategies that help organizations bolster their defenses against evolving cyber threats. Diyar’s impact is further amplified by their role as the discoverer and owner of critical Common Vulnerabilities and Exposures (CVEs), including CVE-2024-25400 and CVE-2024-25399. These achievements underscore their commitment to identifying and addressing systemic vulnerabilities that could otherwise threaten digital ecosystems.
Security Researcher
Kaspersky
KualaLumpur,Malaysia
Fareed is a malware security researcher with more than 5 years of experience. His interests lie in malware reverse engineering, threat intelligence, digital forensics, and detection. As part of the Global Research and Analysis Team (GReAT) at Kaspersky, Fareed participates in investigating cybercrimes, tracking APT groups, and dismantling the malicious infrastructure of threat actors. Additionally, Fareed frequently shares his knowledge through public talks, mentorship, training sessions, briefings, and media interviews, representing both himself and Kaspersky. His specialization in malware and APT analysis allows him to speak and share his insights with a wide range of audiences, contributing significantly to the local and international cybersecurity community.
Offensive Security Consultant
ITSEC Asia
Jakarta
The speaker has served as a presenter at Black Hat Asia in both 2023 and 2024, participating in the Arsenal (Web Application Security) track held in Singapore.The speaker has also served as a guest speaker in several universities and community events & had attended BlackHat MEA 2022 - 2024 in Riyadh as a CTF Finals participant.
Principal Cybersecurity Analyst
Gen Digital
Kuala Lumpur, Malaysia
Jason Phang is a Principal Cybersecurity Analyst with extensive experience in threat hunting, incident response, and detection engineering. Before his current role, he served as CSIRT Lead at MoneyLion, leading incident response operations and cyber defense initiatives. He was previously a Threat Hunter at WithSecure, where he successfully uncovered and analyzed macOS malware families including AMOS, Frigid, and Cuckoo, and developed detection rules to protect enterprise customers. Earlier in his career, he worked as a SOC Analyst at Experian and Maybank, building a strong foundation in security operations and threat monitoring. His expertise lies in uncovering advanced threats and transforming forensic insights into actionable detections, with a particular focus on macOS malware hunting and defense.
Founder
Possible Security
Riga, Latvia
Kirils Solovjovs is Latvia's leading white-hat hacker and IT policy activist, renowned for uncovering and responsibly disclosing critical security vulnerabilities in both national and international systems. Kirils started programming at age 7 and by grade 9 was spending his lunch breaks writing machine code directly in a hex editor.With deep expertise in network flow analysis, reverse engineering, social engineering, and penetration testing, he has significantly contributed to cybersecurity advancements. Notably, Kirils developed the jailbreak tool for MikroTik RouterOS and played a pivotal role in creating e-Saeima, enabling the Latvian Parliament to conduct a fully remote legislative process, the first of its kind globally.He currently serves as the lead researcher at Possible Security and as a research assistant at the Institute of Electronics and Computer Science.
Seoul, South Korea
Moonbeom ParkCPO(Chief Product Officer) @78ResearchLabFormer senior researcher of KrCERT/CC & KISAI'm working at 78ResearchLab(http://www.78researchlab.com) in South Korea, a company specializing in the development of cyber warfare tactics and offensive and attack technologies. They analyze the cyber warfare strategies of Advanced Persistent Threat(APT) groups and conduct research on of attack techniques such as 0-day vulnerabilities and develop various cyber weapons, exploites, Post-Exploitation techniques that can be utilized in cyber warfare operations.
Security Researcher
Internet Initiative Japan Inc.
Japan
## Investigation and Analysis of Malware Spreading Infection via MSI Package Files (BSides Tokyo 2023)Language: JapaneseAgenda: https://bsides.tokyo/2023/Slide (PDF): https://github.com/mopisec/bsides-tokyo-2023/blob/main/BSidesTokyo2023_MSIanalysis_dist.pdfRecording: Not Available## Reverse Engineering Malware Written in C++ with IDA and Semi-Automated Scripts (Training at GCC 2025 Taiwan)Language: EnglishAgenda: https://gcc.ac/archive/gcc_2025/Slide (PDF): Not AvailableRecording: Not Available## Inside Pandora's Box: dissecting the latest arsenal and tactics of APT27 (VB2025 Berlin)Language: EnglishAgenda: https://www.virusbulletin.com/conference/vb2025/abstracts/inside-pandoras-box-dissecting-latest-arsenal-and-tactics-apt27/Slide (PDF): https://www.virusbulletin.com/uploads/pdf/conference/vb2025/slides/Slides-Inside-Pandoras-box-dissecting-the-latest-arsenal-and-tactics-of-APT27.pdfRecording: https://www.youtube.com/watch?v=TUATnkPEsnc## Continuous Evolution of Tianwu’s Pangolin8RAT and Custom Cobalt Strike Beacon (JSAC2026)Language: EnglishAgenda: https://jsac.jpcert.or.jp/en/timetable.htmlSlide (PDF): https://jsac.jpcert.or.jp/archive/2026/pdf/JSAC2026_1_6_naoki_takayama_en.pdfRecording: TBA (Should be available on YouTube soon)
Lead Security Engineer
Coupa Software
Pune
Over 14 years of experience in the security domain, specializing in Penetration Testing, Application Security, Cloud Security, Architecture and Forensics Investigation.Leading an Offensive Security (OffSec) and Security Architecture team with a passion for Red Teaming and Security Research.Reported multiple vulnerabilities in products and applications, recognized with CVEsHolds prestigious certifications including GIAC Cloud Penetration Tester (GCPN), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP), Certified Red Team Operator (CRTO), among othersPresented at prominent conferences such as Bsides Budapest, Bsides Milano, Hacktivity, VulnCon 2024, Hacker Halted, CyberSec Asia, Identity Shield, Microsoft BlueHat 2025, PHDays 2025, VulnCon 2025, OWASP AppSec Days 2025, Hacker Halted 2025.
Founder
Novus Aegis AI Inc
DallasTexas
AI Security Architect, and Founder of Novus Aegis AI and ReconPro. He specializes in building autonomous, AI-driven Security Operations (AI SOC) platforms that detect, triage, and respond to cyber threats in real time.With over a decade of hands-on experience in cloud security, DevOps, and cyber defense, Chris has designed and secured enterprise-scale infrastructures by embedding security into CI/CD pipelines and infrastructure-as-code. His expertise includes vulnerability management (SCA, SAST, DAST), red teaming, APT simulation, and SOC automation, aligned with frameworks such as NIST, ISO 27001, and SOC 2.He is the creator of “God’s Eye,” an advanced capability within ReconPro that delivers continuous attack surface visibility, adversary simulation, and intelligence-driven security insights. Through Novus Aegis AI, he is advancing autonomous cyber defense using AI agents that proactively hunt threats, reduce alert fatigue, and compress incident response times from hours to seconds.Chris is passionate about shaping the future of cybersecurity through AI-driven defense, offensive security strategy, and building resilient, self-adapting security ecosystems for enterprises globally.
Public Service
Self
Federal Way, WA, US
My work is shaped by professional experience and lived reality.A career in law enforcement and public service has included leading programs focused on community safety, supporting missing persons investigations, and working in close partnership with Tribal communities across Washington State. That work has revealed gaps that often exist between systems and the communities served—and the critical role of trust built through consistency, respect, and accountability.Connection to this work is also deeply personal.Previously a foster parent, having extended kinship networks, and a descendant of a federal Indian boarding school survivor, bringing a perspective shaped by lived experience and a deep understanding of loss, resilience, and the lasting impacts of historical and intergenerational trauma. These experiences inform relationship-building, listening, and engagement—with a strong commitment to culturally responsive and trauma-informed practices.Work alongside Tribal leaders, advocates, and partner agencies has supported efforts addressing Missing and Murdered Indigenous Women and People (MMIWP), with a focus on strengthening collaboration and improving system responses.At the core of my work is a belief that meaningful change happens at the intersection of relationships, accountability, and action. Focus remains on building trust and creating solutions informed by the voices and experiences of those most impacted.Because when systems listen, relationships strengthen—and when relationships strengthen, real change becomes possible.
Security Security Analyst
YOKOGAWA Thailand
Thailand
Currently, I serve as a Senior DFIR Analyst at Yokogawa Thailand, where I focus on advanced investigations, incident containment, and strengthening SOC processes for IT-OT environments. Prior to this, I worked as a SOC L2 Analyst at Group-IB, one of the leading global MSSPs, where I handled high-severity incidents, performed root cause analysis, and contributed to proactive defense strategies. Earlier in my career, I spent three years at Myanmar’s largest telecom (MPT-KDDI Joint Operation), gaining deep expertise in security operations, threat intelligence, and cyber threat hunting. I also contributed to defensive operations for ThaiBev’s joint venture (Grand Royal Group International Company), supporting both corporate and OT/ICS security initiatives. With a proven track record across telecom, MSSP, and critical infrastructure sectors, I bring strong technical expertise, cross-border experience, and a proactive approach to defending against advanced threats.
Cybersecurity Analyst
Gen Digital
Malaysia
I am a cybersecurity professional with 1.5 years of work experience in DFIR and CTI. Recently, I have been researching into macOS threats and forensics since this topic is niche in Malaysia. I've also spent two years in the CTF scene, competing with the M53 and L3ak teams, where I had the opportunity to compete on a global stage and achieve multiple victories in CTF competitions and writeup contests. I now channel that same curiosity and rigor into professional development, pursuing certifications and exploring macOS research, RFID security, and blockchain security.
Security Analyst
Telkom
Indonesia
Syaiful Andy earned his Bachelor’s degree in Electrical Engineering from Institut Teknologi Bandung (ITB) in 2016. He then pursued a fast-track Master’s program at ITB, specializing in Information Security Engineering and Management, and graduated in 2017.Syaiful has contributed to the cybersecurity field through several scientific publications (papers and journals), with a current total of approximately 290 citations. He is currently working at Telkom Indonesia as a Security Analyst.He holds various professional certifications, including CCNA, CyberOps, DevNet, CCNP Enterprise, CEH, CHFI, CySA+, CISA, CISM, CFR, CSC, CertNexus Authorized Instructor, SAL1, CCOA, CCD, CDSA, and others.In addition to his professional role, Syaiful is actively involved in community and knowledge-sharing initiatives through organizations such as CDEF and ISACA. He also serves as a mentor, trainer, and guest lecturer at several universities, delivering sessions on Data Science and Cybersecurity.
student
National Forensic Sciences University Delhi Campus (LNJN NICFS)
Delhi, IND
Currently pursuing an M.Sc. in Digital Forensics and Information Security at NFSU, building on a BCA background and a strong interest in cybersecurity, digital forensics, and the role of AI in national security. My academic journey and personal projects have consistently focused on understanding how digital systems function and more importantly, how to secure them. With a foundation in computer applications and practical, problem-solving experience, I’m now exploring deeper domains like threat detection, digital investigations, and intelligence-driven security systems. I’m particularly interested in how AI can be applied to surveillance, decision making, and cyber defense. My goal is to work on projects and research that bridge theoretical knowledge with real-world applications, especially in areas that contribute to critical infrastructure and national security.
Assistant Professor
Rashtriya Raksha University
Gandhinagar,India
Dr. Akash Thakar is an Assistant Professor at Rashtriya Raksha University (RRU), an Institution of National Importance under the Ministry of Home Affairs, Government of India, where he specializes in Digital Forensics, Incident Response, and Cyber Security Operations. He holds a Ph.D. in Forensic Science and multiple industry certifications, including CEH (Certified Ethical Hacker), CHFI (Computer Hacking Forensic Investigator), and CEI (Certified EC-Council Instructor). He was awarded with best academia instructor award in 2023 by EC-Council.Dr. Thakar has served as a trainer and Red Team Manager in several large-scale national cyber security exercises organized by National Security Council Secretariat, including the Bharat National Cyber Security Exercise (2023, 2024, 2025), SOC RATS, and CII SECEx organized by NCIIPC, Government of India, among others. Across these exercises, he designed and delivered live training modules in Digital Forensics and Incident Response, simulating real-world adversary operations and guiding blue teams through evidence collection, analysis, and remediation.His professional engagements span both offensive and defensive cyber operations, where he focuses on bridging the gap between attacker tactics and forensic detection. Dr. Thakar has contributed to developing training frameworks for national cyber defence initiatives, collaborated with government and academic partners, and frequently delivers talks and workshops on advanced forensic methodologies and detection-driven threat hunting.Dr. Akash Thakar continues to advance cyber education through hands-on, detection-oriented programs that integrate red-teaming insights with forensic science for practical, real-world defense.
Student/Cybersecurity Researcher
Rashtriya Raksha University
Hanamkonda,India
Jakkaraju Varshith is a student and cybersecurity researcher pursuing an M.Sc in Cybersecurity and Digital Forensics at Rashtriya Raksha University. His work focuses on red-team operations, Windows exploitation, and malware behavior in real-world enterprise environments.He has hands-on experience in exploit development, digital forensics, and AI-driven security automation. Varshith actively builds open-source security tooling, including MCP-based integrations for Volatility memory forensics and IDA Pro binary analysis, helping bridge modern AI assistants with practical security research workflows. His approach combines offensive experimentation with defensive validation, enabling teams to understand attacker tradecraft and improve detection resilience through reproducible, lab-tested methods.
Security Reseracher
BharatGen, IIT-B
Chandigarh,India
Vishal Chand is a Security Researcher at Zscaler focusing on AI driven cybersecurity and LLM security. He has spoken at Microsoft BlueHat Asia and multiple BSides conferences across India. His work explores real world AI threats, adversarial techniques, and next generation defense strategies.
London
I have spoken at DEF CON 30 (mainstage), various BSides (London, New York City, Rome, Prishtina, Dublin), and many other conferences such as HackCon Norway, Wild West Hackin' Fest @ Mile High, Nullcon Goa, Disobey Helsinki, SANS DFIR Summit and MITRE ATT&CK EU Community.You can find some recordings here: https://www.youtube.com/results?search_query=%22Wietze+Beukema%22
PIOLINK
SouthKorea
I am an information security researcher based in Korea, specializing in digital forensics, CERT, pentesting, and web application security. My work focuses on analyzing real-world security incidents, reproducing attack scenarios, and identifying systemic weaknesses across modern IT environments. I have hands-on experience in offensive and defensive security research, bridging incident response with adversary simulation to improve organizational security posture.