Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 16 speakers matching your filters
Senior R&D Software Engineer
Keysight Technologies
Kolkata,India
Anubhab Sahu is a Senior Research Engineer at Keysight Technologies, working with the Application and Threat Intelligence (ATI) team. With an M.Tech in Cyber Security, he specializes in vulnerability research, AI/LLM security, reverse engineering, security analysis, and automation. He actively writes technical blogs on security topics including AI security and traffic analysis, and holds an approved US patent in the field. His work bridges the gap between offensive security research and real-world threat simulation, contributing to advanced cybersecurity network testing solutions. He has prior experience delivering technical talks at leading security conferences, including ROOTCON '19 - one of Southeast Asia's largest cybersecurity conferences. When he's not tinkering with tech, he enjoys sharing his expertise through technical writing, conference talks, and community meetups.
Senior Security Researcher
Delhi,India
Aryan is a senior security researcher with nearly six years of focused experience in malware development, AV/EDR evasion, and low-level system programming. His work bridges deep technical research and practical offensive security, creating advanced tooling for red team engagements. He holds the CRTO certification and has led numerous adversarial simulations against mature defenses. His research also extends to implementing fuzzing frameworks and automation.Previous Speaking Engagements:WildWest Hackin' Fest - Presented research on advanced security evasion.The Hack Summit - Delivered a talk on modern malware techniques.CarolinaCon - Shared findings in offensive security research.BSides Ahmedabad - Led technical training sessions on red team tooling and methodologies.
Red Team Operator
Siemens
Madrid, Spain
Red Team operator at Siemens. Holds various hacking certifications such as: OSCP, OSWP, CRTP, eMAPT, etc. Interested in many fields within hacking: red teaming, cloud, web security, AI, low level stuff (reversing, pwn, etc). Speaker in various conferences: hack0n, RootedCON Málaga, Honeycon, Worldparty, DragonJARCon, etc.
PatchPoint
Seoul,Korea
DongHyeon Oh is a security researcher and Co-Founder of PatchPoint, based in South Korea. With an M.S. from KAIST's SoftSec Lab (NDSS 2019, CodeAlchemist), he has spent years breaking browsers, embedded devices, and Windows — collecting CVEs from Apple and Microsoft along the way. Ranked Microsoft Top 10 Security Researcher and previously spoke at CODE BLUE 2023. He now lives in IDA Pro and LLM prompts, hunting Windows vulnerabilities at the boundary of human intuition and AI.
Staff Information Security Engineer
India
Farhad Sajid Barbhuiya is a passionate security professional with over 5 years of hands-on experience in offensive security, delivering more than 2000 hours of training across educational institutions, corporations, and government organizations. His trainings cover Web & Mobile Application Security, Reverse Engineering, Exploit Development, Code Review, and more, empowering diverse audiences with practical, real-world skills.Currently a Staff Information Security Engineer on the Offensive Security team at Zscaler, Farhad works on offensive security assessments spanning across Mobile Application Security (Android & iOS), Reverse Engineering, Web Application Security, Agentic AI and LLMs and Hardware Security. His work focuses on uncovering vulnerabilities in high-stakes environments, from custom exploit chains to evasion techniques in containerized and cloud systems.A sought-after speaker, Farhad has presented at premier cybersecurity conferences including NullCon Goa (Advanced Web Apps Pentesting training), Bsides Delhi (Reverse Engineering for Exploit Development), Null Delhi (Reverse Engineering for Developers), Bsides Mumbai (DYLD Library Injection on macOS), Defcon Delhi (IoT Village), Bsides Vizag (TACTOU Attacks in AI Agents), and Bsides Mussorie (Magazine Exhaustion on iOS Heap Allocators). His sessions blend deep technical dives with live demos, making complex topics accessible and actionable.Farhad thrives at the intersection of vulnerability research, exploit development, and secure architecture, contributing to the infosec community through research, tools, and knowledge-sharing.
Head of Offensive Security
Kyoto
I have delivered technical presentations at leading cybersecurity conferences worldwide, sharing vulnerability research and offensive security methodologies with international audiences:Featured Conference Appearances:HITB (Hack In The Box) – Technical deep-dive on vulnerability discovery methodologiesBlack Hat KSA – Offensive security research and exploitation techniquesBSides – Community-focused talks on practical security testingtenguCon – Advanced threat research and attack surface analysisAdditional platforms globally – Continuing to share research across diverse security communitiesSpeaking Style: accessible delivery, making complex vulnerability research understandable for both seasoned security professionals and those newer to offensive security. Presentations include live demonstrations, real-world case studies from 0-day discoveries, and actionable takeaways that audiences can implement immediately.
Security Analyst 2
Netskope
Bangalore, India
Talks within my organisationTech Talks: I have delivered over 10 internal technical presentations tailored to a wide range of audiences across multiple product development disciplines within my organisation(netskope).Hybrid Engagement: These sessions were conducted through both face-to-face and online formats, allowing me to interact with a significant number of colleagues and refine my ability to communicate complex technical topics to diverse teams.Knowledge Transfer: Beyond formal talks, I have led dedicated mentoring sessions and deep-dive technical walkthroughs to help ramp up team members on specialized security research.External Industry RecognitionBlackHat Europe (Arsenal): I was selected to present my research and open-source tool, IOCTL Hammer, at BlackHat Europe.Expert Engagement: This experience involved presenting to an international audience of cybersecurity experts, where I successfully managed high-traffic live interactions at the Arsenal booth.Communication Mastery: Preparing for and executing this talk helped me hone my skills in articulating the technical value and novelty of my work to an external, expert-level audience.
Nukedx
Izmir,Turkey
I'm an engineer from Turkey, who is interested with biotechnology, computer science and digital gaming.So far, I made over 2million$ from bug bounty on multiple platforms like Synack, Bugcrowd and HackerOne combined.
CEO
Fuzzinglabs
Paris,France
Patrick Ventuzelo is a senior security researcher, CEO & founder of Fuzzinglabs. After working for the French Ministry of Defense, he specialized in fuzzing, vulnerability research, and reverse engineering. Over the years, Patrick has created multiple fuzzers, found hundreds of bugs, and published various blog posts/videos/tools on topics like Rust, Go, Blockchain, WebAssembly, and Browser security. Patrick is a regular speaker and trainer at various security conferences around the globe, including BlackHat USA, OffensiveCon, REcon, RingZer0, PoC, ToorCon, hack.lu, NorthSec, SSTIC, and others.
SENIOR SECURITY ENGINEER - TEAM LEAD
SECNORA INC.
DELHI,INDIA
Guest Lecturer: Certified Ethical Hacking (CEH)Poornima University, Jaipur | 2023 (Offline/On-Campus)The Engagement: Delivered an intensive 4-day offline lecture series to a cohort of over 200+ cybersecurity students.The Impact: Managed the full end-to-end delivery of the CEH program, translating dense theoretical frameworks into practical, hands-on offensive security insights.Key Achievement: Successfully maintained high engagement for a large-scale student body, focusing on real-world exploit demonstrations and career guidance in the offensive security domain.International Cybersecurity TrainerBLACKOPS Cybersecurity Consortium | Online (International)The Engagement: Provided specialized online technical training specifically for cybersecurity students located in the Philippines.The Impact: Focused on bridging international security gaps by teaching advanced penetration testing methodologies and vulnerability research.Key Achievement: Delivered high-value training across time zones, ensuring that complex security concepts were accessible and actionable for a global audience.Head Coordinator & Mentor: National Internship ProgramMSG’s Crime Free Bharat (CFB) | 2021 (Online/National)The Engagement: Served as the Head Coordinator for a massive 6-month online internship program, managing and mentoring over 500+ students.The Impact: Oversaw the technical and administrative direction of the program, designed to educate the next generation of security professionals on digital crime prevention and offensive security basics.Key Achievement: Successfully scaled a mentorship framework to support a massive volume of interns, maintaining quality control and technical rigor over a half-year duration.
Student
Amrita Vishwa Vidyapeetham
Coimbatore, Tamil Nadu, India
R.D. Tarun (RDT) is a cybersecurity researcher specializing in malware analysis, reverse engineering, and adversary tradecraft. His work focuses on dissecting real-world attack campaigns, with particular emphasis on multi-stage infection chains, fileless execution, and evolving infostealer ecosystems.He conducts in-depth research on active malware campaigns, tracking their progression from commodity tooling to custom-developed payloads. His analysis has uncovered previously undocumented behavior, including custom infostealers, infrastructure patterns, and techniques used to evade modern defenses. His research has been widely circulated within the security community and covered by multiple security news outlets and industry publications.His work combines static and dynamic analysis with memory-level investigation to trace full execution chains from initial access to data exfiltration. He focuses on understanding attacker tradecraft end-to-end and translating offensive techniques into practical detection strategies for SOC and DFIR teams.He actively publishes technical deep-dives on malware, including infostealers, fileless loaders, and multi-stage attack chains, and has presented his research at reputed security community meetups and forums.
Co-founder & CEO
Beagle Security
Trivandrum,India
Organizer & Speaker at DevFest 2025 (Trivandrum)Hands-on Kubernetes Workshop at GDG Cloud Community Days TrivandrumSpeaker at GDG Cloud Kochi launch event on 11 May 2022JPC recommendation on data protection: Impact on Startups conducted by the Centre for the Digital Future (CDF) on 6 January 2022Keynote address at Hac'KP Summit & Awards 2021 on 4th Sep 2021Startup Stories - #36 Beagle Security interviewData Privacy & Security for Business Analysts on 12 Dec 2020Hands-On Threat Hunting Workshop at OWASP Seasides, International Centre Goa on 3,4,5 March 2020CYINNOV8 - One Day Conference on “INNOVATIONS IN CYBERSPACE” at DR D S KOTHARI AUDITORIUM, DRDO Bhawan, New Delhi on 29 October 2018Security in Web Applications at Cyber Park KozhikodeMalware Analysis Basics for CyberDome volunteers at CyberDome TrivandrumKerala Police CyberDome Python Workshop at CyberDomeOWASP Kerala Student Outreach Program at KeralaWorkshop on Python Programming for College Faculties of KTU at Mar Baselios College of Engneering, Kollom on 24th & 25th July 2015Node JS Security (Coffee@DBG) at DBG Trivandrum on 03 Dec 2014Secure Deployment at DBG Trivandrum, Dec 2013Introduction to Jenkins at DBG Trivandrum on 04 Nov 2013Version Control with Git (Coffee@DBG) at DBG Trivandrum on 02 Oct 2013Code quality tools for PHP developers (Coffee@DBG ) at DBG Trivandrum on 05 Sep 2013
Security Researcher
London, United Kingdom
I'm a security researcher with a passion for OS internals and all things low-level. Over the years I have specialised in Android & the Linux kernel, but have dabbled in a number of domains. When I'm not figuring out how things work and breaking them, I love to share my experiences and help others; whether it's via my blog, talks or mentoring.
Founder
NOZ Berkarya Indonesia
indonesia
A Telco Security Researcher and Embedded System Developer with over 10 years of experience in telecommunication protocol analysis, embedded system design, and cybersecurity research. Founder and principal researcher at NOZ Berkarya Indonesia, focusing on emerging network security, OpenBTS/Osmocom stack integration, and SIEM for Telco networks. Specialized in combining radio frequency analysis, reverse engineering, and real network behavior modeling to improve detection, response, and resilience in telecom infrastructures (2G–5G). Committed to advancing Sustainable Development Goal (SDG) 9: Industry, Innovation, and Infrastructure, by fostering innovation and resilient digital infrastructure through open-source research and secure communication technologies.These are some of the results of my research that I have published.1. 2 Januari 2015 - Publication of research result at Infosec Institute with title “Introduction to RFID Security” At this research we do Reverse Engineering at ticket commuter line and make a attack scenario RFID 2. Januari 2015 - Research RFID – Berdikari Standalone RFID Reader dan Emulator At this research we do a design PCB use ATmega328P to be Reader and Emulator to do cloning RFID Tag. • Deep learning microcontroller • Emulate RFID Tag • RFID cloning more than 3 tags in 1 Device 3. 12 Februari 2015 - Publication of research result at Infosec Institute with title “Introduction to Smartcard Security”At this research we learn about communication of protocol used on Smartcard EMV Debit Card and 4G Provider BOLT and implement several attack • Deep learning about SIM Card • Smartcard Architecture • simulated attack identification ◦ Physical attack: Reverse engineering, Smartcard cloning ◦ Remote attack: IMSI catcher, OTA 4. 19 Maret 2015 - Publication of research result at Infosec Institute with title “Introduction to GSM security” At this research we learn about communication of protocol used on Handphone and BTS (base transceiver station). We do analysis using radio (Universal Software Radio Peripheral) to know type of encription used and tracking handphone location used LAC and Cell ID. • Analisys 2G GSM Protocol • Tracking IMSI in your area 5. 9 Juni 2015 - Publication of research result at Infosec Institute with title “Reverse Engineering of Embedded Devices”At this research we learn about how to work “broadcasters livestream” with identify all CHIP used and learning about protocol communication used, we do Reverse Engineering using Bus Pirate and Saleae Logic Analyzer. • Device disassembly and PCB design analysis. • Debugging Communication Protocol 1-Wire, UART, I2C, SPI, JTAG. • Analyze the logic signals, capture sampling and decode protocol. • extracting the firmware. • Mapping the component Device and protocol used 6. Maret 2016 - Publication Mini Course of INFOSEC INSTITUTE with title “Advanced Pentesting Techniques with Metasploit” • AUXILIARY — Scanners (Intermediate → Advanced). Mastery of additional modules for discovery, fingerprinting, and brute force against services • AUXILIARY — Fuzzers (Intermediate). Find crashes/vulnerabilities in services through Metasploit's built-in fuzzing • Credential Harvesting & Social-Engineering (Intermediate → Advanced). Technique to retrieve credentials from endpoints via post-exploit modules. • Post-Exploitation — Privilege Escalation (Advanced). • Post-Exploitation — Lateral Movement & Persistence (Advanced). • IE Proxy PAC / Proxy Abuse (Attack on Browsing Infrastructure) (Advanced). • Misc: NOP generator & Encoders (Exploit robustness / Evasion) (Advanced). • Advanced module/payload configuration & custom Metasploit modules (Expert) 7. Desember 2018 - Research and manufacture of post-disaster telecomunication equipment. Post-disaster telecommunications equipment (portable BTS / emergency comms kit) aims to provide emergency voice/data services when commercial infrastructure is damaged. This solution involves the design of radio equipment (small/portable BTS), a standalone power system, backhaul options (satellite / microwave / cellular fallback), antenna and RF tuning, signal security, and field operations and logistics procedures.8. 24 Agustus 2019 - Publication of research result at Infosec Institute with title “Mobile Phone Tracking”At the research we learning about protocol communication between Mobile Phone and BTS (base transceiver station) working, with identification LAC , Cell ID and Timing advance (TA) we could to know where the signaling come from. 9. September 2025 – SIEM Telco Research at the research we make a idea inovasion combination of OpenBTS , Osmocom Stack , and ella-core to build a telco-aware SIEM pipeline, benefit for analysis behavior endpoint and cell realtime for detection response, low level kernel analysis behavior realtime detection response, fraud detection realtime.
Senior Security Researcher
Cato Networks
Israel
Vitaly Simonovich is a senior security researcher at Cato Networks and a member of Cato CTRL. Currently, Vitaly focuses on researching topics related to LLM security, with a particular emphasis on jailbreaks and prompt injections, as well as conducting vulnerability research across a wide range of technologies. In addition, he is actively involved in threat intelligence, analyzing emerging threats and attack trends to strengthen organizational defenses.Prior to joining Cato in 2023, Vitaly worked at Incapsula and Imperva, where he led teams of security analysts and researchers. With over nine years of experience in cybersecurity, Vitaly specializes in application security, data security, LLM security, vulnerability research, and threat intelligence.An active contributor to the cybersecurity community, Vitaly regularly publishes research blogs, hosts webinars, and presents at conferences. In addition to his professional work, he teaches cybersecurity at local colleges and enjoys solving CTF challenges in his free time to stay sharp and enhance his skills.
Cycraft
Taiwan
BlackUSA 2025Pay Attention to the Clue: Clue-Driven Reverse Engineering by LLM in Real-World Malware AnalysisAll Talk, AI Action: Binary Analysis Toolkit MCP ServerUSENIX 2024 Poster SessionFuBuKi: Fuzzing Testing on Bluetooth with Profile Emulation KitSECCON 2025YaDa: Reverse Engineering with Yara BytecodeCYPERSEC 2025Blue Archive: Unveiling Bluetooth Vulnerabilities in EV SystemsAVTokyo 2023IDAFit – a ringcon based IDA pro controller to Catch The Fitness