Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 34 speakers matching your filters
Security Analyst
Japan
I’m currently working as a Security Analyst, with experience in both red team and blue team operations. My current focus is on red team engagements, zero-day research, and malware analysis.
Project Assistant
C3iHub
Dehradun, India
Provided Malware Analysis training to 200+ Government Employees over a week.Done my M.Tech degree in cyber security from RRU Gandhinagar.Been part of DRDO (Delhi) for CyberSecurity a projectRed Teamer at NCX '25 and CII-SECEX '25
Security Researcher
CyberWarFare Labs
India
Abhijeet is a security researcher specializing in adversary simulations that mimic advanced threat actors, by crafting multi stage attack chains, from initial foothold to stealthy persistence and data exfiltration. With extensive hands-on experience, he has engineered and executed offensive engagements targeting CI/CD pipelines, Kubernetes clusters, Active Directory environments, cloud infrastructures (AWS, Azure, GCP), and *NIX systems. In his spare time he runs a homelab where he recreates adversary TTPs, toys with new tech, and dissects emerging threats. He’s also an avid reader, enthusiastic foodie, and weekend time home chef.
SOC analyst
IDDA
Baku,Azerbaijan
I often deliver technical security content to professional and executive level audiences. For example, as a SOC Analyst at IDDA, I directly presented our SOAR (Security Orchestration, Automation and Response) platform to Ministry of Security representatives. I gave a technical walkthrough of the platform architecture, incident automation workflows, threat correlation mechanisms, and presented real world use cases. Subsequent to the presentation, the product received considerable interest from multiple stakeholders and potential investors.I've also attended vendor meetings with Palo Alto and Forcepoint DLP, presenting technical assessments and making workflow recommendations to help optimize the deployment of security products and their integration into the corporate environment.Besides this type of enterprise-level presentation, I've also been the guy on the team to go to an international hackathon. I presented AI security and automation concepts at an innovation event in Georgia. I gave a presentation to a technical evaluation panel, detailing the design of the system, the model for threat detection, and the architecture of the data pipeline.I also took part in the Google AI Hackathon in Kazakhstan, where I presented a detailed technical pitch including model architecture, implementation strategy, and deployment aspects to judges and business representatives.These occasions implied explaining intricate technical details in a digestible form, addressing immediate technical inquiries, justifying architecture choices, and discussing security compromises. I feel at ease presenting deeply technical information to both engineering communities and business leaders.
Managing Director
CAIBERP GmbH
Heidelberg, Germany
Andreas Wiegenstein is engaged in SAP cyber security since 2003. He discovered quite a number of zero-day vulnerabilities in SAP software and supported development of a market leading static code analysis tool for the business programming language ABAP. He has spoken at more than 70 conferences world-wide about SAP security, including Black Hat, DeepSec, Hack In The Box, IT Defense, RSA, SAP TechEd and Troopers (alphabetical order). His current research is focused on SAP malware and supply chain attacks.
Senior Security Researcher
Delhi,India
Aryan is a senior security researcher with nearly six years of focused experience in malware development, AV/EDR evasion, and low-level system programming. His work bridges deep technical research and practical offensive security, creating advanced tooling for red team engagements. He holds the CRTO certification and has led numerous adversarial simulations against mature defenses. His research also extends to implementing fuzzing frameworks and automation.Previous Speaking Engagements:WildWest Hackin' Fest - Presented research on advanced security evasion.The Hack Summit - Delivered a talk on modern malware techniques.CarolinaCon - Shared findings in offensive security research.BSides Ahmedabad - Led technical training sessions on red team tooling and methodologies.
Offensive Security Lead
Mindpool Technologies
Hyderabad,India
Offensive Security Lead and globally ranked security researcher with extensive experience in vulnerability research and red teaming. Recognized as Best Bug Hunter at Microsoft MVR (2023–2025) and acknowledged by leading organizations including Apple (2022) and Google (2021). Featured in the Hall of Fame of 300+ Fortune companies for responsible disclosures.Holds multiple industry certifications including CRTP, LPT, CPENT, eWPTXv2, CHFI, and CEH. Discovered and reported 5 CVEs. Active CTF player and public speaker, regularly sharing insights on offensive security, bug bounty methodologies, and advanced attack techniques at international conferences and universities.
India
Blackhat Asia 2026 - https://blackhat.com/asia-26/briefings/schedule/#the-curious-case-about-apple-and-its-intelligence-on-demand-only-50679 "Investigating macOS Ransomware" (Black Hat Middle East & Africa 2025) - https://blackhatmea.com/speaker/bhargav-rathod"macOS Lockdown Mode: A DFIR Odyssey" (Nullcon Goa 2025 and SANS DFIR Summit 2025) - https://www.youtube.com/watch?v=UaNXEad-CPQ"Investigating a WSA Endpoint" (SANS DFIR Summit 2023) - https://www.sans.org/presentations/investigating-a-wsa-endpointBSides Ahmedabad 2023 - Catch me if you Can
Security Research Engineering Technical Leader
Cisco Talos
Zurich
Chi-en “Ashley” Shen is a Security Research Engineering Technical Leader at Cisco Talos, specializing in emerging threat research—ranging from nation-state attacks to financially motivated crimes and spyware campaigns. Before joining Cisco, she worked at Google’s Threat Analysis Group, where she hunted zero-day exploits and tracked botnets. Prior to that, she was part of Mandiant’s Global Research Team, where she co-authored the APT41 report and published research on ICEFOG campaigns. In Taiwan, Ashley co-founded Team T5 and served as a senior threat analyst with a focus on targeted attacks in APAC. A passionate advocate for women in cybersecurity, Ashley co-founded HITCON GIRLS, the first security community for women in Taiwan, and she currently organizes Rhacklette, a security community for FINTA in Switzerland. She has presented her research at a range of conferences, including Black Hat, HITB, HITCON, FIRST, Pivotcon and CODE BLUE. In her free time, she supports the community by offering training sessions and serving on the review boards for Black Hat, HITCON, and HITB.
NULL
Israel
Feel free to email me on basically anything on computing or history
SME
Self Employed
Tangerang, Banten, IDN
EXPERTISE:- Experienced Cyber Security with a demonstrated history of working in the several industry. Skilled in Penetration testing, XDR, EDR, DFIR, Threat Hunting, and OSINT.- Advanced Ethical Hacking:Proficient in various hacking methodologies, including but not limited to network penetration testing, (web, API, Infra, mobile) application testing, wireless network exploitation, and social engineering.- Deep Knowledge of Security Frameworks: Expertise in industry- standard security frameworks such as OWASP, NIST, and PTES, with the ability to apply their guidelines effectively
Managing Ethical Hacker
HAKFLOW
London
As an ethical hacker, I equip enterprises with the advice and solutions to improve their digital security posture and their overall business growth. Throughout my career as an ethical hacker I’ve worked across several industries including:💥 Government💥 Advertising💥 Retail💥 Financial Services💥 Blockchain💥 Technology💥 Publishing💥 Non-Profit💥 And more!This has provided me the opportunities to gain a breadth of knowledge on all things security testing.
Computer Security Researcher
Spectroblock
Iraq
Diyar Saadi Ali is a formidable force in the realm of cybersecurity, renowned for their expertise in cybercrime investigations and their role as a certified SOC and malware analyst. With a laser-focused mission to decode and combat digital threats, Diyar approaches the complex world of cybersecurity with precision and unwavering dedication. At the core of their professional journey lies real-time security event monitoring a task Diyar executes with exceptional vigilance and expertise. As a respected MITRE ATT&CK Contributor, they have made invaluable contributions to the global cybersecurity community, sharing insights and strategies that help organizations bolster their defenses against evolving cyber threats. Diyar’s impact is further amplified by their role as the discoverer and owner of critical Common Vulnerabilities and Exposures (CVEs), including CVE-2024-25400 and CVE-2024-25399. These achievements underscore their commitment to identifying and addressing systemic vulnerabilities that could otherwise threaten digital ecosystems.
Assistant Professor & Director
University of Alabama in Huntsville
Huntsville, United States
Dr. Bramwell Brizendine completed his Ph.D. in Cyber Operations. A security researcher, currently Bramwell is an Assistant Professor at the University of Alabama in Huntsville, and he is the founding Director of the Vulnerability and Exploitation Research for Offensive and Novel Attacks (VERONA Lab). A cybersecurity expert, Bramwell has taught numerous undergraduate, graduate, and doctoral level courses in reverse engineering, software exploitation, advanced software exploitation, malware analysis, and offensive security. Additionally, Bramwell has authored several important cybersecurity tools, including JOP ROCKET, SHAREM, ShellWasp, and ROP ROCKET, which are open source and freely available. Bramwell was a PI on a $300,000 NSA research grant to develop a shellcode analysis framework, SHAREM. Bramwell is a 2025 recipient of the DARPA YFA for $500,000. Bramwell has been a speaker at many top security conferences across the globe, including different regional variations of Black Hat, DEFCON, Hack in the Box, and more.
Security Researcher
Kaspersky
KualaLumpur,Malaysia
Fareed is a malware security researcher with more than 5 years of experience. His interests lie in malware reverse engineering, threat intelligence, digital forensics, and detection. As part of the Global Research and Analysis Team (GReAT) at Kaspersky, Fareed participates in investigating cybercrimes, tracking APT groups, and dismantling the malicious infrastructure of threat actors. Additionally, Fareed frequently shares his knowledge through public talks, mentorship, training sessions, briefings, and media interviews, representing both himself and Kaspersky. His specialization in malware and APT analysis allows him to speak and share his insights with a wide range of audiences, contributing significantly to the local and international cybersecurity community.
Offensive Security Consultant
ITSEC Asia
Jakarta
The speaker has served as a presenter at Black Hat Asia in both 2023 and 2024, participating in the Arsenal (Web Application Security) track held in Singapore.The speaker has also served as a guest speaker in several universities and community events & had attended BlackHat MEA 2022 - 2024 in Riyadh as a CTF Finals participant.
Head of Identity Threat Labs
Segura®
United States
I’ve been working as Head of Identity Threat Labs and Global Product Advocate at Segura®, Red Team Village Director, Senior Advisor Raices Cyber Academy, Founder of Red Team Community (Brazil and LATAM), AWS Community Builder, Snyk Ambassador, Application Security Specialist and Hacking is NOT a crime Advocate. International Speaker at Security and New technologies events in many countries such as US (Black Hat & Defcon), Canada, France, Spain, Germany, Poland, Black Hat MEA - Middle-East - and others. I’ve served as University Professor in Master Degree - Portugal and Graduation and MBA courses at Brazilian colleges, in addition, I'm Creator and Instructor of the Course - Malware Attack Types with Kill Chain Methodology (PentestMagazine), PowerShell and Windows for Red Teamers(PentestMagazine) and Malware Analysis - Fundamentals (HackerSec).
Senior Security Researcher
Virustotal
Madrid,Spain
Joseliyo Sanchez is a security engineer at VirusTotal - Google. Previously worked at McAfee and BlackBerry as a threat researcher. His main objectives are threat hunting that leads to detection engineering and analysis of APTs and Crime groups.
Reverse Engineer
SiouxFalls,SouthDakota
Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer with the FLARE team at Google, where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineering, and other security related topics.
Head of Cyber Threat & Product Defense Center
TXOne Networks
Taipei City
Mars Cheng leads TXOne Networks' PSIRT and Threat Research Team as their Threat Research Manager, where he coordinates product security initiatives and threat research efforts. He also holds the position of Executive Director for the Association of Hackers in Taiwan, facilitating collaboration between enterprises and the government to bolster the cybersecurity landscape. Additionally, Mars serves as a Cybersecurity Auditor for the Taiwan Government. His expertise spans ICS/SCADA systems, malware analysis, threat intelligence, and hunting, as well as enterprise system security. Mars has made significant contributions to the cybersecurity community, including authoring more than ten CVE-IDs and publishing in three SCI journals on applied cryptography.Mars is a frequent speaker and trainer at numerous prestigious international cybersecurity conferences, including Black Hat USA/Europe/MEA, RSA Conference, DEF CON, CODE BLUE, SecTor, Troopers, FIRST, HITB, ICS Cyber Security Conference Asia and USA, HITCON, NoHat, ROOTCON, SINCON, CYBERSEC, and many others. He plays an instrumental role as the General Coordinator for the HITCON CISO Summit 2024 and has successfully organized several past HITCON events including HITCON CISO Summit 2023, HITCON PEACE 2022, HITCON 2021, and HITCON 2020, demonstrating his commitment to advancing the field of cybersecurity.
Seoul, South Korea
Moonbeom ParkCPO(Chief Product Officer) @78ResearchLabFormer senior researcher of KrCERT/CC & KISAI'm working at 78ResearchLab(http://www.78researchlab.com) in South Korea, a company specializing in the development of cyber warfare tactics and offensive and attack technologies. They analyze the cyber warfare strategies of Advanced Persistent Threat(APT) groups and conduct research on of attack techniques such as 0-day vulnerabilities and develop various cyber weapons, exploites, Post-Exploitation techniques that can be utilized in cyber warfare operations.
Security Researcher
Internet Initiative Japan Inc.
Japan
## Investigation and Analysis of Malware Spreading Infection via MSI Package Files (BSides Tokyo 2023)Language: JapaneseAgenda: https://bsides.tokyo/2023/Slide (PDF): https://github.com/mopisec/bsides-tokyo-2023/blob/main/BSidesTokyo2023_MSIanalysis_dist.pdfRecording: Not Available## Reverse Engineering Malware Written in C++ with IDA and Semi-Automated Scripts (Training at GCC 2025 Taiwan)Language: EnglishAgenda: https://gcc.ac/archive/gcc_2025/Slide (PDF): Not AvailableRecording: Not Available## Inside Pandora's Box: dissecting the latest arsenal and tactics of APT27 (VB2025 Berlin)Language: EnglishAgenda: https://www.virusbulletin.com/conference/vb2025/abstracts/inside-pandoras-box-dissecting-latest-arsenal-and-tactics-apt27/Slide (PDF): https://www.virusbulletin.com/uploads/pdf/conference/vb2025/slides/Slides-Inside-Pandoras-box-dissecting-the-latest-arsenal-and-tactics-of-APT27.pdfRecording: https://www.youtube.com/watch?v=TUATnkPEsnc## Continuous Evolution of Tianwu’s Pangolin8RAT and Custom Cobalt Strike Beacon (JSAC2026)Language: EnglishAgenda: https://jsac.jpcert.or.jp/en/timetable.htmlSlide (PDF): https://jsac.jpcert.or.jp/archive/2026/pdf/JSAC2026_1_6_naoki_takayama_en.pdfRecording: TBA (Should be available on YouTube soon)
Boston,MA
lives in Boston with his wife and two cats, enjoys solving math problems on college chalkboards at night, and runs a website dedicated to the city's best dive bars. He works at a security startup and maintains a blog focused on OSINT and North Korea
Founder
Novus Aegis AI Inc
DallasTexas
AI Security Architect, and Founder of Novus Aegis AI and ReconPro. He specializes in building autonomous, AI-driven Security Operations (AI SOC) platforms that detect, triage, and respond to cyber threats in real time.With over a decade of hands-on experience in cloud security, DevOps, and cyber defense, Chris has designed and secured enterprise-scale infrastructures by embedding security into CI/CD pipelines and infrastructure-as-code. His expertise includes vulnerability management (SCA, SAST, DAST), red teaming, APT simulation, and SOC automation, aligned with frameworks such as NIST, ISO 27001, and SOC 2.He is the creator of “God’s Eye,” an advanced capability within ReconPro that delivers continuous attack surface visibility, adversary simulation, and intelligence-driven security insights. Through Novus Aegis AI, he is advancing autonomous cyber defense using AI agents that proactively hunt threats, reduce alert fatigue, and compress incident response times from hours to seconds.Chris is passionate about shaping the future of cybersecurity through AI-driven defense, offensive security strategy, and building resilient, self-adapting security ecosystems for enterprises globally.