CFP Directory LogoCFP Directory
EventsSpeakersTalksOrganizationsFeaturesPricingWhy Us
Sign in

Company

  • About Us
  • Contact

Contact Info

Address:

13, Lorong Toh Aka

Georgetown 10100

Penang, Malaysia

Email:

info@cfp.directory

Website:

13thirtyseven.my

Business Hours

Monday - Friday:9:00 AM - 6:00 PM
Saturday:9:00 AM - 1:00 PM
Sunday:Closed

GMT+8 (Malaysia Standard Time)

© 2025 CFP Directory. All rights reserved.
13 Thirty Seven Sdn. Bhd. (1401538-A)
Privacy PolicyTerms of Service

Find Expert Speakers

Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.

Create Your Speaker Profile
Reverse Engineering

Showing 13 speakers matching your filters

Chi En (Ashley) Shen

Chi En (Ashley) Shen

Security Research Engineering Technical Leader

Cisco Talos

Zurich

Chi-en “Ashley” Shen is a Security Research Engineering Technical Leader at Cisco Talos, specializing in emerging threat research—ranging from nation-state attacks to financially motivated crimes and spyware campaigns. Before joining Cisco, she worked at Google’s Threat Analysis Group, where she hunted zero-day exploits and tracked botnets. Prior to that, she was part of Mandiant’s Global Research Team, where she co-authored the APT41 report and published research on ICEFOG campaigns. In Taiwan, Ashley co-founded Team T5 and served as a senior threat analyst with a focus on targeted attacks in APAC. A passionate advocate for women in cybersecurity, Ashley co-founded HITCON GIRLS, the first security community for women in Taiwan, and she currently organizes Rhacklette, a security community for FINTA in Switzerland. She has presented her research at a range of conferences, including Black Hat, HITB, HITCON, FIRST, Pivotcon and CODE BLUE. In her free time, she supports the community by offering training sessions and serving on the review boards for Black Hat, HITCON, and HITB.

Threat Hunting
Threat Intelligence
Threat Modeling
+2
0
Talks
0
Events
0
Countries
—
Years
English, Chinese (Mandarin)
Chris Herrmann (Iceman)

Chris Herrmann (Iceman)

CO-Founder

AuroraSec AB

Gothenburg,Sweden

Christian Herrmann – RFID Hacker | Co-Founder of AuroraSec & RRG | MCPD Enterprise ArchitectChristian Herrmann, better known in the hacker community as “Iceman”, is a co-founder ofAuroraSec and RRG, and has helped develop many of today’s most widely used RFIDresearch tools, including the Proxmark3 RDV4 and the Chameleon Mini. He is a well-knownRFID hacking and Proxmark3 evangelist, serving the community as both a forumadministrator and a major code contributor alongside other developers since 2013.Christian has spoken at hacker conferences around the world, including Troopers, Black HatAsia, DEF CON, Hardwear IO, SSTIC, NullCon, Pass-the-Salt, BSides Tallinn, BlackAlps, and SaintCon. He also runs a YouTube channel where he shares his knowledge of RFID hacking with the public.With over 14 years of experience in bespoke software development, Christian specializes in.NET platforms and is a Certified MCPD Enterprise Architect.He possesses near-unmatched expertise in the Proxmark3 architecture and various RFIDtechnologies, and has served as an instructor for Red Team Alliance (RTA), including trainingsessions at Black Hat.

Authentication
Biometrics
Access Control
+6
0
Talks
0
Events
0
Countries
—
Years
English, Swedish
Daniel Goldberg

Daniel Goldberg

NULL

Israel

Feel free to email me on basically anything on computing or history

Network Security
Cyber Deception
Malware Analysis
+6
0
Talks
0
Events
0
Countries
—
Years
English, Hebrew
Joshua Stroschein

Joshua Stroschein

Reverse Engineer

SiouxFalls,SouthDakota

Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer with the FLARE team at Google, where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineering, and other security related topics.

Application Security
Cyber Security
Network Security
+4
0
Talks
0
Events
0
Countries
—
Years
English
KaiJern (xwings) Lau

KaiJern (xwings) Lau

Emulate.sh

Kuala Lumpur

KaiJern (xwings). Founder of open source reverse engineering project, Qiling Framework (https://qiling.io). His research topic is mainly on developing cutting edge cross platform reverse engineering framework, embedded devices security, blockchain security, and various security topics.He presented his findings in different international security conferences like Blackhat, Defcon, HITB, Codegate, QCon, KCon, Brucon, H2HC, Nullcon, etc. He conducted hardware hacking courses in various conferences around the globe. He is also actively involved in Unicorn Engine (https://unicorn-engine.org), Capstone Engine (https://capstone-engine.org), Keystone Engine (https://keystone-engine.org) and hackersbage.com

Reverse Engineering
Blockchain Security
IoT Security
2
Talks
2
Events
1
Countries
10
Years
English
Niek Timmers

Niek Timmers

Co-Founder

Raelize

Netherlands

Niek brings over 10 years of expertise to the device security field. With a background in System and Network Engineering and an intrinsic interest, he's able to digest the complexities of device security efficiently.He shared his research with the community at various security and academic conferences, as well as journals, such as Black Hat, Bluehat, Usenix WOOT, hardwear.io, FDTC and PoC||GTFO.He gave trainings at HITB, hardwear.io and Ringzer0.

Hardware Hacking
Reverse Engineering
Exploit Development
+6
1
Talks
1
Events
1
Countries
—
Years
English, Dutch
PV

Patrick Ventuzelo

CEO

Fuzzinglabs

Paris,France

Patrick Ventuzelo is a senior security researcher, CEO & founder of Fuzzinglabs. After working for the French Ministry of Defense, he specialized in fuzzing, vulnerability research, and reverse engineering. Over the years, Patrick has created multiple fuzzers, found hundreds of bugs, and published various blog posts/videos/tools on topics like Rust, Go, Blockchain, WebAssembly, and Browser security. Patrick is a regular speaker and trainer at various security conferences around the globe, including BlackHat USA, OffensiveCon, REcon, RingZer0, PoC, ToorCon, hack.lu, NorthSec, SSTIC, and others.

Application Security
Blockchain
AI/ML
+18
5
Talks
5
Events
4
Countries
—
Years
English, French
Sam Page

Sam Page

Security Researcher

London, United Kingdom

I'm a security researcher with a passion for OS internals and all things low-level. Over the years I have specialised in Android & the Linux kernel, but have dabbled in a number of domains. When I'm not figuring out how things work and breaking them, I love to share my experiences and help others; whether it's via my blog, talks or mentoring.

Mobile Security
Zero-Day
Ethical Hacking
+11
3
Talks
3
Events
2
Countries
—
Years
English
Sayli ambure

Sayli ambure

Washington DC, USA

I got into cybersecurity the messy, curious way - hacking games as a teenager to get extra coins and superpowers, then later reverse-engineering ransomwares to understand how they worked. That same curiosity and passion led me to a career in offensive cyber security.In the past 5+ years of work experience across India, UAE & USA, I’ve worked on:• Mobile application penetration testing (Android & iOS)• Web application and API penetration testing• Secure code review across C/C++, Python, Java, Golang, JavaScript, Typescript and C# .NET• Custom Signature Code Analysis (Semgrep, YARA & Coverity CodeXM custom checkers)• Adverserial tradecraft and Cyber threat intelligence• Network and infrastructure assessments with Segmentation penetration tests for cloud and on-prem setups• Software Composition Analysis (Coverity, Black Duck, GitHub Advisories, PlexTrac)• Innovative research & automated pentest tools development (AI, OSINT, Python, Bash script)Currently, I work as a Security Researcher at OnDefend, where I help secure user data of a large-scale social media platform & contribute to U.S. national security.🌟 Key Achievements:• Awarded the first-ever “Magical Mention” as an intern at Equinix for uncovering and reporting multiple critical security misconfigurations. Recognized for investigative persistence, curiosity, and successfully improving internal security workflows through proactive analysis and alerting.• Bug Bounty & Hall of Fame mentions: Tesco, IKEA, SecureLayer7 live hacking event, Accenture, Ericsson, Springer Nature, OSIsoft🔍CVE Research:• CVE-2020-11539 : Access control issue in Tata Sonata Smartwatch• CVE-2020-11540 : Access control issue in Tata Sonata Smartwatch• CVE-2020-25498 : Chained CSRF & Stored XSS vulnerabilities in Beetel router• CVE-2020-35262 : Stored XSS vulnerability in Digisol router👾 Outside of work, I’m always exploring new tools, ways to use AI as leverage in security, hacking techniques & trying to level up. I love building my own custom IoT devices as well as hacking them.🧑‍🤝‍🧑As an active member of 'Women in Cybersecurity', 'Women in Security & Privacy' and 'The Diana Initiative' volunteer at Defcon, I’m also passionate about making cyber security more inclusive and human, especially for women and underrepresented voices.

Cyber Security
Application Security
IoT Security
+22
0
Talks
0
Events
0
Countries
—
Years
English
SeungJin Lee

SeungJin Lee

Security Researcher

Unemployed

Korea

Beist has been a member of the IT security field since 2000. His first company was Cyber Research based in Seoul, South Korea and first focused on pen-testing. He then got a Computer Engineering B.A. degree from Sejong University. He has won more than 10 CTF hacking contests in his country as well as passed DefCon quals 5 times. He has run numerous security conferences and hacking contests such as SECUINSIDE and CODEGATE in Korea. Also, he has given talks at BLACKHAT Las Vegas, SYSCAN, CANSECWEST, AVTOKYO, HITCON, SECUINSIDE, EDSC, and TROOPERS. Hunting bugs and exploiting them are his main interests. He was one of GRAYHASH company founders now acquired by LINE which is a leading messenger company in Asia. He is ex-CISO of LINE Plus.

Bug hunting
exploiting
reverse engineering
0
Talks
0
Events
0
Countries
—
Years
English
Soummya Mukhopadhyay

Soummya Mukhopadhyay

Sr Security Consultant

Payatu

India

Cybersecurity Consultant with over three years of hands-on industry experience, I specialize in offensive security—driven by a passion for uncovering and exploiting weaknesses before adversaries can. My work spans Red Team operations, Network Security, and Web/API Vulnerability Assessment & Penetration Testing (VAPT), with successful engagements across BFSI, IT Products & Services, and Healthcare sectors.With a strong research focus on Adversarial Tactics, Techniques, and Procedures (TTPs), I continuously explore emerging threat vectors and offensive methodologies to deliver actionable security insights that directly reduce business risk. My approach blends technical precision with creative attack strategies, ensuring organizations stay ahead of evolving cyber threats

Web Security
Cloud Security
API Security
+22
0
Talks
0
Events
0
Countries
—
Years
English
ZeZe Lin

ZeZe Lin

Research Engineer

Teamt5

Taipei, Taiwan

Zeze serves as a research engineer at TeamT5. He has participated in the DEFCON CTF Final in both 2023 and 2024. As a speaker, Zeze has shared the research at various conferences including CODEBLUE, HITCON, VXCON, CYBERSEC, and ROOTCON. His primary research focuses on Windows system security, and he has reported numerous vulnerabilities related to Windows systems.

Windows Security
Reverse Engineering
0
Talks
0
Events
0
Countries
—
Years
English
ZHAO MIN CHEN

ZHAO MIN CHEN

Cycraft

Taiwan

BlackUSA 2025Pay Attention to the Clue: Clue-Driven Reverse Engineering by LLM in Real-World Malware AnalysisAll Talk, AI Action: Binary Analysis Toolkit MCP ServerUSENIX 2024 Poster SessionFuBuKi: Fuzzing Testing on Bluetooth with Profile Emulation KitSECCON 2025YaDa: Reverse Engineering with Yara BytecodeCYPERSEC 2025Blue Archive: Unveiling Bluetooth Vulnerabilities in EV SystemsAVTokyo 2023IDAFit – a ringcon based IDA pro controller to Catch The Fitness

Cyber Security
Wireless Network Security
Ransomware
+6
1
Talks
1
Events
0
Countries
—
Years
1 accepted
1 submissions
English