Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 32 speakers matching your filters
Senior Security Researcher
Delhi,India
Aryan is a senior security researcher with nearly six years of focused experience in malware development, AV/EDR evasion, and low-level system programming. His work bridges deep technical research and practical offensive security, creating advanced tooling for red team engagements. He holds the CRTO certification and has led numerous adversarial simulations against mature defenses. His research also extends to implementing fuzzing frameworks and automation.Previous Speaking Engagements:WildWest Hackin' Fest - Presented research on advanced security evasion.The Hack Summit - Delivered a talk on modern malware techniques.CarolinaCon - Shared findings in offensive security research.BSides Ahmedabad - Led technical training sessions on red team tooling and methodologies.
Security Research Engineering Technical Leader
Cisco Talos
Zurich
Chi-en “Ashley” Shen is a Security Research Engineering Technical Leader at Cisco Talos, specializing in emerging threat research—ranging from nation-state attacks to financially motivated crimes and spyware campaigns. Before joining Cisco, she worked at Google’s Threat Analysis Group, where she hunted zero-day exploits and tracked botnets. Prior to that, she was part of Mandiant’s Global Research Team, where she co-authored the APT41 report and published research on ICEFOG campaigns. In Taiwan, Ashley co-founded Team T5 and served as a senior threat analyst with a focus on targeted attacks in APAC. A passionate advocate for women in cybersecurity, Ashley co-founded HITCON GIRLS, the first security community for women in Taiwan, and she currently organizes Rhacklette, a security community for FINTA in Switzerland. She has presented her research at a range of conferences, including Black Hat, HITB, HITCON, FIRST, Pivotcon and CODE BLUE. In her free time, she supports the community by offering training sessions and serving on the review boards for Black Hat, HITCON, and HITB.
NewTaipei,Taiwan
1. Guest Speaker at BINUS University (Indonesia) | 2024Topic: Cybersecurity Practices & The "Open Possible" SpiritDescription: Delivered a keynote during an overseas technical exchange, sharing insights on Taiwan Mobile's security strategies and fostering transnational internship opportunities.2. Internal Technical Seminar at Taiwan MobileTopic: Case Study: Exploiting Google Web Designer (Zip Slip Vulnerability)Description: A deep-dive presentation analyzing the root cause of a $7,500 Google VRP finding. Covered the discovery process, exploitation of the path traversal defect, and the final reporting methodology.3. Advanced Security Training Series (Internal)Topic: Offensive Security & Reverse EngineeringDescription: Conducted multiple technical sessions for internal engineering teams. Topics included:DLL Hijacking & Patch Diffing: Analyzing attack vectors in Windows environments.Reverse Engineering: Practical training using IDA Pro and Linux CTF challenges.Web Exploitation: Methodologies for identifying XSS and SQL Injection vulnerabilities
CO-Founder
AuroraSec AB
Gothenburg,Sweden
Christian Herrmann – RFID Hacker | Co-Founder of AuroraSec & RRG | MCPD Enterprise ArchitectChristian Herrmann, better known in the hacker community as “Iceman”, is a co-founder ofAuroraSec and RRG, and has helped develop many of today’s most widely used RFIDresearch tools, including the Proxmark3 RDV4 and the Chameleon Mini. He is a well-knownRFID hacking and Proxmark3 evangelist, serving the community as both a forumadministrator and a major code contributor alongside other developers since 2013.Christian has spoken at hacker conferences around the world, including Troopers, Black HatAsia, DEF CON, Hardwear IO, SSTIC, NullCon, Pass-the-Salt, BSides Tallinn, BlackAlps, and SaintCon. He also runs a YouTube channel where he shares his knowledge of RFID hacking with the public.With over 14 years of experience in bespoke software development, Christian specializes in.NET platforms and is a Certified MCPD Enterprise Architect.He possesses near-unmatched expertise in the Proxmark3 architecture and various RFIDtechnologies, and has served as an instructor for Red Team Alliance (RTA), including trainingsessions at Black Hat.
NULL
Israel
Feel free to email me on basically anything on computing or history
Computer Security Researcher
Spectroblock
Iraq
Diyar Saadi Ali is a formidable force in the realm of cybersecurity, renowned for their expertise in cybercrime investigations and their role as a certified SOC and malware analyst. With a laser-focused mission to decode and combat digital threats, Diyar approaches the complex world of cybersecurity with precision and unwavering dedication. At the core of their professional journey lies real-time security event monitoring a task Diyar executes with exceptional vigilance and expertise. As a respected MITRE ATT&CK Contributor, they have made invaluable contributions to the global cybersecurity community, sharing insights and strategies that help organizations bolster their defenses against evolving cyber threats. Diyar’s impact is further amplified by their role as the discoverer and owner of critical Common Vulnerabilities and Exposures (CVEs), including CVE-2024-25400 and CVE-2024-25399. These achievements underscore their commitment to identifying and addressing systemic vulnerabilities that could otherwise threaten digital ecosystems.
PatchPoint
Seoul,Korea
DongHyeon Oh is a security researcher and Co-Founder of PatchPoint, based in South Korea. With an M.S. from KAIST's SoftSec Lab (NDSS 2019, CodeAlchemist), he has spent years breaking browsers, embedded devices, and Windows — collecting CVEs from Apple and Microsoft along the way. Ranked Microsoft Top 10 Security Researcher and previously spoke at CODE BLUE 2023. He now lives in IDA Pro and LLM prompts, hunting Windows vulnerabilities at the boundary of human intuition and AI.
Assistant Professor & Director
University of Alabama in Huntsville
Huntsville, United States
Dr. Bramwell Brizendine completed his Ph.D. in Cyber Operations. A security researcher, currently Bramwell is an Assistant Professor at the University of Alabama in Huntsville, and he is the founding Director of the Vulnerability and Exploitation Research for Offensive and Novel Attacks (VERONA Lab). A cybersecurity expert, Bramwell has taught numerous undergraduate, graduate, and doctoral level courses in reverse engineering, software exploitation, advanced software exploitation, malware analysis, and offensive security. Additionally, Bramwell has authored several important cybersecurity tools, including JOP ROCKET, SHAREM, ShellWasp, and ROP ROCKET, which are open source and freely available. Bramwell was a PI on a $300,000 NSA research grant to develop a shellcode analysis framework, SHAREM. Bramwell is a 2025 recipient of the DARPA YFA for $500,000. Bramwell has been a speaker at many top security conferences across the globe, including different regional variations of Black Hat, DEFCON, Hack in the Box, and more.
Security Researcher
Boston, USA
Evangelos Bitsikas is a Doctoral Security Researcher at Northeastern University and a Google PhD Fellow in Cybersecurity. He specializes in wireless security, with an emphasis on cellular networks (LTE/5G), adversarial attacks against cellular infrastructure, and mission-critical networking for autonomous systems, including 5G-enabled drones and vehicles.Evangelos has trained extensively across offensive and defensive security, including network monitoring and incident response exercises, as well as hands-on exploitation and penetration-testing labs. He currently holds advanced security certifications, including CASP+ and CISSP, and speaks on topics at the intersection of wireless systems, real-world security testing, and resilient network design.
Security Researcher
Kaspersky
KualaLumpur,Malaysia
Fareed is a malware security researcher with more than 5 years of experience. His interests lie in malware reverse engineering, threat intelligence, digital forensics, and detection. As part of the Global Research and Analysis Team (GReAT) at Kaspersky, Fareed participates in investigating cybercrimes, tracking APT groups, and dismantling the malicious infrastructure of threat actors. Additionally, Fareed frequently shares his knowledge through public talks, mentorship, training sessions, briefings, and media interviews, representing both himself and Kaspersky. His specialization in malware and APT analysis allows him to speak and share his insights with a wide range of audiences, contributing significantly to the local and international cybersecurity community.
Offensive Security Consultant
ITSEC Asia
Jakarta
The speaker has served as a presenter at Black Hat Asia in both 2023 and 2024, participating in the Arsenal (Web Application Security) track held in Singapore.The speaker has also served as a guest speaker in several universities and community events & had attended BlackHat MEA 2022 - 2024 in Riyadh as a CTF Finals participant.
Reverse Engineer
SiouxFalls,SouthDakota
Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer with the FLARE team at Google, where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineering, and other security related topics.
Emulate.sh
Kuala Lumpur
KaiJern (xwings). Founder of open source reverse engineering project, Qiling Framework (https://qiling.io). His research topic is mainly on developing cutting edge cross platform reverse engineering framework, embedded devices security, blockchain security, and various security topics.He presented his findings in different international security conferences like Blackhat, Defcon, HITB, Codegate, QCon, KCon, Brucon, H2HC, Nullcon, etc. He conducted hardware hacking courses in various conferences around the globe. He is also actively involved in Unicorn Engine (https://unicorn-engine.org), Capstone Engine (https://capstone-engine.org), Keystone Engine (https://keystone-engine.org) and hackersbage.com
Security Analyst 2
Netskope
Bangalore, India
Talks within my organisationTech Talks: I have delivered over 10 internal technical presentations tailored to a wide range of audiences across multiple product development disciplines within my organisation(netskope).Hybrid Engagement: These sessions were conducted through both face-to-face and online formats, allowing me to interact with a significant number of colleagues and refine my ability to communicate complex technical topics to diverse teams.Knowledge Transfer: Beyond formal talks, I have led dedicated mentoring sessions and deep-dive technical walkthroughs to help ramp up team members on specialized security research.External Industry RecognitionBlackHat Europe (Arsenal): I was selected to present my research and open-source tool, IOCTL Hammer, at BlackHat Europe.Expert Engagement: This experience involved presenting to an international audience of cybersecurity experts, where I successfully managed high-traffic live interactions at the Arsenal booth.Communication Mastery: Preparing for and executing this talk helped me hone my skills in articulating the technical value and novelty of my work to an external, expert-level audience.
Principal Engineer
NinjaOne
Argentina
I have presented at:Black Hat USA: Main Track and ArsenalDEF CON: Demo Labs and Blue Team VillageEkopartyTyphoonConBSides: Austin and Córdoba
Security Researcher
CrowdStrike
France
Previous talks:Black Hat USA 2020: “Fooling Windows through Superfetch”Fooling Windows through Superfetchc0c0n 2022, India: “Intel SGX: the ransomware strongbox?”REcon 2023, Canada.: “Press Play to Restart: Under the Hood of the Restart Manager”Mathilde Venault Press Play To Restart Under the Hood of the Windows Restart ManagerSinCon 2025, Singapore “DrawMeATree: the master key to WinDbg’s fortress”Previous workshops:Diana Initiative 2023, USA: “Introduction to Reverse Engineering” https://infocondb.org/con/diana-initiative/diana-initiative-2023/blackhoodie-introduction-to-reverse-engineering-workshop-for-women 44con 2024, London: “Trick-or-treat WinDbg: taming the Windows debugger”https://44con.com/44con-2024-talks-and-workshops/ SinCon 2025, Singapore “Trick-or-treat WinDbg: taming the Windows debugger”https://www.infosec-city.com/schedule/sin25-con
Security Researcher
Internet Initiative Japan Inc.
Japan
## Investigation and Analysis of Malware Spreading Infection via MSI Package Files (BSides Tokyo 2023)Language: JapaneseAgenda: https://bsides.tokyo/2023/Slide (PDF): https://github.com/mopisec/bsides-tokyo-2023/blob/main/BSidesTokyo2023_MSIanalysis_dist.pdfRecording: Not Available## Reverse Engineering Malware Written in C++ with IDA and Semi-Automated Scripts (Training at GCC 2025 Taiwan)Language: EnglishAgenda: https://gcc.ac/archive/gcc_2025/Slide (PDF): Not AvailableRecording: Not Available## Inside Pandora's Box: dissecting the latest arsenal and tactics of APT27 (VB2025 Berlin)Language: EnglishAgenda: https://www.virusbulletin.com/conference/vb2025/abstracts/inside-pandoras-box-dissecting-latest-arsenal-and-tactics-apt27/Slide (PDF): https://www.virusbulletin.com/uploads/pdf/conference/vb2025/slides/Slides-Inside-Pandoras-box-dissecting-the-latest-arsenal-and-tactics-of-APT27.pdfRecording: https://www.youtube.com/watch?v=TUATnkPEsnc## Continuous Evolution of Tianwu’s Pangolin8RAT and Custom Cobalt Strike Beacon (JSAC2026)Language: EnglishAgenda: https://jsac.jpcert.or.jp/en/timetable.htmlSlide (PDF): https://jsac.jpcert.or.jp/archive/2026/pdf/JSAC2026_1_6_naoki_takayama_en.pdfRecording: TBA (Should be available on YouTube soon)
Co-Founder
Raelize
Netherlands
Niek brings over 10 years of expertise to the device security field. With a background in System and Network Engineering and an intrinsic interest, he's able to digest the complexities of device security efficiently.He shared his research with the community at various security and academic conferences, as well as journals, such as Black Hat, Bluehat, Usenix WOOT, hardwear.io, FDTC and PoC||GTFO.He gave trainings at HITB, hardwear.io and Ringzer0.
CEO
Fuzzinglabs
Paris,France
Patrick Ventuzelo is a senior security researcher, CEO & founder of Fuzzinglabs. After working for the French Ministry of Defense, he specialized in fuzzing, vulnerability research, and reverse engineering. Over the years, Patrick has created multiple fuzzers, found hundreds of bugs, and published various blog posts/videos/tools on topics like Rust, Go, Blockchain, WebAssembly, and Browser security. Patrick is a regular speaker and trainer at various security conferences around the globe, including BlackHat USA, OffensiveCon, REcon, RingZer0, PoC, ToorCon, hack.lu, NorthSec, SSTIC, and others.
Malware Analyst
Cloudsek
Bangalore,India
Prajwal is a Malware Analyst at Cloudsek, specializing in reverse engineering and threat intelligence. He focuses on uncovering new threats through malware research, with a background in Offensive Security and Windows Internals.
Malware researcher
Brazilian Air Force
Brasília, Federal District, Brazil
Rafael Salema Marques (SWaNk) is an old-school VXer who tends to define himself as a malware enthusiast. He has been coding malware since the early 2000s.His contributions bridge the dark technical underground with rigorous scientific methodology. Over his career, he has published code and research in prestigious hacker e-zines including 29A and Phrack Magazine. Additionally, he already contributed to the LOLBAS project, discovering and documenting novel ways to weaponize native OS executables. Academically, he did his MSc research at the Instituto Tecnológico de Aeronáutica (ITA) focused on employing an artificial immune system approach to detect advanced rootkit activities and covert data exfiltration. Building on this foundation, his PhD research introduced a novel method for detecting highly evasive pivot attacks in complex networks. SWaNk is always available for coffee, beer, and malware projects.
Manger Offensive Security and Threat Assessment
Confidential
Dubai
Rahul is a security researcher with 7+ years in offensive security and red teaming. He specializes in malware development, AV/EDR evasion, and bypassing security controls in heavily defended environments. As a full-time red teamer, he's built tools and developed techniques that work against real-world security stacks.He currently works as Manager of Offensive Security and Threat Assessment with leading financial organizations across the Middle East, collaborating with red, blue, and purple teams to find and fix security gaps in enterprise infrastructure. He's spoken at international conferences including BlackHat, CONFidence, and HAcktivity.His expertise spans enterprise security and cloud infrastructure, with particular focus on identifying and exploiting design flaws in hardened environments.
New York
I am a long-time FSF developer and the current author and developer of many Python bytecode tools and debuggers. This includes a cross-version bytecode disassembler, decompilers, and debuggers for Python.I have been writing open-source software for 3 decades. You may even have some software I wrote on your computer, for example, if you have an open-source media player installed.I have written several debuggers for languages outside of Python, such as ones for Mathematica, bash and GNU Make. Bits of this code can be found in commercial debuggers.I have worked at:IBM Research,NASA (as a government contractor),a university, a large financial firm,a large news organization (Associated Press),a large survey firm, andfar too many start-up companies, mostly in or near New York
Security Researcher
London, United Kingdom
I'm a security researcher with a passion for OS internals and all things low-level. Over the years I have specialised in Android & the Linux kernel, but have dabbled in a number of domains. When I'm not figuring out how things work and breaking them, I love to share my experiences and help others; whether it's via my blog, talks or mentoring.