Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 17 speakers matching your filters
SOC analyst
IDDA
Baku,Azerbaijan
I often deliver technical security content to professional and executive level audiences. For example, as a SOC Analyst at IDDA, I directly presented our SOAR (Security Orchestration, Automation and Response) platform to Ministry of Security representatives. I gave a technical walkthrough of the platform architecture, incident automation workflows, threat correlation mechanisms, and presented real world use cases. Subsequent to the presentation, the product received considerable interest from multiple stakeholders and potential investors.I've also attended vendor meetings with Palo Alto and Forcepoint DLP, presenting technical assessments and making workflow recommendations to help optimize the deployment of security products and their integration into the corporate environment.Besides this type of enterprise-level presentation, I've also been the guy on the team to go to an international hackathon. I presented AI security and automation concepts at an innovation event in Georgia. I gave a presentation to a technical evaluation panel, detailing the design of the system, the model for threat detection, and the architecture of the data pipeline.I also took part in the Google AI Hackathon in Kazakhstan, where I presented a detailed technical pitch including model architecture, implementation strategy, and deployment aspects to judges and business representatives.These occasions implied explaining intricate technical details in a digestible form, addressing immediate technical inquiries, justifying architecture choices, and discussing security compromises. I feel at ease presenting deeply technical information to both engineering communities and business leaders.
Principal SecOps Engineer
Perforce Software
Pune, Maharashtra, India
I’m a results-driven Principal SecOps Engineer with over 15 years of proven expertise spanning across multiple organisations in various service sectors in architecting and delivering world-class security programs for global software organizations. I’ve spearheaded transformational automation initiatives, reducing report-generation times by over 95% and built unified multi-cloud compliance frameworks that consistently pass rigorous audits and compliances. I've created AI-powered attack surface platform earned international hackathon recognition, and I’ve presented SecOps deep dives at VULNCON, top engineering colleges, and industry forums.As Cloud Security Lead and Principal Engineer at Perforce, I’ve led high-impact teams to operationalize continuous monitoring, vulnerability management, and incident response at scale.A CISSP-certified mentor and community advocate, I actively contribute to open-source security projects and share expertise through workshops, and local meetups empowering the next generation of security professionals.
Security Engineer
RUDRA Cybersecurity Pvt Ltd
Delhi,India
I have spoken at multiple international cybersecurity conferences and platforms, addressing both deeply technical audiences and early-career practitioners, with topics spanning AI security, detection engineering, and modern SOC evolution. At NDC Security 2026 Oslo, I shall deliver “Who Gave the Agent Admin Rights?! Securing Cloud & AI Machine Identities”, where I'll examine non-human identities, AI agents, and the emerging risks of autonomous privilege, focusing on governance, detection, and containment strategies in cloud environments. At BSides Pittsburgh and BSides Krakow, as well as at the Silicon Saxony Day (19th edition), I presented “Enhancing Open-Source IDS & SIEM Solutions into AI-Enabled XDR & SOAR Solutions in Cloud Environments”, focusing on extending open-source detection stacks with automation, ML-driven enrichment, and response orchestration to build scalable, analyst-effective security operations. In contrast, my session at BSides Buffalo, “From Curiosity to Cybersecurity: A Practical Guide to Getting Started and Standing Out”, was designed for students and early professionals, offering actionable guidance on skill-building, differentiation, and navigating cybersecurity careers. Beyond conferences, I have appeared on the Distilled Security Podcast, where I discussed how deploying specialised, small language models locally can significantly improve efficiency, reduce operational friction, and make AI-assisted security workflows more practical and trustworthy.
SME
Self Employed
Tangerang, Banten, IDN
EXPERTISE:- Experienced Cyber Security with a demonstrated history of working in the several industry. Skilled in Penetration testing, XDR, EDR, DFIR, Threat Hunting, and OSINT.- Advanced Ethical Hacking:Proficient in various hacking methodologies, including but not limited to network penetration testing, (web, API, Infra, mobile) application testing, wireless network exploitation, and social engineering.- Deep Knowledge of Security Frameworks: Expertise in industry- standard security frameworks such as OWASP, NIST, and PTES, with the ability to apply their guidelines effectively
Principal Cybersecurity Analyst
Gen Digital
Kuala Lumpur, Malaysia
Jason Phang is a Principal Cybersecurity Analyst with extensive experience in threat hunting, incident response, and detection engineering. Before his current role, he served as CSIRT Lead at MoneyLion, leading incident response operations and cyber defense initiatives. He was previously a Threat Hunter at WithSecure, where he successfully uncovered and analyzed macOS malware families including AMOS, Frigid, and Cuckoo, and developed detection rules to protect enterprise customers. Earlier in his career, he worked as a SOC Analyst at Experian and Maybank, building a strong foundation in security operations and threat monitoring. His expertise lies in uncovering advanced threats and transforming forensic insights into actionable detections, with a particular focus on macOS malware hunting and defense.
Founder
Vicxer, Inc.
Miami,US
Mr Santarsieri is a founder partner at Vicxer where he utilizes his 16+ years of experience in the security industry, to bring top notch research into the ERP (SAP / Oracle) world.He is engaged in a daily effort to identify, analyze, exploit and mitigate vulnerabilities affecting ERP systems and business-critical applications, helping Vicxer's customers (Global Fortune-500 companies and defense contractors) to stay one step ahead of cyber-threats.Jordan has also discovered critical vulnerabilities in Oracle, IBM and SAP software, and is a frequent speaker at international security conferences such as Black-Hat, Insomnihack, YSTS, Auscert, Sec-T, Rootcon, NanoSec, Hacker Halted, OWASP US, Infosec in the city, Code Blue and Ekoparty.
Security Researcher
Independent
Kanagawa
Makoto Sugita is an independent security researcher with expertise in network defense, penetration testing, and active cyber deception. He has delivered talks and live demonstrations at major conferences including Black Hat USA and BSides Las Vegas. His recent work, the Azazel System, introduces a portable SOC/NOC concept designed for resilience in disaster environments, combining intrusion detection, deception technologies, and delaying action strategies.
Boston,MA
lives in Boston with his wife and two cats, enjoys solving math problems on college chalkboards at night, and runs a website dedicated to the city's best dive bars. He works at a security startup and maintains a blog focused on OSINT and North Korea
Founder
Novus Aegis AI Inc
DallasTexas
AI Security Architect, and Founder of Novus Aegis AI and ReconPro. He specializes in building autonomous, AI-driven Security Operations (AI SOC) platforms that detect, triage, and respond to cyber threats in real time.With over a decade of hands-on experience in cloud security, DevOps, and cyber defense, Chris has designed and secured enterprise-scale infrastructures by embedding security into CI/CD pipelines and infrastructure-as-code. His expertise includes vulnerability management (SCA, SAST, DAST), red teaming, APT simulation, and SOC automation, aligned with frameworks such as NIST, ISO 27001, and SOC 2.He is the creator of “God’s Eye,” an advanced capability within ReconPro that delivers continuous attack surface visibility, adversary simulation, and intelligence-driven security insights. Through Novus Aegis AI, he is advancing autonomous cyber defense using AI agents that proactively hunt threats, reduce alert fatigue, and compress incident response times from hours to seconds.Chris is passionate about shaping the future of cybersecurity through AI-driven defense, offensive security strategy, and building resilient, self-adapting security ecosystems for enterprises globally.
Cloud Security Manager
Coupa
PUNE
Pallavi is a Cloud Security Manager, overseeing cloud security operations and IAM, with 15 years of experience in cybersecurity. Passionate about application security, she excels in navigating complex security challenges, consistently working to strengthen defenses against emerging threats. With deep expertise in penetration testing, Pallavi focuses on identifying vulnerabilities and strengthening defenses in complex and challenging environments. She has spoken at multiple industry-leading conferences like HackerHalted, Vulncon, Identity Shield and BlueHat and continues sharing her knowledge and expertise in cybersecurity.
Solution Architect
Picus Security
Singapore
Pengfei is a Solution Architect at Picus Security, where he advise enterprise security teams in implementing automated adversary simulation operations and framework.Previously, he worked as a Cybersecurity Engineer in GovTech's GCSOC team, where he led the implementation of continuous purple teaming across the Whole-of-Government. Before this role, he served on GovTech's red team, mainly dabbling in VAPT and Adversary Simulation.Pengfei is certified with OSCP, eMAPT, Crest CRT, CCSK V4, etc. He has conducted research on emerging cybersecurity technologies and presented his findings at renowned conferences like Black Hat USA & Asia, DEFCON, SINCON, ROOTCON, etc.
Security Security Analyst
YOKOGAWA Thailand
Thailand
Currently, I serve as a Senior DFIR Analyst at Yokogawa Thailand, where I focus on advanced investigations, incident containment, and strengthening SOC processes for IT-OT environments. Prior to this, I worked as a SOC L2 Analyst at Group-IB, one of the leading global MSSPs, where I handled high-severity incidents, performed root cause analysis, and contributed to proactive defense strategies. Earlier in my career, I spent three years at Myanmar’s largest telecom (MPT-KDDI Joint Operation), gaining deep expertise in security operations, threat intelligence, and cyber threat hunting. I also contributed to defensive operations for ThaiBev’s joint venture (Grand Royal Group International Company), supporting both corporate and OT/ICS security initiatives. With a proven track record across telecom, MSSP, and critical infrastructure sectors, I bring strong technical expertise, cross-border experience, and a proactive approach to defending against advanced threats.
Director, Information Security
Roush
Detroit,Michigan
Keynote speaker with a proven track record presenting at premier industry conferences, including Secureworld, ISSA Motor City, RSAC CLF. Served as a Keynote Speaker at SecureWorld Detroit 2025, delivering executive-level insights on cyber risk, AI-driven threats, and enterprise resilience.
Senior Insider Threat Specialist
Illumina
Bangalore
I have spoken in couple of national and international platforms as a guest speaker on SOC, threat hunting, Incident Response , AI security and Phishing Attacks
Head of Cybersecurity
Ryt Bank
Malaysia
Co-founder of Sherpasec Malaysia.Spoke at multiple local conferencesUncountable panelist experiences in closed door eventsSpoke at a couple of regional conferences
Security Reseracher
BharatGen, IIT-B
Chandigarh,India
Vishal Chand is a Security Researcher at Zscaler focusing on AI driven cybersecurity and LLM security. He has spoken at Microsoft BlueHat Asia and multiple BSides conferences across India. His work explores real world AI threats, adversarial techniques, and next generation defense strategies.
Senior Security Researcher
Cato Networks
Israel
Vitaly Simonovich is a senior security researcher at Cato Networks and a member of Cato CTRL. Currently, Vitaly focuses on researching topics related to LLM security, with a particular emphasis on jailbreaks and prompt injections, as well as conducting vulnerability research across a wide range of technologies. In addition, he is actively involved in threat intelligence, analyzing emerging threats and attack trends to strengthen organizational defenses.Prior to joining Cato in 2023, Vitaly worked at Incapsula and Imperva, where he led teams of security analysts and researchers. With over nine years of experience in cybersecurity, Vitaly specializes in application security, data security, LLM security, vulnerability research, and threat intelligence.An active contributor to the cybersecurity community, Vitaly regularly publishes research blogs, hosts webinars, and presents at conferences. In addition to his professional work, he teaches cybersecurity at local colleges and enjoys solving CTF challenges in his free time to stay sharp and enhance his skills.