Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 7 speakers matching your filters
Founder
Cyfinoid Research
Bhopal,India
As a seasoned speaker and trainer, Anant has shared his expertise at various prestigious platforms including Black Hat (USA/ASIA/EU), Defcon, Nullcon, c0c0n, and Rootconf. His extensive involvement in these conferences extends to serving as a CFP reviewer for Blackhat EU, nullcon, Rootconf by Hasgeek, and multiple villages at Defcon (Recon, Adversary and Cloud), showcasing his dedication to nurturing and elevating the discourse within the field.
Security Research Manager
CyCraft Technology
Taipei,Taiwan
Boik Su is a security research manager at CyCraft Technology and is currently focused on Cloud Security, Web Security, and Blockchain Security. He takes an active role in the cybersecurity community and has delivered speeches at multiple seminars across the globe, including HITCON, HITB, FIRSTCTI, VB, and HackerOne. He still participates in CTF competitions, including SECCON CTF in Japan and HITCON CTF in Taiwan, and has submitted multiple reports to bug bounty programs and open-source projects.
Founder
Vicxer, Inc.
Miami,US
Mr Santarsieri is a founder partner at Vicxer where he utilizes his 16+ years of experience in the security industry, to bring top notch research into the ERP (SAP / Oracle) world.He is engaged in a daily effort to identify, analyze, exploit and mitigate vulnerabilities affecting ERP systems and business-critical applications, helping Vicxer's customers (Global Fortune-500 companies and defense contractors) to stay one step ahead of cyber-threats.Jordan has also discovered critical vulnerabilities in Oracle, IBM and SAP software, and is a frequent speaker at international security conferences such as Black-Hat, Insomnihack, YSTS, Auscert, Sec-T, Rootcon, NanoSec, Hacker Halted, OWASP US, Infosec in the city, Code Blue and Ekoparty.
Security Researcher
Independent
Kanagawa
Makoto Sugita is an independent security researcher with expertise in network defense, penetration testing, and active cyber deception. He has delivered talks and live demonstrations at major conferences including Black Hat USA and BSides Las Vegas. His recent work, the Azazel System, introduces a portable SOC/NOC concept designed for resilience in disaster environments, combining intrusion detection, deception technologies, and delaying action strategies.
DevSecOps Expert
Scyon
Mijdrecht, Netherlands
My career has taken me through a diverse journey, spanning roles that include full-stack developer, business analyst, IT manager, and now thriving in cybersecurity. Throughout this journey, my deep passion for technology has remained a constant driving force. For me, security resembles solving a 10,000-piece puzzle that's been turned upside down. You understand the end goal, yet you're uncertain about where each piece belongs. Achieving this requires close collaboration with developers, business stakeholders, and others, necessitating me to consistently bridge different disciplines within technology. Whether it's simplifying intricate development concepts for security and business professionals or vice versa, every piece added brings us nearer to the solution. This challenge deeply motivates me. I approach my work with a clear focus on prioritizing people first, followed by refining processes, and then utilizing technology to enhance these efforts. This philosophy ensures that technological changes are seamlessly integrated and readily embraced by our teams and organizations.
Security Consultant
Doyensec
Kraków,Poland
I spoke at CONFidence 2025, one of the most established infosec conferences in Central Europe. My talk focused on advanced API authorization vulnerabilities and practical exploitation techniques, drawing from real-world engagements. I’ve compressed years of pentesting and secure code review experience into research-driven content and I’m eager to bring more of that to the stage.
Cycraft
Taiwan
BlackUSA 2025Pay Attention to the Clue: Clue-Driven Reverse Engineering by LLM in Real-World Malware AnalysisAll Talk, AI Action: Binary Analysis Toolkit MCP ServerUSENIX 2024 Poster SessionFuBuKi: Fuzzing Testing on Bluetooth with Profile Emulation KitSECCON 2025YaDa: Reverse Engineering with Yara BytecodeCYPERSEC 2025Blue Archive: Unveiling Bluetooth Vulnerabilities in EV SystemsAVTokyo 2023IDAFit – a ringcon based IDA pro controller to Catch The Fitness