Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 16 speakers matching your filters
Cyber Threat Analysis Team
SK AX
Republic of Korea
Yeonwoo Park previously conducted penetration testing projects targeting Korean companies at his former workplace (Core Research Team at Raon Secure) and currently serves as a red teamer at his current workplace (Cyber Threat Analysis Team at SK AX).Through his AD zero-day research, he discovered an exception-handling flaw in the Kerberos protocol, uncovering a method to bypass Microsoft's security policies. Furthermore, through continuous research into areas undetected by popular open-source tools like BloodHound and unexplored topics, he contributes to enhancing the maturity of the red team.
Ph.D
F
ShangHai China
Bocheng Xiang (@crispr_x) is an offensive security researcher and PhD candidate at Fudan University. His work focuses on uncovering high-impact Windows vulnerabilities and exploitation primitives rooted in file system semantics and OS design flaws. He is an MSRC MVR (2024/2025) and ranked Top 20 on the MSRC 2024 Q3 Windows Leaderboard.He has published at USENIX Security and NDSS, with accepted talks at PoC 2025 and Black Hat USA/Europe.
Security Consultant
IOActive
Madrid, Spain
Carlos Gómez Quintana is a Security Consultant at IOActive, specializing in Red Team operations and offensive security. As one of the youngest professionals to join the firm, he conducts advanced penetration testing, adversarial simulation, and security research across diverse enterprise environments.At IOActive, Carlos focuses on cutting-edge security research, including automotive security where he has developed novel attack techniques such as rollback agnostic replay attacks against vehicular systems. He regularly conducts Red Team engagements that simulate real-world adversarial scenarios for enterprise clients.Carlos is an active security researcher and contributor to Maldev Academy, where he has contributed to the phishing section and active research on malware development.
NULL
Israel
Feel free to email me on basically anything on computing or history
PatchPoint
Seoul,Korea
DongHyeon Oh is a security researcher and Co-Founder of PatchPoint, based in South Korea. With an M.S. from KAIST's SoftSec Lab (NDSS 2019, CodeAlchemist), he has spent years breaking browsers, embedded devices, and Windows — collecting CVEs from Apple and Microsoft along the way. Ranked Microsoft Top 10 Security Researcher and previously spoke at CODE BLUE 2023. He now lives in IDA Pro and LLM prompts, hunting Windows vulnerabilities at the boundary of human intuition and AI.
Assistant Professor & Director
University of Alabama in Huntsville
Huntsville, United States
Dr. Bramwell Brizendine completed his Ph.D. in Cyber Operations. A security researcher, currently Bramwell is an Assistant Professor at the University of Alabama in Huntsville, and he is the founding Director of the Vulnerability and Exploitation Research for Offensive and Novel Attacks (VERONA Lab). A cybersecurity expert, Bramwell has taught numerous undergraduate, graduate, and doctoral level courses in reverse engineering, software exploitation, advanced software exploitation, malware analysis, and offensive security. Additionally, Bramwell has authored several important cybersecurity tools, including JOP ROCKET, SHAREM, ShellWasp, and ROP ROCKET, which are open source and freely available. Bramwell was a PI on a $300,000 NSA research grant to develop a shellcode analysis framework, SHAREM. Bramwell is a 2025 recipient of the DARPA YFA for $500,000. Bramwell has been a speaker at many top security conferences across the globe, including different regional variations of Black Hat, DEFCON, Hack in the Box, and more.
researcher
theori
Seoul,Souh Korea
POC 2025 : Follow the Link: Building Full-Chain Local Privilege Escalation on WindowsTheori OpenTRS : Windows Third-Party Privilege EscalationCodegate 2023 : Windows Kernel ExploitationCodegate 2022 : Windows Logical Bugs
North Bend, Washington, USA
Jonathan Bar Or ("JBO") an information security expert and a hacker, focusing on binary analysis, vulnerability research, application security, reverse engineering, and cryptography.His research has uncovered critical vulnerabilities that have impacted millions of users worldwide, shaping security best practices across the industry.Frequently cited by major news outlets, his work has influenced both academia and industry, driving meaningful security improvements.
Security Analyst 2
Netskope
Bangalore, India
Talks within my organisationTech Talks: I have delivered over 10 internal technical presentations tailored to a wide range of audiences across multiple product development disciplines within my organisation(netskope).Hybrid Engagement: These sessions were conducted through both face-to-face and online formats, allowing me to interact with a significant number of colleagues and refine my ability to communicate complex technical topics to diverse teams.Knowledge Transfer: Beyond formal talks, I have led dedicated mentoring sessions and deep-dive technical walkthroughs to help ramp up team members on specialized security research.External Industry RecognitionBlackHat Europe (Arsenal): I was selected to present my research and open-source tool, IOCTL Hammer, at BlackHat Europe.Expert Engagement: This experience involved presenting to an international audience of cybersecurity experts, where I successfully managed high-traffic live interactions at the Arsenal booth.Communication Mastery: Preparing for and executing this talk helped me hone my skills in articulating the technical value and novelty of my work to an external, expert-level audience.
Principal Engineer
NinjaOne
Argentina
I have presented at:Black Hat USA: Main Track and ArsenalDEF CON: Demo Labs and Blue Team VillageEkopartyTyphoonConBSides: Austin and Córdoba
Security Researcher
SafeBreach
Israel
Ron (@RonB_Y) is a security researcher at SafeBreach with 10 years of experience. He works in vulnerability research and has knowledge in forensic investigations, malware analysis and reverse engineering. Ron previously worked in the development of security products and spoke several times at DEFCON
Independet Sec Researcher
None
BecicherecuMic,Romania
OSEE + OSED Certified, Lover of binaries and pwning.
London
I have spoken at DEF CON 30 (mainstage), various BSides (London, New York City, Rome, Prishtina, Dublin), and many other conferences such as HackCon Norway, Wild West Hackin' Fest @ Mile High, Nullcon Goa, Disobey Helsinki, SANS DFIR Summit and MITRE ATT&CK EU Community.You can find some recordings here: https://www.youtube.com/results?search_query=%22Wietze+Beukema%22
Co-Founder & CEO
Hexaplex
Tel Aviv, Israel
Yaron Dinkin is the Co-Founder & CEO of Hexaplex AI, a security research lab exploring autonomous AI-powered cybersecurity capabilities.With over a decade of experience spanning security research at the Office of the Prime Minister of Israel, platform group leadership at NextSilicon (HPC/AI accelerators), and OS internals consulting for deep tech startups, he brings deep expertise in vulnerability research, reverse engineering, and systems architecture.Most recently, Yaron co-developed an AI agent swarm for high-scale automated vulnerability research of OS components, uncovering over 100 exploitable kernel driver vulnerabilities at a cost of just $600.
Research Engineer
TeamT5
Taipei, Taiwan
Zeze serves as a research engineer at TeamT5. He has participated in the DEFCON CTF Final in both 2023 and 2024. As a speaker, Zeze has shared the research at various conferences including CODEBLUE, HITCON, VXCON, CYBERSEC, and ROOTCON. His primary research focuses on Windows system security, and he has reported numerous vulnerabilities related to Windows systems.
Research Engineer
Teamt5
Taipei, Taiwan
Zeze serves as a research engineer at TeamT5. He has participated in the DEFCON CTF Final in both 2023 and 2024. As a speaker, Zeze has shared the research at various conferences including CODEBLUE, HITCON, VXCON, CYBERSEC, and ROOTCON. His primary research focuses on Windows system security, and he has reported numerous vulnerabilities related to Windows systems.