Connect with talented speakers from around the world. Search by expertise, topics, or use our advanced filters to find the perfect speaker for your event.
Showing 5 speakers matching your filters
Infrastructure Security Monitoring Engineer
Meta Platforms, Inc.
London
Alessandro Pisani is a software and security engineer at Meta, focusing on large-scale infrastructure defense and threat detection systems. With a strong background in software engineering and advanced malware research, he specializes in building resilient systems that bridge deep security telemetry with modern, high-throughput production environments. He holds an M.Sc. in Computer Engineering from Politecnico di Torino.
PatchPoint
Seoul,Korea
DongHyeon Oh is a security researcher and Co-Founder of PatchPoint, based in South Korea. With an M.S. from KAIST's SoftSec Lab (NDSS 2019, CodeAlchemist), he has spent years breaking browsers, embedded devices, and Windows — collecting CVEs from Apple and Microsoft along the way. Ranked Microsoft Top 10 Security Researcher and previously spoke at CODE BLUE 2023. He now lives in IDA Pro and LLM prompts, hunting Windows vulnerabilities at the boundary of human intuition and AI.
Principal Engineer
NinjaOne
Argentina
I have presented at:Black Hat USA: Main Track and ArsenalDEF CON: Demo Labs and Blue Team VillageEkopartyTyphoonConBSides: Austin and Córdoba
Student
Amrita Vishwa Vidyapeetham
Coimbatore, Tamil Nadu, India
R.D. Tarun (RDT) is a cybersecurity researcher specializing in malware analysis, reverse engineering, and adversary tradecraft. His work focuses on dissecting real-world attack campaigns, with particular emphasis on multi-stage infection chains, fileless execution, and evolving infostealer ecosystems.He conducts in-depth research on active malware campaigns, tracking their progression from commodity tooling to custom-developed payloads. His analysis has uncovered previously undocumented behavior, including custom infostealers, infrastructure patterns, and techniques used to evade modern defenses. His research has been widely circulated within the security community and covered by multiple security news outlets and industry publications.His work combines static and dynamic analysis with memory-level investigation to trace full execution chains from initial access to data exfiltration. He focuses on understanding attacker tradecraft end-to-end and translating offensive techniques into practical detection strategies for SOC and DFIR teams.He actively publishes technical deep-dives on malware, including infostealers, fileless loaders, and multi-stage attack chains, and has presented his research at reputed security community meetups and forums.
London
I have spoken at DEF CON 30 (mainstage), various BSides (London, New York City, Rome, Prishtina, Dublin), and many other conferences such as HackCon Norway, Wild West Hackin' Fest @ Mile High, Nullcon Goa, Disobey Helsinki, SANS DFIR Summit and MITRE ATT&CK EU Community.You can find some recordings here: https://www.youtube.com/results?search_query=%22Wietze+Beukema%22