Antonio A. Rucci

Director, InfoSec & Threat Intelligence, GRIDSMART Technologies, Inc.
Bio

Antonio A. Rucci is a retired Counterintelligence Special Agent and US Army Warrant Officer, with more than 34 years of technical security experience. Tony is the Director of Information Security & Threat Intelligence for GRIDSMART Technologies Inc, Knoxville, TN.

Tony ran technical espionage and computer crimes investigations for a good portion of his operational career. He served as the Counterintelligence Operations Officer at The White House, serving two administrations from 1998-2004. He led technical accreditation for a critical facility at one of the DOE National Labs before being recruited to move to Reno, NV to build a data center for one of the beltway bandits. Since then, Tony has started two of his own companies; served as the Chief Security Officer for two others; and built an InfoSec & Threat Intelligence vertical for another company before joining GRIDSMART earlier this year. Tony continues to serve national security efforts in his current capacities, stirring up the Transportation Industry by assessing and assisting smart/autonomous vehicle strategies along with their smart cities and traffic management support infrastructure, supporting both private sector and government interests. Twitter: @InsiderThreats

Joseph Muniz

Architect at CISCO Systems and Security Researcher
Bio

Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Examples of Joseph’s research is his RSA talk titled Social Media Deception quoted by many sources found by searching “Emily Williams Social Engineering” as well as articles in PenTest Magazine regarding various security topics.

Joseph runs the Security Blogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including titles on building security operations centers (SOC)s, CCNA cyber ops certification, web penetration testing and hacking with raspberry pi. Joseph’s next title, Digital Forensics for Network Engineers released on Cisco Press was released late February 2018. Follow Joseph at www.thesecurityblogger.com and @SecureBlogger.

Brian Contos

CISO & VP Technology Innovation at Verodin
Bio

Brian has over two decades of experience in the security industry. He is a seasoned executive, board advisor, security company entrepreneur and author. After getting his start in security with the Defense Information Systems Agency (DISA) and later Bell Labs, Brian began the process of building security startups and taking multiple companies through successful IPOs and acquisitions including: Riptech, ArcSight, Imperva, McAfee and Solera Networks. Brian has worked in over 50 countries across six continents. He is a strategic board advisor for multiple companies including Cylance and Appdome. He has authored several security books, his latest with the former Deputy Director of the NSA, spoken at leading security events globally and is a Distinguished Fellow with the Ponemon Institute. Brian frequently appears in the news and has been featured in CNBC, C-SPAN, Fox, NPR, Forbes, Wall Street Journal, The London Times and many others. He most recently appeared in a cyberwar documentary alongside General Michael Hayden (former Director NSA and CIA).

Dr. Catherine J. Ullman

Senior Information Security Analyst, University at Buffalo
Bio

Dr. Catherine J. Ullman began her IT career over 20 years ago as a Technical Support Specialist for Corel Word Perfect. After gaining valuable experience, as well as several technical certifications while working for Ingram Micro and subsequently Amherst Systems, she was offered and accepted a position at UB as a Systems Administrator in 2000 in which she provided both server and workstation support for several departments within Undergraduate Education. While she enjoyed her support role, she began to specialize in computer security and computer forensics. As a result, Cathy was often utilized by the Information Security Office to assist in the investigation of security breaches. Ultimately, she was asked to join the Information Security Office full time in 2009. In her current role as a Senior Information Security Analyst, Cathy is responsible for performing computer forensic investigative services for compliance on potentially compromised machines as well as personnel issues. She also assists with incident management involving intrusion detection and analysis, as well as providing security awareness training to departments on campus upon request. In 2017 Cathy was given the honor of speaking at Defcon’s Wall of Sheep for the first time. In her (minimal) spare time, she enjoys researching death and the dead, and learning more about hacking things.

Corey McReynolds

Senior Enterprise Security Consultant at Sword & Shield Enterprise Security, Inc.
Bio

Corey McReynolds is an Enterprise Security Consultant with Sword & Shield Enterprise Security. Corey graduated Carson-Newman University with Bachelor of Arts in communications. He then started his career with the United States Army where he worked on numerous operations as an Military Intelligence asset earning numerous commendations and the Combat Action Badge. He was Honorably Discharged as a Military Intelligence Officer from the United States Army Intelligence Center of Excellence at Fort Huachuca. He then transitioned to supporting security operations at a Department of Energy research and development facility, where he rebuilt the facilities complete security operations procedures and manual. During this time, he began working on additional technical degrees where he acquired three additional degrees in Information Technology, Programming, and Network Security & Forensics, while also earning all six of the Committee on National Security Systems (CNSS) Certifications meeting requirements for both the National Security Agency (NSA) and U.S. Department of Homeland Security (DHS). Corey also transitioned into a Senior Systems Engineer/Solutions Architect position for a data storage company. He designed and deployed four data centers capable of handling 500+ petabytes of data storage. After completion of the degrees Corey was offered a position at Sword & Shield Enterprise Security where he enjoys serving clients and solving problems with creative solutions.

Michael J. Masucci

Commissioner, Santa Monica Arts Commission Chair, Santa Monica Public Art Committee
Bio

Michael J. Masucci is an award-winning media producer, video-artist, writer, musician, curator and mediator. He also currently serves as an Arts Commissioner for the City of Santa Monica, where he chairs its prestigious Public Art Committee.

Masucci’s collaborations have been exhibited internationally, at venues such as the Museum of Modern Art (New York), the Institute of Contemporary Art (London), the American Film Institute (Los Angeles), the Autry National Center, on commercial television, as well as in festivals, galleries conferences and universities.

He is co-founder of Los Angeles’ seminal media art group EZTV (www.eztvmedia.com), which has received retrospective tributes by the American Film Institute, UCLA, SIGGRAPH, the University of Southern California (who also houses the EZTV Archives as part of its permanent collection) and was included in the Getty Museum’s Pacific Standard Time. Additionally, Masucci co-founded CyberSpace Gallery, one of the world’s first art galleries dedicated to digital art. He was also a founding member of the “LA Digilantes”, a group of artist-activists advocating for use of computing in the arts.

Masucci has taught at the Otis College of Art & Design and has done guest lectures at a number of institutions, including Changchun Film Studios (China) UCLA, USC, CalTech, Claremont College, the University of Helsinki, San Francisco Art Institute, American Film Institute, ICA (London), Long Beach Museum of Art, the School of Visual Arts (NYC) and New School/ Parsons. He has alos presented at conferences internationally, whose topics range from popular entertainment, Transhumanism, cyber-security, social justice, education and technology. His presentations in the field of Cybersecurity bridge together the worlds seemingly separate realms of art culture and IT.

His work has been profiled in a variety of media, including PBS, the Discovery Channel, the Los Angeles Times, Variety, Artweek and the Hollywood Reporter. His writings have appeared in the SIGGRAPH Journal, the Independent Film & Video Monthly, and in several books, including the pioneering “CyberArts-Exploring Art & Technology” (edited by Linda Jacobsen).

Masucci has a law degree and has completed graduate level training in mediation and conflict resolution and holds certificates in film, music, entrepreneurship and graphic design.

Kaveh Ghaemmaghami

Principal Application Security Engineer, Software Solutions | NCR Corporation
Bio

Kaveh is employed in NCR Corporation as Principal Application Security Engineer and has provided many findings and assistance in the sector of IT-Security. His unique, self-written tools and knowledge of security audits and penetration testing has placed Kaveh in the Google Hall of Fame and acknowledgment by Microsoft, Adobe, Artweaver and Integraxor SCADA for his findings.

Kaveh hopes to give back to the IT-Security community by showcasing the tools he designed and he got 30 critical/high CVE’s in a year.

Adam Compton

Bio

Adam Compton has been a programmer, researcher, instructor, professional pentester, father, husband, and farmer. Adam has close to 2 decades of programming, network security, incident response, security assessment, and penetration testing experience. Throughout Adam’s career, he has worked for both federal and international government agencies as well as within various aspects of the private sector.

Tyler Cohen Wood

CyberVista, Executive Director of Cyber Workforce Development
Bio

Tyler Cohen Wood is a cyber-authority with 18 years of highly technical experience, 13 of which were spent working for the Department of Defense (DoD). As a cyber, Intelligence, national security expert, author and public speaker, Tyler is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools they need to defend themselves in the digital world. Tyler sits on several cyber advisory boards, including CyberSat and The Internet of Things Consortium.

Before joining CyberVista as an Executive Director of Cyber Workforce Development, Tyler worked at AT&T as a Director of Cyber Risk Management in the Cyber Solutions Group where she used thought leadership and her cybersecurity expertise to develop new and inventive solutions to protect customers from hackers and the ever-increasing cyber threat landscape.

Prior to that, Tyler worked at the U.S. Defense Intelligence Agency (DIA) under the DoD, serving as a Senior Intelligence Officer, Deputy Cyber Division Chief of the Special Communications Division and the DIA Science and Technologies Directorate-selected Cyber Subject Matter Expert (SME). Along with providing day-to-day leadership for the division, she developed highly technical cyber solutions, and made recommendations and decisions significantly interpreting, developing and changing critical cyber policies and directives affecting current and future DoD and intelligence community programs. She has helped the White House, DoD, federal law enforcement, and the intelligence community thwart many threats to our country.

At DIA, Tyler was also responsible for developing and leading many interagency working groups and task forces to develop, assess and deconflict advanced technical capabilities and techniques currently being used by U.S. Special Forces and the intelligence community to conduct special operations and missions. Many of these capabilities are still in active use in the field today. In addition, she led the development of a digital data protection course that has been instituted as required training for many factions of Special Forces.

As a senior digital forensic analyst for the DoD’s Cyber Crime Center, Tyler used her expertise to conduct major crimes, intrusion and malware analysis. Her work directly led to many successful prosecutions, protecting the country from hackers, saving businesses millions of dollars, and put numerous online sexual offenders and those who have committed crimes against children behind bars.

Over her career she also provided her extensive expertise to NASA and technology stalwart IBM. Her latest book, Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life (2014, The Career Press), teaches the public how to safely and successfully navigate the online world, protect yourself, your children, your privacy, and learn how to be sure if someone is who they claim to be online. Previously, she co-authored the textbook, Alternate Data Storage Forensics (2007, Syngress), and was also featured in Best Damn Cybercrime and Digital Forensics Book Period (2007, Syngress).
Tyler’s expertise has made her a highly sought-after guest and writer for both national and local television, radio, print and online media. She has been featured on Good Morning America, FOX and Friends, CBS Evening News, ABC World News Tonight, Bloomberg, CNN, FOX, CBS, ABC, NBC, WGN, among others, and in The Wall Street Journal, Washington Post and Huffington Post.

She has given many successful presentations across the country in the technical, insurance, financial, healthcare and other industries at companies ranging from start-ups to Fortune 100s. Tyler has also presented to schools, universities, town halls and parenting groups and has been a keynote speaker at conferences such as RSA, Defcon/Blackhat, HTCIA, Bloomberg, DoD Cybercrime and many other intelligence community and law enforcement conferences.

With a passion for helping the average person understand the dangers and pitfalls of living in a digital world, Tyler is also called upon as a featured speaker to educate audiences of all demographics on the ever-growing and ever-changing digital landscape.

Yury Chemerkin

Security Consultant at Pawlin Technologies
Bio

Yury Chemerkin has ten years of experience in information security. He is multi-skilled security expert on security & compliance and mainly focused on privacy and leakage showdown. Key activity fields are EMM and Mobile Computing, IAM, Cloud Computing, Forensics & Compliance. He published many papers on mobile and cloud security, regularly appears at conferences such as CyberCrimeForum, HackerHalted, DefCamp, NullCon, OWASP, CONFidence, Hacktivity, Hackfest, DeepSec Intelligence, HackMiami, NotaCon, BalcCon, Intelligence Sec, InfoSec NetSysAdmins, etc.

Gregory Carpenter

Chief of Security Testing for Titania Solutions Group
Bio

Gregory is the owner of GCE, LLC, Chief of Security Testing for Titania Solutions Group, on the Board of Directors of ATNA Systems, International Board of Advisors of the MacKenzie Institute and has his own radio show based on his book, Reverse Deception which is a popular curriculum book in IT and psychology departments nationwide which has been translated into four languages; Cyrillic, Arabic, Russian and Chinese. He has been a frequent guest on Fox News, ABC and SiriusXM and travels globally to speak on future technologies.

In his over 30 years of military and civil service he served in several capacities in the Infantry, Logistics, Medical Service and Military Intelligence branches. His key assignments included US Strategic Command and the National Security Agency.

Gregory holds a MS from Seton Hall University and a BS from Colorado Christian University and is a doctoral candidate studying in vivo bio-nanotechnology. He is a Certified Information Security Manager (CISM) is LEAN 6 Sigma Blackbelt trained, a licensed ISO 9000 Lead Auditor and has received numerous professional awards including the prestigious National Security Agency Military Performer of the Year.

John Nye

Senior Director of Cybersecurity Research and Communications for CynergisTek
Bio

John Nye is Senior Director of Cybersecurity Research and Communications for CynergisTek and has spent the last decade working in Information Security, half that time working exclusively as a professional penetration tester. Besides testing and improving security, John has a passion for educating and informing the public. He accomplishes this by presenting regularly at industry conferences and groups (such as DEF CON, B-SidesLV, and HIMSS 2018). When he is not busy speaking he is writing blog posts for CynergisTek and industry publications. Nye’s specialties include social engineering, the human/computer interaction, wireless, web, and system penetration testing, user education, public speaking, information assurance, security auditing, writing, security research and analysis. Some of his industry certifications include CISSP, Licensed Penetration Tester (LPT) and Certified Ethical Hacker (CEH).

Tal Melamed

Head of Security Research at Protego Labs
Bio

Tal has 15 years’ experience in the information security field, specializing in security research and vulnerability assessment. Prior to being the Head of Security Research at Protego, Tal was a tech leader at AppSec Labs, leading and executing a variety of security projects for serverless, IoT, mobile, web, and client applications, as well as working for leading security organizations, such as Synack, CheckPoint, and RSA.

Tal is also a keen speaker; training DevOps and hackers around the world, as well as lecturing at major security conferences; and a neat developer, experimenting daily with offensive and defensive security.

Stefan Stephenson-Moe

Senior Client Security Analyst for SunTrust Bank
Bio

Stefan is a senior client security analyst for SunTrust Bank. He works in the intersection between information security and fraud focusing on securing the client experience. Having spent the last two years working in the financial sector, his primary focus has been in detecting fraud and detecting financial malware used to steal user credentials. Stefan’s primary area of focus is finding new and better ways to baseline customer web traffic and single out fraudster anomalies. Previously, Stefan worked for a power company in the South doing intrusion detection and response, while also performing research into potential vulnerabilities on the Transmission SCADA and power distribution networks and ways an attacker might exploit them. As a side interest he is researching ways in which blockchain can be used to fight government corruption. Additionally, Stefan is a Field Artillery Officer in the Army National Guard.