Speakers « BSidesROC

Speakers

David Kennedy
Moving the Industry Forward – The Purple Team

David Kennedy is the President / CEO of TrustedSec, LLC. He is considered a thought leader in the security field and has presented at many conferences worldwide. David has had guest appearances on FoxNews, BBC, and other high-profile media outlets. He is the founder of DerbyCon, a large-scale security conference in Louisville Kentucky, and co-authored Metasploit: The Penetration Testers Guide book (with Devon Kearns, Jim O’Gorman, and Mati Aharoni). David was also one of the founding members of the Penetration Testing Execution Standard (PTES).

David is also the creator of several widely popular open-source tools including “The Social-Engineer Toolkit” (SET), Artillery, and Fast-Track.


Silas Cutler
Dexter: Less Blood, More Victims

Silas Cutler is a well-known security researcher with a focus on malware analysis and botnet tracking. He is currently a Sr. Security Researcher at CrowdStrike, where he analyzes malware developed by nation states and organized cybercrime groups. He has been invited to speak at the RSA Conference, OWASP and other industry conferences. In the past, he has been interviewed by SC Magazine, CNET and Security Week.

Prior to joining CrowdStrike, he worked at Dell SecureWorks and Global Crossing. He earned his Bachelor of Science from Rochester Institute of Technology.


Rockie Brockway
The Challenge Of Natural Security Systems

Rockie Brockway serves Black Box as Senior Engineering Director and Security Practice Director. With over two decades of experience in InfoSec/Risk, he specializes in Information Security Risk Management and the inherent relationship between assets, systems, business process, and function. He offers perspectives on how adversaries may find value in business data, highlights the business impact and ramifications of the theft, disruption, and/or destruction of that data, simulates the adversarial data breach/theft and provides rational and reasonable business mitigation recommendations. He is a recovering cynic, zero FUDs given.


Zack Allen & Chaim Sanders
A Measure Of Human Susceptibility

Chaim Sanders is a security consultant working for Cigital out of the northern Virginia area. In his day job he does everything from reverse engineering to red teaming. By night he focuses on security research that deals with internal network testing and targeting methods.

Zack Allen is a Research and Development Engineer working for ZeroFOX in Baltimore MD. A graduate of RIT, he worked for the Air Force Research Lab in Rome, NY for both the ACE internship and full time before moving on to the exciting startup world in Baltimore. Interests include secure system development, cryptography, research and development and developing for red team engagements.


Steve Stasiukonis
OSINT For Profit: How Someone’s Social Network Can Be Used

Steve serves as President of Secure Network Technologies, focusing on Penetration Testing, Information Security Risk Assessments, Incident Response and Digital Investigations. Steve has worked in the field of Information Security for over seventeen years, specializing in the use of technology to identify information security vulnerabilities, assessing risk and the collection and interpretation of digital network intelligence.


Tom Kopchak
Attacking & Defending Full Disk Encryption

Tom Kopchak is a Senior Security Engineer at Hurricane Labs, an Information Security Firm in Cleveland, Ohio. Tom is an alum of the Rochester Institute of Technology, with a background in Computing Security and Information Security (MS) and Applied Networking and System Administration(BS). While studying at RIT, Tom worked as a graduate assistant and virtual lab administrator. His responsibilities included tutoring students in subjects such as networking, security, and system administration, as well as updating coursework and student lab assignments. Tom’s passion for information security stems from his experiences in the Collegiate Cyber Defense Competition. His research areas include computer forensics and data storage technologies. When he is not working with computers, Tom enjoys composing, music improvisation, and playing both the piano and organ.


Eric ‘PanicOpticon’ Busse
Busting A Cap Without Die-ing

Eric has been doing computer security research professionally in the private sector for the last 7 years, and unprofessional for closer to 20. He focuses on system level security architecture and it’s  interaction with wireless and embedded systems. When not at work, he spends most of his time wandering around looking at things with antennas in public spaces, then trolling the FCC OET database and eBay to see what he can find out about them.