Richmond, VA

June 5th - 6th, 2014

Category Archives: Conference

Speaker feature: mubix

@mubix / www.room362.com Hak5 Mubix is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United […]

Speaker feature: Jack Mannino, Abdullah Munawar

@jack_mannino / nvisium.com nVisium Jack Mannino is a Co-Founder at nVisium, a DC area firm specializing in application security. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful security initiatives. He is an active Android security researcher/tinkerer, and has a keen interest […]

Speaker feature: Pete Herzog

@peteherzog / www.isecom.org ISECOM Pete Herzog is the managing director of ISECOM and the lead researcher behind the organization’s “10-gen” research initiative to research and evaluate new ideas at least 10 years ahead of the security industry. Pete is the creator and main writer of the OSSTMM and Hacker Highschool. Five Secrets to Building an Amazing Security […]

Speaker feature: Ray Kelly

@vbisbest / h30499.www3.hp.com/t5/user/viewprofilepage/user-id/1456467 HP Fortify on Demand Ray Kelly got his start in internet security 11 years ago with SPI Dynamics. As the lead developer of WebInspect, he helped build the product into an industry leading application scanner. After the SPI’s acquisition by HP, Ray moved on to other startups such as Purewire and Barracuda Networks where […]

Speaker feature: Dan Holden & Elizabeth Martin

@desmondholden & @elizmmartin / www.arbornetworks.com/asert/ Arbor Networks & RedLegg Dan Holden is the Director of ASERT, Arbor’s Security Engineering and Response Team, where he leads one of the most well respected security research organizations in the industry. His teams oversee the ATLAS global security intelligence database, and are responsible for threat landscape monitoring and Internet security research […]

Speaker feature: Inga Goddijn

@analoggirl11 / www.riskbasedsecurity.com Risk Based Security Inga has been involved with specialty insurance coverages since 1993 and brings a wealth of experience with all facets of risk transfer. Her focus includes the strategic management of data privacy and security exposures, with an emphasis on leveraging data-driven risk assessment to build sustainable insurance programs and product profitability. As […]

Speaker feature: Seth Hanford

@SethHanford / blogs.cisco.com/tag/trac/ Cisco Seth Hanford manages Cisco’s TRAC team, whose members use Cisco’s expansive security intelligence resources to detect and respond to threats and generate original research on a wide array of security topics. Prior to this role, he worked for more than a decade in vulnerability and threat intelligence. Between his roles as a Security […]

Speaker feature: Jonathan Dambrot

www.prevalent.net Prevalent Networks Prevalent Networks Managing Director Jonathan Dambrot, CISSP, works with the leading organizations in the world to help better manage third party and IT related risks. Prevalent develops Prevalent Vendor Risk Manager and provides compliance automation solutions from the cloud with its Prevalent Compliance as a Service. Jonathan received his MBA from The […]

Speaker feature: Sarah Clarke

@dystonica / dystoni.ca Genesys Telecommunications Sarah Clarke is a Senior Security Engineer at Genesys Telecommunications. She has 12 years of experience in IT, seven of which have specialized in Security. She has worked with nonprofit, government contracting, ISP, financial sector, and telecommunications organizations; currently, she is enjoying serving as application security testing and vulnerability management SME for […]

Speaker feature: Evan Booth

@evanbooth / terminalcornucopia.com Growing up, it was a safe bet that if an object around the house was held together with screws or contained any number of wires, Evan “treefort” Booth took it apart at some point to see what made it tick. In 4th grade, with the help of strategically placed pens, erasers, and a Pop-Tarts […]