Speakers & Trainers


RobMLee.jpegRobert M. Lee (@RobertMLee) - United States Airforce Cyber Warfare Ops Officer | PhD candidate @KingsCollegeLon | Co-Founder @DragosSecurity | SANS ICS 515 author | Lecturer @UticaCollege | SCADA and Me author




Holland.jpgRick Holland (@rickholland) has more than 14 years experience working in information security. Prior to joining Digital Shadows he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the U.S. Army. He is currently the co-chair of the SANS Cyber Threat Intelligence Summit, and holds a B.S. in business administration with an MIS concentration from the University of Texas at Dallas. 



JonRamsey.pngJon Ramsey is the Chief Technology Officer at SecureWorks in Atlanta, GA and a Dell Fellow. Ramsey has 25 years of hands-on experience at every level: system administrator, software engineer, analyst, security penetration specialist and senior engineer. Prior to joining SecureWorks, Ramsey worked for the Computer Emergency Response Team (CERT), Siemens, and the University of Pittsburgh. Ramsey earned a Master's degree in software engineering from Carnegie Mellon University and a Bachelor of Science in computer science from the University of Pittsburgh.


AndrewHay.jpgAndrew Hay (@andrewsmhayis the CISO at DataGravity where he advocates for the company’s total information security needs and is responsible for the development and delivery of the company’s comprehensive information security strategy. Prior to that, Hay was the Director of Research at OpenDNS (acquired by Cisco) and was the Director of Applied Security Research and Chief Evangelist at CloudPassage, Inc. Hay previously served as a Senior Security Analyst for 451 Research’s Enterprise Security Practice (ESP). 


maxwell-kyle-500-2013-05.jpgKyle Maxwell (@kylemaxwell) is a private-sector threat intelligence analyst and malware researcher working with incident response and security operations. He is a GPL zealot, believes in UNIX uber alles, and supports his local CryptoParty. Kyle holds a degree in Mathematics from the University of Texas at Dallas.

 

   

TM_201602_250.jpgTim MalcomVetter (@malcomvetter) has fifteen years in defending, building, and breaking systems, built upon a thorough academic foundation. Currently, Tim is the Director of the Red Team at the world’s largest commercial entity, Walmart, where he is privileged to lead a team of very skilled and scary pirates-turned-privateer Red Team engineers. Previously Tim was a Principal Consultant in Optiv’s Software Security Group, their top offensive security blogger during his tenure, performing penetration tests and code reviews on web apps, web services, mobile apps, point of sale systems, proprietary TCP socket services, and even fuel pumps and car washes (yes, fuel pumps!). Before that, Tim led agile e-commerce dev teams, led PCI compliance projects at Level 1 merchants, and was a security generalist wearer-of-many-hats. Tim has presented in numerous venues, including Black Hat USA Tools Arsenal, Security BSides, ArchC0N, ShowMeCon, Secure World Expo, St. Louis Day of .NET, and other developer conferences. Born and raised in the Show Me State, right here in St. Louis, Tim also donates time to coach the Missouri S&T CTF Team, and spent way too much time in school, including a couple campuses of the University of Missouri system.

Harlan.jpg

Harlan Carvey is a Sr InfoSec Researcher for SecureWorks. He has been involved in information security for 27 years, and been performing DFIR work for 16 years. Harlan is a prolific author, public speaker, and is the author of the open source tool known as RegRipper.




Holtz.jpgAshley Holtz (@thec0dem0nkey) is a programmer and consultant in Washington, DC specializing in security and forensics. In her free time Ashley teaches women and children about technology and volunteers as the Outreach Director at DC Web Women.




Roberts.jpgScott J Roberts (@sroberts) works for GitHub and makes up his title every time he's asked, so we'll say he's the Director of Bad Guy Catching. He has worked for 900lbs security gorillas, government security giants & boutiques, and financial services security firms and done his best to track down bad guys at all these places. He's released and contributed to multiple tools for threat intelligence and malware analysis. Scott is also really good at speaking in the 3rd person.


 

Parsons.jpgMark Parsons (@markpars0ns)was a net defender/incident responder in a past life that slowly turned him into a small projects developer and occasional threat analyst. Mark has spent the past few years working on developing solutions that allow threat analysts and net defenders to spend more time looking at data rather than collecting it. Before jumping into security Mark spent 10 years as a systems administrator and network engineer. Mark recently presented at the 2016 BSIDES Baltimore.



Hardcastle.jpgKevin Hardcastle is CISO for Washington University in St. Louis. where he is responsible for risk management, compliance, information security operations, information security awareness, program development, and overall coordination of all aspects of information security. Kevin’s previous responsibilities included performing project based security risk assessments and implementing an ISMS program to attain BS7799 and ISO27001 certifications for Reuters and developing the information security program for WellPoint/Blue Cross & Blue Shield of Missouri.


Pease.jpgAndrew Pease is currently Cyber Threat Intelligence Lead for Monsanto and is a member of the Missouri National Guard Cyber Team. He has presented at multiple Department of Defense conferences to include Project C, Advanced Cyber Training Program, and monthly on various security topics to audiences of 30+ people.

 


© 2016 ArchCON 2016