Alexis Cao
Alexis Cao is doing research at Johns Hopkins University under the advising of Professor Matthew Green. Her research interests are in anonymous communication and cryptography. She received her Bachelor of Science degree in Computer Science from Johns Hopkins University in May 2025. Previously, she has volunteered at TraceLabs, and at Physical Security Village, Red Team Village, and AppSec Village at DEFCON.
alexiscao.bsky.social
—
Presenting: You Can Mix But You Can’t Hide: Centralization in Decentralized Mixnets
Alton Henley
Alton Henley is Dean of Business and Hospitality at Montgomery College in Maryland, where he leads programs preparing the next generation of public and private sector professionals.
Before his administrative role, Henley spent a decade as a cybersecurity professor at Howard University and Montgomery College, teaching network defense, security architecture, and risk management. He serves on the advisory board of the KC7 Foundation, a nonprofit making cybersecurity education accessible through game-based learning.
He holds AWS Certified Solutions Architect and Cloud Practitioner certifications, complementing earlier credentials in enterprise technology (Microsoft MCSE, CompTIA Server). His previous books, Learn Data Analysis with Python and Java EE Web Application Primer (Apress, 2017), reflect his commitment to making complex technology accessible to working professionals.
Henley’s local government experience includes board service with the Rockville Chamber of Commerce and REDI (Rockville Economic Development, Inc.), giving him direct insight into how municipal leaders approach technology adoption and workforce development.
A Howard University graduate based in the Washington, D.C. metro area, his recent work focuses on private AI solutions, municipal digital transformation, and preparing workers for an AI-enabled economy.
—
Presenting: Soft Targets: Why Small Municipalities Are Hackers’ Favorite Prey
Andre Piazza
Andre Piazza is a cybersecurity strategist with 20+ years pioneering technology innovation and adoption across organizations small, medium, and large. He’s influenced the creation of 5 cybersecurity categories and **translates** complex threat intelligence into practical defense strategies that SOC teams actually implement.
Specializes in predictive security frameworks that shift defenders from reaction to anticipation, identifying malicious infrastructure before attacks weaponize. BSides speaker delivering evidence-based sessions with Monday-morning applicability. Combines deep technical expertise with proven adoption strategies to help security teams work smarter against AI-driven threats.
—
Presenting: When Headlines Hit, They Strike: Predicting AI‑Driven News Scams
Andrew Bullen
Andrew Bullen leads the AI Security team at Stripe, where he designs infrastructural primitives that secure the company’s internal and customer-facing AI platforms. A ten-year veteran of Stripe, Andrew previously led the Data Platform and Privacy Engineering teams. He approaches security as a leadership challenge just as much as a technical one. His work sits at the intersection of engineering leadership, security, AI/ML, and usability. In addition to his technical work, Andrew is an engineering leadership coach and can be found online at andrewbullen.co.
—
Presenting: Breaking the Lethal Trifecta: Architectural Prompt Injection Defenses
Anuj Soni
Anuj Soni is a Senior Reverse Engineer at the Johns Hopkins University Applied Physics Laboratory and the founder of The Malware Lab, where he teaches analysts how to analyze and understand malicious code through hands-on, practical training. He previously authored FOR710: Advanced Code Analysis and co-authored FOR610: Malware Analysis Tools and Techniques for the SANS Institute, where he served as a Senior Certified Instructor. Anuj also shares educational malware analysis content on YouTube to help others build confidence in reverse engineering. When Anuj is away from his keyboard, you’ll find him at the local gym, or with his kids (which is also a workout).
sonianuj |
asoni
—
Presenting: Malware Analysis Fundamentals: A Hands-On Workshop
Anurag Swarnim Yadav
Anurag Swarnim Yadav is a security researcher currently working on QubitAQ, a platform focused on cryptographic discovery, inventory, and post-quantum cryptography (PQC) readiness. He holds a Ph.D. in Computer Science from the University of Florida, where his research centered on machine-learning–driven vulnerability detection and automated program repair.
—
Presenting: You Can’t Migrate What You Can’t See: Discovering Real Post-Quantum Crypto
Caleb Kinney
Caleb Kinney is a data driven cybersecurity leader and Manager of Security Operations at Posit. He leads security operations, metrics, and reporting across corporate security, application security, and vulnerability management, and helps shape security strategy for products used by millions of data scientists worldwide. He contributes to HackerTracker, serves on the NumFOCUS Security Committee, and volunteers at DEF CON as a Goon. Caleb builds open source tools and dashboards that turn security data into measurable, defensible practices that help teams move faster with less risk. Find his work at derail.net. Away from the keyboard, he is often logging miles on Maryland back roads and adventuring with his wife and two imaginative daughters.
cak
—
Presenting: Why Vulnerability MTTR Alone Misleads: Add MOVA to Measure Real Risk
Chris Maenner
Chris is Head of Security at Ybor Technologies, where he focuses on securing Kubernetes platforms, AI workloads, and cloud-native infrastructure. He has been working in security engineering since 2006, spanning roles from early-stage startups to enterprise platform teams.
Chris serves as a board member of BSidesPhilly and is a frequent speaker at security conferences, including multiple BSides events, Boardwalk Bytes, and corporate conferences. He’s passionate about helping fast-moving teams build secure systems without sacrificing velocity.
Outside of security, Chris builds music applications and spends his free time visiting music venues around the world.
dafinga |
dafinga |
cmaenner
—
Presenting: Securing AI Workloads in Kubernetes: Lessons from Scaling Startups
Derek Chamorro
Derek is the Head of Security at Together.ai and the former Head of Infrastructure Security at Cloudflare. He has over 20 years of experience in designing security frameworks at scale. His main focus is on research and development within the fields of encryption and infrastructure security.
He earned a masters in cybersecurity from Purdue University and now owns more than 50 global patents related to cryptography, key management, and distributed ledger technology.
—
Presenting: It’s Not the CPU’s Fault: Adventures in GPU and Firmware Forensics
Dickson Kwong
Dickson Kwong is an accomplished Information Security professional with over a decade of comprehensive experience spanning both offensive (red team) and defensive (blue team) cybersecurity operations. His professional experience encompasses a broad range of industries, including leading financial institutions, U.S. government agencies, and high-growth technology startups. This diverse background has provided him with a strong understanding of regulatory and compliance requirements, risk management frameworks, and the unique security challenges inherent to each sector.
—
Presenting: Modernize, Vectorize, and Visualize CyberOps Data, Threat Intel with Qdrant
Erich Kron
Erich Kron, CISO Advisor at KnowBe4, author, podcaster and regular contributor to cybersecurity industry publications, is a veteran information security professional with over 30 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the US Army’s 2nd Regional Cyber Center and holds CISSP, CISSP-ISSAP, SACP and many other certifications. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in Information Security.
ErichKron
—
Presenting: The Chronicles of NERD-ia: Making a Smart Home That Works Most of the Time
Grey Fox
Grey Fox is a Security Engineer and Vulnerability Rustler working on global ICS products. As a U.S. military veteran with 20 years experience, he cut his teeth in digital network intelligence, cyberspace warfare, and ground combat tactics. Grey Fox lugs baggage from numerous deployments ranging from offensive cyber operations planning and execution to military information support operations. He currently teaches Digital OPSEC, Expedient Software-defined Radio, and Tactical Emergency Casualty Care to both civilian and military groups. Grey Fox has been tolerated speaking at Def Con, various B-Sides, and other cons in addition to chairing panels on consumer data privacy for Federal research and accountability. When not seeking some free time, Grey Fox is threat modeling your AI applications and cos-playing as a Human Resistance fighter against Skynet.
—
Presenting: Going AFK – A Discussion on Standing Up and Standing Out
h00die
h00die is currently employed with nDepth Security as a senior penetration tester. Previously he helped start Exploit-DB as one of the original staff moderators for submissions and quality control experts. He is currently one of the few non-Rapid7 employees entrusted with commiter rights for the Metasploit framework, volunteering to create new module, peer review submissions, and keep the framework awesome over the last 10 years.
h00die
—
Presenting: New Windows Persistence Techniques in Metasploit
h00die
—
Presenting: New Windows Persistence Techniques in Metasploit Jason Blanchard
Jason Blanchard has been happily adopted into the hacker community at Black Hills Information Security (BHIS) since 2019, despite “working in marketing.” He’s held a variety of dream jobs, including teaching filmmaking, owning the world’s most famous comic book store, and supporting infosec community efforts at SANS. At BHIS, he’s often called the “Director of Excitement,” though his formal title is Content and Community Director. In his day-to-day work of “sucking at capitalism,” Jason focuses on helping others, sharing knowledge, and giving away lots of free stuff. Outside of work, he spends time with his wife and daughter and hosts workshops to help people find jobs through, “Job Hunt Like a Hacker.”
—
Presenting: Job Hunt Like a Hacker with Jason Blanchard
Jenko Hwong
Jenko Hwong is a Principal Security Researcher at Huntress Labs, focusing on identity-based attacks and abuse. Prior to Huntress, he spent 6 years at Netskope Threat Labs, speaks regularly at RSA and DEFCON, and is a Cloud Village CTF Lead. He has over 20 years in engineering and product roles at various security startups in vulnerability scanning, AV/AS, pen-testing/exploits, L3/4 appliances, threat intel, and windows security.
edleft.bsky.social |
infosec.exchange/@jenko |
jenkohwong |
jenkohwong |
edleft |
j@bulky.eml.cc
—
Presenting: CloudShell Hide-n-Seek: persistent lessons from building a CTF Challenge
j@bulky.eml.cc
—
Presenting: CloudShell Hide-n-Seek: persistent lessons from building a CTF Challenge Jerry Jones IV
I am Jerry Jones IV, an Associate Delivery Consultant – Security at Amazon Web Services, where I help enterprise customers architect secure, compliant cloud solutions that meet rigorous regulatory requirements while enabling innovation.
I’ve independently designed enterprise-grade solutions including a centralized backup and logging strategy for AWS Organizations with automated cross-account and cross-region capabilities, and a comprehensive multi-account governance framework using AWS Control Tower with Service Control Policies and AWS Transit Gateway for scalable connectivity.
I hold multiple AWS certifications including Solutions Architect Associate, Machine Learning Engineer – Associate, AI Practitioner, Cloud Practitioner, and AWS Certified Associate Speaker, along with Certified Information Systems Security Professional (CISSP) and Security+ credentials. I’ve earned my Master of Science in Cybersecurity from George Washington University as a National Science Foundation CyberCorps Scholarship for Service recipient and co-authored IEEE 2018 research on blockchain applications for space object tracking.
I bring deep cloud architecture expertise and a passion for bridging security requirements with business objectives to help organizations navigate modern cloud security challenges.
—
Presenting: Too Many Security Tools? ASH Has Entered the Chat
Jessie Jamieson
Dr. Jessie Jamieson is a research mathematician with almost a decade of experience applying mathematical techniques to cybersecurity and decision making.
She’s now a mathemagician (you read that right) at Turngate and an AI SME at SilverEdge Government Solutions. When not doing cyber stuff, she’s chilling with her dog, Dax, and her lovely husband, William, or perfecting her dolphin dive as a libero on a number of volleyball teams within the DMV.
ringer.bsky.social
—
Presenting: Why Integer Factorization is F****** Hard: a History
John Aron
I grew up with the mantra of ‘those who talk, don’t know; and those who know don’t talk,’ finding myself wading through the forests to climb outside routes. My climbing friends are astonished by the breadth and scope of the infromation security knowledge to defend our data and identity. Except, there is more to defend like civil liberties and civil infrastructure.
—
Presenting: Letters and more letters
Jonathan Butler
No Biography provided.
—
Presenting: MCP Under Fire: Threats and Countermeasures for AI Tool Integrations
Joseph N. Wilson
J.N. Wilson is an Information Security Researcher and Emeritus Professor at the University of Florida. His current activities involve efforts associated with undisruptable27.org, the Consortium of Cybersecurity Clinics, and work on Post-Quantum Cryptography.
—
Presenting: You Can’t Migrate What You Can’t See: Discovering Real Post-Quantum Crypto
Kaitlin Seng
Kaitlin has over a decade of experience as a software engineer developing cybersecurity tools with a background spanning applied research, open-source contributions, and startup innovation. Kaitlin is currently with Ginger Cybersecurity, securing Rust & Go applications on AWS.
kaitlinseng.com |
kaitlinseng
—
Presenting: The Case for MicroVMs: Container-like agility with the security of VMs
Kat Fitzgerald
Kat operates a global honeypot network that attracts more malicious traffic than her tequila collection attracts admirers (and that’s saying something as she’s a certified Catadora de Tequila who’s sampled over 600 expressions).
She approaches cybersecurity, tequila, and life with the same philosophy: dig deep, stay curious, and never settle for the well-marketed garbage when the real craft is out there waiting to be discovered. and in 2026, she’ll still be crisscrossing the globe speaking at security conferences, her trusty flamingo companion in tow, because apparently sitting still isn’t in her threat model.
rnbwkatt.bsky.social |
infosec.exchange/@rnbwkat |
Kat Fitzgerald
—
Presenting: Cloud Misconfigurations: Oh look – Poke, Poke,, Breach!
Kevin Figueroa
With over two decades in cybersecurity, I’ve built deep, hands-on expertise in enterprise security across the full stack. My background spans network, web application, API, and mobile penetration testing, comprehensive vulnerability assessments, advanced intrusion detection, and hardening of both systems and network infrastructure. I’m driven by ongoing research into emerging threats and by practical experimentation with AI to augment defensive and offensive security workflows. My goal is to combine technical depth with a strong analytical mindset to strengthen organizational security posture against next‑generation attacks and to help design resilient, future‑ready security architectures.
KevinFigueroa
—
Presenting: Modernize, Vectorize, and Visualize CyberOps Data, Threat Intel with Qdrant
Kiara Deloatch
I am currently working in the digital forensics and incident response space, currently pursuing a Master of Science in Cyber Operations (Red Team) with a strong academic and practical foundation in DFIR (B.S Cyber Forensics). My work and studies focus on investigative thinking, evidence-based analysis, and understanding how complex systems fail under real-world conditions. I approach emerging security problems with a practitioner mindset, grounded in the realities of incident response rather than theoretical idealism.
This talk reflects the type of problems many defenders are already encountering but do not yet have shared language or frameworks to address. As AI systems become embedded in security tooling and decision-making workflows, questions around data integrity, poisoning, and auditability are no longer hypothetical. I bring a DFIR perspective that translates existing investigative skills to these new environments without overpromising detection or claiming advanced tooling that does not yet exist. BSides has always emphasized practical knowledge-sharing and honest conversations, and this session aligns with that mission by helping the community think critically about AI risk using familiar, defensible methods.
—
Presenting: Nothing Looks Broken: Investigating AI When the Model Behaves
Kirsten Sireci Renner
Best known in the community for directing BSLV HireGround & BSidesCharm Hiring Village, Kirsten also co-founded/co-built Car Hacking Village in 2015. After a decade helping run it, she left and joined ICS Village board and can be found at many conferences and events throughout the year speaking and volunteering. She settled into technical recruiting after running helpdesks over twenty years ago. She is currently serving as the VP of Talent at SilverEdge – an SAIC Company, and is always open to helping those who reach out – especially transitioning service members and veterans!
Over 50 speaking engagements to include DEFCON, ShmooCon and many BSides nationwide.
Kirsten is a published author and serial volunteer at countless endeavors.
Most of you know you can find her at various cons throughout the year.
krenner |
krenner
—
Presenting: Tap In: Disability -> Superpower
Mackenzie Jackson
Mackenzie Jackson grew up in a circus in New Zealand and now finds himself in the only act scarier than juggling fire… application security. As a security researcher and advocate at Aikido Security, he spends his time showing developers how hackers actually break things. He’s spoken in 30 countries, hosts The Disclosure Podcast, and still insists New Zealand makes the best coffee.
advocatemack
—
Presenting: Worms, Tokens, and Trust: The Industrialization of Supply Chain Attacks
Matthew Gracie
Matthew Gracie is a defensive security specialist with fifteen years of Blue Team experience in higher education, manufacturing, financial services, and healthcare. He is currently a Senior Engineer at Security Onion Solutions, as well as the interim director of the Cybersecurity graduate program at Canisius University. Matt is also the lead organizer of Infosec 716, a monthly meetup for security enthusiasts in Western New York, and the BSides Buffalo technology conference. He enjoys good beer, mountain bikes, open source security tools, and college hockey, and can be found on Bluesky
InfosecGoon.
—
Presenting: A Standard For Investigative Playbooks
Nimish Sharma
Results-driven Cybersecurity Engineer with diverse experience across Healthcare, Banking, Public, and Telecom sectors, cross-functional project guidance and stakeholder support, security architecture strategy, application security, predictive analytics, and enterprise risk management. Adept at designing and implementing scalable solutions, driving automation, and delivering quantifiable value and innovation.
—
Presenting: Breaking Silos, not Systems: Dissecting the Cloud Beast and Harboring No Illusions: Navigating risks in a FaaS world
Niveadita Razdan
No Biography provided.
—
Presenting: Breaking Silos, not Systems: Dissecting the Cloud Beast
Pat Wheltle
Hello! I am a cyber threat analyst who has been working in cybersecurity since 2016. While I do cyber analysis for a living, I picked up fun OSINT and data analysis projects as a hobby.
—
Presenting: Finding Ghost Jobs and Ghost Companies using OSINT
Paul Navarro
Chief Architect for Cybersecurity in Microsoft Federal.
T0pcyber
—
Presenting: MCP Under Fire: Threats and Countermeasures for AI Tool Integrations
Pujita Sahni
Associate Cloud Security Delivery Consultant at AWS
—
Presenting: Too Many Security Tools? ASH Has Entered the Chat
Robert M. Lee
Robert M. Lee is CEO and co-founder of Dragos, the global leader in Operational Technology (OT) cybersecurity. The Dragos Platform protects critical infrastructure and industrial operations worldwide. For the World Economic Forum, Robert is a frequent speaker and serves on the cyber resilience subcommittees for Oil & Gas and Electricity. He is a SANS Fellow and on boards for the International Society of Automation and National Cryptologic Foundation. Robert was a U.S. Air Force Cyber Warfare Operations Officer tasked to NSA, and subsequently helped lead the investigation into the 2015 attack on Ukraine’s power grid. He continues his public service as Lieutenant Colonel in the Army National Guard, designing and leading OT cybersecurity and response.
—
Presenting: Keynote
Ryan Pearson
Ryan Pearson, aka “Brews ‘n Hacks” is a vulnerability analyst who believes that securing an environment is a lot like brewing a fine ale, as it’s all about the quality of your ingredients and the refinement of your process, not the fancy equipment! With over four years of experience, Pearson has earned the PenTest+, Security+, Linux+ certifications and has worked on the Federal/DoD vulnerability analysis and Critical Infrastructure Cyber Hygiene program. Pearson specializes in filtering the “trub” out of raw scanner data to find the 1% of risk that truly matters.
A former social worker and retail manager turned security professional, he brings a “human-centric” perspective to technical reporting, ensuring that security recommendations resonate with leadership and drive action. When not “cold-crashing” vulnerabilities, he can be found homebrewing. Whether that be a fresh batch of beer, or a new home lab walkthrough for his YouTube channel, Brews ‘n Hacks.
Ryan Pearson
—
Presenting: The Perfect Pour: Crafting Actionable Vulnerability Intelligence
Sharon Shama
Sharon has a strong background in defensive research, especially around emerging AI technologies and environments. Off the clock, she channels that same curiosity into cooking, taking on kitchen challenges like beef Wellington and lemon pie.
—
Presenting: Illuminating Shadow AI: An Open-Source Tool for CustomGPT Risk Assessment
Shawn Thomas
Shawn Thomas is the Director of Threat Detection and Response at ZoomInfo, where he spends his days building the systems and teams that find badness before it becomes a headline. With nearly 20 years of experience in security, he’s done stints across incident response, detection engineering, and security operations, basically anywhere there are fires to fight and chaos to wrangle.
In a past life he was a regular on the conference circuit and hosted some infosec podcasts, but these days he’s a recovering extrovert who prefers the company of birds to people. When he’s not hunting threats, he’s in the woods with a camera, hoping a pileated woodpecker holds still for once.
—
Presenting: Finding Badness with the Threat Detection and Response Lifecycle
Shivam Dhar
With nearly a decade of experience across sectors such as e-commerce, healthcare, gaming, open-source, and cybersecurity, within both large enterprises and agile startups, Shivam brings a creative, solutions-driven approach to complex challenges. Committed to community engagement, he actively mentors early-career cybersecurity professionals, judges prestigious tech awards, peer-reviews academic research, and contributes to tech-for-good initiatives with nonprofit organizations. He currently leads cloud security efforts at JPMorganChase, driving robust solutions to support the firm’s ongoing growth.
Social:
—
Presenting: Breaking Silos, not Systems: Dissecting the Cloud Beast and Harboring No Illusions: Navigating risks in a FaaS world
Steve Dyson
With a background in law enforcement and cybersecurity, Steve is highly skilled in cyber risk management, cloud security, threat mitigation, and intelligence gathering and analysis. Steve has expertise in a range of cybersecurity incident response and threat hunting tools, as well as in information security system design, management, and analysis. Steve also brings a wealth of specialized experience in both Healthcare and Financial Services sectors and has a legal background focused on regulatory compliance and digital privacy.
—
Presenting: Aligning Cyber Defense and Compliance
Stryker
Stryker is the director of content and threat analysis at Fable Security, where she translates technical research and qualitative intelligence into the “so what?” and “what now?” solutions that keep more people safe and secure. Before Fable, she produced threat intelligence for GEICO, Blackpoint Cyber, and other cybersecurity vendors. You can often find her playing “Backdoors & Breaches” in the hallway after her talks at DEF CON, SecTor, and Bsides conferences around the United States. Stryker lives in Baltimore, growing parsley for butterflies and algae for shrimp.
—
Presenting: Just a TIP: DIY Your First Threat Intelligence Platform
Suril Desai
Suril is VP Engineering and security SME at Acalvio Technologies. Suril has deep domain expertise in security and academic and industry foundation in Computer Science. Suril has spoken at numerous security conferences and believes in sharing his knowledge and learning from the interactions.
—
Presenting: When the IAM admin is the threat: battles with a privileged insider
Sweta Deivanayagam
Sweta Deivanayagam is a cybersecurity professional with 15 years of experience protecting software and computer systems from hackers and security threats. Currently working as a Lead Security Engineer at Salesforce, Sweta designs and builds security solutions to keep their software safe throughout the entire development process, especially when using cloud technology and AI.
Before joining Salesforce, Sweta spent 10 years working as a security consultant, first at Cigital and then at Synopsys. In these consulting roles, Sweta served as a security detective and advisor, examining other companies’ software applications to find vulnerabilities and weaknesses that hackers could exploit.
Sweta used specialized tools to scan code for security flaws, tested applications by attempting to break into them legally, and then helped development teams fix these problems. Throughout her career, Sweta has also helped companies set up automated security systems in their software development processes, created training programs to teach developers how to write more secure code, and provided strategic guidance on improving overall security practices. Sweta’s expertise spans a wide variety of security tools and technologies, from code analysis software to penetration testing tools, helping organizations build stronger and more secure applications and systems.
—
Presenting: Using AI in Threat Modeling
Teddy Katayama
Kaoru T. “Teddy” Katayama is the Chief Technology Officer and co-founder of Exploit Strike, where he leads offensive security operations and defines the technical strategy behind the firm’s penetration testing and adversary simulation engagements. With nearly two decades of experience in cybersecurity, Teddy blends deep technical expertise with a practical focus on real-world risk.
His interest in security began early. At age ten, he bypassed his elementary school’s door-lock system, and by eighth grade he had built a Java-based port scanner. In high school, his skills earned multiple SkillsUSA awards in network management and remote administration.
Teddy holds a Bachelor of Science in Computer Engineering and a Master of Engineering in Cybersecurity from the University of Delaware and is currently completing his Ph.D. in Electrical and Computer Engineering, specializing in cybersecurity and machine learning. His research focuses on applying machine learning to threat detection and security operations and has been supported by a $259,527 research grant from Cisco Systems.
Teddy has led security initiatives for organizations ranging from startups to large enterprises. Prior to Exploit Strike, he co-founded Golden Egg Labs, created the University of Delaware’s first VIP Red Team, and led penetration testing and compliance projects across the Mid-Atlantic. He also worked at Cisco Systems, developing machine learning tools for detecting malicious binaries in encrypted traffic.
—
Presenting: Hidden Exposure Crisis – How Supply Chain Leakage is Becoming the Norm
TheClockworkBird
I am TheClockworkBird, and I have been a part of the Cicadasolvers community for nearly 6 years. I like to think of myself as a kind of tour guide for the digital interactive museum that is Solvers. In 2023, myself and three others had the pleasure of giving a mainstage talk at Defcon 31, as well as a talk at the Crypto and Privacy Village. Each of us has our own area of expertise, with mine being the art, literature, and sociological aspects of the puzzle. I work as a community organizer for Cicadasolvers, putting together solving sessions, curating collaboration between solvers, and guiding newcomers through the vast materials pertaining to the puzzle. Bringing curious cryptanalysis fiends and all in betweens together is what I like to do!
theclockworkbird.bsky.social |
mastodon.social/@theclockworkbird
—
Presenting: The Misinformation Misadventures of Cicada 3301
Tim Pappa
Tim Pappa is an Incident Response Engineer – Cyber Deception Strategy, Content Development, and Marketing, Cyber Deception Operations, Walmart Global Tech. Before Walmart Global Tech, Tim was a Supervisory Special Agent and profiler with the Federal Bureau of Investigation’s (FBI) Behavioral Analysis Unit (BAU), where he specialized in cyber deception and online influence. Tim has presented and published at various academic and industry conferences, including Black Hat Asia, NDSS, IEEE S&P, CYBERWARCON, and the Honeynet Project. Tim has also held various strategy and policy Fellow roles at the Center for Strategic and International Studies (CSIS) and the Aspen Institute. Tim’s current research interests include attitudes toward cybercriminal felons, HoneyContent, and cyber deception design thinking. Singapore-based publisher World Scientific published his first book, “Influencing the Influencers: Applying Whaley’s Communication and Deception Frameworks to Terrorism and Insurgent Narratives” in summer 2025. He is currently writing No Starch Press’s first book on cyber deception.
Tim Pappa
—
Presenting: The Heart Wants What It Wants: Convenience and Moral Drift in Cybercrime
Tyler Schroder
R. Tyler Schroder is a Lead Cybersecurity Analyst at MorganStanley with an M.S. and B.S. in Computer Science from Yale University, and is currently a PhD student in Cyber Defense at Dakota State University. He holds a CompTIA SecurityX (CASP+) certification alongside numerous other industry credentials. Tyler has a demonstrated history of impact across the public and private sectors, including experience from CrowdStrike,MITRE, and Microsoft. His expertise spans cyber incident management and forensic analysis, threat hunting in both cloud and on-premises environments, Active Directory security, and the development of AI strategy. He is a fellow at Yale’s Digital Ethics Center, where he works on governance, ethical, legal, and social implications (GELSI) of digital innovation and technologies and their human, societal, and environmental impact.
rts2.us |
infosec.exchange/@redorhcal77
—
Presenting: Cybersecurity Considerations for Brain-Computer Interfaces
