Marc Gassert spent a major part of his life in different cultures on various continents and has learned the Asian martial arts with renowned grandmasters. He studied Communication Studies and Intercultural Communication in Munich and Japanese Studies in Tokyo. With master ranks in three Asian martial arts, he is the expert on “the Tao of discipline”. Marc Gassert is a speaker who transfers knowledge between Far Eastern and Western cultures.
Mikko Hypponen is a cyber war veteran. He works as the Chief Research Officer of F-Secure. He has written on his research for the New York Times, Wired and Scientific American and lectured at the universities of Oxford, Stanford and Cambridge. He's also the Curator for the Malware Museum at the Internet Archive.
Paula Januszkiewicz is CEO and founder of CQURE Inc. and CQURE Academy. She is also Enterprise Security MVP and a world-class cybersecurity expert, consulting customers all around the world.
She has 14 years of experience in the cybersecurity field, performing penetration tests, architecture consulting, trainings and seminars. She has performed hundreds of security projects, including those for governmental organizations and big enterprises. At the same time, Paula is a top speaker and a keynote speaker at many well-known conferences, including Microsoft Ignite (rated as No. 1 speaker among 1,100 speakers and 26,000 attendees), RSA (in 2017 in San Francisco, her session was one of the 5 hottest sessions), Black Hat, TechEd North America, TechEd Europe, TechEd Middle East, CyberCrime, etc., where she is often rated as No. 1 speaker. Her presentations gather thousands of people.
Paula also creates security awareness programs for various organizations, including awareness sessions for top management (telecoms, banks, government, etc.). Paula is passionate about sharing her knowledge with others. In private, she enjoys working with her research team, converting the results of her findings to authored leading-edge trainings and tools used in practice in projects. She wrote a book about Threat Management Gateway and is currently working on the next one.
She has access to a source code of Windows, an honor granted to just few people around the world!
Paula is a type that suffers when doing nothing; every year, she takes over 215 flights to provide security services to international organizations and enterprises. You can always expect some thoughtful ideas and interesting arguments!
His current research focus is the analysis of CPU microcode, with the aim of improving existing defense mechanisms in the software field and developing new methods. At the same time, there are other ongoing projects in this field, such as the analysis of runtime behavior of instructions and the identification of undocumented features in CPUs.
Philipp Koppe studied Computer Science and Telecommunications in Leipzig and IT Security in Bochum. He has been a doctoral candidate at the Chair for Systems Security with Prof. Holz at Ruhr-University Bochum for three years. His field of research involves code-reuse attacks as well as defense mechanisms on the application and operating system level. The focus is mostly on commercial-off-the-shelf binaries, so methods such as static and dynamic program analysis as well as reverse engineering are used. What is more, Philipp assesses the security of CPU updates, analyzes x86-processor microcode encoding and implements applications in microcode.
Lieutenant Colonel Volker Kozok works as a technical officer in the legal department of the German Federal Ministry of Defence and is a proven cyber security expert. For more than 20 years, he has been working in various positions in the IT security of the German Armed Forces. In 2002, he planned and trained the Computer Emergency Response Team of the German Armed Forces.
He is a trained IT forensics expert and conducted the first training courses for computer forensics and incident management in the German Armed Forces.
He is a speaker at both national and international events, lecturing on cyber security and data protection topics, and he focuses on the “dark side of the Internet”, which includes the analysis of hacker attacks, cybercrime and social media attacks.
Since 2002, he has been leading the annual US study tour, where cyber security experts of the German Armed Forces and of the industry exchange views on cyber security with US offices and organizations in a 14-day trip in the United States.
At his annual confidential security conference, the international “Bulletproofhosting & Botnetkonferenz”, national and international representatives of the German Armed Forces, authorities, intelligence services, industry and the hacker scene exchange views on example cases, attacks and ways to react.
Nikhil Mittal Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes penetration testing, attack research, defense strategies and post-exploitation research. He has 8+ years of experience in penetration testing for his clients, which include many global corporate giants. He is also a member of Red teams of selected clients. He specializes in assessing security risks at secure environments that require novel attack vectors and an "out-of-the-box" approach. He has worked extensively on using human interface devices in penetration tests and PowerShell for post exploitation. He is the creator of Kautilya, a toolkit that makes it easy to use HIDs in penetration tests, and Nishang, a post-exploitation framework in PowerShell. In his spare time, Nikhil researches on new attack methodologies and updates his tools and frameworks. Nikhil has held trainings and boot camps for various corporate clients (in the US, Europe and SE Asia) and at the world’s top information security conferences. He has spoken/trained at conferences like DEF CON, Black Hat USA, Black Hat Europe, RSA China, Shakacon, DeepSec, PHDays, Black Hat Abu Dhabi, Hackfest, ClubHack, EuSecWest and more. He blogs at www.labofapenetrationtester.com.
CTO NewAE Technology Inc.
Colin O’Flynn started the open-source ChipWhisperer project aimed at bringing power analysis and glitch attacks to everyone. He previously was a design engineer working on embedded systems, and he helped develop several low-power wireless protocols. In moving from "design engineer" to "IoT arsonist", he completed a PhD around side-channel power analysis. He now runs a startup helping more companies uncover potential pitfalls in their embedded designs.
Vesselin Popov is the Business Development Director for the University of Cambridge Psychometrics Centre, a multidisciplinary research institute specialising in online behaviour and psychological assessment. Vess oversees the Centre’s commercial partnerships and focusses on the impact that Big Data and psychometrics, used together, can have in business and the community.
Vess also runs the Apply Magic Sauce project, a battery of predictive algorithms based on 8 million users’ psychological and social media data. Apply Magic Sauce API translates digital footprints of human behaviour into accurate psycho-demographic profiles, and can more accurately predict a user’s personality than people’s friends, family and loved ones. It makes psychological sense of social media data, such as Pages liked on Facebook or language used on Twitter.
Vess is a law graduate of Trinity College, Cambridge and has delivered Big Data projects for many global brands, such as Ubisoft, Hilton, Warner Bros., Nissan and National Geographic.
Marcus J. Ranum is Chief Security Officer at Tenable Security, Inc. and is a world-renowned expert on security system design and implementation. He has been involved in every level of the security industry from product coder to CEO of a successful start-up. He is an ISSA fellow and holds achievement and service awards from several industry groups.
Starbug studied microsystems technology and computer engineering in Berlin. Since receiving his degree in engineering, he has worked at different Fraunhofer Society institutes, for security companies and as a freelance consultant. He is currently involved in the Security in Telecommunications (SECT) working group, a cooperation between Telekom Innovation Laboratories and the TU-Berlin. Starbug has been dealing with overcoming biometric systems for more than 15 years now, recently demonstrated when hacking the iPhone fingerprint sensor. He also inspects the security of microchips, e.g. the access system based on MIFARE Classic or the LEGIC prime chip installed in the immobilizer.
Changhoon Yoon is a PhD student at KAIST. He is working with Dr. Seungwon Shin at Network and System Security Laboratory, and his research interests primarily lie in the area of network security including SDN/NFV and IoT security. He has presented his recent work at NDSS, Black Hat USA, ONS and more.