TONY TURNER (KEYNOTE)
Tony is a seasoned cybersecurity executive, focused on addressing issues in critical infrastructure, security engineering and disrupting the way we think about security solutions.
- VP Product @ Frenos
- SANS Author and Instructor
- Security Architect to Critical Infrastructure
SOURCE: LEAKED_CAM_22
Aidan Holland
Is a Senior Cybersecurity Researcher and Software Engineer at Censys, where he specializes in threat intelligence and internet-wide security research. His work focuses on identifying and analyzing malicious infrastructure, tracking threat actors, and developing tools for security analysis at scale.
Aidan is an active contributor to the open source security community, building and maintaining tools for threat hunting, data analysis, and security automation.
SOURCE: LEAKED_CAM_24
Jeff Man
(Expert in AI) (e.g. Actual Intelligence)
With over 40 years of experience in the trenches working in all aspects of computer, network, and information security, including cryptography, risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing. Certified National Security Agency Cryptanalyst. Designed and fielded the first software-based cryptosystem ever produced by NSA. Inventor of the “whiz” wheel, a cryptologic cipher wheel used by US Special Forces for over a decade. Honorary lifetime member of the Special Forces Association. Previously held security research, management and product development roles with the National Security Agency, the DoD and private-sector enterprises. Pioneering member of the first penetration testing “red team” at NSA.
SOURCE: LEAKED_CAM_41
Kadi McKean
Improving [Dev|Sec]Ops since her days in COBOL development and Mainframe solutions
She is currently focused on collaborating with developers, security researchers to help prioritize Open Source, 3rd party, and technical debt causes of potential risk areas which result in fewer attacker options.
SOURCE: LEAKED_CAM_25
Chris Williams
Chris is part of the HackNWA crew with a fascinating background. He grew up in New Jersery, he learned to code in assembler at 7yrs old and was writing and optimizing video games for his siblings. Later in life he held multiple director level roles such as Director of Network Operations at Interop Technologies, then CTO of Bernett Research before returning to more hands on keyboard roles before getting into the CTF circuit and writing his own shell code on the fly. Currently in the top 50 rankings on the National Cyber League, he has pwnd many a CTFs and is a top hacker
SOURCE: LEAKED_CAM_26
Jimi Allee
Jimi2x over 25 years in the Information Security industry, Jimi has successfully navigated through many roles within the Infosec landscape, including Network/System/Security Engineering, Threat Intel/Risk Analysis, Offensive Security, Red/Blue/Purple Teaming as well as Research & Development. A former member of the US National Video Game Team, Jimi's passionate curiosity brings a gamer mentality to the world of Threat Research, Detection and Elimination.
SOURCE: LEAKED_CAM_31
Fred Lawler
Software Developer on Linux Kernel @ Cloudflare; versatile developer who contributes to open source, builds applications, contributes to an operating system, mentors, and sometimes speaks. Enjoys refactoring, simplifying systems, learning and tackling technical problems.
SOURCE: LEAKED_CAM_21
Sara Alfadil
Sr. Software Engineer @ McGraw Hill; HackNWA crew member who has participated with us and contributes to the win for over a decade in hacking tournaments and other events. Software Engineer and ethical hacker by trade; specializing in Game Development, Distributed Systems, Web App Security and Cloud Infrastructure.
SOURCE: LEAKED_CAM_43
Mike Debreceni
1337 Hacker; Protocol Wizard, Human ADC
SOURCE: LEAKED_CAM_1337
MORE INC
sponsors
Contributing greatly to the overall experience
Operations Log / Schedule
The Economics of Fraud multiplied by Slavery
Deep dive into the financial flows of the Pig Butchering industry. How billions are washed through crypto.
Tooling for Liberation
Workshop: Building communication tunnels for trapped victims using mesh networks.
Survivor Testimony
Live encrypted feed interview with an escapee from the KK Park compound.