THREATCON1
SPEAKERS
Jacob has a long-standing background in vulnerability research and exploit development across both the public and private sectors. Nine (and counting) of the vulnerabilities he discovered have been added to the CISA Known Exploited Vulnerabilities (KEV) list. He has presented multiple times at DEF CON and Black Hat, and has contributed to widely used security tools including Metasploit, ysoserial, and YARA. Jacob is currently the Chief Technology Officer at VulnCheck.

Andrew Boyd has spent his career safeguarding national security interests, serving in senior intelligence roles across the CIA. As Director of CCI, he led intelligence collection, analysis, and operations targeting foreign threats to U.S. national interests.
Prior to his tenure at the CIA, Boyd served as the Chief of Operations for the Counterterrorism Mission Center and as a U.S. State Department Foreign Service Officer at U.S. Embassies in Saudi Arabia, Lebanon, Tunisia, Iraq, and Syria. He is also a combat veteran and a recognized authority in geopolitics, cyber operations, and threat mitigation.

Doug Britton is Chief Strategy Officer at RunSafe Security. As founding CTO, he drove the company’s technology strategy, patent portfolio, and world-class security research. Previously, Doug founded Kaprica Security, selling its Tachyon business to Samsung, and led cybersecurity programs at Lockheed Martin. A computer scientist and former US Army Russian Linguist, Doug began his career at NCSA, earned an MBA from the University of Maryland, and mentors aspiring entrepreneurs.

Numa Dhamani is the Head of Machine Learning at iVerify and the co-author of Introduction to Generative AI (Manning Publications). She is a natural language processing expert with domain expertise in trust, safety, and security. Numa has developed machine learning systems for Fortune 500 companies and social media platforms, as well as for start-ups and nonprofits. She has advised industry leaders and organizations, served as the Principal Investigator on the United States Department of Defense’s research programs, and contributed to multiple international peer-reviewed journals. She is also deeply engaged in the technology policy space, supporting think tanks and nonprofits with data and AI governance efforts. In addition to her industry and research contributions, she has taught AI courses as an adjunct lecturer at the University of Texas at Austin and Georgetown University. Numa is passionate about working towards a more secure digital world, building responsible artificial intelligence, and advocating for transparency and accountability in technology. She holds degrees in Physics and Chemistry from the University of Texas at Austin.

Globally recognized as a cybersecurity and national security leader, Jen Easterly transformed CISA into a $3 billion powerhouse with over 10,000 personnel, establishing the agency as a cornerstone of U.S. cyber defense.
Before CISA, she was Head of Firm Resilience at Morgan Stanley, where she built and led the Firm’s Cybersecurity Fusion Center. Her public service includes two tours at the White House, over a decade at the National Security Agency, and multiple combat deployments in the U.S. Army.

Matthew Hand is a cybersecurity leader with over 10+ years of experience across threat hunting, cyber threat intelligence, and incident response. He serves as a Technical Director and Senior Technical Advisor supporting innovation and modernization efforts for the Department of Defense, leading cross-functional teams and shaping solutions that bridge tactical operations with strategic objectives. His work spans AI integration, infrastructure-as-code, and partnerships focused on advancing innovative solutions through integrated technologies.

Cale is an Initial Access Exploit Developer who conducts N-day reproduction and 0-day research with a focus on external internet exposure. Previously, he worked as a lead security engineer and spent 10 years as penetration tester, with a focus on UNIX-like systems and network exploitation.
