THREATCON1
SPEAKERS

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Jacob has a long-standing background in vulnerability research and exploit development across both the public and private sectors. Nine (and counting) of the vulnerabilities he discovered have been added to the CISA Known Exploited Vulnerabilities (KEV) list. He has presented multiple times at DEF CON and Black Hat, and has contributed to widely used security tools including Metasploit, ysoserial, and YARA. Jacob is currently the Chief Technology Officer at VulnCheck.

Jacob Baines

CTO, VulnCheck
Presentation Abstract

Andrew Boyd has spent his career safeguarding national security interests, serving in senior intelligence roles across the CIA. As Director of CCI, he led intelligence collection, analysis, and operations targeting foreign threats to U.S. national interests.

Prior to his tenure at the CIA, Boyd served as the Chief of Operations for the Counterterrorism Mission Center and as a U.S. State Department Foreign Service Officer at U.S. Embassies in Saudi Arabia, Lebanon, Tunisia, Iraq, and Syria. He is also a combat veteran and a recognized authority in geopolitics, cyber operations, and threat mitigation.

Andrew Boyd

Former Director for the Central Intelligence Agency’s Center for Cyber Intelligence
Presentation Abstract

Doug Britton is Chief Strategy Officer at RunSafe Security. As founding CTO, he drove the company’s technology strategy, patent portfolio, and world-class security research. Previously, Doug founded Kaprica Security, selling its Tachyon business to Samsung, and led cybersecurity programs at Lockheed Martin. A computer scientist and former US Army Russian Linguist, Doug began his career at NCSA, earned an MBA from the University of Maryland, and mentors aspiring entrepreneurs.

Doug Britton

Chief Strategy Officer, RunSafe Security
Presentation Abstract

Numa Dhamani is the Head of Machine Learning at iVerify and the co-author of Introduction to Generative AI (Manning Publications). She is a natural language processing expert with domain expertise in trust, safety, and security. Numa has developed machine learning systems for Fortune 500 companies and social media platforms, as well as for start-ups and nonprofits. She has advised industry leaders and organizations, served as the Principal Investigator on the United States Department of Defense’s research programs, and contributed to multiple international peer-reviewed journals. She is also deeply engaged in the technology policy space, supporting think tanks and nonprofits with data and AI governance efforts. In addition to her industry and research contributions, she has taught AI courses as an adjunct lecturer at the University of Texas at Austin and Georgetown University. Numa is passionate about working towards a more secure digital world, building responsible artificial intelligence, and advocating for transparency and accountability in technology. She holds degrees in Physics and Chemistry from the University of Texas at Austin.

Numa Dhamani

Head of Machine Learning, iVerify
Presentation Abstract

Globally recognized as a cybersecurity and national security leader, Jen Easterly transformed CISA into a $3 billion powerhouse with over 10,000 personnel, establishing the agency as a cornerstone of U.S. cyber defense.

Before CISA, she was Head of Firm Resilience at Morgan Stanley, where she built and led the Firm’s Cybersecurity Fusion Center. Her public service includes two tours at the White House, over a decade at the National Security Agency, and multiple combat deployments in the U.S. Army.

Jen Easterly

Combat veteran, cybersecurity pioneer, and former Wall Street technology executive,
Presentation Abstract

Christine Fignar

Information Security Analyst, Federal Reserve Bank of Minneapolis
Presentation Abstract

Guillermo

Research Engineer. VulnCheck
Presentation Abstract

Matthew Hand is a cybersecurity leader with over 10+ years of experience across threat hunting, cyber threat intelligence, and incident response. He serves as a Technical Director and Senior Technical Advisor supporting innovation and modernization efforts for the Department of Defense, leading cross-functional teams and shaping solutions that bridge tactical operations with strategic objectives. His work spans AI integration, infrastructure-as-code, and partnerships focused on advancing innovative solutions through integrated technologies.

Matthew (Matt) Hand

Senior Technical Advisor, Independent
Presentation Abstract

Cynthia Kaiser

SVP, Ransomware Research Center, Halcyon AI
Presentation Abstract

Lillian Lang

Senior Manager, Cyber Threat Intelligence, Chevron
Presentation Abstract

Cale is an Initial Access Exploit Developer who conducts N-day reproduction and 0-day research with a focus on external internet exposure. Previously, he worked as a lead security engineer and spent 10 years as penetration tester, with a focus on UNIX-like systems and network exploitation.

POPTART

Initial Access Exploit Developer, VulnCheck
Presentation Abstract

Scott Stephenson

VP, Sales and Business Development, Blackwire Labs
Presentation Abstract