Mike Summers

Senior Solutions Engineer, ThreatConnect

Mike Summers is a Senior Solutions Engineer with over a decade of experience in the cybersecurity industry, including nearly four years at ThreatConnect.

MacKenzie Brown, VP of the Adversary Pursuit Group, Blackpoint Cyber’s threat intelligence and threat research division, focuses on driving Blackpoint’s security vision and strengthening security postures for BlackPoint partners and the community as whole. Based out of Boise, Idaho, MacKenzie has spent much of her career immersed in Incident Response, more recently supporting global Microsoft customers in Incident Management for Microsoft's Incident Response team, navigating global campaigns and advanced adversary investigations. MacKenzie is an advisory board member for the Idaho Women in Technology organization, as well as maintains a deep connection to her local tech community and cybersecurity groups. With studies in theater and cyber operations resilience through Boise State University, MacKenzie brings a unique approach to the industry, with hopes of graciously disrupting the industry for a better tomorrow.

Mac Brown

VP of Adversary Pursuit Group. Blackpoint Cyber
Presentation Abstract

Jacob has a long-standing background in vulnerability research and exploit development across both the public and private sectors. Nine (and counting) of the vulnerabilities he discovered have been added to the CISA Known Exploited Vulnerabilities (KEV) list. He has presented multiple times at DEF CON and Black Hat, and has contributed to widely used security tools including Metasploit, ysoserial, and YARA. Jacob is currently the Chief Technology Officer at VulnCheck.

Jacob Baines

CTO, VulnCheck
Presentation Abstract

Tod Beardsley is VP of Security Research at runZero, where he "kicks assets and fakes frames." Prior to 2025, he was the Section Chief for the Vulnerability Response section for CSD/VM/VRC at CISA, the Cybersecurity and Infrastructure Security Agency, part of the US government, and a seasonal Travis County Election Judge in Texas. He's also a founder and CNA point of contact for AHA!.

Tod spends much of his time involved in vulnerability research and coordinated vulnerability disclosure (CVD). He has over 30 years of hands-on security experience, stretching from in-band telephony switching to modern ICS/OT implementations. He has held IT ops, security, software engineering, and management positions in large organizations such as the US Government, Rapid7, 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Tod is a CVE Board member, has authored several research papers. He is also an internationally-tolerated horror fiction expert.

Tod Beardsley

Director of Research, RunZero and CISA
Presentation Abstract

Andrew Boyd has spent his career safeguarding national security interests, serving in senior intelligence roles across the CIA. As Director of CCI, he led intelligence collection, analysis, and operations targeting foreign threats to U.S. national interests.

Prior to his tenure at the CIA, Boyd served as the Chief of Operations for the Counterterrorism Mission Center and as a U.S. State Department Foreign Service Officer at U.S. Embassies in Saudi Arabia, Lebanon, Tunisia, Iraq, and Syria. He is also a combat veteran and a recognized authority in geopolitics, cyber operations, and threat mitigation.

Andrew Boyd

Former Director for the Central Intelligence Agency’s Center for Cyber Intelligence
Presentation Abstract

Doug Britton is Chief Strategy Officer at RunSafe Security. As founding CTO, he drove the company’s technology strategy, patent portfolio, and world-class security research. Previously, Doug founded Kaprica Security, selling its Tachyon business to Samsung, and led cybersecurity programs at Lockheed Martin. A computer scientist and former US Army Russian Linguist, Doug began his career at NCSA, earned an MBA from the University of Maryland, and mentors aspiring entrepreneurs.

Doug Britton

Chief Strategy Officer, RunSafe Security
Presentation Abstract

Numa Dhamani is the Head of Machine Learning at iVerify and the co-author of Introduction to Generative AI (Manning Publications). She is a natural language processing expert with domain expertise in trust, safety, and security. Numa has developed machine learning systems for Fortune 500 companies and social media platforms, as well as for start-ups and nonprofits. She has advised industry leaders and organizations, served as the Principal Investigator on the United States Department of Defense’s research programs, and contributed to multiple international peer-reviewed journals. She is also deeply engaged in the technology policy space, supporting think tanks and nonprofits with data and AI governance efforts. In addition to her industry and research contributions, she has taught AI courses as an adjunct lecturer at the University of Texas at Austin and Georgetown University. Numa is passionate about working towards a more secure digital world, building responsible artificial intelligence, and advocating for transparency and accountability in technology. She holds degrees in Physics and Chemistry from the University of Texas at Austin.

Numa Dhamani

Head of Machine Learning, iVerify
Presentation Abstract

Globally recognized as a cybersecurity and national security leader, Jen Easterly transformed CISA into a $3 billion powerhouse with over 10,000 personnel, establishing the agency as a cornerstone of U.S. cyber defense.

Before CISA, she was Head of Firm Resilience at Morgan Stanley, where she built and led the Firm’s Cybersecurity Fusion Center. Her public service includes two tours at the White House, over a decade at the National Security Agency, and multiple combat deployments in the U.S. Army.

Jen Easterly

Combat veteran, cybersecurity pioneer, and former Wall Street technology executive,
Presentation Abstract

Christine Fignar

Information Security Analyst, Federal Reserve Bank of Minneapolis
Presentation Abstract

Patrick Garrity is a security researcher at VulnCheck where he focuses on vulnerabilities, vulnerability exploitation and threat actors. Patrick has spent the last decade helping building Cybersecurity companies including Duo Security, Censys, Blumira, Nucleus Security and VulnCheck.

Patrick Garrity

Security Researcher, VulnCheck
Presentation Abstract

Guillermo

Research Engineer. VulnCheck
Presentation Abstract

Matthew Hand is a cybersecurity leader with over 10+ years of experience across threat hunting, cyber threat intelligence, and incident response. He serves as a Technical Director and Senior Technical Advisor supporting innovation and modernization efforts for the Department of Defense, leading cross-functional teams and shaping solutions that bridge tactical operations with strategic objectives. His work spans AI integration, infrastructure-as-code, and partnerships focused on advancing innovative solutions through integrated technologies.

Matthew (Matt) Hand

Senior Technical Advisor, Independent
Presentation Abstract

Benjamin is the CEO & Founder of watchTowr, the Preemptive Exposure Management capability trusted by Fortune 500 companies and critical infrastructure providers. By combining proactive threat intelligence, real attacker telemetry, and automated red teaming, watchTowr continuously identifies and validates real exposure, so security teams can outrun real-world threats. With over a decade of experience building and leading elite offensive cybersecurity teams worldwide, Ben brings deep expertise in helping some of the world's most targeted organizations and industries prepare for, and defend themselves from, sophisticated cyber attacks. Recognized for his work, he was named within Forbes' 30 Under 30 for Enterprise Technology in 2022 and Prestige's 40 Under 40 in 2023.

Benjamin Harris

CEO and Founder, watchTowr
Presentation Abstract

Cynthia Kaiser

SVP, Ransomware Research Center, Halcyon AI
Presentation Abstract

Lillian Lang

Senior Manager, Cyber Threat Intelligence, Chevron
Presentation Abstract

Cale is an Initial Access Exploit Developer who conducts N-day reproduction and 0-day research with a focus on external internet exposure. Previously, he worked as a lead security engineer and spent 10 years as penetration tester, with a focus on UNIX-like systems and network exploitation.

POPTART

Initial Access Exploit Developer, VulnCheck
Presentation Abstract

With a background in cybersecurity focused on automation and investigations, Nick helps organizations optimize their security configurations and improve overall security posture. When he's not working, Nick lives in Boston with his wife and two cats, enjoys solving math problems on college chalkboards at night, runs a website dedicated to the city's best dive bars, and writes a blog exploring OSINT and technology in North Korea.

Presentation Title: Tools of the Trade: Infrastructure Behind DPRK IT Workers

Nick Roy

Sales Engineer, Silent Push
Presentation Abstract

Scott Stephenson

VP, Sales and Business Development, Blackwire Labs
Presentation Abstract

Zach is a co-creator of osquery and co-founder of Fleet, where he builds open source tools for defenders to secure their endpoints. He brings the vision and experience of working with osquery since the earliest design documents at Facebook in 2014 and has served on the Linux Foundation osquery Technical Steering Committee since its inception in 2019. Prior to Fleet, Zach founded open-source security consultancy Dactiv, and co-founded endpoint security company Kolide. Zach graduated Summa Cum Laude with a BSE in computer science from the University of Pennsylvania where he conducted wireless security research and lectured on the Python programming language.

Zach Wasserman

Tech Evangelist, Fleet Device Management
Presentation Abstract