Joshua Lospinoso is a software engineer who created Beamgun which is used for defeating PoisonTaps, USB Rubber Ducky and other Rogue Network Adapters.
Vladimir Reznichenko is the creator of Php Inspections (EA Extended) which is a Static Code Analysis tool for PHP available as a PhpStorm plugin.
Ashfaq Ansari is the founder of HackSys Team code named "Panthera". He has authored "HackSys Extreme Vulnerable Driver" and "Shellcode of Death". He has also written and published various white papers on low level software exploitation.
James is a security researcher in Google’s Project Zero. He has been involved with computer hardware and software security for over 10 years looking at a range of different platforms and applications. With a great interest in logical vulnerabilities he’s been listed as the #1 researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner.
Swaroop Yermalkar is an Indian security researcher who is an active member of NULL, an open security community in India, and is a contributor to the regular meetups and Humla sessions at the Pune chapter. He has written articles for clubHACK magazine and also authored a book, "An Ethical Guide to Wi-Fi Hacking and Security" and the iOS security book 'Learning iOS Penetration Testing'.
Dan Geer is a computer security analyst and risk management specialist. He is a 1972 graduate of MIT with a Bachelors of Science in Electrical Engineering and Computer Science, as well as a 1988 Harvard graduate where he received his Doctor of Science (Sc.D) in biostatics. Geer was a key contributor to the development of the X Window System, as well as the Kerberos authentication protocol while a member of the Athena Project at MIT in the 1980s. Shortly after, he created the first information security consulting firm on Wall Street in 1992; followed by, organizing one of the first academic conferences on electronic commerce in 1995.
In 2003, Geer's 24-page report entitled "CyberInsecurity: The Cost of Monopoly" was released by the Computer and Communications Industry Association (CCIA). The paper argued that Microsoft's dominance of desktop computer operating systems is a threat to national security. Geer was fired (from consultancy @Stake) the day the report was made public. Geer has cited subsequent changes in the Vista operating system (notably a location-randomization feature) as evidence that Microsoft "accepted the paper."
Dr. Matthew D. Green is a cryptographer and security technologist. He designed several cryptographic tools, including Charm, a framework for rapidly prototyping cryptosystems, and a Functional Encryption library that provides implementations of several new Attribute Based Encryption schemes. Dr. Green led the team that developed the first anonymous cryptocurrencies, Zerocoin and Zerocash. His research team has exposed flaws in more than one third of SSL/TLS encrypted web sites as well as vulnerabilities in encryption technologies, including RSA BSafe, Exxon/Mobil Speedpass, EZpass, and automotive security systems.
Anastasios Stasinopoulos is a security researcher who is the core developer of UINFC2 Project and Sopler Project. He was born in Athens, Greece. He is a member of the Systems Security Laboratory and his research interests are focused on the field of vulnerability assessment, exploit development, penetration testing, web application security, and web application source code auditing. Over the past years, he has worked as a freelance security researcher and as a penetration tester.
Marc "van Hauser" Heuse is the author of various security and pentest tools like hydra, amap, THC-Scan, secure_delete, SuSEFirewall and many more. He has been performing security research on IPv6 since 2005 and has spoken on many conferences on this topic since then, among these are the CCC congress (Germany), Cansecwest (Canada), PacSec (Japan) and many more international conferences, and additionally has programmed the solely available pentest toolkit for ipv6: the thc-ipv6 protocol attack suite.
Jamie Levy is a core developer of Volatility Framework. She worked on various R&D projects and forensic cases while previously working at Guidance Software, Inc. Jamie has taught classes in Computer Forensics and Computer Science at Queens College (CUNY) and John Jay College (CUNY). She has an MS in Forensic Computing from John Jay College and is an avid contributor to the open source Computer Forensics community. Jamie has authored peer-reviewed conference publications and presented at conferences (OMFW, CEIC, IEEE ICC) on the topics of memory, network, and malware forensics analysis.