Yolanda SmithLead Infosec Analyst at Target

Yolonda Smith is a Lead Infosec Analyst with Target Corporation’s Business Information Security Office (BISO), aligned with the Digital portfolio. In this role, she provides expert security consultancy to developers, business leaders and key stakeholders to ensure that Target's web and mobile applications are designed, developed and deployed with minimal risk to Target or its guests.

A security professional herself, she spent 8 years in the United States Air Force as a Cyberspace Operations Officer with duties and responsibilities varying from Mission Commander, (Advanced Network Operations) where her team planned and executed the first DoD Cyber Threat Hunting Missions to Flight Commander, (Cyber Defense Capabilities Development) where her team developed and fielded the first and only malware neutralization tool for the Predator Drone Weapon System. Additionally, she successfully completed multiple deployments in support of Operations Iraqi Freedom and Enduring Freedom where her teams delivered secure, reliable communications capabilities to forward-deployed units on-demand.

Yolonda holds a litany of degrees and certifications including a Bachelor of Science, Computer Science (University of Notre Dame, 2005), Master of Science, Information Technology, with a concentration in Information Assurance (University of Maryland, 2010) as well as GSEC (2008), GCIH (2011), and CISSP (2008) certifications.

Yolanda SmithLead Infosec Analyst at Target

Yolonda Smith is a Lead Infosec Analyst with Target Corporation’s Business Information Security Office (BISO), aligned with the Digital portfolio. In this role, she provides expert security consultancy to developers, business leaders and key stakeholders to ensure that Target's web and mobile applications are designed, developed and deployed with minimal risk to Target or its guests.

A security professional herself, she spent 8 years in the United States Air Force as a Cyberspace Operations Officer with duties and responsibilities varying from Mission Commander, (Advanced Network Operations) where her team planned and executed the first DoD Cyber Threat Hunting Missions to Flight Commander, (Cyber Defense Capabilities Development) where her team developed and fielded the first and only malware neutralization tool for the Predator Drone Weapon System. Additionally, she successfully completed multiple deployments in support of Operations Iraqi Freedom and Enduring Freedom where her teams delivered secure, reliable communications capabilities to forward-deployed units on-demand.

Yolonda holds a litany of degrees and certifications including a Bachelor of Science, Computer Science (University of Notre Dame, 2005), Master of Science, Information Technology, with a concentration in Information Assurance (University of Maryland, 2010) as well as GSEC (2008), GCIH (2011), and CISSP (2008) certifications.

closepopup
Kelley RobinsonDeveloper Evangelist at Twilio

Kelley works on the Account Security team at Twilio, helping developers manage and secure customer identity in their software applications. Previously she worked in a variety of API platform and data engineering roles at startups in San Francisco. She believes in making technical concepts, especially security, accessible and approachable for new audiences. In her spare time, Kelley is an avid home cook and greatly enjoys reorganizing her tiny kitchen to accommodate completely necessary small appliance purchases.

Kelley RobinsonDeveloper Evangelist at Twilio

Kelley works on the Account Security team at Twilio, helping developers manage and secure customer identity in their software applications. Previously she worked in a variety of API platform and data engineering roles at startups in San Francisco. She believes in making technical concepts, especially security, accessible and approachable for new audiences. In her spare time, Kelley is an avid home cook and greatly enjoys reorganizing her tiny kitchen to accommodate completely necessary small appliance purchases.

closepopup
Alyssa MillerManager - Information Security Solutions Practice at CDW

Alyssa is a former developer turned pen-tester and security evangelist with over 15 years of experience in the security industry. She has maintained a heavy focus on application security over the years, not only conducting application assessments, threat modeling exercises and secure code reviews, but also working with companies to develop comprehensive secure SDLC programs. Alyssa is also experienced in delivering security training at all levels from basic awareness to detailed secure coding practices. Currently, Alyssa is the Manager of the Information Security Solutions Practice for CDW, working with customers to deliver security assessment and advisory services. Alyssa has been published in multiple security publications, spoken at security conferences and events, and also holds a CISM certification from ISACA.

Alyssa MillerManager - Information Security Solutions Practice at CDW

Alyssa is a former developer turned pen-tester and security evangelist with over 15 years of experience in the security industry. She has maintained a heavy focus on application security over the years, not only conducting application assessments, threat modeling exercises and secure code reviews, but also working with companies to develop comprehensive secure SDLC programs. Alyssa is also experienced in delivering security training at all levels from basic awareness to detailed secure coding practices. Currently, Alyssa is the Manager of the Information Security Solutions Practice for CDW, working with customers to deliver security assessment and advisory services. Alyssa has been published in multiple security publications, spoken at security conferences and events, and also holds a CISM certification from ISACA.

closepopup
Wendy EdwardsProgrammer at ASPCA

Wendy is a programmer at a nonprofit who participated in the SANS Women’s Academy for security training and the NASA Datanauts program. She has one master’s degree in computer science and another in library and information science. She is active in local security groups CU2600 and DC217 and is especially interested in the applications of data science to security.

Wendy EdwardsProgrammer at ASPCA

Wendy is a programmer at a nonprofit who participated in the SANS Women’s Academy for security training and the NASA Datanauts program. She has one master’s degree in computer science and another in library and information science. She is active in local security groups CU2600 and DC217 and is especially interested in the applications of data science to security.

closepopup
Jessica HydeDirector of Forensics at Magnet Forensics / Adjunct Professor at George Mason University

Jessica Hyde has experience performing computer and mobile device forensics in both the commercial and government sectors. Jessica earned an MS in Computer Forensics from George Mason University. She is the Director of Forensics for Magnet Forensics and an Adjunct Professor at George Mason University where she teaches Mobile Forensics. Prior to her current role, she was a Senior Mobile Exploitation Analyst and team lead for Basis Technology, was part of the Cyber Crime Investigations team at EY, and worked as a Senior Electrical Engineer for American Systems where she specialized in the analysis of damaged mobile devices. She is currently working on a book on Digital Forensics for the Internet of Things anticipated for release in 2019. Jessica is also a veteran of the United States Marine Corps.

Jessica HydeDirector of Forensics at Magnet Forensics / Adjunct Professor at George Mason University

Jessica Hyde has experience performing computer and mobile device forensics in both the commercial and government sectors. Jessica earned an MS in Computer Forensics from George Mason University. She is the Director of Forensics for Magnet Forensics and an Adjunct Professor at George Mason University where she teaches Mobile Forensics. Prior to her current role, she was a Senior Mobile Exploitation Analyst and team lead for Basis Technology, was part of the Cyber Crime Investigations team at EY, and worked as a Senior Electrical Engineer for American Systems where she specialized in the analysis of damaged mobile devices. She is currently working on a book on Digital Forensics for the Internet of Things anticipated for release in 2019. Jessica is also a veteran of the United States Marine Corps.

closepopup
Chloe MessdaghiPM/Security Researcher Advocate at Bugcrowd

Chloe Messdaghi is a Security Researcher Advocate/PM @Bugcrowd. Since entering cybersecurity space, she sees security as a humanitarian issue. Humanitarian work includes advising as a UN Volunteer, serving as a board member for several humanitarian organizations. Chloe also heads WIST, mentors and advocates for inclusion in tech, and founded a nonprofit called Drop Labels.

Chloe MessdaghiPM/Security Researcher Advocate at Bugcrowd

Chloe Messdaghi is a Security Researcher Advocate/PM @Bugcrowd. Since entering cybersecurity space, she sees security as a humanitarian issue. Humanitarian work includes advising as a UN Volunteer, serving as a board member for several humanitarian organizations. Chloe also heads WIST, mentors and advocates for inclusion in tech, and founded a nonprofit called Drop Labels.

closepopup
Mary WaddickCyber Engineer at Raytheon

Mary Anne is a Cyber Engineer at Raytheon in Indianapolis. She has a master’s Degree in Information Assurance with a focus on Cyber Security from Regis University. She has worked at Raytheon for 29 years, both with Software Engineering and Cyber Engineering. She helps them understand the importance of secure coding practices, and helps them use static code analysis tools for finding and understanding security issues.

Mary WaddickCyber Engineer at Raytheon

Mary Anne is a Cyber Engineer at Raytheon in Indianapolis. She has a master’s Degree in Information Assurance with a focus on Cyber Security from Regis University. She has worked at Raytheon for 29 years, both with Software Engineering and Cyber Engineering. She helps them understand the importance of secure coding practices, and helps them use static code analysis tools for finding and understanding security issues.

closepopup
Jordanne BarretteInformation Security Administration at Miva, Inc

Information Security Administrator for an eCommerce company who is passionate about educating others on security and how to get into the Information Security career field. I hold a Bachelor's degree from the University of South Florida in Information Studies and I am a graduate student at UMUC, along with a CompTIA Security Plus and SSCP certification holder. I am a firm believer in giving back, a CyberPatriots Mentor and volunteer within the Tampa Bay community. When I am not volunteering I co-host a podcast weekly discussing recent security news.

Jordanne BarretteInformation Security Administration at Miva, Inc

Information Security Administrator for an eCommerce company who is passionate about educating others on security and how to get into the Information Security career field. I hold a Bachelor's degree from the University of South Florida in Information Studies and I am a graduate student at UMUC, along with a CompTIA Security Plus and SSCP certification holder. I am a firm believer in giving back, a CyberPatriots Mentor and volunteer within the Tampa Bay community. When I am not volunteering I co-host a podcast weekly discussing recent security news.

closepopup
Vandana Verma SehgalSecurity Solutions Architect at IBM

Vandana Verma is an experienced Security Solutions Architect with IBM. Her work includes Vulnerability Assessments, Penetration Tests and Product Integrations. She is part of Open source communities like Chapter Leader OWASP Bangalore, OWASP Women In AppSec Committee Secretary, and Asia Volunteer Coordinator, Heading InfoSecGirls iN India. She has given talks and workshops at many colleges and security conferences including AppSec Europe, AppSec USA, NullCon, BSides Delhi, AppSec California c0c0n (Kerala Police Conference) and more. She also supports CyberDay4Girls to teach middle aged school girls from 5th - 9th Grade.

Vandana Verma SehgalSecurity Solutions Architect at IBM

Vandana Verma is an experienced Security Solutions Architect with IBM. Her work includes Vulnerability Assessments, Penetration Tests and Product Integrations. She is part of Open source communities like Chapter Leader OWASP Bangalore, OWASP Women In AppSec Committee Secretary, and Asia Volunteer Coordinator, Heading InfoSecGirls iN India. She has given talks and workshops at many colleges and security conferences including AppSec Europe, AppSec USA, NullCon, BSides Delhi, AppSec California c0c0n (Kerala Police Conference) and more. She also supports CyberDay4Girls to teach middle aged school girls from 5th - 9th Grade.

closepopup
Emilie St-PierreSecurity Consultant at Rapid7

Émilie is a penetration tester who has been a part of the information security community for over 5 years. She specializes in testing technology from the point-of-view of a malicious actor- performing social engineering, web application, WiFi and network-based engagements. She currently organizes community workshops for FutureAda and has presented at conferences such as BSidesLV and Layer8.

Emilie St-PierreSecurity Consultant at Rapid7

Émilie is a penetration tester who has been a part of the information security community for over 5 years. She specializes in testing technology from the point-of-view of a malicious actor- performing social engineering, web application, WiFi and network-based engagements. She currently organizes community workshops for FutureAda and has presented at conferences such as BSidesLV and Layer8.

closepopup
Mandy Logan

Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. She used her life hacking prowess from a non-traditional background (such as skipping five years of K-12 schooling while working on a ranch and then graduating from a giant, traditional high school in 2.5 years with a 4.2 GPA) to re-establish neuro control using her electrical system, her tongue against her teeth, and perseverance. Now, as a happy dyslexic autie (autistic person) she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, and Community, pressing forth to improve the lives of InfoSec professionals and long term ethical neuro tech for those unable to express themselves to their own satisfaction. She enjoys art, travel, naps, speaking, continuing and broadening her own recovery, and good people, and hopes to be half the person her service dog, Trevor, is.

Mandy Logan

Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. She used her life hacking prowess from a non-traditional background (such as skipping five years of K-12 schooling while working on a ranch and then graduating from a giant, traditional high school in 2.5 years with a 4.2 GPA) to re-establish neuro control using her electrical system, her tongue against her teeth, and perseverance. Now, as a happy dyslexic autie (autistic person) she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, and Community, pressing forth to improve the lives of InfoSec professionals and long term ethical neuro tech for those unable to express themselves to their own satisfaction. She enjoys art, travel, naps, speaking, continuing and broadening her own recovery, and good people, and hopes to be half the person her service dog, Trevor, is.

closepopup
Tash NorrisSenior Cloud Security Engineer at PhotoBox Group

Tash is a Senior Cloud Security Engineer at Photobox Group (which includes Moonpig, PosterXXL, Greetz! and Hofmann) and previously a threat modeling engineer in financial services. She is currently building tools and processes to automate all the things/ make the Cloud more secure. Currently she is also contributing to threat modeling projects and resources via OWASP and other community events.

Tash is also on the review panel for DevSecCon, an OWASP contributor and an avid advocate for Women in Tech/Cyber, appearing at various tech and security events and meetups to talk about both technical and behavioural topics.

Tash NorrisSenior Cloud Security Engineer at PhotoBox Group

Tash is a Senior Cloud Security Engineer at Photobox Group (which includes Moonpig, PosterXXL, Greetz! and Hofmann) and previously a threat modeling engineer in financial services. She is currently building tools and processes to automate all the things/ make the Cloud more secure. Currently she is also contributing to threat modeling projects and resources via OWASP and other community events.

Tash is also on the review panel for DevSecCon, an OWASP contributor and an avid advocate for Women in Tech/Cyber, appearing at various tech and security events and meetups to talk about both technical and behavioural topics.

closepopup
Joe GrayAdvanced Persistent Security

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is currently a Senior Security Architect and maintains his own blog and podcast called Advanced Persistent Security. In his spare time, Joe enjoys attending information security conferences, contributing blogs to various outlets, training in Brazilian Jiu Jitsu, and flying his drone. Joe is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe is a regular Forbes contributor and has contributed material for the likes of AlienVault, ITSP Magazine, CSO Online, and Dark Reading. Joe is an IBM Recognized Speaker/Presenter.

Joe GrayAdvanced Persistent Security

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is currently a Senior Security Architect and maintains his own blog and podcast called Advanced Persistent Security. In his spare time, Joe enjoys attending information security conferences, contributing blogs to various outlets, training in Brazilian Jiu Jitsu, and flying his drone. Joe is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe is a regular Forbes contributor and has contributed material for the likes of AlienVault, ITSP Magazine, CSO Online, and Dark Reading. Joe is an IBM Recognized Speaker/Presenter.

closepopup
Xena OlsenCyber Threat Intel Analyst at Financial Services

Xena Olsen is a cyber threat intelligence analyst in the financial services industry. Graduate of SANS Women’s Academy with 5 GIAC certifications and a current graduate student pursuing an MBA in IT Management. She has over 15 years of business experience from start-ups to enterprise in management, technical projects, consulting, strategy, and leadership. Her current focus is malware analysis and paying it forward through her Women in Information Security Group.

Xena OlsenCyber Threat Intel Analyst at Financial Services

Xena Olsen is a cyber threat intelligence analyst in the financial services industry. Graduate of SANS Women’s Academy with 5 GIAC certifications and a current graduate student pursuing an MBA in IT Management. She has over 15 years of business experience from start-ups to enterprise in management, technical projects, consulting, strategy, and leadership. Her current focus is malware analysis and paying it forward through her Women in Information Security Group.

closepopup
Lodrina CherneInstructor at SANS Institute, Security Analyst at Cybereason

Lodrina Cherne is an instructor for the SANS Institute where she teaches Windows Forensic Analysis and helps students to advance their foundational understanding of DFIR. She also works as a Security Analyst at Cybereason helping protect organizations from attack through incident response, malware analysis, and security research. Throughout her 15 years in cybersecurity, she has been able to fight for people wrongly impacted by technology including her work investigating the “Sledgehammer” case in Turkey where she helped in the acquittal of more than 200 foreign imprisoned senior military officers after showing that the electronic documents used to indict them were forged.

Lodrina CherneInstructor at SANS Institute, Security Analyst at Cybereason

Lodrina Cherne is an instructor for the SANS Institute where she teaches Windows Forensic Analysis and helps students to advance their foundational understanding of DFIR. She also works as a Security Analyst at Cybereason helping protect organizations from attack through incident response, malware analysis, and security research. Throughout her 15 years in cybersecurity, she has been able to fight for people wrongly impacted by technology including her work investigating the “Sledgehammer” case in Turkey where she helped in the acquittal of more than 200 foreign imprisoned senior military officers after showing that the electronic documents used to indict them were forged.

closepopup
Miki DemeterSecurity Researcher at Intel

I am a writer and Public Speaker for technical subjects as well as Diversity & Inclusion and other social subjects. My passion lies with advocating for underrepresented communities in Tech. My career has encompassed everything from firmware to application space. I have worked with teams providing full stack development. My last 8 years have had Security focus as the Security Champion for the Open Source Technology Center @ Intel. My current position as a Security Researcher In the IPAS GO (formerly Security Center of Excellence) working on Secure Development Lifecycle governance and as Product Security Expert for Open Source Software. Working with outside organizations like Women Who Code, Women in Security and Technology, Portland Women in Tech, and the Diana Initiative to help drive diversity and true inclusion while advocating for women in the STEM fields.

Miki DemeterSecurity Researcher at Intel

I am a writer and Public Speaker for technical subjects as well as Diversity & Inclusion and other social subjects. My passion lies with advocating for underrepresented communities in Tech. My career has encompassed everything from firmware to application space. I have worked with teams providing full stack development. My last 8 years have had Security focus as the Security Champion for the Open Source Technology Center @ Intel. My current position as a Security Researcher In the IPAS GO (formerly Security Center of Excellence) working on Secure Development Lifecycle governance and as Product Security Expert for Open Source Software. Working with outside organizations like Women Who Code, Women in Security and Technology, Portland Women in Tech, and the Diana Initiative to help drive diversity and true inclusion while advocating for women in the STEM fields.

closepopup
Jasmine JacksonBlogger/Owner at PassionForPentesting

Self-proclaimed Information Security Unicorn and cool nerd, Jasmine interest in Information Security started when she was 16 years old after she stumbled into a Yahoo! Group on Cryptography. Ten years later, Jasmine earned her Masters in Computer Science and a Graduate Certificate in Information Security and Privacy from University of North Carolina at Charlotte (UNCC). A life-long learner, Jasmine also has an assortment of security certifications - GSEC, GSSP-Java, GWAPT. In her spare time, besides hacking, she likes going to concerts, write on her blog - passionforpentesting.com, spoiling her furry daughter, and playing vintage video games on her Raspberry Pi.

Jasmine JacksonBlogger/Owner at PassionForPentesting

Self-proclaimed Information Security Unicorn and cool nerd, Jasmine interest in Information Security started when she was 16 years old after she stumbled into a Yahoo! Group on Cryptography. Ten years later, Jasmine earned her Masters in Computer Science and a Graduate Certificate in Information Security and Privacy from University of North Carolina at Charlotte (UNCC). A life-long learner, Jasmine also has an assortment of security certifications - GSEC, GSSP-Java, GWAPT. In her spare time, besides hacking, she likes going to concerts, write on her blog - passionforpentesting.com, spoiling her furry daughter, and playing vintage video games on her Raspberry Pi.

closepopup
Clover TwombleySecurity Analyst at Target

Clover Twombley was lured into the security field about two years ago by the prospect of putting out fires and responding to nonstop alerts in an environment that never sleeps. Her previous life was split between accounting and putting out fires and responding to nonstop alerts while never sleeping in her role as a mother of six. So far it's been a surprisingly easy transition.

Clover TwombleySecurity Analyst at Target

Clover Twombley was lured into the security field about two years ago by the prospect of putting out fires and responding to nonstop alerts in an environment that never sleeps. Her previous life was split between accounting and putting out fires and responding to nonstop alerts while never sleeping in her role as a mother of six. So far it's been a surprisingly easy transition.

closepopup
Paulina Valdivieso

Paulina is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans for more than 10 years, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.

Paulina Valdivieso

Paulina is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans for more than 10 years, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.

closepopup
Elizabeth Bell

Liz has been a librarian, soldier, waitress, garbage-sorter, and mystery diner. More recently, she's been a penetration tester, cryptanalyst, and network defense analyst, and has seen the clouds from both sides of the red/blue split. When she isn't guarding networks, she builds Nazi-hunting Twitter robots and picks locks.

Elizabeth Bell

Liz has been a librarian, soldier, waitress, garbage-sorter, and mystery diner. More recently, she's been a penetration tester, cryptanalyst, and network defense analyst, and has seen the clouds from both sides of the red/blue split. When she isn't guarding networks, she builds Nazi-hunting Twitter robots and picks locks.

closepopup
Amber WelchPrivacy Technical Lead at Schellman & Co

Until she’s accepted for a Mars mission, Amber Welch is pursuing the advancement of personal information privacy and data protection as a Privacy Technical Lead for Schellman & Company. Amber has been assessing corporate privacy compliance programs for the past year and prior to that, managed security and privacy governance for a suite of SaaS products. She has previously worked in companies creating ERP, CRM, event planning, and biologics manufacturing software.

Amber WelchPrivacy Technical Lead at Schellman & Co

Until she’s accepted for a Mars mission, Amber Welch is pursuing the advancement of personal information privacy and data protection as a Privacy Technical Lead for Schellman & Company. Amber has been assessing corporate privacy compliance programs for the past year and prior to that, managed security and privacy governance for a suite of SaaS products. She has previously worked in companies creating ERP, CRM, event planning, and biologics manufacturing software.

closepopup
Seth VargoDeveloper Relations Engineer at Google

Seth Vargo is a Developer Relations Engineer at Google. Previously he worked at HashiCorp, Chef Software, CustomInk, and a few Pittsburgh-based startups. He is the author of Learning Chef and is passionate about reducing inequality in technology. When he is not writing, working on open source, teaching, or speaking at conferences, Seth enjoys spending time with his friends and advising non-profits.

Seth VargoDeveloper Relations Engineer at Google

Seth Vargo is a Developer Relations Engineer at Google. Previously he worked at HashiCorp, Chef Software, CustomInk, and a few Pittsburgh-based startups. He is the author of Learning Chef and is passionate about reducing inequality in technology. When he is not writing, working on open source, teaching, or speaking at conferences, Seth enjoys spending time with his friends and advising non-profits.

closepopup
Katie NickelsATT&CK Threat Intelligence Lead at MITRE

Katie Nickels is the ATT&CK Threat Intelligence Lead at The MITRE Corporation, where she focuses on sharing how ATT&CK is useful for moving toward a threat-informed defense. She is also a SANS instructor for FOR578: Cyber Threat Intelligence. Katie has worked in network defense, incident response, and cyber threat intelligence for nearly a decade. She hails from a liberal arts background with degrees from Smith College and Georgetown University, embracing the power of applying liberal arts prowess to cybersecurity. With more than a dozen publications to her name, Katie has shared her expertise with presentations at BSidesLV, the FIRST CTI Symposium, multiple SANS Summits, Sp4rkcon, and many other events. Katie was also was a member of the 2019 SANS CTI Summit Advisory Board. She was the 2018 recipient of the President's Award from the Women's Society of Cyberjutsu and serves as the Program Manager for the Cyberjutsu Girls Academy, which seeks to inspire young women to learn more about STEM.

Katie NickelsATT&CK Threat Intelligence Lead at MITRE

Katie Nickels is the ATT&CK Threat Intelligence Lead at The MITRE Corporation, where she focuses on sharing how ATT&CK is useful for moving toward a threat-informed defense. She is also a SANS instructor for FOR578: Cyber Threat Intelligence. Katie has worked in network defense, incident response, and cyber threat intelligence for nearly a decade. She hails from a liberal arts background with degrees from Smith College and Georgetown University, embracing the power of applying liberal arts prowess to cybersecurity. With more than a dozen publications to her name, Katie has shared her expertise with presentations at BSidesLV, the FIRST CTI Symposium, multiple SANS Summits, Sp4rkcon, and many other events. Katie was also was a member of the 2019 SANS CTI Summit Advisory Board. She was the 2018 recipient of the President's Award from the Women's Society of Cyberjutsu and serves as the Program Manager for the Cyberjutsu Girls Academy, which seeks to inspire young women to learn more about STEM.

closepopup
Sarah YoungCloud Security Architect at Microsoft

Sarah is a cloud security architect working for Microsoft and based in Melbourne, Australia. She has a decade of experience in tech and is particularly interested in cloud security, container/orchestrator security and good ol' fashioned networking and infrastructure security (having previously worked as a network engineer). Sarah has spoken around the world at a variety of info sec conferences about a range of security and technical topics.

Sarah YoungCloud Security Architect at Microsoft

Sarah is a cloud security architect working for Microsoft and based in Melbourne, Australia. She has a decade of experience in tech and is particularly interested in cloud security, container/orchestrator security and good ol' fashioned networking and infrastructure security (having previously worked as a network engineer). Sarah has spoken around the world at a variety of info sec conferences about a range of security and technical topics.

closepopup
Emily Gladstone ColeSenior Security Engineer at Agari Data, Inc

Emily is currently a Senior Security Engineer for Agari Data, Inc., and spends a lot of time thinking about the ways that DevOps and Security intersect. Emily has performed critical organizational roles of security research, incident response, product security, devops engineer, system administrator, tech support, security expert, operations specialist, and project lead. Emily specializes in Unix security and is a co-author of a book on Solaris Security for the SANS Institute, and serves as a Mentor for SANS' CyberTalent Immersion Academy for Women. She holds GSEC, GCED, GPPA, GCIH, and ITIL certifications, and is a Certified Scrum Master.

Emily Gladstone ColeSenior Security Engineer at Agari Data, Inc

Emily is currently a Senior Security Engineer for Agari Data, Inc., and spends a lot of time thinking about the ways that DevOps and Security intersect. Emily has performed critical organizational roles of security research, incident response, product security, devops engineer, system administrator, tech support, security expert, operations specialist, and project lead. Emily specializes in Unix security and is a co-author of a book on Solaris Security for the SANS Institute, and serves as a Mentor for SANS' CyberTalent Immersion Academy for Women. She holds GSEC, GCED, GPPA, GCIH, and ITIL certifications, and is a Certified Scrum Master.

closepopup
Sapna SinghCyber Security Researcher

Sapna is a Security Professional with more than 9 years of experience in this cyber security domain. She comes with a background in Information Security where she worked as SME for critical incidents investigations, forensics, vulnerability assessment, penetrations testing and cloud security assessments for various organizations. She has earned her Master’s degree in “Information Security & Cyber law”. Prior to that she completed Masters and Post Graduate Diploma in Computer application.

She has given talks at SANS Summit, Kuwait University, for WTM & GDG and WiCSME sessions. Sapna is active member of ‘Women in Cyber Security Middle East’ group working to empower and mentor women in Cyber Security. She is driving the online knowledge sharing sessions to provide platform for women across Middle East countries, where they can express, share their knowledge and learn from each other. She is also co-organizer for Kuwait Cyber Security group.

Sapna SinghCyber Security Researcher

Sapna is a Security Professional with more than 9 years of experience in this cyber security domain. She comes with a background in Information Security where she worked as SME for critical incidents investigations, forensics, vulnerability assessment, penetrations testing and cloud security assessments for various organizations. She has earned her Master’s degree in “Information Security & Cyber law”. Prior to that she completed Masters and Post Graduate Diploma in Computer application.

She has given talks at SANS Summit, Kuwait University, for WTM & GDG and WiCSME sessions. Sapna is active member of ‘Women in Cyber Security Middle East’ group working to empower and mentor women in Cyber Security. She is driving the online knowledge sharing sessions to provide platform for women across Middle East countries, where they can express, share their knowledge and learn from each other. She is also co-organizer for Kuwait Cyber Security group.

closepopup
Saba DeyhimConsultant Manager at Slalom

Saba is a consultant at heart who started her career in Semiconductor Engineering and through several pivots, she found her passion in Security and Infrastructure consulting. She leads the Slalom SF Security team and loves working with a talented group with experience spanning the strategic to execution in Security/ Devops/ Cloud Operations/ Automation. While she has traveled the world and supported clients in Europe and Asia in the past, she has found that the most rewarding impact is contributing to the growth of her local market. It helps to call the Bay Area home and to consultant at the heart of innovation. Saba completed undergrad in Applied and Engineering Physics at Cornell, and her MBA at the Tuck School of Business at Dartmouth College.

Saba DeyhimConsultant Manager at Slalom

Saba is a consultant at heart who started her career in Semiconductor Engineering and through several pivots, she found her passion in Security and Infrastructure consulting. She leads the Slalom SF Security team and loves working with a talented group with experience spanning the strategic to execution in Security/ Devops/ Cloud Operations/ Automation. While she has traveled the world and supported clients in Europe and Asia in the past, she has found that the most rewarding impact is contributing to the growth of her local market. It helps to call the Bay Area home and to consultant at the heart of innovation. Saba completed undergrad in Applied and Engineering Physics at Cornell, and her MBA at the Tuck School of Business at Dartmouth College.

closepopup
Alana StaszczyszynSecurity Consultant at Security Compass

Alana Staszczyszyn is a practicing security consultant. Her past and present work has focused on penetration testing as well as security governance in the public health sector. She is also heavily interested in various cultural, socioeconomic, and political aspects of cybersecurity, particularly on how the rise of the cyber-threat landscape has given rise to new risk dimensions in those domains.

Alana StaszczyszynSecurity Consultant at Security Compass

Alana Staszczyszyn is a practicing security consultant. Her past and present work has focused on penetration testing as well as security governance in the public health sector. She is also heavily interested in various cultural, socioeconomic, and political aspects of cybersecurity, particularly on how the rise of the cyber-threat landscape has given rise to new risk dimensions in those domains.

closepopup
Brianne HughesTechnical Editor at Bishop Fox

As a technical editor for Bishop Fox, Brianne Hughes works on client reports, internal resource development, and ongoing consultant training. She compiled the style guide available at cybersecuritystyleguide.com and hosted SpellCheck: The Hacker Spelling Bee at HOPE and DEF CON in Summer 2018. As a historical linguist, she enjoys finding new cutthroat compounds and using vulgar examples in her talks. She is Associate Executive Secretary for the DSNA, an Odd Salon Fellow, and she is on the board of directors at Wordnik.

Brianne HughesTechnical Editor at Bishop Fox

As a technical editor for Bishop Fox, Brianne Hughes works on client reports, internal resource development, and ongoing consultant training. She compiled the style guide available at cybersecuritystyleguide.com and hosted SpellCheck: The Hacker Spelling Bee at HOPE and DEF CON in Summer 2018. As a historical linguist, she enjoys finding new cutthroat compounds and using vulgar examples in her talks. She is Associate Executive Secretary for the DSNA, an Odd Salon Fellow, and she is on the board of directors at Wordnik.

closepopup
Laura WebbFounder at Wildcard Study

Laura is a national speaker with a varied career from art museums to remote work for a large online community. She's interested in Linux, security, making things better, and the next Mars mission.

Laura WebbFounder at Wildcard Study

Laura is a national speaker with a varied career from art museums to remote work for a large online community. She's interested in Linux, security, making things better, and the next Mars mission.

closepopup
Serenity SmileDiversity Immersion Academy Student at SANS Institute

Serenity Smile is a SANS Diversity Cybertalent Immersion
Academy Graduate. She holds the GIAC GSEC (GIAC Security Essentials),
GIAC GCIH (GIAC Certified Incident Handler), and GIAC GCIA (GIAC
Certified Intrusion Analyst) Certifications. Additionally, she’s
earned five different yoga and meditation teaching certifications and is a health and wellness consultant. She also co-directs Women Who Code in her city and is an avid cybersecurity researcher, chair of an Arboretum Board, a Coursera Beta-Tester, and an avid lifelong learner.

Serenity SmileDiversity Immersion Academy Student at SANS Institute

Serenity Smile is a SANS Diversity Cybertalent Immersion
Academy Graduate. She holds the GIAC GSEC (GIAC Security Essentials),
GIAC GCIH (GIAC Certified Incident Handler), and GIAC GCIA (GIAC
Certified Intrusion Analyst) Certifications. Additionally, she’s
earned five different yoga and meditation teaching certifications and is a health and wellness consultant. She also co-directs Women Who Code in her city and is an avid cybersecurity researcher, chair of an Arboretum Board, a Coursera Beta-Tester, and an avid lifelong learner.

closepopup
Sylvia KillinenSenior QA Engineer at Worldpay

Sylvia joined a QA team at Mercury Payment Systems in 2009 and never looked back. Finding a SQL injection bug was the impetus to start studying information security, and she has turned an interest into a field of work. With a focus on finding the trail and making it easier to do the right thing, she has offered technical and theoretical training to other testers within the company.

Sylvia KillinenSenior QA Engineer at Worldpay

Sylvia joined a QA team at Mercury Payment Systems in 2009 and never looked back. Finding a SQL injection bug was the impetus to start studying information security, and she has turned an interest into a field of work. With a focus on finding the trail and making it easier to do the right thing, she has offered technical and theoretical training to other testers within the company.

closepopup
Jaime Lightfoot

Jaime is an electrical engineer turned software developer. Her experience spans from embedded systems to mobile apps to web development. She caught the infosec bug through playing CTFs with her team, BisonSquad. When she's not adding LEDs to things or volunteering with her local software community, she can be found taking her dog for overdue walks.

Jaime Lightfoot

Jaime is an electrical engineer turned software developer. Her experience spans from embedded systems to mobile apps to web development. She caught the infosec bug through playing CTFs with her team, BisonSquad. When she's not adding LEDs to things or volunteering with her local software community, she can be found taking her dog for overdue walks.

closepopup
Vanessa Redman

Vanessa Redman is a long time listener, first time speaker at a cyber conference. She considers herself a researcher first and foremost, and has interests in open source information gathering and adversary tactics and techniques. She is particularly interested in cyber threat intelligence and how to integrate algorithmic game theory to create a *proactive* defensive framework that can be easily specialized and used across the community. Her view of cybersecurity fundamentally changed while working for a Red Team, and she strongly believes that being able to think like a malicious actor is a key component in building a robust defensive posture. She holds a CompTia Security + certification, in currently finishing her B.S. in Computer Science, and is scheduled to take the GXPN Certification in the Fall of 2019.

Vanessa Redman

Vanessa Redman is a long time listener, first time speaker at a cyber conference. She considers herself a researcher first and foremost, and has interests in open source information gathering and adversary tactics and techniques. She is particularly interested in cyber threat intelligence and how to integrate algorithmic game theory to create a *proactive* defensive framework that can be easily specialized and used across the community. Her view of cybersecurity fundamentally changed while working for a Red Team, and she strongly believes that being able to think like a malicious actor is a key component in building a robust defensive posture. She holds a CompTia Security + certification, in currently finishing her B.S. in Computer Science, and is scheduled to take the GXPN Certification in the Fall of 2019.

closepopup
Sam BowneInstructor at City College San Francisco

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at RSA, DEF CON in Las Vegas, DEF CON China, HOPE, BSidesSF, BSidesLV, LayerOne, Toorcon, and many other schools and conferences.

Credentials: PhD, CISSP, DEF CON Black Badge Co-Winner

Sam BowneInstructor at City College San Francisco

Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at RSA, DEF CON in Las Vegas, DEF CON China, HOPE, BSidesSF, BSidesLV, LayerOne, Toorcon, and many other schools and conferences.

Credentials: PhD, CISSP, DEF CON Black Badge Co-Winner

closepopup
Yasmine Johnston-IsonPrincipal Threat Researcher at BlackBerry

I started tinkering with webpage vulnerabilities when I was around 17 years old. I had no clue that tinkering was a real job. I was soon, purposefully, infecting my own computers with spyware to see what happens and how they work. Then I joined the military (around 19 years old) as a Signals Intelligence Analyst (National Guard 2003, active duty Army 2005, and ended my career last year in the reserves).
I've done some threat targeting downrange in Afghanistan and Iraq and even more targeting back here stateside. I left the targeting world for a short time when I worked at the Department of Energy as their Senior Reverse Engineer. While there, I had a great Team Lead who pushed my technical skills at every opportunity. Current, I am working at Cylance/Blackberry as a Principal Threat Researcher, where I am back to hunting.
As you can see, my career grew up in the shadows of digital conversations. I saw and learned so much. I understood how pieces fit together. I learned weaknesses in targets and how to exploit them. Sometimes I knew my target better than my family. I was trained to become an expert in the area I was assigned. Even as a contractor for the Department of Defense, I was still in this shadow. People's lives depended on my ability to put a puzzle together.
A target is a target and I had better have my facts right.
A network is a network - human or digital.
In the shadows, it's one in the same.
I live for hunting. Discovery of the unknown while staying unknown.

Yasmine Johnston-IsonPrincipal Threat Researcher at BlackBerry

I started tinkering with webpage vulnerabilities when I was around 17 years old. I had no clue that tinkering was a real job. I was soon, purposefully, infecting my own computers with spyware to see what happens and how they work. Then I joined the military (around 19 years old) as a Signals Intelligence Analyst (National Guard 2003, active duty Army 2005, and ended my career last year in the reserves).
I've done some threat targeting downrange in Afghanistan and Iraq and even more targeting back here stateside. I left the targeting world for a short time when I worked at the Department of Energy as their Senior Reverse Engineer. While there, I had a great Team Lead who pushed my technical skills at every opportunity. Current, I am working at Cylance/Blackberry as a Principal Threat Researcher, where I am back to hunting.
As you can see, my career grew up in the shadows of digital conversations. I saw and learned so much. I understood how pieces fit together. I learned weaknesses in targets and how to exploit them. Sometimes I knew my target better than my family. I was trained to become an expert in the area I was assigned. Even as a contractor for the Department of Defense, I was still in this shadow. People's lives depended on my ability to put a puzzle together.
A target is a target and I had better have my facts right.
A network is a network - human or digital.
In the shadows, it's one in the same.
I live for hunting. Discovery of the unknown while staying unknown.

closepopup
Yoman NasserElectronic Frontier Foundation

Yomna is a research engineer at the Electronic Frontier Foundation and at Harvard's Berkman Klein Center, where she is focused on researching cell network surveillance. Previously she was a Certbot engineer (formerly known as the Let's Encrypt client).

Yoman NasserElectronic Frontier Foundation

Yomna is a research engineer at the Electronic Frontier Foundation and at Harvard's Berkman Klein Center, where she is focused on researching cell network surveillance. Previously she was a Certbot engineer (formerly known as the Let's Encrypt client).

closepopup
Whitney MaxwellSecurity Consultant at Rapid7

Whitney Maxwell has over 5 years of experience in security. She is currently working for Rapid7 as a security consultant with expertise in social engineering and red teaming. She received the Social Engineering CTF Black Badge from DEF CON in 2018 and she received her Masters of Technology degree with an emphasis in cyber security from Brigham Young University in December of 2017. Her previous experience includes working on the Office 365 red team at Microsoft where she pen tested network infrastructures, coded internal toolsets, and adjudicated cases for the O365 bug bounty. Along with her professional experience she was one of the founding members of the Cyber Security Research Lab red team at Brigham Young University.

Whitney MaxwellSecurity Consultant at Rapid7

Whitney Maxwell has over 5 years of experience in security. She is currently working for Rapid7 as a security consultant with expertise in social engineering and red teaming. She received the Social Engineering CTF Black Badge from DEF CON in 2018 and she received her Masters of Technology degree with an emphasis in cyber security from Brigham Young University in December of 2017. Her previous experience includes working on the Office 365 red team at Microsoft where she pen tested network infrastructures, coded internal toolsets, and adjudicated cases for the O365 bug bounty. Along with her professional experience she was one of the founding members of the Cyber Security Research Lab red team at Brigham Young University.

closepopup
Gabrielle HempelSecurity Consultant at Accenture

Gabrielle E. Hempel, B.A., B.S. Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for Advarra Institutional Review Board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as an Information Security Analyst with Accenture while pursuing a certificate in Advanced Computer Security at Stanford. She serves as a mentor for a student cohort of cybersecurity analysts, and volunteers with various community organizations that encourage youth and minorities to pursue careers in STEM and information security.

Gabrielle HempelSecurity Consultant at Accenture

Gabrielle E. Hempel, B.A., B.S. Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for Advarra Institutional Review Board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as an Information Security Analyst with Accenture while pursuing a certificate in Advanced Computer Security at Stanford. She serves as a mentor for a student cohort of cybersecurity analysts, and volunteers with various community organizations that encourage youth and minorities to pursue careers in STEM and information security.

closepopup
Margaret LaytonDirector of Engineering at Symantec

Dr. Margaret Layton (Meg) is currently Director of Engineering for the Cyber Security Services organization of Symantec and has been working in technology for over two decades. In 2001, she joined a start-up company that was acquired by Symantec, and she has since been working in various roles within the company - both on products and working on the intelligence that fuels the front-line responders. Prior to joining Symantec, Meg worked as a Director of IT for a telecommunications company doing business in Africa, which is where she first discovered her passion for security. There is nothing like protecting networks in developing countries in the middle of a civil war to really drive forward what security needs. Meg maintains several certifications in the Cyber Security realm that she is passionate about, including both the CISSP and CSSLP certifications from ISC(2), and GIAC certifications for Incident Handling, Forensic Analysis, and Penetration Testing. She is CNSS 4011 and 4012 certified. In her role as Director of Engineering, she also holds Agile certifications.

Margaret LaytonDirector of Engineering at Symantec

Dr. Margaret Layton (Meg) is currently Director of Engineering for the Cyber Security Services organization of Symantec and has been working in technology for over two decades. In 2001, she joined a start-up company that was acquired by Symantec, and she has since been working in various roles within the company - both on products and working on the intelligence that fuels the front-line responders. Prior to joining Symantec, Meg worked as a Director of IT for a telecommunications company doing business in Africa, which is where she first discovered her passion for security. There is nothing like protecting networks in developing countries in the middle of a civil war to really drive forward what security needs. Meg maintains several certifications in the Cyber Security realm that she is passionate about, including both the CISSP and CSSLP certifications from ISC(2), and GIAC certifications for Incident Handling, Forensic Analysis, and Penetration Testing. She is CNSS 4011 and 4012 certified. In her role as Director of Engineering, she also holds Agile certifications.

closepopup
Michelle BrennerSenior Backend Engineer at ChowNow

connecting them with customers to discover their delicious creations. She has previously served as both an engineer and a manager for the last 7+ years in entertainment technology. She has worked tirelessly to help movies and television get made faster and cheaper, saving productions millions of dollars. A Philadelphia native, she has a background in Media Arts and is a self-taught Python developer. Michelle is now working to give back to her community through mentorship and conference speaking.

Michelle BrennerSenior Backend Engineer at ChowNow

connecting them with customers to discover their delicious creations. She has previously served as both an engineer and a manager for the last 7+ years in entertainment technology. She has worked tirelessly to help movies and television get made faster and cheaper, saving productions millions of dollars. A Philadelphia native, she has a background in Media Arts and is a self-taught Python developer. Michelle is now working to give back to her community through mentorship and conference speaking.

closepopup
Kathleen MullinCISO at Healthmap Solutions

Kathleen (Kate) Mullin CISSP, MLSE, CCSFP
Kate Mullin is an influential information security practitioner with more than 30 years of experience in various accounting, audit, risk, governance, and information security roles. She has been a CISO at various organizations including publicly traded, private equity, not-for-profit, and governmental entities. Kate established the role of CISO at Tampa Airport and at Healthplan Services. Kate was the CISO for Adventist Health System and WageWorks and has a vast array of first-hand experience in various areas of information security from social engineering to presenting to Boards. Kate has a BSBA with a concentration in Accounting from St Joseph's College, Maine and an MBA from Florida Metropolitan University.
Kate is now a vCISO providing services for colleges and universities, third party administrators (TPA), and financial, and healthcare firms. Kate provides interim CISO, fractal CISO and vCISO services as well as DPO guidance.
Throughout her career, Kate has volunteered and participated in maturing information security as a profession. Kate is a former member of the ISACA CGEIT Certification and Credentials Committee and a past chapter president and CISA, CISM, CRISC, and CGEIT coordinator for West Florida ISACA. Kate has been a part of the CISO Coalition governing board, participating in their teams such as the one created for the EUGDPR and has moderated at several of their events. Kate is cited by publications as an expert in information security including governance, social engineering, and general security trends.
Kate serves internationally as a featured speaker and panelist at webinars, seminars, and conferences, delivering presentations on diverse topics including Reducing Compliance Risk, Commonly Accepted Standards, IT Audit Becoming a Trusted Advisor, Social Engineering, CISO Organizational placement, Audit Logging and Log Management, and Information Security Incident Response. Kate was one of the panelist to six startups for “Shark Tank” 2017 in San Francisco "Enterprise IT Security Demo Day" hosted by Glynn Capital Management, DocuSign, Silicon Valley Bank, and Dropbox. She spoke at the COSAC and SABSA conference Kildare, Ireland 2018 as well as DefCon 26 https://www.youtube.com/watch?v=F1sbd7hFFy4 Tampa BSIDES 2019, and is a regular presenter for AHIA and MISTI.

Kathleen MullinCISO at Healthmap Solutions

Kathleen (Kate) Mullin CISSP, MLSE, CCSFP
Kate Mullin is an influential information security practitioner with more than 30 years of experience in various accounting, audit, risk, governance, and information security roles. She has been a CISO at various organizations including publicly traded, private equity, not-for-profit, and governmental entities. Kate established the role of CISO at Tampa Airport and at Healthplan Services. Kate was the CISO for Adventist Health System and WageWorks and has a vast array of first-hand experience in various areas of information security from social engineering to presenting to Boards. Kate has a BSBA with a concentration in Accounting from St Joseph's College, Maine and an MBA from Florida Metropolitan University.
Kate is now a vCISO providing services for colleges and universities, third party administrators (TPA), and financial, and healthcare firms. Kate provides interim CISO, fractal CISO and vCISO services as well as DPO guidance.
Throughout her career, Kate has volunteered and participated in maturing information security as a profession. Kate is a former member of the ISACA CGEIT Certification and Credentials Committee and a past chapter president and CISA, CISM, CRISC, and CGEIT coordinator for West Florida ISACA. Kate has been a part of the CISO Coalition governing board, participating in their teams such as the one created for the EUGDPR and has moderated at several of their events. Kate is cited by publications as an expert in information security including governance, social engineering, and general security trends.
Kate serves internationally as a featured speaker and panelist at webinars, seminars, and conferences, delivering presentations on diverse topics including Reducing Compliance Risk, Commonly Accepted Standards, IT Audit Becoming a Trusted Advisor, Social Engineering, CISO Organizational placement, Audit Logging and Log Management, and Information Security Incident Response. Kate was one of the panelist to six startups for “Shark Tank” 2017 in San Francisco "Enterprise IT Security Demo Day" hosted by Glynn Capital Management, DocuSign, Silicon Valley Bank, and Dropbox. She spoke at the COSAC and SABSA conference Kildare, Ireland 2018 as well as DefCon 26 https://www.youtube.com/watch?v=F1sbd7hFFy4 Tampa BSIDES 2019, and is a regular presenter for AHIA and MISTI.

closepopup
Tanya JancaCloud Security Advocate at Microsoft

Tanya Janca is a senior cloud advocate for Microsoft, specializing in application and cloud security; evangelizing software security and advocating for developers and operations folks alike through public speaking, her open source project OWASP DevSlop, and various forms of teaching via workshops, blogs and community events. As an ethical hacker, OWASP Project and Chapter Leader, Women in Security and Technology (WIST) chapter leader, software developer and professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.

Tanya JancaCloud Security Advocate at Microsoft

Tanya Janca is a senior cloud advocate for Microsoft, specializing in application and cloud security; evangelizing software security and advocating for developers and operations folks alike through public speaking, her open source project OWASP DevSlop, and various forms of teaching via workshops, blogs and community events. As an ethical hacker, OWASP Project and Chapter Leader, Women in Security and Technology (WIST) chapter leader, software developer and professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.

closepopup
Andrea LimbagoChief Social Scientist at Virtru

Andrea Little Limbago is a computational social scientist specializing in the intersection of technology, national security, and society. She is the Chief Social Scientist at Virtru, an encryption and data privacy software company, where she researches and writes on the geopolitics of cybersecurity, global digital privacy trends, and usable security. Her writing has been featured in numerous outlets, and she frequently presents on a range of cybersecurity topics such as norms, attacker trends, computational propaganda, digital privacy, and workforce development. Andrea is also a Senior Fellow and Program Director for the Emerging Technologies Law and Policy Program at the National Security Institute at George Mason, and she contributes to numerous security conference program review committees. She previously was the Chief Social Scientist at Endgame. Prior to that, Andrea taught in academia and was a technical lead at the Department of Defense, where she received the top award for technical excellence. Andrea earned a PhD in Political Science from the University of Colorado at Boulder.

Andrea LimbagoChief Social Scientist at Virtru

Andrea Little Limbago is a computational social scientist specializing in the intersection of technology, national security, and society. She is the Chief Social Scientist at Virtru, an encryption and data privacy software company, where she researches and writes on the geopolitics of cybersecurity, global digital privacy trends, and usable security. Her writing has been featured in numerous outlets, and she frequently presents on a range of cybersecurity topics such as norms, attacker trends, computational propaganda, digital privacy, and workforce development. Andrea is also a Senior Fellow and Program Director for the Emerging Technologies Law and Policy Program at the National Security Institute at George Mason, and she contributes to numerous security conference program review committees. She previously was the Chief Social Scientist at Endgame. Prior to that, Andrea taught in academia and was a technical lead at the Department of Defense, where she received the top award for technical excellence. Andrea earned a PhD in Political Science from the University of Colorado at Boulder.

closepopup
Olivia StellaSenior Cybersecurity Analyst

Olivia Stella is a senior cybersecurity analyst for a US airline. In her current role, she focuses on aviation security and vulnerability management including pen testing. She has over ten years of experience in software development and information security. Previously, she worked at an in-flight entertainment company in product security supporting incident response, risk & compliance, and as the bug bounty lead. She holds a bachelor's degree in computer science, masters in software engineering, CISSP & CISM. When she's not wearing her security hat, she loves to curl and is an avid toastmaster. (That's right, ice curling.)

Olivia StellaSenior Cybersecurity Analyst

Olivia Stella is a senior cybersecurity analyst for a US airline. In her current role, she focuses on aviation security and vulnerability management including pen testing. She has over ten years of experience in software development and information security. Previously, she worked at an in-flight entertainment company in product security supporting incident response, risk & compliance, and as the bug bounty lead. She holds a bachelor's degree in computer science, masters in software engineering, CISSP & CISM. When she's not wearing her security hat, she loves to curl and is an avid toastmaster. (That's right, ice curling.)

closepopup
Keira PatersonCo-Founder at eConvenor

Keira Paterson is a Django developer and co-founder of eConvenor.org and is passionate about diversity, equity, sustainability and empathy in technology.

Motivated by a desire to see automated tools improving the effectiveness of community organizers, Keira taught herself to code building eConvenor with her partner in 2012. In 2017 she made the jump into web development as a career, while continuing to develop and manage eConvenor.

Prior to development, Keira gained 10 years experience in people-focused work, as a trade union organizer, a political volunteer coordinator, staff manager and policy process manager. She now works in her spare time to bring these two worlds together - teaching people stuff to computer-people, and computer stuff to people-people in hopes of a more secure, equitable tech future.

Keira PatersonCo-Founder at eConvenor

Keira Paterson is a Django developer and co-founder of eConvenor.org and is passionate about diversity, equity, sustainability and empathy in technology.

Motivated by a desire to see automated tools improving the effectiveness of community organizers, Keira taught herself to code building eConvenor with her partner in 2012. In 2017 she made the jump into web development as a career, while continuing to develop and manage eConvenor.

Prior to development, Keira gained 10 years experience in people-focused work, as a trade union organizer, a political volunteer coordinator, staff manager and policy process manager. She now works in her spare time to bring these two worlds together - teaching people stuff to computer-people, and computer stuff to people-people in hopes of a more secure, equitable tech future.

closepopup