Author: rvasadmin

RVAsec 14 Speaker Feature: Jon Waldman

Jon Waldman is a co-founder and President of SBS CyberSecurity and the SBS Institute. Over the past 20 years, Jon has helped organizations across the US identify and understand cybersecurity risks to allow them to make informed cybersecurity decisions. Jon is incredibly passionate about cybersecurity training and education and serves as a speaker at conferences across the country, along with writing blog posts, hosting webinars, and speaking on podcasts.

For 20 years, Jon Waldman, co-founder and President of SBS CyberSecurity and the SBS Institute, has passionately equipped organizations nationwide to conquer cyber risks. He’s dedicated to transforming complex threats into actionable intelligence. Catch his energy and insights as he actively shares his expertise through compelling talks, engaging writing, webinars, and podcasts.


Vendor Management 2025 – How to Make Better Vendor Management Decisions (<– add to your schedule)

Although vendor management has evolved, the core process remains the same: gathering and reviewing documentation to decide whether to continue business with a vendor. The key question now is how to ensure that vendors are genuinely protecting your datal

Come see Jon Waldman at RVAsec 13!


RVAsec 14 Speaker Feature: Jeremy Dorrough

Jeremy Dorrough has built his career around protecting assets in the most critical IT sectors. He started his career working in a Network Operations Security Center for the US Army. He then went on to work as a Network Security Engineer defending Dominion’s North Anna Nuclear Power Station. He also spent a few years as a Senior Network Security Engineer/Architect at Genworth Financial. Currently Jeremy works as a Client Director for Consortium Networks. He has presented at DefCon, RVASEC, UNC, JMU, ECPI, FBI Infragard and holds or has held Carnegie Mellon CISO certificate, MBA, CISSP, CISM, CEH, GIAC GPPA, CCSK, CCNA. Jeremy has spent over 20 years researching and implementing new ways to defend against the latest attacks. In his free time he loves spending time with his wife and two soon to be hacker children.


How to Win Budgets and Influence Stakeholders: Articulate Cyber Value to Non Technical Audiences (<– add to your schedule)

Limited budgets are a reality we all must live with. Security tools are getting pricier, and management is demanding stronger justifications for every dollar spent. Often, we in cyber struggle to explain the return on investment for all this security technology. Risk management frameworks and heat maps are not the saving grace they are made out to be. We as cyber professionals need to be fluent in financial discussions to guide the business toward informed decisions. I’ll walk you through some proven methods to bridge the communication gap between security and the business.

Come see Jeremy Dorrough at RVAsec 13!


RVAsec 14 Speaker Feature: Bobby N. Turnage, Jr.

Bobby Turnage is a business-minded attorney with more than 25 years of experience advising organizations dealing with technology and data-related matters, including cybersecurity, data security, data privacy, technology contracts, and conducting business on the web. Bobby advises clients of all sizes, both public and private, from start-up to well-established, and across multiple industries. Whether guiding clients through a data breach or ransomware attack with potential impacts in the U.S. and internationally, advising clients concerning data privacy and security obligations, or negotiating technology-related contracts that drive growth, Bobby brings a practical, “here’s how we can get it done” approach to delivering legal services. Bobby is the Cybersecurity and Technology Team Leader and is a Certified Information Privacy Professional/US (CIPP/US) by the International Association of Privacy Professionals. He previously served as SVP and General Counsel for Network Solutions and as AGC for Verisign.


Data Breach Management and Legal Issues for Information Technology Professionals (<– add to your schedule)

Please join us for a practical discussion (without the legalese!) about data breach management and minimizing the risk to your organization. In this discussion, we’ll talk through what it’s like to be in a breach situation, and we’ll cover some practical and legal considerations and suggestions that will help your organization achieve a better outcome.
Learning Objectives:
1. Gain a better understanding of what it’s like to be in a data breach situation.
2. Increase awareness of risks to your organization.
3. Increase awareness of the various people and workstreams involved in working through a data breach.
4. Increase knowledge of proactive measures to improve the outcome and minimize risk to the organization.

Come see Bobby N. Turnage, Jr. at RVAsec 13!


RVAsec 14 Speaker Feature: Alain Petit

Alain Petit is a seasoned Enterprise Security Architect at Capital One, bringing over 22 years of experience to his roles in restricted perimeter, governance, risk, compliance, and data protection. His career reflects a deep expertise in designing and implementing robust security architectures, leveraging frameworks like NIST, CSF, and MITRE. His tenure at Capital One has been marked by significant achievements, including earning top 1% recognition for delivering a project under budget and on time.

Prior to Capital One, Alain contributed to NASA’s EOS project at Hughes Aircraft and provided mission-critical support for the UARS satellite at Allied Signal, earning a Certificate of Appreciation from NASA. His early career also includes a 5-year stint as a Senior Object-Oriented Consultant. Born in Iowa, raised in France, and with a background in Physics, Alain thrives in complex environments. He holds a CISSP certification and a Leadership Certificate from the University of Virginia Darden School of Business. He enjoys strategy board games, history, and is currently reading “Hawkins Magic Beers: Bronze rank Brewer.”


Key Management and Basic Key Usage for Encryption 101 (<– add to your schedule)

raise your awareness of cybersecurity encryption with a simple analogy: house keys. This presentation breaks down key management and encryption basics, from creation to destruction, using relatable examples.

Come see Alain Petit at RVAsec 13!


Fortinet – RVAsec 14 Gold Sponsor

RVAsec is pleased to present Fortinet as an RVAsec ’25 Gold sponsor!

Fortinet delivers cybersecurity everywhere you need it. We secure the entire digital attack surface from devices, data, and apps and from data center to home office.

Fortinet
X (Twitter): @fortinet

RVAsec 14 tickets are available now!


RVAsec 14 Speaker Feature: Kyle King

Kyle King has designed, implemented, managed, and secured information systems and networks for various industries throughout his 28+ year career, including construction, financial, and healthcare. A native of Hickory, NC, he has been employed by Check Point Software Technologies for the last 8 years where he manages a team of engineers to help assess and architect security solutions to protect organizations from the ever expanding threat landscape.


AI: Who’s watching whom? (<– add to your schedule)

Artificial Intelligence (AI) has intersected with cybercrime and cybersecurity that forces organizations to leverage the technology in order to benefit the industry while at the same time understanding how to protect against AI based threats. How will your organization use AI safely and securely?

Come see Kyle King at RVAsec 13!


RVAsec 14 Speaker Feature: Kevin Massey

Kevin Massey is an IT Engineering Manager and Independent Security Researcher. I am focused primarily on vulnerabilities, binary exploitation, and network protocols.


Linux Kernel Exploitation for Beginners (<– add to your schedule)

My talk is focused on teaching people how to get into Linux kernel exploitation using Kernel based CTFs as an entry point.

Come see Kevin Massey at RVAsec 13!


RVAsec 14 Speaker Feature: David Young

David Young has worked in the I.T. industry for over 27 year with specializing in Cybersecurity for the last 16 years. David has worked in several different areas from healthcare, government, financial, utility and consulting. David really enjoys helping organizations find and resolve their security issues.

David is a former U.S. Army veteran, who served in Desert Shield and Storm.

X (Twitter): @deyo2794


It’s Not All Ninjas and Anonymous Masks (<– add to your schedule)

In this talk, I’ll give you an insider’s look at what the day-to-day reality of working in cybersecurity really entails. We’ll dive into the typical tasks you’ll face, from scoping and executing the test to long-term security strategy. I’ll also share how to bridge the gap between technical jargon and business language, making complex concepts understandable for non-technical stakeholders. Of course, we can’t forget about reporting—a crucial yet often challenging part of the job. I’ll discuss the complexities of crafting reports that not only communicate risks but also drive action. Along the way, we’ll touch on the unique challenges posed by timelines and the tools we rely on. What makes this talk unique is my perspective from both sides of the fence: working on an internal team and as a consultant. This experience allows me to highlight the key differences and offer insights into how each role shapes your approach to cybersecurity.

Come see David Young at RVAsec 13!


RVAsec 14 Speaker Feature: Andrew Case

Andrew Case is the Director of Research at Volexity and has significant experience in incident response handling, digital forensics, and malware analysis. Case is a core developer of Volatility, the most widely used open-source memory forensics framework, and a co-author of the highly popular and technical forensics analysis book “”The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory.”” Case has spoken at many industry conferences, including Black Hat, DEF CON, RSA, SecTor, BSides*, and OMFW. X (Twitter): @attrc


Using Volatility 3 to Combat Modern Malware (<– add to your schedule)

Volatility 3 is the latest version of the Volatility Memory Analysis framework, which has been the most widely used open-source framework for memory forensics since its creation in 2007. This new version of the framework is a complete rewrite starting from the first line of code. In this presentation, attendees will learn about Volatility 3’s new features while also seeing how many brand-new plugins can be used to detect a wide range of sophisticated, modern malware. This will include detection of the techniques currently deployed by ransomware and APT groups to evade EDR detection, inject code in a stealthy manner, and perform lateral movement. Examples of the covered techniques will include process hollowing, module unhooking, and privilege escalation. Attendees will leave understanding how to detect modern malware and attacker toolkits along with how to integrate Volatility 3 and its new features into detection workflows suitable for production use.

Come see Andrew Case at RVAsec 13!


RVAsec 14 Speaker Feature: Mike Bailey

Mike Bailey has almost 2 decades of varied experience working in private industry, academic institutions, US government and every aspect of the financial industry. Mike’s focus is all things security. He brings a robust subject matter expertise within the areas of adversarial threat simulation, offensive and defensive security, and advanced technical security assessments. He is an active thought-leader within the security community and has been a featured speaker at several security conferences on the subjects of threat research and network security.

Mike is passionate about learning and the pursuit of knowledge. He holds numerous industry certifications and when he is not working on computer security, Mike enjoys spending time outdoors with his family, hiking, fishing and camping. He is an avid gardener who can be found in the greenhouse when he’s not working.

X (Twitter): @mpbailey1911


Attacking & Defending ServiceNow: A Hands-on Lab for Red & Blue Teams (<– add to your schedule)

ServiceNow is a critical enterprise platform, often integrated with sensitive systems and privileged access. This talk explores how attackers can exploit misconfigurations and privilege escalation paths within ServiceNow to gain a foothold in an environment. We’ll walk through real-world attack techniques, from initial access to lateral movement, and demonstrate how defenders can detect and mitigate these threats.

In addition to offensive tradecraft, we’ll cover how to set up a dedicated lab to safely test these attack vectors, fine-tune detections, and improve defensive strategies. Whether you’re a red teamer looking to sharpen your tactics or a blue teamer aiming to strengthen your defenses, this talk will provide actionable insights and practical steps for securing ServiceNow.

Come see Mike Bailey at RVAsec 13!