Tag: speaker

RVAsec 13 Speaker Feature: Evan Booth

Evan Booth is a builder and architect at Counter Hack, a company devoted to building fun and engaging challenges that educate and evaluate information security professionals. Armed with a profound fascination with how things are built, Evan has spent the past 20 years working on the creative, strategic, and engineering components of software and hardware projects for a wide variety of clients. Evan enjoys spending time with his family, taking stuff apart, and occasionally putting stuff back together again. X (Twitter): @evanbooth

Scaling Your Creative Output with AI: Lessons from SANS Holiday Hack Challenge 2023 (<– add to your schedule)

The rise in prominence of AI-powered content generation tools over the past year was tough to miss, and, heck, you have probably already created some cool stuff with them. Putting these tools to work in a meaningful, scalable way, however, can prove challenging.

In this talk, I will equip you with the technical knowledge required to build AI-enhanced tools, we’ll discuss strategies for identifying opportunities for said tools, and we’ll look at real-world examples from SANS Holiday Hack Challenge, the best darn free, seasonal hacking challenge in the world.

Come see Evan Booth at RVAsec 13!


RVAsec 13 Speaker Feature: Caleb Gross / Josh Shomo

Caleb Gross is the Director of Capability Development at Bishop Fox, where he leads a team of offensive security professionals specializing in attack surface research and vulnerability intelligence. Prior to coming to Bishop Fox, he served as an exploitation operator in the US Department of Defense’s most elite computer network exploitation (CNE) unit. As a top-rated military officer, Caleb led an offensive operations team in the US Air Force’s premier selectively manned cyber attack squadron. He studied at the University of Virginia and holds two degrees in computer science.

Josh Shomo leads the vulnerability research team within Bishop Fox’s Capability Development group. He investigates security issues in widely used applications and appliances, and produces vulnerability intelligence to prioritize offensive security research at Bishop Fox. Josh earned a master’s degree in computer science from Johns Hopkins University. Before joining Bishop Fox, Josh attended the Computer Network Operations Development Program (CNODP), the US Department of Defense’s foremost vehicle for developing technical leaders in information security. X (Twitter): @noperator

Patch Perfect: Harmonizing with LLMs to Find Security Vulns (<– add to your schedule)

Are LLMs a revolutionary leap forward for security research—or just spicy auto-complete?

The truth lies somewhere in between. This talk cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products. We’ll walk through our process of harnessing large language models (LLMs) for patch-diffing in the context of N-day vulnerability research. Given a vague security advisory and some complicated code diffs, can an LLM get you closer to finding the right spot in the code to dig deeper? Which models work best for this task, and why? Let’s ditch the theory and get our hands dirty with iterative experimentation. Whether you’re a seasoned pentester, applied researcher, or budding practitioner, you’ll take away tactical lessons for incorporating AI into your security toolkit.

Come see Caleb Gross at RVAsec 13!


RVAsec 13 Speaker Feature: Jimi Sebree / Evan Grant

Evan Grant is based out of Halifax, Nova Scotia and works as a Security Researcher at Tenable. He got his start in infosec working with the Canadian Forces Reserves, and has been hooked ever since. Outside of work, he occasionally tries to climb rocks, at which he is definitely worse than Jimi.

Jimi Sebree is security researcher on Tenable’s Research team. With a strong background in software engineering and security, he bounces between research disciplines in an effort to appear knowledgeable about a variety of topics. Occasionally he succeeds in tricking someone into listening to his ramblings. X (Twitter): @dinobytes / @stargravy

Consumer Routers Still Suck (<– add to your schedule)

You know that little box in the corner of your house doing all the heavy lifting required to connect you (and, now that everyone is working from home, your company) with the rest of the world? Yeah, that one. It’s no secret that these things are oftentimes security nightmares for consumers, but have ISPs or the various networking vendors improved things over the years, or are they still just as terrible as we all think they are?

Over the last few years, we’ve done a deep dive into many of these devices to see what makes them tick and evaluate the risks posed to consumers. In this talk, we’ll provide a rapid fire assessment of a handful of these devices, showcase the commonalities between flaws discovered, shed some light on behind-the-scenes supply chain issues plaguing this industry, and discuss where we see things going from here.

Come see Jimi Sebree / Evan Grant at RVAsec 13!


RVAsec 13 Speaker Feature: Kevin Johnson

Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute. X (Twitter): @secureideas

Orion’s Quest: Navigating the Cyber Wilderness – Tales of Modern Penetration Testing (<– add to your schedule)

Focusing on real stories from the trenches, Orion’s Quest walks through a series of modern application and API attacks Kevin and his team have pulled off. The talk describes how we found and exploited the flaws and provides information so you can test yourself.

Come see Kevin Johnson at RVAsec 13!


RVAsec 13 Speaker Feature: David J. Bianco

David is a Staff Security Strategist on Splunk’s SURGe research team. He is also a SANS Certified Instructor, where he teaches network forensics. David has more than 20 years of experience in the information security field, primarily in incident detection and response, threat hunting, and Cyber Threat Intelligence (CTI). He is the creator of both the Pyramid of Pain and the Threat Hunting Maturity Model, both widely cited defensive security models. Really, he just wants to make security better for everyone, and he has a special interest in helping people get started in their cybersecurity careers. You can follow David on Twitter as @DavidJBianco or on Mastodon as @DavidJBianco@infosec.exchange. X (Twitter): @DavidJBianco

My Way is Not Very Sportsman-Like: Shaping Adversary Behavior to Strengthen Defenses (<– add to your schedule)

We’re taking a fresh look at how to beat cyber attackers at their own games! It’s all about using our defender advantages wisely, controlling, constraining, and shaping the adversary’s moves before the attack even begins. We’re ditching the old “”Defender’s Dilemma”” mindset and showing how smart defense strategies can make a huge difference. Let’s shift our thinking, use our advantages better, and boost our defense without breaking the bank.

Come see David J. Bianco at RVAsec 13!


RVAsec 13 Speaker Feature: Tucker Mahan

Tucker Mahan currently leads emerging technology initiatives at MAXX Potential, expanding capabilities and coaching others to build careers in technology.

He is a lifelong learner with a passion for all things Technology, and loves to share his ever-evolving knowledge on the subject. When he’s not helping others learn the fundamentals, he’s actively involved in many community and personal passion projects.

Trained in qualitative and quantitative data analysis to recognize trends and patterns
MicroMasters from The Georgia Institute of Technology in Analytics: Essential Tools and Methods
MAXX Potential Distinguished Alumni
VCU, BSc Sociology, minor in Math & Religious Studies

Defending Against the Deep: Is your workforce ready for Generative AI Adversaries? (<– add to your schedule)

Gain insight into the evolving landscape of cybersecurity in the age of AI Generated Content. From defending against multi-vector cyber attacks to empowering your workforce through AI-powered cybersecurity awareness, Defending Against the Deep delves into the intricacies of Generative AI. Together, we will look at case studies, a technical demonstration of current capabilities, keys for leveling up your workforce, and an opportunity to test your ability to recognize AI Generated Content. In this talk, explore how the same technology used for malicious intent can be harnessed for good, offering innovative solutions to safeguard enterprise environments.

Come see Tucker Mahan at RVAsec 13!


RVAsec 13 Speaker Feature: Aqeel Yaseen

Aqeel Yaseen transitioned into Offensive Security from over a decade of teaching yoga professionally, and is currently working with Blue Bastion Security. That might seem like a curious combination, but Pentesting and teaching yoga both help people cultivate awareness of blind spots, and find ways to learn and grow from that awareness. Aqeel has been teaching himself that art and skill of hacking by creating home labs, owning machines on HTB and Offsec’s Proving Grounds, and participating in CTFs. He has already earned the Security+, OSCP, and OSWA certifications, and is currently working towards the CRTO. He also has a website with two years of recorded yoga and meditation classes that are available for free. He is eager to learn and to share!

Mindfulness, Meditation, and Cybersecurity (<– add to your schedule)

We are meant to enjoy our lives; both personal, and professional.
As human beings, and as professionals, we all have to learn how to cultivate even-mindedness, balance, and fortitude to meet life/work challenges. Cybersecurity is fascinating because it requires us to constantly learn, and find ways to optimize our process. Burnout is a huge problem many fields, but especially in Cybersecurity. Cultivating a mindfulness or meditation practice is one of the most efficient ways we can support our process, and manage the stress and anxiety that comes with our professional and personal lives.

The focus of this talk is not specifically on work, because it addresses thoughtful ways to approach every aspect of our lives from our mental and physical health, to our relationships both personally and professionally. Whether new to the industry or a seasoned veteran, this talk with give you some insights, guidance, and the opportunity to practice.

Come see Aqeel Yaseen at RVAsec 13!


RVAsec 13 Speaker Feature: Sam Panicker

Samuel S. Panicker specializes in cyber security and data protection. He is currently the CISO for NTS with over twenty-six years of experience in the field. Sam has authored several security awareness programs for SANS and Black Hat including “A healthy level of paranoia”.

Quickstart to building your own Private AI Chat (<– add to your schedule)

Join our quick start guide to building your very own Private AI! In this presentation, we’ll explore the key differences between Public and Private AI and the components needed for success. You’ll get hands-on experience setting up your development environment, preparing data for training, and using popular libraries to train a simple AI model. We’ll also discuss best practices in AI development and provide guidance on evaluating and fine-tuning performance. Don’t miss this opportunity to take control of your very own AI and build a system tailored to your unique needs and goals. Join us for an engaging and informative session that will empower you to start building your Private AI today!

Come see Sam Panicker at RVAsec 13!


RVAsec 13 Speaker Feature: Ben Haynes

Ben Haynes is a data scientist at Flashpoint, leveraging analytics and his cybersecurity expertise to solve practical problems in the industry. Previously, he worked at Risk Based Security, where he dedicated his time to enhancing and implementing the organization’s cybersecurity intelligence products. He is responsible for multiple innovative risk models for vulnerability and breach intelligence, as well as pioneering ways to make that intelligence actionable for clients.

Ben earned his Bachelor of Science degree in Astronomy & Planetary Sciences from Stony Brook University, and subsequently a Master of Mathematical Sciences, specializing in Statistics, from Virginia Commonwealth University. He is an amateur archivist, data hoarder, and prolific collector of hobbies.
X (Twitter): @atbenhaynes

Prioritization Myths Busted with Better Vulnerability Data (<– add to your schedule)

A good prioritization plan should let you know where to start when tackling risk. And yet, people don’t know where to start when developing a good prioritization plan! Even worse, we make a number of bad assumptions when trying to navigate this labyrinth.

Which method is the best? Are many methods better than one? How many is too many? What does “best” even mean?

Ask 10 different practitioners these questions and you might get 10 different answers. There’s no better example of this situation than with the plethora of vulnerability prioritization methods available today. Luckily, we’ve been able to collect an unprecedented amount of data on vulnerabilities, and it’s taught us a lot about what makes sense, and what doesn’t.

Join us as we use this vulnerability data to dispel myths, avoid pitfalls, and conjure some solid recommendations that will put you on a better path.

Come see Ben Haynes at RVAsec 13!


RVAsec 13 Speaker Feature: Darryl MacLeod

Darryl MacLeod works for the Lares Advisory Services team and has over 20 years of experience in the IT security sector, having been responsible for developing, managing, and assessing information security programs for all levels of enterprise and government-level organizations. He has spoken at multiple conferences such as Security BSides St.John’s, GoSec, and the Texas Cyber Summit. He also sits on the Board of Directors for AtlSecCon and is the former lead organizer for Security BSides Cape Breton.

Strategic Alliances: How GRC Teams Can Empower Offensive Security Efforts (<– add to your schedule)

Collaboration between Governance, Risk, and Compliance (GRC) teams and offensive security teams is vital for a strong security stance. This presentation highlights the role of GRC teams in augmenting offensive security efforts. Traditionally, GRC teams are seen as policy makers, compliance assessors, and risk managers. Their role, however, significantly contributes to offensive security strategies, going beyond these conventional duties. The presentation emphasizes how GRC teams can enhance offensive security through risk-informed strategies, ensuring that offensive measures align with policies and compliance, optimizing resources, and bridging communication between technical and executive teams. The session aims to provide cybersecurity professionals and organizational leaders with a thorough understanding of the importance of GRC teams in offensive security and practical approaches for integrating these functions within their organizations.

Come see Darryl MacLeod at RVAsec 13!