Tag: speakers

RVAsec 13 Speaker Announcements

We are pleased to announce the first batch of speakers for RVAsec 13!  Secure your ticket as prices increase on May 1.

While there are still more speakers to announce and the exact schedule is still coming, head over to https://rvasec13.sched.com/directory/speakers to read more about each speaker and talk abstracts!

  • Kymberlee Price – Keynote
  • Caleb Sima – Keynote
  • Darryl MacLeod – Strategic Alliances: How GRC Teams Can Empower Offensive Security Efforts
  • Ariyan Suroosh – Its Coming From Inside the House: A Guide to Physical Facility Penetration Testing
  • Chris Tillett – The Human Experience of Security Operations
  • Jennifer Shannon – API-ocalypse
  • Kevin Johnson – Orion’s Quest: Navigating the Cyber Wilderness – Tales of Modern Penetration Testing
  • Aqeel Yaseen – Mindfulness, Meditation, and Cybersecurity
  • Corey Brennan – Embracing my inner cyber wizard to defeat Impostor Syndrome
  • Corey Overstreet – That Shouldn’t Have Worked – Payload Development
  • Ross Merritt – Improv Comedy for Social Engineering
  • David J. Bianco – My Way is Not Very Sportsman-Like: Shaping Adversary Behavior to Strengthen Defenses
  • Nick Copi – Some Assembly Required: Weaponizing Chrome CVE-2023-2033 for RCE in Electron
  • Oren Koren – Verified for Business Continuity: How to Remediate Risk Safely Across the Enterprise
  • Luke McOmie (Pyr0) – Apples to Apples
  • Sam Panicker – Quickstart to building your own Private AI Chat
  • Jimi Sebree / Evan Grant – Consumer Routers Still Suck
  • Micah Parks – Reverse Engineering for Dummies: The “what if?” user
  • Tucker Mahan – Defending Against the Deep: Is your workforce ready for Generative AI Adversaries?
  • Ben Haynes – Prioritization Myths Busted with Better Vulnerability Data
  • Ali Ahmad – Hacking Exchange from the Outside In

Stay tuned for additional speaker announcements coming soon! We will have a new layout this year with multiple tracks.

And if you haven’t purchased your ticket yet, the time to do so is now as prices go up on May 1st!

Get your tickets here: https://www.eventbrite.com/e/rvasec-13-security-conference-tickets-776407274057

RVAsec 12 Speaker Announcements

We are pleased to announce the first batch of speakers for RVAsec 12!  Secure your ticket as prices increase on April 30.

While there are still more speakers to announce and the exact schedule is still coming, head over to https://rvasec2023.sched.com/directory/speakers to read more about each speaker and talk abstracts!

  • Andy Ellis – Keynote
  • Paul Asadoorian – Keynote
  • Adrian Amos – I <3 my password
  • Allen Jenkins – “Use your words” – to build an Information Security Program and fight Cyber Crime!
  • Amelia Szczuchniak – Why You Can’t Call the Police
  • Andrea Matwyshyn – Cybernation: The FUD, Facts, and Future of Software Liability and Security
  • Andrew Hendela – Software Bills of Behaviors: Why SBOMs aren’t enough
  • Andrew Skatoff – Maturing your Threat Hunting Operations
  • Brendan O’Leary – Shakespeare, Bacon, and the NSA
  • Colin Estep – Insiders packing their bags with your data
  • Dan Han – Beyond the pandemic: How the pandemic shaped organizations and their security architecture
  • David girvin – Hacking your Job? Trying to cheat at life with ChatGPT
  • Denis Mandich – Quantum Cybersecurity
  • Drew Schmitt – Ransomware Rebranding … So Hot Right Now!
  • Dwayne McDaniel – Who Goes There? Actively Detecting Intruders With Cyber Deception Tools
  • Fletcher Davis – Context Matters: Tailoring Tradecraft to the Operational Environment
  • Ian MacRae – The state of NIST/CMMC compliance today
  • Jason Wonn – Corporate Dungeon Master: How to Lead Cyber Games at Work
  • Josh Cigna – Everything you never knew you wanted to know about Passkeys
  • Kate Collins – This is the Way: A New Leadership Creed for Info-Sec professionals
  • Kenneth Broderick – Hunting for Evidence of Data Exfiltration: Dark Web, Digital Forensics, and Log Analysis
  • Mark Arnold – TOP 5 CISO FINDINGS OF 2022
  • Qasim Ijaz – Feature or a Vulnerability? Tale of an Active Directory Pentest
  • Rick Lull – Network 201: A Tour Through Network Security
  • Scott Small – Adversary TTP Evolution & the Value of TTP Intelligence
  • Luke McOmie – “A programmatic approach to enterprise security” OR “How to not waste your security budget on sh!7 that doesn’t matter!”
  • Kevin Massey – Heap Exploitation from First Principles

Stay tuned for some additional speaker announcements coming soon!

We have a new layout this year with multiple tracks. Given some space requirements the exact schedule and room assignment will be more in flux than prior years at RVAsec.  More details to come very soon!

And if you haven’t got your ticket yet, the time to do so is now!  Prices go up in 11 days!

You can get tickets here: https://www.eventbrite.com/e/rvasec-2023-security-conference-tickets-411449104347

Speaker feature: Charles Tango

Charles is the Chief Information Security Officer at Altria, the parent company of producers of superior branded tobacco and wine products such as Philip Morris USA and Ste. Michelle Wine Estates.
Charles also represents Altria on the board of the Richmond Technology Council, which supports technology innovation in the greater Richmond area, as well as the board of the Virginia Cybersecurity Partnership—a joint information sharing organization between government agencies and the private sector. Additionally he is a member of IBM Security’s Advisory Board, and a board member of a block chain venture capital fund / accelerator – Bloccelerate.
Prior to his role at Altria, Charles held senior level Information Security positions with financial institutions in the NY metro area, including Chief Information Security & Risk Officer for Sterling National Bank and Senior Vice President, IT & Operational Risk at Citigroup. During his time in NY he was also a charter founding member of the NY ISC2 Chapter.

Being Secure Doesn’t Mean You Are Managing Risk

Charles will explain the beginner concepts of identifying, quantifying, qualifying, and decisioning risks with a focus on how this differs from the practice of cybersecurity.

Come see Charles at RVAsec! Register now.

Speaker feature: Barry Kouns

Barry Kouns is CEO at Risk Based Security, a vulnerability intelligence, organizational ratings,
and on-demand security solutions firm. Barry’s experience includes information security consulting, risk assessment and quality management. Barry has full knowledge of GLBA, FFIEC, HIPAA, Sarbanes-Oxley, and ISO 27001 and is well versed with PCI DSS, ISO 9001, COBIT, FISMA, NIST 800-53, BS 25999, ISO 31000 and ISO 20000. He has earned a B.S. in Statistics from Virginia Tech and a M.S. in Industrial Engineering Management from North Dakota State University. He has earned the CISSP designation, is a trained ISO/IEC 27001:2013 Auditor &amp; ISMS Implementer, and is ITIL Foundation Certified. Barry was a Captain in the United States Air Force and served as a B-52H Bombardier.

Risk Assessment – The Heart of Risk-based Security

Everywhere you look today you see “risk-based security” being touted as the next big thing. Knowing your assets, understanding the threats and vulnerabilities that may impact those assets, and calculating a risk score in order to prioritize mitigation actions, should be every organization’s goal. Risk-based security is not accomplished by performing a risk assessment exercise once a year. It requires a continuous assessment of your organization’s risk posture. Too many businesses think that completing a risk assessment is a difficult and complicated process that requires expensive software and can only be done by third party consultants. As a result, risk assessments are not conducted or conducted once and stored away to show the auditors. Risk assessments are essential in order to assure that the expenditures involved in mitigating vulnerabilities and the implementation of security controls are commensurate with the risks facing the organization. Attend this interactive session to explore the definitions, methodologies, structure and the expected results of a proper risk assessment that can be produced by your organization

Come see Barry at RVAsec! Register now.

Speaker Feature: Deana Shick

Deana Shick has been a Member of the Technical Staff at the Software Engineering Institute’s CERT Coordination Center (CERT/CC) for 5 years. Deana works on the Threat Ecosystem Analysis team where she researches and analyzes current and emerging threats and vulnerabilities. Prior to working at CERT/CC, Deana was an International Trade Specialist focusing on EAR and ITAR regulatory processes. In 2014, she completed her M.S. in Information Security Policy and Management from Carnegie Mellon University. Along with her position at CERT/CC, Deana teaches at the Heinz College at Carnegie Mellon University, and pioneered the Information Security program at Duquesne University in Pittsburgh, PA.

Intro to Infosec and Overview of the 101 Track

Information Security is constantly in the news and making headlines. Which companies are breached? What are the impacts? How will the government respond to adversarial nations? The Internet still behaves much like the wild west – policy decisions are consistently being made and changed based on the structure and sustainability of the web. Organizations large and small are feeling the impacts of having a poor cyber security posture. This talk is perfect for those who are beginners, career changers, or anyone who needs a refresh on the building blocks of  information security. It will discuss how data can be compromised, what those impacts are, and some suggestions of first steps. We will then dive into what vulnerabilities are and what to do about it. Finally, we will go over the things the rest of the 101 track will cover.

Come see Deana at RVAsec! Register now.

Speaker Feature: Eddie Glenn

Eddie Glenn is the senior threat intelligence manager at Venafi and is responsible for researching the risks and threats of code signing and endpoint infrastructure. Eddie has more than 30 years of experience in enterprise software at companies such as IBM, Rational, and Wind River where he held a variety of senior level positions in product management and product marketing. Eddie is co-author of the Definitive Guide to Next Generation Fraud and has written for various industry publications. He has a Bachelor of Science degree in computer and electrical engineering from the University of Virginia, and an MBA from the University of Oregon.

Code Signing: A Security Control That Isn’t Secured

Enterprises know code-signing is an important security control, for both self-defense and external reputation protection, but most overlook securing the infrastructure that supports the signing process, leaving them vulnerable to security and brand risks.
This session will discuss the four main poor practices often applied to code-signing infrastructure. This will be followed by a look at how these poor practices result in operational inefficiencies and security risks. The session will highlight the abuse and exploitation enabled by these poor practices and their ramifications, including the use of code-signing certificates to sign malicious code.
The session will conclude with a look at creating a secure enterprise code-signing infrastructure, including signing operations and models, inter-organizational communications, process and policies, and certificates issuance and management. Overall, the session will consider what is needed to create an infrastructure foundation for code-signing that will scale and adapt as networks continue to evolve and grow.

Come and see Eddie at RVAsec! Register now.

Speaker feature: David Sullivan



David Sullivan is a Penetration Tester and part of the Offensive Security Services team at CampusGuard. He has a background in working for various agencies with the State of Virginia in many InfoSec roles. He is a high-school dropout who transitioned into the technology field after a career in construction and believes that people from all backgrounds bring unique perspectives into this expansive field.

These Aren’t the Scans You’re Looking For

A quick look at the marketing FUD of ‘Automated Pentests’ and a high level look at the various technical pieces that delineate the difference between scanning and real-world attacks.

Come see David at RVAsec! Register now.

Speaker Feature: Rick Lull

Rick has had a hand on a wide variety of tech over the years and also seen it used for both good and ill. He spent a significant chunk of time at a health system, which gave him an appreciation for the reasons behind the technology. He was also very fortunate to be mentored by some great people during his IT career so he has a passion for passing on the knowledge to other. Currently working as the Lead Security Consultant at SyCom Technologies, he is focused on helping companies defend their assets – their people, systems and data.

Bits, Frames and Packets – Demystifying the Network

Think the network is a black box that magically gets your cat videos to you? This talk explains how it works at the fundamental levels.

Come see Rick at RVAsec! Register now.

Speaker Feature: Lou Botticelli and Kara Owens

Lou Botticelli serves as Executive Underwriter, Professional Liability for Markel Assurance Risk Management.  Prior to his employment at Markel in 2015 he worked for insurance broker Marsh & McLennan on the Private Equity & Mergers and Acquisitions team performing both advisory and placement responsibilities for various clients.  Before working at Marsh he worked for Arch Insurance’s Executive Assurance Division and Hartford’s Financial Products Division holding various roles in their respective private equity groups.  He began his career in the National Accounts Management Liability Division at AIG and now has over 15 years of insurance experience.  He graduated with a BBA degree in Business Management from Pace University in 2000.

Kara Owens is Managing Director, Global Cyber Underwriting Executive at Markel Corporation.  In this role, Kara is responsible for establishing and leading Markel’s cyber market strategy and working with cyber underwriters across the Company to achieve growth and profit initiatives. She is in charge of best practices for cyber underwriting and reinsurance strategies worldwide in all Markel divisions. Prior to this role, Kara was the Global Head of Cyber at TransRe and prior to that was a reinsurance broker at Guy Carpenter.  Kara graduated Magna Cum Laude with Bachelors of Business Administration with a dual focus in Risk Management and Insurance as well as Marketing from Temple University. She holds her RPLU, CPCU, ARe and ARM designations.  Kara is a frequent speaker at universities and cyber insurance conferences.  She is on the Board of the APIW (Association for Professional Insurance Women).

What is Cyber Insurance? Are you covered?

Attendees of this session will gain a clear perspective of what benefits Cyber Insurance can provide to their existing Cyber Security Program. Today, Cyber Insurance is no longer a “nice to have” but is a “must have” for every company doing business in a digital world. But how much coverage do you need and what’s really involved in getting cyber insurance? People who attend this session will gain a clear perspective on what Cyber Insurance can and can’t provide and where traditional insurance policies fall short.

Come see us at RVAsec! Register now.

Speaker Feature: Brandon Martin



Brandon Martin leads the Security Measurement Team at NorthState Technology Solutions.  His team focuses on risk assessments and penetration tests that enable customers to benchmark and improve their security maturity and capability.  Through his experiences he earned certifications like the Offensive Security Certified Professional (OSCP), Certified Information System Security Professional (CISSP), Certified in Risk and Information Systems Controls (CRISC) and 6-Sigma Blackbelt.  Brandon performed roles in software engineering, project management, business analysis, penetration testing, and compliance consulting.  Before his current role he worked in heavy industry and banking. In his spare time Brandon enjoys writing code, spending time with family, and mentoring young people with his church’s youth program.

Was I Supposed to Mix the Security in Before I baked it?

Security practitioners advocate ideals through clichés and analogies to help others understand complex problems.  One prominent analogy espouses baking security into a solution instead of bolting security on at the end.  This seems like an obvious analogy – a baker certainly can’t add flour to a cake after it’s in the oven.  In business reality, time-to-market beats security every day of the week.  How can an architect bake security into solutions when the extra time could result in a failed venture?  This talk explores the realities of blending security into the design and implementation of solutions with a goal of realizing better is not the enemy of perfect.  Some implementations bolt on security beautifully; other design patterns prove impossible to correct.  Look forward to a meme-filled tour of architectures, design patterns, and lessons learned that will help security practitioners and business people identify if they’re cooking soup or baking cakes (…if that sounds like a mixed metaphor, don’t be late for supper).

Come and see Robert at RVAsec! Register now.