BRAD ANTONIEWICZ | INTEL SECURITY, FOUNDSTONE RESEARCH AND DEVELOPMENT
Brad Antoniewicz works in Intel Security Foundstone's security research division to uncover flaws in popular technologies. He is a contributing author to both the Hacking Exposed and Hacking Exposed: Wireless series of books and has authored and contributed to various internal/external Foundstone tools, training courses, whitepapers, and methodologies. Brad is also an adjunct professor at NYU Poly, teaching vulnerability analysis and exploitation.
JULIAN COHEN | FLATIRON HEALTH
Julian has variously won, advised, judged, ran, managed, or created every CSAW event that exists today.
KEVIN CHUNG | BISHOP FOX
Kevin Chung graduated from NYU School of Engineering and spends time at its computer security research lab. He uses his time to play in CTFs, do computer related things, and has assorted other hobbies that seem to be cool.
MICHAEL COPPOLA | AZIMUTH SECURITY
Michael Coppola is a vulnerability researcher and recent graduate from Northeastern University. His main interests include Linux kernel exploitation and rootkit development, embedded systems, and burning things with a soldering iron. He has been known to hack unsuspecting Androids, silly Internet devices, and Furbies.
JEFF CROWELL | GOOGLE
Jeff is a software engineer at Google in Cambridge, MA, USA. He spends his free time playing CTF with Shellphish, running Boston Key Party, and of course, contributing to radare2.
SOPHIA D’ANTOINE | TRAIL OF BITS
Sophia D’Antoine is a security researcher at Trail of Bits and a recent graduate student from Rensselaer Polytechnic Institute. She has presented at RECon Montreal, Blackhat and Sec-t on malicious applications of hardware side channels in virtualized environments. Presently, she is working with LLVM to automatically exploit, obfuscate, and transform execution paths and spoke on this topic at Hack.lu 2015.
BRANDON EDWARDS | SILVER SKY
Brandon is a security researcher who dabbles in program analysis, vulnerability discovery, and exploitation.
ZACH LANIER | OPTIV
Zach Lanier is a Senior Research Scientist with Optiv, specializing in various bits of network, application, mobile, and embedded security. Prior to joining Optiv, Zach most recently served as a Senior Security Researcher with Duo Security. He has spoken at a variety of security conferences, such as Black Hat, DEFCON, CanSecWest, INFILTRATE, SummerCon, and SecTor, and is a co-author of the "Android Hackers' Handbook" (Wiley, 2014).
RYAN STORTZ | TRAIL OF BITS
Ryan is a senior security researcher at Trail of Bits and has been told he’s pretty good at computers.
ALEXANDER TAYLOR | RAYTHEON
In 2009, a colorblind Graphic Designer majoring in Physics decided to check out his university's "hacking club". A number of happy accidents and a Computer Engineering degree later, Alex is now a 4-time DEFCON CTF finalist working for a government contractor. He spends most of his time auditing source code, reverse engineering systems, developing custom fuzzers, and fighting with glitchy test equipment. When he's not working, though, he's playing as many games - CTFs, World of WarCraft, Super Smash Brothers, Dota 2, Hearthstone, you name it - as possible. Eventually, he'll probably settle down somewhere as a basil farmer and play with his music production tools. But, for now, Alex is on a mission to understand how the world works (and to show everyone just how broken it all is).
RUSTY WAGNER | VECTOR 35
Rusty has spent his professional career developing advanced vulnerability research and reverse engineering tools. His time both playing and running CTFs has honed his skills in everything from emulation and compiler writing to massively multiplayer online game development.
JORDAN WIENS | VECTOR 35
Jordan started his professional career at the University of Florida where he got to do a little bit of everything security related. His love of CTFs, however, drove him to a job at a government contractor where he honed his reverse engineering and vulnerability research skills. Now, his goal in life is to become a professional CTF e-sports caster which is why he founded Vector 35. He claims he can stop buying NERF any time he wants, but no one believes him.
NICK ANDERSON | SANDIA NATIONAL LABORATORIES
Nick Anderson received his bachelors degree from the University of Wyoming, and after a short and confused journey in graduate level math he decided to attend NYU for a masters in Cybersecurity. During his time at NYU, Nick curated the Hack Night program and co-lead the Brooklynt Overflow CTF team, until finishing his masters degree when he accepted a position with Sandia National Labs. Nick is now working for Sandia's Cyber Security Research and Development team in Albuquerque New Mexico.
BRIAN HATTON | IDAHO NATIONAL LABORATORY
Brian Hatton works at Idaho National Laboratory, an energy systems laboratory organized by the United States Department of Energy with the goal of identifying future energy options.
TREVOR KROEGER | SANDIA NATIONAL LABORATORIES
Trevor Kroeger is a SIP Technical Intern at Sandia National Laboratories and a graduate student at NYU Tandon School of Engineering. In the past he has worked as a hardware engineer at SEAKR Engineering. He was also an adjunct professor and research assistant at the University of Denver.
YOUSEF ISKANDER | CISCO
CHARANJIT JUTLA | IBM RESEARCH
ANTONIOS STAMPOULIS | ORIGINATE INC
SEETHARAM NARASIMHAN | INTEL
BRIAN ANDRZEJEWSKI | DIGITAL FORENSICS CONSORTIUM
Brian Andrzejewski is a cyber-competitions expert whom draws from real-world experiences in his 17 year IT career in private sector and as a GS-2210 information security public servant with his passion to develop the nation’s future cyber security workforce. His IT career experiences are coupled with his unique perspectives as a prior competitive, team-based computer gamer and competition organizer.
As the Director of Operations in his off-duty time for the Digital Forensics Consortium (DFC), Brian develops and manages DFC’s cyber-competitions to promote the STEM field, the NICE Framework, and the under-manned field of digital forensics. He is a very strong advocate of hands-on, team-based, competitive cyber competitions that require players to apply their learned IT “hard” skills to solve exercises while requiring them to collaborate and cooperate together as a team to further develop their “soft” skills for the workforce.
Prior to joining DFC, Brian has worked off-duty with several U.S. non-profits and academia to help develop, foster, and execute their national and regional cyber competitions. Brian is currently pursuing his Master’s Degree in Cybersecurity Leadership with National Defense University while holding a Bachelor’s degree from Towson University and an Associate’s degree from Harford Community College both in Computer Information Systems. He is a certified as a DoD Digital Media Collector, a Microsoft Systems Administrator, and an Apple Support Professional.
JASON BEVIS | FIREEYE
Located in the tri-state area, Jason is the Global Managing Director for Deployment and Integration at Mandiant Consulting, a division of FireEye. He has an outstanding track record in consulting services, strategic security solutions, incident response, forensics and client management. He has worked for large security firms including McAfee and KPMG. His current role is to develop solutions enabling customers to find evil and protect their organization against today’s advanced attacks. Jason is also a member of InfoTech Research Group Hall of Fame and has several whitepapers published on major security topics as well as articles in magazines such as Hackin.
JIM CHRISTY | DIGITAL FORENSICS CONSORTIUM
Jim Christy left the government in July 2013 after 42 years of public service. He's a retired special agent who has specialized in cyber crime investigations and digital forensics for over 27 years with the Air Force Office of Special Investigation and Department of Defense Cyber Crime Center (DC3). The Secretary of the Air Force appointed Jim director of the innovation incubator Futures Exploration (FX) for (DC3), where he was responsible for marketing, outreach and the development of strategic relationships with other private, academic and government organizations.
Jim consulted with screenwriter David Marconi on the critical infrastructure attacks (Fire Sale) that took place in the film "Live Free or Die Hard." He was also featured in a 2013 Smithsonian Channel documentary on the film.
Jim received the Distinguished Information Science Award in 2003. In 2006 he created an international competition called the DC3 Digital Forensics Challenge with 1,800 participants. He was profiled in Wired Magazine in 2007. In 2011, he was honored to present the "Jim Christy Award" to the top graduate of a new Air Force career field, Cyber Defense Operations.
MICHAEL GERAGHTY | HUDSON’S BAY COMPANY
Mike is the Chief Information Security Officer at Hudson’s Bay Company's where he is responsible for all aspects of information security governance, risk and compliance, as well as the incident response, forensics, e-discovery and security analytics functions. Mike has an extensive history in high technology investigations and forensics. As a Trooper with the New Jersey State Police he was responsible for the formation and development of the NJSP High Technology Crimes Unit. Mike has testified as an expert in computer crimes investigations and computer forensics before the United States Congress and in state, federal and international courts. He has developed and provided training in high technology investigations to law enforcement officers around the world. He is a past president of the Northeast Chapter of the High Technology Crime Investigation Association and a current member of the Dallas Crimes Against Children Conference Advisory Board.
MIKE HIGGINS | NBCUNIVERSAL
Mike Higgins is a veteran security executive with more than 20 years of experience working in the Government and in private industry. As the founder of the DOD Computer Emergency Response Team (DOD-CERT), Mike was one of the earliest advocates in the leadership role of the Federal Government through the identification of the five critical infrastructures.
Today Mike serves as the Chief Information Security Officer (CISO) for NBCUniversal leading the company’s information security programs. Previously Mike held the Chief Security Officer positions at The New York Times Company, leading the company’s defense from the Chinese attacks of their infrastructure, and LexisNexis, where Mike was recruited to build their security program following their publicized breaches. For more than a decade Mike was an executive security consultant to Fortune 500 companies including Time Warner, Citigroup, Sun Microsystems, Merrill Lynch, JPMorganChase, and British Petroleum.
Mike holds dual certifications as a Certified Information Security Manager (CISM) and a Certified Protection Professional (CPP) and is the recipient of the Defense Intelligence Agency’s Director’s Medal and Federal Computer Week’s Federal 100 Award. Mike is a visiting professor at the Northeastern University where he teaches the Capstone Course for their Master of Science in Information Assurance, an NSA/DHS Designated Center of Academic Excellence in Information Assurance Education; a visiting lecturer for over 10 years at the McIntire School of Commerce at the University of Virginia and a former adjunct professor in the Information Assurance Program at The George Washington University.
Mike received his Bachelor’s degree from Northeastern University and his Masters’ from the Viterbi School of Engineering at the University of Southern California.
EVAN SAEZ | LIFARS
Evan Saez is a Cyber Threat Intelligence Analyst at LIFARS LLC, with multiple years’ experience working with corporate-sized networks and high level data breaches. He currently provides data analysis, penetration tests, secure code reviews and threat monitoring and detection services to businesses ranging from large international firms to medium-sized startups. Evan is heavily involved in security and forensic research, with a focus on tracking and reverse engineering malware affecting financial industries in the United States and abroad. As a researcher and consultant, Evan has unique and resourceful insight into computer and network forensic methods, handling data breach and incident response, and the evolving cyber threats the world is facing.
SCOTT SARAFIAN | US SECRET SERVICE
Scott Sarafian is currently assigned as the supervisor in charge of the Electronic Crimes Task Force (ECTF). As the supervisor of the ECTF, his responsibilities include oversight of all NYC-based network intrusion and Internet investigations and liaison with government, industry and academic partners. The NYC ECTF is the largest task force in the U.S. Secret Service.
AARON BRANTLY | ARMY CYBER INSTITUTE
Dr. Aaron F. Brantly is Assistant Professor of International Relations and Cyber in the Department of Social Sciences, Cyber Policy Fellow at the Army Cyber Institute and Cyber Fellow at the Combating Terrorism Center.
He has experience working in international democracy and human rights development with a focus on ICT innovation and security as a Peace Corps Volunteer in Ukraine and subsequently with the International Republican Institute for Advancing Democracy Worldwide and a Senior Program Officer with the National Democratic Institute for International Affairs.
He holds a Ph.D. in Political Science from the University of Georgia's School of Public and International Affairs and a Master's of Public Policy from The American University. He has technical experience in multiple coding languages and systems.
His research focuses on national security policy issues in cyberspace. Brantly's recent publications include: "Financing Terror Bit by Bit" (CTC Sentinel), "Cyber Actions by State Actors: Motivation and Utility" (International Journal of Intelligence and Counter Intelligence) and "Aesop's Wolves: The Deceptive Appearance of Espionage and Attacks in Cyberspace" (Journal of Intelligence and National Security).
SEAN BROOKS | NIST
Sean is a Privacy Engineer in the national program office for NSTIC (National Strategy for Trusted Identities in Cyberspace) at NIST, an agency of the United States Department of Commerce.
Sean completed his MPA as a Federal Scholar for Service with the NYU Center for Interdisciplinary Studies in Security and Privacy. He attended the Robert F. Wagner Graduate School of Public Service, where he was a graduate research fellow with the Governance Lab, a MacArthur and Knight Foundation-funded center dedicated to studying the impact of technology on decentralized democratic institutions.
He was also the Web Operations Editor of the Wagner Review, NYU's student-run academic public policy journal.
Previously, Sean spent two years serving as a program associate in the San Francisco office of the Center for Democracy and Technology, a non-profit public interest organization focused on civil liberties and human rights issues online. Sean's work at CDT was cited in major media outlets like The Washington Post, Reuters, Ars Technica, and the BBC.
Sean also worked for the London-based public relations agency The Red Consultancy, serving clients in the Silicon Valley ranging from multinational information security and business intelligence companies to consumer technology start-ups. Sean received his undergraduate degree in politics from the University of California at Santa Cruz.
ZACHARY GOLDMAN | CENTER ON LAW AND SECURITY
Zachary K. Goldman is the Executive Director of the Center on Law and Security at NYU School of Law.
Zachary returned to NYU in 2012 after having served for several years in the U.S. government. He first served as a policy advisor in the U.S. Department of the Treasury’s Office of Terrorism and Financial Intelligence, where he was the subject matter expert on terrorist financing in the Arabian Peninsula, and worked on the development of Iran sanctions policy.
He then served at the U.S. Department of Defense as a Special Assistant to the Chairman of the Joint Chiefs of Staff.
In the private sector, Zachary worked as an Associate in the litigation department of Sullivan & Cromwell LLP in New York.
He has published articles on national security strategy, financial sanctions, counterterrorism, and U.S. foreign policy in outlets such as The New York Times, Foreign Affairs, Political Science Quarterly, Cold War History, The Atlantic, The Diplomat, The National Interest, and others.
Zachary is a Term Member of the Council on Foreign Relations, and an Adjunct Senior Fellow at the Center for a New American Security.
He received his J.D. from New York University School of Law, his Masters in International Relations from the London School of Economics, and his B.A. from Harvard University.
MORGAN MARQUIS-BOIRE | FIRST LOOK MEDIA
Morgan Marquis-Boire a contributing writer to The Intercept and director of security for First Look Media. He is also a senior researcher and technical advisor at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs.
Additionally, he serves as a Special Advisor to the Electronic Frontier Foundation and as a member of the Free Press Foundation’s security advisory board.
His research on surveillance, censorship, and the targeting of activists and journalists has been featured in numerous print and online publications.
ANGELA MCKAY | MICROSOFT
Angela McKay is Director of Cybersecurity Policy and Strategy in the Global Security Strategy and Diplomacy team at Microsoft. She focuses on driving strategic change, both within Microsoft and externally, to advance trust in the computing ecosystem.
Angela leads Microsoft’s cybersecurity policy work in the U.S., and engages internationally with industry, governments, and civil society to improve security and stability of cyberspace for users around the world. She combines technical expertise and public policy acumen to develop policies that support development, growth, and innovation, and advance security, privacy, and trust in the Information Age.
She serves as Microsoft’s POC for the National Security Telecommunications Advisory Committee (NSTAC), a Presidential advisory committee focused on maintaining secure and resilient communications and as Secretary of the IT Sector Coordinating Council, a public private partnership between the IT industry and the U.S. Government focusing on critical infrastructure protection and cybersecurity.
She also serves on the East West Institute Board of Councilors.
Prior to joining Microsoft, she worked at Booz Allen Hamilton and BellSouth Communications. Angela holds a Bachelor’s of Industrial and Systems Engineering from the Georgia Institute of Technology.