I am the newest Penetration tester for Breakpoint Labs. I was recently an intern from the Hiring our Heroes program due to my status as a military spouse
- Embarking on Your INFOSEC Journey in Military City USA
Allyn Stott is a senior staff engineer at Airbnb. He currently works on the information security technology leadership team where he spends most of his time working on threat detection and incident response. Over the past decade, he has built and run detection and response programs at companies including Delta Dental of California, MZ, and Palantir. Red team tears are his testimonials.
In the late evenings, after his toddler ceases all antics for the day, Allyn writes a semi-regular, exclusive security newsletter. This morning espresso shot can be served directly to your inbox by subscribing at meoward.co.
Allyn has previously presented at Black Hat, Kernelcon, The Diana Initiative, Texas Cyber Summit, and BSides Berlin, Singapore, Toronto, Seattle, Orlando, St Pete, San Antonio, Charleston, and Atlanta. He received his Masters in High Tech Crime Investigation from The George Washington University as part of the Department of Defense Information Assurance Scholarship Program.
- The Fault in Our Metrics: Rethinking How We Measure Detection & Response
During my 20-year career as an Intelligence Analyst in the United States Air Force, I exercised my analytical skills and gained a deep understanding of security threats. Since then, I've transitioned those skills to the private sector, holding various cybersecurity positions. Outside of work, I enjoy 3D printing and spending time with our beloved dog.
- Seeing Outside In: Mapping Your External Attack Surface
I'm a Sr. Security Architect for a financial service company. I completed my Master of Jurisprudence in Cybersecurity Law from Texas A&M University School of Law in August 2022. I finished my Master of Science coursework for Information Assurance in 2012 from the University of Dallas but did not finish my thesis. I completed my Master of Business Administration in Global Business in 2002 from the University of Dallas. Previous companies that I have worked as a full-time employee have been Microsoft, Check Point, Dell and Fiserv in various Cybersecurity roles spanning more than 25 years.
- Threat Modeling Intro for Security Architecture
Carl Mehner is an information security engineer who has spent the last decade working with the public key infrastructure, certificates, and secure protocols. He is passionate about securing digital data, helping others learn, and playing music.
- The Digital Trust Journey: From Key Generation to Signed Certificate
Chip Thornsburg is a Professor of Cyber Defense for Northeast Lakeview College in San Antonio. Chip taught and lectured on Technology and Criminal Justice subjects at River City College, Southern Careers, and North Texas State. He is also a previous speaker at NolaCon, Texas Cyber Summit, and B-Sides San Antonio.
Chip retains his status as a Master Peace Officer in Texas, Special Deputy U.S. Marshall, and Electronic Crimes Investigator for the City of Helotes. He has conducted cyber investigations for more than 13 years and is a member of the High Technology Crime Investigation Association and the US Secret Service: Electronic Crime Task Force.
- Competitions & Competencies: or “How to Hack your way into the Cyber Workforce!”
Principal Spreader of Smiles | Teriyaki Chicken Connoisseur | Professional Goober-in-Training | Head Janitor and Cook for the Honda Household | Sometimes does Security for Whistic | Bad at Making Jokes and Writing Bios
- VRM 201: Effectively Assessing Vendor AI Risk
Coop is a security strategist for CDW focusing on Data Security, Privacy, and Infrastructure. Leveraging over 25 years of Security and Infrastructure experience, Coop designs and implements secure solutions that safeguard systems, protect data, and reduce risk
- Unpacking Data Security Posture Management (DSPM)
David French is a Detection & Response Engineer and Threat Hunter with many years of experience both working as a defensive cybersecurity practitioner and on the vendor side of life doing threat research and building security solutions. He currently works at Google Cloud where he helps security practitioners defend their organization from attack using Chronicle Security Operations.
He likes to pay it forward by sharing knowledge and research with the community via blogging, presenting at conferences such as Black Hat and BSides, and contributing to MITRE ATT&CK. David is the creator of Dorothy, a tool to simulate attacker behavior in Okta environments.
- From soup to nuts: Building a Detection-as-Code pipeline
David McDonald is a researcher and software engineer with 3 years of digital forensics R&D experience. His passion for this field began with his involvement in the University of New Orleans CTF team, as well as through his time as a Systems Programming teaching assistant. After over two years of digital forensics research and development on Cellebrite's computer forensics team, he joined Volexity's Volcano team, where he now works to develop next-generation memory analysis solutions.
He believes deeply in sharing knowledge and helping others discover their abilities and interests through their own journeys in cybersecurity, and strives to pay forward the benefits of the mentorship that has opened so many doors for him.
- Hunting Fileless Malware with Treesitter
Dirce currently works as Cyber Risk Management SME in the Insurance and Financial Services sector. With over 17 years of experience spanning across Information and Cyber Security, Cyber Threat Risk Management, Cybersecurity IT Audit, and Cyber Security Research in various industries; specifically Texas State Government, Higher Education, Healthcare and Financial Sectors. Dirce holds both a Bachelor's degree in Computer Information Systems and E-Commerce, and a master's degree in Information Security and Information Assurance Management from Our Lady of the Lake University. He holds the following industry certifications: CISA, CISM, CRISC, CPDSE, CSX. In addition to his professional career, Dirce is involved with higher education in a professor capacity teaching Organizational leadership, Cyber security, and general IT courses for several colleges and Universities. Dirce also served on the San Antonio ISACA leadership board from 2018-2021.
- Doubling down on Compliance: Deep Dive into relevant 2024 Cybersecurity Regulations including NYDFS, SEC, & Others!
Dr. J is the Education Lead for the Women's Society of Cyberjutsu, Alamo Chapter, and is the founder of Cyber for Rural Texas. Additionally, she specializes in cyber mission planning, purple teaming, and integrating intelligence into cyber operations. She has experience in threat hunting, purple teaming, ICS, and cyber threat intelligence and is experienced in incident response. Dr. J is passionate about mentoring and growing others in cyber and serves as a technical mentor for the local Cyber Patriot team.
- Cyber Safeguarding Through Folklore: Engaging Elementary Students in Digital Citizenship Education
- Women in Cybersecurity: The Digital Rosie
Fredrick Hall, originally from Baltimore, Maryland, enlisted in the US Army post-high school, serving in various IT roles across global locations. Transitioning to civilian life, he pursued diverse roles from network defense operator to network engineer. Outside work, Fredrick actively mentors youth in cybersecurity through Boy Scouts, CyberPatriot coaching, and educational programs like the Alamo Academy’s ITSA CyberPatriot team. He volunteers extensively, leading CyberPatriot and cyber education camps, contributing to STEM initiatives, and speaking at cybersecurity events. Recognized for his contributions, Fredrick received accolades from U.S. Representatives for his leadership in cyber education. Joining CyberTexas Foundation in 2022 as Lead Coach/Mentor Trainer, he continues to foster talent and promote cybersecurity awareness. Fredrick's commitment to inspiring future generations is showcased through his involvement in literature aimed at encouraging young women in STEM/STEAM.
- Start Early, Stay Safe: The Crucial Role of Cyber in Education
As a proud Marine Corps veteran transitioning into the field of cybersecurity, I am currently pursuing an associate's degree in Cybersecurity and Information Assurance while enhancing my skills through various industry certifications.
At Accenture Federal Services, I focus on application security for SAP 4/HANA. With over 10 years of experience in law enforcement and a bachelor's degree in Criminal Justice, I have honed my security and investigative skills. My law degree further enriches my understanding of the legal implications of cybersecurity, aligning with my dedication to staying at the forefront of cybersecurity technologies and practices.
I am deeply committed to continuous learning and community service, actively seeking opportunities to contribute and give back. Passionate about education and mentorship, I use my experiences to inspire and guide future professionals in the field.
- Women in Cybersecurity: The Digital Rosie
- Women in Cybersecurity: The Digital Rosie
Jacob is an IT professional with 5 years of experience consisting of Offensive Security Consulting, System Administration, and Help Desk. As a consultant, he has helped over 20 companies secure their environments through PenTesting, Red/Purple Teaming, and Social Engineering engagements. Jacob is also an alumnus of the University of Texas at San Antonio. He is passionate about helping others in the IT community and shares his expertise through tutorials on Cyber Security via his YouTube channel ‘VillaRoot’.
- DPAPI - The Spice of Encryption
A security and data professional with several years in architecture and engineering.
- Unpacking Data Security Posture Management (DSPM)
Jonathan Gonzalez graduated from the University of Texas at San Antonio with a major in Cybersecurity and Information Systems and a minor in Digital Forensics in 2020. During his collegiate career he worked in Application Security, Security Operations and Vulnerability Management before doing Digital Forensics and Incident Response (DFIR) at Crowdstrike. He is now an Assistant Vice President (AVP) of Cyber Threat Intelligence at Synchrony Financial, where he works to build and test enterprise defenses for key stakeholders. Currently, he is a graduate student in Global Security Studies at Johns Hopkins University, deepening his understanding of the intersection between cybersecurity and global security. Outside of his professional and academic pursuits, Jonathan enjoys lifting weights, traveling, engaging with the Warhammer 40k universe, and reading military history.
- Navigating the Shadows: The Crucial Intersection of KYC, AML, and Cyber Threat Intelligence
Josh Prager has over 13 years’ experience focusing on DoD red team infrastructure, cyber threat emulation and threat hunting. As a former threat hunter in the Federal industry, he provided various cyber threat emulation and threat hunting assessments throughout DOD environments. As a principal consultant at SpecterOps, he guides clients in developing the maturity of their detection and response programs, building their detection engineering capabilities, and ensuring detective and preventive coverage of offensive techniques.
- Domain Persistence- Detection, Triage, and Recovery
JR Hernandez, a seasoned security professional based in San Antonio, TX, who brings over a decade of experience in cybersecurity. Currently serving as an Offensive Security Manager, JR leads a team of penetration testers at Evolve Security Inc., where he oversees the delivery of offensive security services. His primary responsibility involves ensuring the success of his team by equipping them with the necessary tools, training, and support to excel in their roles.
Beyond his professional endeavors, Jose finds solace in literature, photography, and stand-up comedy, showcasing his diverse interests outside the realm of cybersecurity. With a relentless pursuit of knowledge and a passion for cybersecurity advocacy.
- LLMs for Beginners
Electrical Engineer, Computer Scientist, experienced cyber capability developer, co-chair of the Cybersecurity Career Ambassador program, Air Force officer and commander of the 90th Cyberspace Operations Squadron. Hacker.
- Cybersecurity Career Ambassadors - A NIST NICE Community of Interest
Based in Chicago and a natural creature of winter, you can typically find me sipping Grand Mayan Extra Anejo whilst simultaneously defending my systems using OSS, magic spells and Dancing Flamingos. Honeypots & IOT Refrigerators are a few of my favorite things!
- Home Labs for fun and !profit (Put your home lab on your resume!)
Kyle Avery has been interested in computers for his entire life. Growing up, he and his dad self-hosted game servers and ran their own websites. He focused on offensive security in university and has spent the last few years learning about malware and post-exploitation. Kyle previously worked as a red teamer at Black Hills Information Security, specializing in .NET development. He has since moved to a full-time R&D role at Outflank, contributing to their offensive security toolkit for red teamers. Previously, Kyle presented at conferences, such as DEF CON and Texas Cyber Summit, and hosted webcasts for BHIS and WWHF.
- EDR Internals for macOS and Linux
Paul Guido has over 25 years of experience working with financial institutions, keeping their employees, customers, and data safe.
- DNS and Attack Surface Management
Phillip Wylie is a cybersecurity professional with over 26 years of industry experience in IT and cybersecurity. He is also a former Dallas College Adjunct Instructor and the founder of The Pwn School Project and DEFCON Group 940. Phillip has diverse experience in multiple cybersecurity disciplines, including network security, application security, and pentesting. As an offensive security professional with over a decade of experience, he has conducted pentests of networks, Wi-Fi networks, applications, red team operations, and social engineering.
Phillip’s contributions to the cybersecurity industry extend beyond his work as a pentester. He is the concept creator and co-author of “The Pentester Blueprint: Starting a Career as an Ethical Hacker,” a highly regarded book inspired by a lecture he presented to his class at Dallas College, which later became a conference talk. Phillip hosts “The Phillip Wylie Show” and previously “The Hacker Factory Podcast.”
- Offensive Security Awareness
Rob Quiros is a technologist and entrepreneur with more than 30 years building enterprise-class solutions in networking and security. He is the inventor, architect and builder of the new approach being discussed, and chief dreamer of Caber Systems, Inc., a startup with hopes to bring the solution to market. Prior to Caber, Rob was with Akamai after their purchase of Soha Systems, a pioneer in the now multi-billion dollar Secure Access Secure Edge (SASE) market, where he was an early team member and executive.
- A New Architecture for Data Security to Free Incident Responders from False Positives
Ross Bryant, Ph.D. is the Chief of Research at Phylum and leads the Phylum Research Team. Ross has over two decades of cybersecurity and math research experience. Prior to joining Phylum in late 2021, he worked as a research project lead at Sandia National Labs where he led a team that researched and developed real-time analytic solutions to network forensics problems. He has also worked in cybersecurity operations for the NSA and U.S. Air Force and as an Applied Research Mathematician for the NSA.
- Nation-State Threats in the Open-Source Software Supply Chain
Susan Markose is an Intern at CPS Energy, contributing to the Identity Access Management Team. Inspired by her late father's early lessons on digital safety, Susan embarked on her cybersecurity journey. Her father's use of intricate passwords introduced her to the importance of security—a small but significant detail that now deeply influences her approach, blending personal insights with professional skills.
- Women in Cybersecurity: The Digital Rosie
Recovering System Administrator, now Cybersecurity Engineer. I'm into anything low voltage. My hobbies include vintage computers.
- Access control done right the first time
The Women’s Society of Cyberjutsu (WSC) is a Northern Virginia-based 501c(3) non-profit organization passionate about helping and empowering women to succeed in the cybersecurity field. Our reach is worldwide.
Mission Statement: Our primary mission is to advance women in cybersecurity by providing programs and partnerships that promote hands-on training, networking, education, mentoring, resource-sharing, and opportunities.
- Women in Cybersecurity: The Digital Rosie