Speakers

#TheSAS2020 is exited to announce the brilliant minds who will share the unique knowledge and recent researches in the field of cyber security.

Costin Raiu

Kaspersky

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin specializes in analyzing advanced persistent threats and high-level malware attacks. He is leading the Global Research & Analysis Team (GReAT) at Kaspersky that researched the inner workings of Stuxnet, Duqu, Carbanak and more recently, Lazarus, BlueNoroff, Moonlight Maze and the Equation group. Costin’s work includes analyzing malicious websites, exploits and online banking malware.

Costin has over 24 years of experience in anti-virus technologies and security research. He is a member of the Virus Bulletin Technical Advisory Board, a member of the Computer AntiVirus Researchers’ Organization (CARO) and a reporter for the Wildlist Organization International.
 

Maddie Stone

Google

Maddie Stone is a Security Engineer on the Android Security team at Google. She has spent many years deep in the circuitry and firmware of embedded devices including 8051, ARM, C166, MIPS, PowerPC, BlackFin, the many flavors of Renesas, and more. Maddie has previously spoken at conferences including REcon Montreal, DerbyCon, and the Women in Cybersecurity Conference.
 

Maddie Stone is a Security Engineer on the Android Security team at Google. She has spent many years deep in the circuitry and firmware of embedded devices including 8051, ARM, C166, MIPS, PowerPC, BlackFin, the many flavors of Renesas, and more. Maddie has previously spoken at conferences including REcon Montreal, DerbyCon, and the Women in Cybersecurity Conference.
 

Thomas Rid

Johns Hopkins SAIS

Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies, previously serving as a Professor of Security Studies in the Department of War Studies at King’s College London, where he developed a Cyber Security module that bridged the gap between technological and political debates.

He has held positions at the RAND Corporation in Washington, the Institut Français des Relations Internationales in Paris, and served as a visiting scholar at Hebrew University and Shalem Center in Jerusalem. From 2007 to 2008, Rid served as a Visiting Scholar at the Center for Transatlantic Relations at Johns Hopkins SAIS. He holds a PhD and MA in Social Science from Humboldt University in Berlin. 

Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies, previously serving as a Professor of Security Studies in the Department of War Studies at King’s College London, where he developed a Cyber Security module that bridged the gap between technological and political debates.

Thomas has recently shared his expertise on information security through testimony before the U.S. Senate Select Committee on Intelligence, as well as insights on intelligence with the German Bundestag and the UK Parliament.

Rid closely tracked the election interference in 2016, and was one of the first named sources to call out the hack-and-leak as a Russian intelligence operation, only one day after details became public.

He has held positions at the RAND Corporation in Washington, the Institut Français des Relations Internationales in Paris, and served as a visiting scholar at Hebrew University and Shalem Center in Jerusalem. From 2007 to 2008, Rid served as a Visiting Scholar at the Center for Transatlantic Relations at Johns Hopkins SAIS. He holds a PhD and MA in Social Science from Humboldt University in Berlin. 

Kris McConkey

PwC

Kris leads our Cyber Threat Detection and Response team which comprises of highly specialised cyber security professionals. He is responsible for the delivery of our cyber threat response capabilities which enables clients to resist, detect and respond to advanced cyber attacks. Focusing on cyber crime, espionage investigations and technical countermeasures, his team is regularly called on to investigate and contain network intrusions and provide actionable threat intelligence to clients in crisis situations.

Kris leads our Cyber Threat Detection and Response team which comprises of highly specialised cyber security professionals. He is responsible for the delivery of our cyber threat response capabilities which enables clients to resist, detect and respond to advanced cyber attacks. Focusing on cyber crime, espionage investigations and technical countermeasures, his team is regularly called on to investigate and contain network intrusions and provide actionable threat intelligence to clients in crisis situations.

Azeria

Azeria Labs

Maria aka Azeria (@Fox0x01) is the founder and CEO of Azeria Labs, and a security researcher focusing on IoT and mobile exploit development, and processor security.

Maria aka Azeria (@Fox0x01) is the founder and CEO of Azeria Labs, and a security researcher focusing on IoT and mobile exploit development, and processor security. Azeria has obtained a reputation as the leading teacher of offensive-based Arm exploitation skills, offering trainings at top-tier security conferences including Black Hat and Infiltrate, and providing on-site training for companies. She has been recognized as a Forbes “30 under 30” list member for technology, has been collaborating with Arm on exploit mitigation research, and is a member of the Black Hat Review Board.

Joe Fitzpatrick

SecuringHardware.com

Joe is a Trainer and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers.

Joe is a Trainer and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers. He has spend the past 5 years developing and leading hardware security related training, instructing hundreds of security researchers, pen testers, and hardware validators worldwide. When not teaching Applied Physical Attacks courses, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects, which he regularly presents at all sorts of fun conferences.

Marie Moe

mnemonic

Dr. Marie Moe is a senior security consultant in threat intelligence and incident response at mnemonic, and has a PhD in information security. She is also an Associate Professor at the Norwegian University of Science and Technology.

Dr. Marie Moe is a senior security consultant in threat intelligence and incident response at mnemonic, and has a PhD in information security. She is also an Associate Professor at the Norwegian University of Science and Technology. She is currently doing research on the security of her own personal critical infrastructure, an implanted pacemaker that is generating every single beat of her heart. Marie loves to break crypto protocols, but gets angry when the broken crypto is in her own body.
 

Patrick Wardle

Jamf

Patrick Wardle is a Principal Security Research at Jamf and founder of Objective-See. Having worked at NASA and the NSA, as well as presented at countless security conferences, he is intimately familiar with aliens, spies, and talking nerdy.

Patrick Wardle is a Principal Security Research at Jamf and founder of Objective-See. Having worked at NASA and the NSA, as well as presented at countless security conferences, he is intimately familiar with aliens, spies, and talking nerdy. Patrick is passionate about all things related to macOS security and thus spends his days finding Apple 0days, analyzing macOS malware and writing free open-source security tools to protect Mac users.

Aseel Kayal

Check Point

Aseel is a malware analyst at Check Point Research. She joined Check Point as a security analyst in 2016. She received her bachelor’s degree in Computer Science and English Literature, and speaks Arabic, Hebrew and English.

Aseel is a malware analyst at Check Point Research. She joined Check Point as a security analyst in 2016. She received her bachelor’s degree in Computer Science and English Literature, and speaks Arabic, Hebrew and English. Aseel’s research mainly focuses on threat groups and cyberattacks in the Middle East. Some of her work was presented at security conferences such as Virus Bulletin and Botconf.

John Bambenek

Bambenek Consulting

John Bambenek is the President of Bambenek Consulting and a lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign. He is also one of the incident handlers at the SANS Internet Storm Center.

John Bambenek is the President of Bambenek Consulting and a lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign. He is also one of the incident handlers at the SANS Internet Storm Center. He has over 18 years experience in information security and leads several international investigative efforts tracking cybercriminals, some of which have lead to high profile arrests and legal actions. He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He produces some of the largest bodies of open-source intelligence used by thousands of entities across the world.

Steve Miller

FireEye

Steve Miller is an incident response professional and principal researcher for FireEye. Steve is experienced in the broader security and IT industries in areas such as computer forensics, communications signals analysis and intelligence program management.

Steve joined Mandiant in early 2013 as a threat analyst and continues his work in FireEye in studying adversary methodologies, aiding incident response activities, and generally finding evil.

Steve Miller is an incident response professional and principal researcher for FireEye. Steve is experienced in the broader security and IT industries in areas such as computer forensics, communications signals analysis and intelligence program management.

Steve joined Mandiant in early 2013 as a threat analyst and continues his work in FireEye in studying adversary methodologies, aiding incident response activities, and generally finding evil.

Prior to joining Mandiant, Steve conducted research and special projects for federal government agencies like the U.S. Department of Homeland Security and the U.S. Department of State. His work in these organizations included the development of new ways to perform tailored evidence collection for use in law enforcement investigations. Steve’s other research includes the design and management of security emergency exercises including a simulated international manhunt called the TAG Challenge, the results of which are now published in the Public Library of Science.

Steve began his career in security working with the U.S. Army Intelligence and Security Command at the National Security Agency. In this role, Steve conducted signals intelligence operations in direct support of U.S. counterterrorism operations in Iraq and Afghanistan.

Steve holds a Bachelor of Science in Computer and Digital Forensics from Champlain College in Vermont. In his spare time, he likes to shred on his guitar, dabble with VHF radio, and pwn newbs on the Battlefield.

Anton Ivanov

Kaspersky

Anton joined Kaspersky in 2011 as a malware analyst. For five years he worked as a senior malware analyst in the company’s heuristic detection group. In 2016, Anton started leading the behavioral detection team. The team’s main focus was to proactively protect customers from different kinds of malware threats, including ransomware.

Anton joined Kaspersky in 2011 as a malware analyst. For five years he worked as a senior malware analyst in the company’s heuristic detection group. In 2016, Anton started leading the behavioral detection team. The team’s main focus was to proactively protect customers from different kinds of malware threats, including ransomware.

In 2019, Anton became Vice President of Threat Research. In addition, Anton is a well-known speaker at security conferences.

Anton graduated from Russia’s Higher School of Economics in 2013, with a degree in information technology. In 2015, he received a master's degree in economics from the Russian Presidential Academy of National Economy and Public Administration under the President of the Russian Federation. He is the author of several patents in the field of malware detection.

Want to be a Speaker next year?

We are especially looking for presentations and research showcasing the following areas:

  • Advanced malware threats
  • Mobile device exploitation
  • Threats against banks, financial institutions:
    • PoS systems
    • ATMs
    • Crypto-currencies
    • E-commerce data breaches
  • Critical infrastructure protection (SCADA/ICS)
  • Internet of Things:
    • Autonomous transportation (self-driving cars, drones)
    • Smart homes and smart devices
    • Smart cities
  • Attacks on medical devices
  • Threats to Gaming industry:
    • Game cheats and defense mechanisms
    • Server and client-side vulnerabilities
    • Industrial espionage targeting gaming industry
    • Mass infections via gaming vendor breach
  • Cross-border law-enforcement coordination and information sharing
  • Vulnerability discovery and responsible disclosure
  • Techniques for development of secure software and systems
  • Side Channel and Physical Attacks
  • Blockchain and smart contracts

We use cookies to make your experience of our websites better. By using and further navigating this website you accept that some of your browsing activity can be recorded in cookies. Detailed information about the use of cookies on this website is available by clicking on more information.