Campfire Stories - 15 minutes each
Feedback form is now closed.
Feedback Submitted
Speakers JA
FRSecure
Jordan is a Network Security Analyst for FRSecure who holds a Security+ certification and is an active board member for North Dakota Infragard. He has been blue teaming for 8 years and red teaming for 3 years professionally. In his spare time, he built a home computer security lab...
Read More →
Security Analyst, Black Hills Information Security
Derek has over 20 years of experience in the IT industry as a systems administrator for multiple operating system platforms, and monitoring and defending those systems from potential intruders. He has worked in the aerospace, defense, banking, manufacturing, and software development...
Read More →
Ted Demopoulos’ professional background includes over 30 years of experience in Information Security and Business, including 25 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup...
Read More →
Black Hills Information Security
Jordan is one of Black Hills’ security analysts. He hails from the land of enterprise networking tech support, where stress was high and the challenges were strong. Most days, Jordan enjoys wireless research and malware sample packet data served with coffee.
JG
John Grigg has years of diverse experience within the Navy, the Intelligence Community, and in the corporate cyber security world with focuses on building and developing cyber defense systems, SIEM/IDS/IPS engineering, malware analysis, and cyber operations.
Black Hills Information Security
Kent is a business school Masters graduate with a focus on Network Infrastructure Design and Management. He has experience in Higher Education Management, Finance, and SMB. His hobbies include woodworking, frisbee golf, and medieval architecture.
LL
Protiviti
Leo Loobeek is a senior consultant with Protiviti performing offensive security operations ranging from textbook penetration tests to stealth and red team operations. With the majority in the offensive security space researching post-exploitation techniques, Leo finds his niche in...
Read More → DL
ITProTV
Daniel LowrieITProTV Edutainer - SecurityDaniel worked as a systems and network admin before moving into teaching. He was drawn to ITProTV because he himself is a visual learner and that’s key to ITProTV’s content. He holds certifications in A+, Network+, Linux+, CEH, and MCSA...
Read More → JM
Respected Information Security expert, advisor, evangelist, and co-host on Paul’s Security Weekly. Over 35 years of experience working in all aspects of computer, network, and information security, including risk management, vulnerability analysis, compliance assessment, forensic...
Read More → DN
BHIS
Dakota started attending information security conferences while still in high school, and has been hooked ever since. Trained as a software developer, he is particularly interested in developing novel tooling and automation to make red teams more effective. He enjoys creating and...
Read More →
Red Siege
Mike's love of IT started in the third grade when he discovered he could view the code of BASIC programs on an Apple ][e. He has held many IT and IT security positions, including developer, network and system administrator, security architect and security incident handler. Currently...
Read More → JW
Justin Williams is an Information Security professional focused on defense strategies with his current organization. During his career, he has worked in systems and server administration, .NET development, database management, and help desk operations. He spends his free time learning...
Read More →
Ryan has helped multiple companies stabilize their infrastructure operations and launch security programs to ensure the systems stay running as expected. He cut his teeth on the mainframe helping write the operating system and hold multiple patents with IBM. He has recently helped...
Read More →