{"id":562,"date":"2023-09-12T20:34:27","date_gmt":"2023-09-13T01:34:27","guid":{"rendered":"https:\/\/dev.phreaknic.info\/?page_id=562"},"modified":"2024-10-16T23:23:28","modified_gmt":"2024-10-17T04:23:28","slug":"talks-and-speakers","status":"publish","type":"page","link":"https:\/\/dev.phreaknic.info\/index.php\/talks-and-speakers\/","title":{"rendered":"Speakers"},"content":{"rendered":"\n
With over 18 years of experience in application security, Josh has played diverse roles\u2014from being a penetration tester and reverse engineer to serving as a full-stack developer and CTO of a cybersecurity startup. He founded Faction Security, an organization committed to hosting open-source tools with the goal of supporting security teams by providing resources that enhance collaboration and efficiency. In addition to making open-source security tools, Josh builds custom modular synths and generally enjoys making strange and unusual noise making devices.<\/p>\n\n\n\n
I have been coming to PhreakNIC since 2011. I have previously given presentations on “Meat Hacking” at PN17, where we discussed making Jerky. And at PN23 we discussed the art of “Pen Testing” and turning pens (and other items) on a wood lathe. I have 20ish years in the IT field, currently working as an IT Director. I absolutely hate public speaking and PhreakNIC is one of the exceptions I make because of the wonderful community. As for this talk, I have had my plex pass since 2013, and have been a Starlink User for a little over 2 years. PS- Stop by the CTF, im sure it will be fun again this year!
<\/p>\n\n\n\n
I’m either a backdoor or a conspiracy theory. Who really knows?
<\/p>\n\n\n\n
Security Engineer | Penetration Tester | Linux Enthusiast
<\/p>\n\n\n\n
Ron Foster has thirteen years working in the application security field and seven additional working with quality and performance testing. His knowledge spans multiple pillars of application security testing. From DAST and Mobile Apps, SAST and SCA to integrating pipelines and process, Ron’s holistic approach to application security keeps his approach flexible and custom. His natural passion and interest in the field keeps him current. Ron speaks at conferences on topics like Integrating Burp into your SDLC, Drone Hacking, and Pentest Delivery. Ron has been instrumental in the development of SaltMiner PenTest, an industry first in standardizing the way PenTest results are consolidated into consistent results. He excels at providing quality in-depth results to customers and mentoring his team in being able to consistently do the same.
<\/p>\n\n\n\n
Matt really enjoys making all things hardware, and sadly sometimes software. Enjoys exploring new technologies and using those to better understand things as a whole.
<\/p>\n\n\n\n
My name is Mike, and I\u2019m a Security Engineer with a passion for building and problem-solving. I\u2019ve had the privilege of working in a variety of security roles, including as a penetration tester and system administrator, and have always been fascinated by how things work.
Over the course of my career, I\u2019ve had the opportunity to help build and improve security programs for a number of organizations, primarily startups. I\u2019ve deployed various security controls to help mature these programs, and I\u2019m always looking for new ways to improve and enhance security.
<\/p>\n\n\n\n
Matt Robinson (brimstone) is a long time attendee, sometimes speaker to Phreaknic, co-organizer of DC404 out of Atlanta, and current organizer of ATL2600.
<\/p>\n\n\n\n
Hacker and Coder,
Finding patterns in the noise
Mysteries emerge.
<\/p>\n\n\n\n
Tyler Crumpton thrives on creating things that wouldn\u2019t exist otherwise, especially if they have the potential to inspire others to try something new. From playful and interactive LED displays, to silly useless IoT projects, down to synthesizers built from hot dogs, his quest is aimed at highlighting technologies that are easy to learn and sparking a bit of joy where least expected. His toybox usually includes microcontrollers, laser cutters, 3D printers, CNC machines, and whatever else makes it easier to go from goofy idea to goofy reality.
<\/p>\n\n\n\n
Altk3y likes big bots and she can not lie. She’s passionate about cybersecurity and committed to advancing the field through innovative solutions and continuous learning (and putting Doom on as many devices as possible). Her experience spans from creating patent-pending security technologies to advising training programs for law enforcement agencies on critical security practices and mentoring through ISSA @ KSU.
<\/p>\n\n\n\n
Mog is a 6 foot tall ape descendant.
Aliases: 96bcaa76-0f27-45e7-9aa3-65c535e53a05, Matthew O’Gorman, Matt, Dad, just this guy you know
<\/p>\n\n\n\n
Ron’s journey in the tech world began as a trainer for HP-UX Unix. He quickly transitioned to Solaris as a valued employee of SUN Microsystems. After 9\/11,
Ron shifted his focus to the Software Development Life Cycle (SDLC), specializing in performance engineering, tuning, reliability, and observability.
A move to application security allowed him to take his process and methodology expertise to Micro Focus as one of the early members of the Fortify Team.
His contributions helped to build processes and methodologies still used today.
Ron now serves as the Director of Dynamic Testing, and Testing as a Service at Saltworks Security, where he oversees all aspects of application security testing within a DevOps model.
His leadership and expertise continue to drive advancements in securing applications against emerging threats.
<\/p>\n\n\n\n
Elonka is a longtime PhreakNIC attendee, whose solution of the 1999 PhreakNIC 3.0 Code launched her public career in codebreaking. She is the author or co-author of four books on cryptography, the most recent of which came out in September 2023: \u201cCodebreaking (Expanded Edition)\u201d.She currently lives in Washington DC with her cat, Crypto Kitty.
<\/p>\n\n\n\n
More to follow, Or talk to me before\/after the talk.<\/p>\n\n\n\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Josh Summitt With over 18 years of experience in application security, Josh has played diverse roles\u2014from being a penetration tester and reverse engineer to serving as a full-stack developer and CTO of a cybersecurity startup. He founded Faction Security, an organization committed to hosting open-source tools with the goal of supporting security teams by providing […]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-562","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/pages\/562"}],"collection":[{"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/comments?post=562"}],"version-history":[{"count":9,"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/pages\/562\/revisions"}],"predecessor-version":[{"id":769,"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/pages\/562\/revisions\/769"}],"wp:attachment":[{"href":"https:\/\/dev.phreaknic.info\/index.php\/wp-json\/wp\/v2\/media?parent=562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}