Get to know the SPEAKERS

Meet the experts shaping cyber security today

Lee Felsenstein

Lee Felsenstein is an American computer engineer who played a central role in the development of personal computers. He was one of the original members of the Homebrew Computer Club and the designer of the Osborne 1, the first mass-produced portable computer.

Before the Osborne, Felsenstein designed the Intel 8080 based Sol-20 computer from Processor Technology, the PennyWhistle modem, and other early "S-100 bus" era designs. His shared-memory alphanumeric video display design, the Processor Technology VDM-1 video display module board, was widely copied and became the basis for the standard display architecture of personal computers.

"Homebrew Computing Club, Me and My Big Ideas, The History of Hacking"

Chris Wysopal (Weld Pond)

Chris Wysopal (aka Weld Pond) was an early and longstanding member of L0pht Heavy Industries, the Boston-based hacker collective that turned a chaotic loft full of scavenged hardware into one of the most influential security labs of the early Internet. In the 1990s, he and his peers weren’t working from textbooks or corporate playbooks—they were pulling systems apart, finding where they broke, and publishing what they found, whether vendors liked it or not.

At the L0pht, Chris was part of the crew that helped turn vulnerability research into something public and impossible to ignore. From cracking password systems to exposing fundamental flaws in widely deployed software, the group’s work and tools like L0phtCrack forced a reluctant industry to confront the reality that insecurity wasn’t an edge case, it was the default. They rejected “security through obscurity” and instead made disclosure a lever to shift power, dragging uncomfortable truths into the open.

Speaker place holder
Speaker place holder

G. Mark Hardy

G. Mark Hardy serves as President of National Security Corporation and co-host of the award-winning CISO Tradecraft podcast. He has been providing cyber security expertise to government, military, and commercial clients for over 40 years, and is the author of over one hundred articles and presentations on security, privacy, and leadership. A graduate of Northwestern University and Loyola University, he holds a BS in Computer Science, a BA in Mathematics, a Masters in Business Administration, a Masters in Strategic Studies, and is designated as a Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM).

"A Hacker Looks at 50"

Richard Thieme

Richard Thieme (thiemeworks.com) is an author and professional speaker who speaks about the challenges posed by new technologies and the future, how to redesign ourselves to meet these challenges, and creativity in response to radical change. He has published numerous articles and short stories, eight books, and has delivered hundreds of speeches. His Mobius Trilogy, which includes "Mobius: A Memoir," illuminates the impacts of security and intelligence work on practitioners. The trilogy was lauded by a 20-year CIA veteran as one of the five best works of serious spy fiction--ever. He spoke in 2025 at the noted security conference Def Con for the 27th time. He has keynoted security conferences in 15 countries. Clients range from GE, Microsoft, Medtronic, Bank of America, Allstate Insurance, and Johnson Controls to the NSA, FBI, US Dept of the Treasury. Los Alamos National Lab, the Pentagon Security Forum, and the US Secret Service.

Johnny Shaieb

Bio to follow.

"Axiomatic Events that Evolved Vulnerability Databases"

Andrew Brandt

Andrew Brandt has a 20+ year history in cybersecurity. He has served as a director of threat research at Symantec, Blue Coat Systems, and as a principal researcher at Sophos and Netcraft. Prior to working as a threat researcher, he was an investigative journalist and editor at PC World and a production coordinator for the syndicated TV show Next Step, dating to the mid-1990s. He has been involved in the hacking community since then as well, as one of the original members of San Francisco's Otaku Patrol Group. Brandt holds a deep and abiding affection for retrocomputing and retrogaming, and volunteers as a docent and retro-to-modern data specialist for the Media Archaeology Lab, based in Boulder, Colorado. The MAL houses the largest collection of functional retrocomputing devices, in a university laboratory setting, in North America.

G. Mark Hardy
G. Mark Hardy
Speaker place holder
Speaker place holder
Speaker place holder
Speaker place holder
Speaker place holder
Speaker place holder
Speaker place holder
Speaker place holder

Heidi and Bruce Potter

Bio to follow.

"AMA with the Potters"
Speaker place holder
Speaker place holder

Brian Harden (noid)

Noid has spent his life building. From organizing the Los Angeles 2600 meetings in the 90’s, to building out the DC206 in the early 2000’s, to helping create the juggernaut that is DEF CON, Noid has built communities everywhere he’s gone. Now largely retired from the scene, Noid spends his days working on his farm and writing about himself in the 3rd person

"Community Organizing Before Social Media… How we did it"
Speaker place holder
Speaker place holder

Izaac Falken

...is a hacker of the 1990s and beyond. He's mostly associated with 2600 Magazine and the radio program Off The Hook. This year will mark 30 years in professional computer security consulting.

"## The Persistent Antipattern'); DROP TABLE keynote; -- In-band Signaling"
Speaker place holder
Speaker place holder

Mei Danowski

Mei Danowski is the founder and principal of Natto Thoughts, an advisory firm specializing in strategic threat intelligence rooted in geopolitical, economic, social, cultural, and linguistic analysis. She is internationally recognized for her expertise in connecting cyber threats to broader geopolitical, economic, and cultural dynamics. Before founding Natto Thoughts, Mei supported various U.S. government organizations and held key positions in the private sector at Microsoft, Accenture, and Verisign.

Speaker place holder
Speaker place holder

Benjamin DeLong (McIntyre)

B.K. DeLong (handle: McIntyre) was a staff contributor at Attrition.org from the late 1990s through the early 2000s. He served as sometimes-spokesperson for the project & one of a handful of volunteers responsible for capturing, verifying, and archiving web defacements during the mirror's operational period - a project that ultimately cataloged over 15,000 defaced sites, documented geopolitical hacktivism, and became an early proof-of-concept for open, community-run cyber threat intelligence. Today he works as a Product Owner and Lead Engineer in Enterprise Vulnerability Management, taking a risk-based approach to vulnerability mitigation & remediation and exposure management programs.

Speaker place holder
Speaker place holder

Edison Carter / Jericho

Old-school hacker and phone phreak from the '80s & '90s.

"Life in an Early 90's Hacker Group"
Speaker place holder
Speaker place holder

Josh Corman

Josh Corman is what you get when you put a wannabe superhero & formally trained philosopher into the hacker culture for ~30 yrs… As technology shifted from issues of bits & bytes to those of flesh & blood, he started leaning more into public policy and the public good on issues like the rise of Anonymous While some A-list 1337 hackers didn’t like that very much, in 2013, Josh launched “I am the Cavalry” to focus on over-dependence on undependable things… both the make things safer - and to make it easier for good faith hackers to do their part to help. Initially mocked, their approach helped build trust, open collaborations, soften postures towards good faith hacking, and even passed a few laws.

Speaker place holder
Speaker place holder

Jamie Arlen

Jamie Arlen brings a mix of security and engineering background to * as a service. Over the past thirty plus years, Jamie has been delivering information security solutions to Fortune 500, TSE 100, and major public-sector organizations. Jamie is best described as: “Infosec geek, hacker, social activist, author, speaker, and parent.” His areas of interest include organizational change, social engineering, blinky lights and shiny things. Greatest hits from the past include: Contributing Analyst at the research firm Securosis, blogger/podcaster with Liquidmatrix Security Digest, a frequent speaker at industry conferences, and a prolific contributor to media and standards including a lead author contribution to the Cloud Security Alliance Security Guidance for Critical Areas of Cloud Computing V4.

"I began addressing the human impacts of technological change--specifically the arrival of the public internet--32 years ago"
"Bring Me (Back) To Life: Running early hacking tools on obsolete computers"
"Subduing the Enemy Without Fighting:
Ancient Strategy and the Birth of China's Early Hacker Imagination"
"In January 1999, a small group of volunteers at Attrition.org decided to do something no one else was doing systematically: capture and archive defaced websites"

Josh lives in a few worlds, but often helps the outside world see the best hackers have to offer - and maybe also help hackers see the best in themselves. In day jobs he has oscillated between AppSec, CTO, Chief Security Officer roles… but has also done two stints at public policy think tanks and designed/implemented the CISA COVID Task Force in support of Operation Warp Speed. He is currently driving UnDisruptable27 to prepare for disruption to US Water and Hospital Access related to a Taiwan Conflict. He tilts at quite a few windmills… but some of them were dragons… and some of them were slain…

"FAIL: An epic career of doing all the wrong things and somehow still being right"

He was part of the L0pht team that testified before the U.S. Senate in 1998, delivering the now-infamous warning that they could take down the Internet in 30 minutes, a moment when hacker knowledge collided directly with national policy. After the L0pht era, Chris co-founded Veracode, helping bring application security into the enterprise, but his roots remain in that original scene: a time when a handful of hackers, working outside the system, forced the system to change.

"The Accidental Cyber Think Tank:
How the L0pht Forced the World to Take Software Security Seriously"
Speaker place holder
Speaker place holder

Casey John Ellis

Casey is a serial entrepreneur and executive, best known as the founder of Bugcrowd and co-founder of The disclose.io Project. He is a 25+ year veteran of information security who grew up inventing things, hacking things, and generally getting technology to do things it isn't supposed to do. Casey pioneered the crowdsourced security as-a-service model, launching the first bug bounty programs on the Bugcrowd platform in 2012, and he co-founded disclose.io vulnerability disclosure standardization project in 2014 prior to its launch in 2018.

He’s an active member of a variety of policy and threat intelligence working groups and think tanks such as the Hacking Policy Council and the Election Security Research Forum.

He has personally advised the US White House, DoD, Department of Justice, Department of Homeland Security/CISA, the Australian and UK intelligence communities, and various US House and Senate legislative cybersecurity initiatives, including preemptive cyberspace protection ahead of the 2020 and 2024 Presidential Elections, the US National Cyber Strategy, and a variety of policies and EO’s relating to security research, anti-hacking law, and artificial intelligence.

Casey, a native of Sydney, Australia, is based in the San Francisco Bay Area.

"Smashing the (Policy) Stack for … Public Safety & (Not) Profit?! "

Fireside Chats

Meet your story tellers around the fire while they reminisce about history and hacking

Speaker place holder
Speaker place holder

Hack Beer'd

Cap'n HackBeer'd be the most infamous hacker buccaneer to ever hoist the Jolly Roger! Born during a Cat 5 hurricane, he built his first computer from a ship’s wheel and abacus before he could walk the plank. He scored his first dubloons from cracked software on the high C:\. He wears an iPatch on Tuesdays and his Peg Leg rebroadcasts MLB games with implied oral consent.

Legend has it his 1337 crew has SYNned in all 65,535 ports but never attACKed an honest sailor. Though he has a Bug Bounty on his head, his ship the Error 404 shall ne’er be found—disappearing into the vaporware or attacking alongside his first mate, Bobby TABLES, and his parrot, Pollymorphic.

"Avast, ye LAN lubbers! Grab a grog and park yer ParrotOS while cap'n HackBeer'd tells a `tail -f /dev/urandom`."
Speaker place holder
Speaker place holder

Edison Carter

Old-school phone phreak and hacker. Got started in the mid-80s, and active until the mid-90s.

"Digital Hooligan:
Origin and Exploits of an Old-School Hacker and Phone Phreak"
Speaker place holder
Speaker place holder

Dustin Heywood

Dustin Heywood otherwise known as EvilMog is a Senior Technical Leader at IBM X-Force, a semi retired member of Team Hashcat, and a Bishop of the Church of Wifi, he is a multi time Hacker Jeopardy World Champion and a collector to Black Badges.

"The early Hashcat beta days, the rise of the Alberta Hashcat super cluster, DROWN [..]"
Speaker place holder
Speaker place holder

Brian Harden (noid)

Noid has spent his life building. From organizing the Los Angeles 2600 meetings in the 90’s, to building out the DC206 in the early 2000’s, to helping create the juggernaut that is DEF CON, Noid has built communities everywhere he’s gone. Now largely retired from the scene, Noid spends his days working on his farm and writing about himself in the 3rd person

"DEFCON War Stories with Unkie Noid"