BSides ST. Pete 2023 Speakers
Check out our fantastic speakers for this year's BSides St. Pete
How I Learned to Stop Worrying and Build a Modern Detection & Response Program
Allyn Stott
Allyn Stott is a senior staff engineer at Airbnb. He currently works on the information security technology leadership team where spends most of his time working on threat detection and incident response. Over the past decade, he has built and run detection and response programs at companies including Delta Dental of California, MZ, and Palantir. Red team tears are his testimonials. In the late evenings, after his toddler ceases all antics for the day, Allyn writes a semi-regular, exclusive security newsletter: https://www.meoward.co. Allyn has previously presented at Kernelcon, BSides Seattle, BSides SATX, and The Diana Initiative. He received his Masters in High Tech Crime Investigation from The George Washington University as part of the Department of Defense Information Assurance Scholarship Program.
A Urinal Story: Human Behavior & Security
Daniel Lopez
Daniel is a computer security and technology enthusiast active in the field since 2008. He has taken part in various security engineering roles with a focus on protecting critical manufacturing systems and services, leading to expertise in Cloud and Data Center Security. Since joining Amazon in 2020, Daniel shifted his impact from securing systems to empowering humans. In his role with Amazon, he is tasked with identifying human-related risks and increasing the cybersecurity posture of all Amazonians. Daniel has a B.S in Computer Information System from the University of South Florida, a M.S in Engineering Management from the University of Michigan, and a Post Baccalaureate Certificate in Information Systems Cybersecurity from Penn State University.
Complexity is the Enemy: How to Start Doing Cyber Risk Management
Dan Holland
Getting Into Cybersecurity
Stacey Oneal
How I Learned to Stop Worrying and Build a Modern Detection & Response Program
Allyn Stott
Allyn Stott is a senior staff engineer at Airbnb. He currently works on the information security technology leadership team where spends most of his time working on threat detection and incident response. Over the past decade, he has built and run detection and response programs at companies including Delta Dental of California, MZ, and Palantir. Red team tears are his testimonials. In the late evenings, after his toddler ceases all antics for the day, Allyn writes a semi-regular, exclusive security newsletter: https://www.meoward.co. Allyn has previously presented at Kernelcon, BSides Seattle, BSides SATX, and The Diana Initiative. He received his Masters in High Tech Crime Investigation from The George Washington University as part of the Department of Defense Information Assurance Scholarship Program.
The Boring Parts of AI: Risks and Governance of Large Language Models
Dan Fernandez
Navigating New Cybersecurity Regulations: Charting a Course for Success
Terri Khalil
Going Undercover in the Underground - A Practical Guide on How to Safely Infiltrate & Engage
Michael-Angelo Zummo
Michael-Angelo Zummo is a Cyber Threat Intelligence Specialist at Sixgill. He is a US Marine Corps veteran that started his career as a cryptologic linguist and intelligence analyst. He served at the NSA (National Security Agency) in South Korea where he supported national security against foreign threats. Zummo earned his Masters in Cybercrime Investigations and Cybersecurity from Boston University, where he transitioned from national security to digital forensics, dark web intelligence, and law enforcement.
Everything I Needed to Know About Practical Cybersecurity, I Learned from my Mom
Michael Magyar
Creating your Security & Compliance Audit Framework
Michael Brown
Building a Comprehensive Framework for AI Systems Security: Methodology and Grading
Wilson Bautista
Exploring Threat Actor Strategies on Exploitation of Emerging TLDs
Pat Gelin
Hacking Large Language Models (LLMs)
Sam Decker
Sam “Furio” Decker is a Cyber Threat Analyst at Raymond James. He is an active member of the Neon Temple and a Hack the Box Meetup Host for the Tampa Bay area. He’s currently working on CTF building and experimenting with LLMs. When he’s not hacking, he’s rooting for the Dallas Cowboys, Tampa Bay Lightning and the University of Tennessee Vols.
???
Joshua Weathers
Joshua embarked on his cybersecurity journey following a commendable six-year enlistment in the United States Air Force. His fervor for the field ignited in 2014 when he achieved his inaugural certification. Since then, he has garnered an impressive roster of IT certifications, encompassing prestigious accolades such as CISSP, CCSP, CISM, CRISC, CISA, and PMP. From his initial days at the Help Desk to advancing through roles in SOC and NOC, and his tenure at the SecureSet CORE Program, Joshua's trajectory epitomizes dedication and adaptability. This commitment was acknowledged with the SecureSet Beta Wolf Award (Student most likely to succeed) and facilitated opportunities with eminent entities like DISA, DoD, and NASA. An alumnus of Norwich University, Joshua achieved his Bachelor of Science in Information Warfare, graduating Cum Laude in 2021. Beyond his academic and professional milestones, he is fervently dedicated to mentoring and nurturing budding talents in cybersecurity. He often extends his guidance in after-school and post-work programs such as the Microsoft TEALS program, co-instructing CyberSecurity to High-School students. Joshua also serves as a Treasurer for the ISC2 Charleston Chapter, expanding the mission and reaching out to prospective IT professionals. While his roots trace back to St. Louis and his residence in Charleston, Joshua considers Tampa his second home. Joshua currently works as a Counterfeit Identification (CI) and Information Communications Technology (ICT) Supply Chain Risk Management (SCRM) Program Manager and Technical Lead for a civilian agency. Presently contributing to C-SCRM (Cyber SCRM) Working Groups under CISA, GSA, DHS, and others. Navigating the ICT SCRM waters to achieve excellence beyond compliance.
How to Build a Cybersecurity Journey
Ivan Marhcany
Ivan Marchany is a Vulnerability Analyst for Raymond James. Ivan has been in the security field for over 4 years working in Vulnerability Management in identifying, assessing, and mitigating vulnerabilities within systems, networks, and software to prevent potential breaches. Ivan has a multitude of security certifications and maintains his extensive skills by routinely taking training. He has passion for mentorship, public speaking and tutoring information security professionals who want to advance in their careers.
LinkedIn: https://www.linkedin.com/in/ivan-m-240ab090/
Twitter: https://twitter.com/ivan_marchany
Website: https://www.ivanmarchany.com/
How to Wage War and Bypass Congress: a Primer on Gray Zone Warfare
Jon "Cochise" Buzin
Beyond his academic and professional milestones, he is fervently dedicated to mentoring and nurturing budding talents in cybersecurity. He often extends his guidance in after-school and post-work programs such as the Microsoft TEALS program, co-instructing CyberSecurity to High-School students. Joshua also serves as a Treasurer for the ISC2 Charleston Chapter, expanding the mission and reaching out to prospective IT professionals. While his roots trace back to St. Louis and his residence in Charleston, Joshua considers Tampa his second home.