David Elze has been breaking things in the name of security for over two decades. After starting his career as a penetration tester at a German premium car manufacturer, he went on to lead international hacking teams and eventually joined CODE WHITE in 2014 as its first technical employee. Today he runs CODE WHITE as CEO but has never lost his passion for the technical side of hacking.
Martin Brunner is currently Senior Principal Engineer Offensive Security at Infineon Technologies, where he is heading the Red Team. Prior to his current role, he held numerous research, engineering and consulting positions in automotive and security. He has also been the founder and owner of a security-centric hosting company. Overall, he has 20 years of global experience in IT- and automotive security – in designing, building, testing, operating and securing systems and networks. He (co-)authored various publications – consisting of conference papers, articles, book chapters, patents – and is a frequent public speaker at international security conferences and events. As a member of several committees and consortia he served as reviewer and security expert to various technical standards and the European Commission.
Abian Morina is a Threat Researcher on Permiso Security’s P0 Labs team. He began hacking by modifying video games, a curiosity that evolved into a cybersecurity career. As a senior member of the Kosova Cyber Team, he proudly represents his country on the international stage at the European Cybersecurity Challenge. He also contributes to the community through public speaking and open-source tooling.
Mr.Morina holds a Bachelor’s in Computer Science and now is pursuing a Master’s in Cybersecurity.
Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in information security and threat intelligence, becoming one of the most recognizable names in its field. Mr. Holden researches minds and techniques of cyber criminals and helps our society to build better defenses against cyber-attacks.
Alex is a researcher affiliated with public institutions in Germany and Sweden, focusing on security, privacy, and compliance by design. Prior to his research career, he worked as an information security engineer, consultant, and process architect.
Andi Ahmeti is a Threat Researcher on Permiso Security’s P0 Labs team with 3 years of experience in offensive security and threat hunting. He now is focused on hunting through product telemetry to identify evil and building tools to enrich extensive collection of cloud focused data.
He is the author of an open-source threat detection tool called CloudGrappler and co-author of the Cloud Console Cartographer defensive visibility framework. He has presented at numerous conferences around the world including Black Hat Asia, Black Hat Europe, Black Hat MEA, FIRSTCON24, x33fcon, BSides Prishtina, BSides NYC, BSides Tirana
Mr. Ahmeti obtained a Bachelor of Science in Computer Engineering from the University of Prishtina Faculty of Computer and Electrical Engineering (2023).
Benjamin began his career as a Cyber Security Consultant and has since developed into a specialist at the intersection of machine learning and security. His work focuses on the practical evaluation and implementation of the OWASP Top 10 for Machine Learning and Large Language Models (LLMs), particularly through hands-on experience with RAG-based LLM systems in real-world security contexts.
Benjamin also works on secure system design, applying threat modeling and Security by Design in alignment with ISMS principles. His current research includes supervised learning techniques to reduce false positives in vulnerability detection, as well as risk analysis in LLM systems – always aiming to bridge the gap between research and secure implementation.
Senior Penetration Tester @ CODE WHITE GmbH
Daniel Schwendner is a DevOps Engineer with a strong passion for Cyber Security. With a background in mobile application security and hardware security, he participates in bug bounty hunting and shares his security knowledge online.
David Gstir is a security engineer and researcher with 15+ years of hands-on experience. He has been actively involved in security-related projects, successfully identifying vulnerabilities in various consumer and enterprise software.
X-Force Principal Incident Response Consultant with 7 years of experience in Security Operations, specialising in Incident Response and Threat Intelligence. Extensive experience in the banking sector, having served as an Incident Responder, Detection Engineer, and Manager within a Global SOC. Successfully led and supported initiatives focused on building incident response capabilities, developing threat intelligence platforms, delivering technical training, and strengthening proactive security services. Holds industry-recognised certifications including GCTI, GCFA, and GCFR. Holds a Bachelor’s degree in Security Studies, is currently pursuing a Master’s in Cybersecurity, and is a Chevening Fellow (UK Defence Academy).
Georg is a seasoned professional in the offensive security domain. Currently, he serves as a Red Teamer at NVISO ARES (Adversarial Risk Emulation & Simulation). In this role, he leads and conducts Red Team operations and is responsible for NVISO’s physical security capabilities. Whether it is a locked PC, an Network Access Control (NAC) or a closed door, Georg thrives to bypass it.
Guillaume is a penetration tester and security researcher working at Synacktiv. During his career, he developed a healthy addiction to Windows systems and their internals. He is also passionate about Active Directory security, in which he gathered solid knowledge through several Red Team engagements and internal pentests.
I work as a forensic analyst for a managed incident response provider. I value giving back to the community by contributing to triage and threat hunting capabilities. In my free time, I enjoy chalky climbing gyms and high mountains.
Javier Vazquez Vidal is a hardware security specialist with a lifelong passion for electronics and embedded systems security, who has been delivering hands-on hardware security trainings for over a decade. He released his first public research project at Black Hat Arsenal USA 2013 and DEFCON with the ECU tool, followed by the CAN Hacking Tool (CHT) at Black Hat Asia 2014 and his research that demonstrated that it was possible to compromise the Spanish smart power grid at Black Hat Europe.
If you see him around and want to talk with him or ask him some questions, make sure to bring an extra beer or coffee along, depending on the time of the day.
Jerry Gamblin is a Principal Engineer in the Threat Detection & Response business group at Cisco Security, where he leads research and data science initiatives to enhance Cisco Security products. He is actively involved in the CVE community, participating in various working groups and serving as a member of the EPPS SIG. He regularly speaks on vulnerabilities and vulnerability management at international conferences and manages a CVE data collection site at CVE.ICU.
Root-cause all the things!
João’s mission at Siemens Healthineers AG is to enable medical device resilience by leveraging insights gained from the analysis of cyber incidents. His core tools in this mission are digital forensics and cyber threat intelligence. In previous roles, he investigated high-profile security breaches, developed network-based tools for threat detection, and promoted collaboration across diverse industry peers. He is a strong advocate for the idea that cybersecurity challenges can only be effectively addressed through cooperation and knowledge exchange.
https://www.linkedin.com/in/joaocmendonca/
John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much loved SANS teacher. John is a contributor to the industry-shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.
Hello :) My name is Julia, I’m 25 years old and a student of IT-Security at university. I am currently writing my bachelor’s thesis on Security Awareness Trainings.
In my free time I love to game, play volleyball or go travel the world with my friends.
Founder & Security Community Expert @ FullCyrcle Security
Juliane Reimann has worked as a cybersecurity consultant for large companies since 2019, with a focus on DevSecOps and community building. Her expertise includes building security communities among software developers and establishing developer-centric communication around secure software development topics. Before entering the cybersecurity field, she founded several companies in web development. Her web development background provides her with extensive knowledge of the software development lifecycle. Since 2024, she has been a core member of the OWASP Security Champions Guide Community.
Lisi found tech as her place to be in 2009 and has grown as a specialized generalist ever since. Building great products that deliver value together with great people motivates her and lets her thrive. As a security engineer, she’s now fully focusing on all things product security to help build more secure solutions. She’s committed to testing and quality, passionate about whole-team approaches to increase effectiveness and resilience, and enjoys experimenting and learning continuously. Having received a lot from communities, Lisi is paying it forward by sharing her stories and learning in public. She posts on Mastodon as @lisihocke@mastodon.social and blogs at www.lisihocke.com. In her free time, she plays indoor volleyball or delves into computer games and stories of all kinds.
Marius worked for 5 years at the German Patent and Trademark Office on the electronic patent and trademark filing systems. Since 2025, he has been working at the University of Applied Sciences Munich as a researcher and PhD student investigating the resiliency of operational technology at the HM-SecLab.
Since his master’s degree in 2023, he has been working on SBOMs and is a regular contributor to SBOM projects. Mostly, he can be found with the SBOM-Everywhere Working Group at the OpenSSF. He is one of the maintainers and developers of the SBOM-Tooling Catalog hosted by the OpenSSF.
Markus Einarsson is a Security Architect and Incident Response Lead at Sectra in Sweden, where he secures cloud-hosted environments for healthcare customers worldwide. With over a decade of experience in cybersecurity, Markus specializes in incident response, digital forensics and security architecture.
As part of the Sectra Hunt and Incident Response Team, he has extensive hands-on experience with forensic workflows and modern DFIR toolchains. Markus holds multiple GIAC certifications including GEIR, GCDA, GCFE, GCFA, GRID, GNFA, GCIA and GCIH. He is passionate about scalable incident response methodologies and advancing open-source forensic tools.
I am a senior security consultant, founder and a director at the Munich based company secureIO GmbH. With a strong background in application security and building and managing application security programs, I am passionate about all things related to AppSec and DevSecOps.
Michael Kerrisk is a trainer, author, and programmer who has a passion for investigating and explaining software systems. He is the author of “The Linux Programming Interface”, a widely acclaimed book on Linux (and UNIX) system programming. He has been actively involved in the Linux development community since 2000, operating mainly in the area of testing, design review, and documentation of kernel-user-space interfaces. From 2004 to 2021, he maintained the Linux “man-pages” project, which provides the primary documentation for Linux system calls and C library functions. Michael is a New Zealander, living in Munich, Germany, from where he operates a training business (man7.org) providing low-level Linux programming courses in Europe, North America, and occasionally further afield.
Hi, I’m Oisín, a cloud security engineer at Immersive, a company specialising in practical cybersecurity training. I’ve spent the past five years there honing my cloud security skills, with experience across all the major public cloud providers. I love learning about and evaluating cutting-edge research from across the cloud security field, so I can teach others all about the latest trends, tactics, and techniques. I’m especially enthusiastic about AWS and promoting secure practices in cloud infrastructure.
Remco is a Principal Security Researcher at Elastic’s Security Labs, specializing in reversing and analyzing malware, particularly in the Linux domain. With a rich background as a forensic investigator for the Dutch Police, he brings a unique blend of law enforcement and cybersecurity expertise. At Elastic, Remco focuses on dissecting malware families, contributing to the development of innovative security strategies. His work is integral in understanding and mitigating emerging cyber threats, leveraging his extensive experience in digital forensics and threat analysis.
I’m a cybersecurity professional with a background in network security, threat analysis, and internet infrastructure research. My focus is on the intersection of technology and civil liberties, particularly how network-layer protocols are used—and misused—by state actors to control access to information.
Samuel Hopstock is a software engineer at Guardsquare, where he was one of the first engineers working on AppSweep, a mobile app security testing tool. Initially, he contributed to the Java bytecode analysis engine for Android apps. Since then he has shifted his focus to analyzing and protecting native iOS, Android, and Flutter binaries.
Sarah is a Senior Consultant at NVISO, with a focus on Red Team Assessments. Complementing her cybersecurity experience, she has developed proficiency in Operational Technology (OT) assessments and continues to specialize further in this area.
She possesses a Master’s degree in Applied IT Security, which has been enriched by her diverse experiences in cybersecurity roles across various companies.
In addition to her professional work, Sarah is dedicated to contributing to the community by leading workshops and delivering presentations at industry conferences.
Stephan Berger has over a decade of experience in cybersecurity. Currently working with the Swiss-based company InfoGuard, Stephan investigates breaches and hacked networks as Head of Investigation of the Incident Response team. An avid Twitter user under the handle @malmoeb, he actively shares insights on cybersecurity trends and developments. Stephan also authors the blog DFIR.ch, where he provides in-depth analysis and commentary on digital forensics and incident response. Stephan has spoken at numerous conferences, sharing his expertise with audiences worldwide.
Tom Barnea is a Cybersecurity Specialist at Varonis, where he dives into forensics investigations and leads customer-facing DFIR operations. He also contributes to internal research and the enhancement of methods and tools. Previously, Tom was a Team Leader and Instructor for the Cybersecurity Practitioner Course, where he mentored future cybersecurity analysts and introduced innovative learning methods. Always curious and ready for new challenges, Tom believes in the power of continuous learning and simple solutions. He’s passionate about sharing knowledge and truly believes that our work helps to keep the world a better place.
Platform Engineer | OSS Contributor |
Vlad is a seasoned full-stack developer with over a decade of experience building and maintaining scalable B2B platforms, as well as a dedicated open-source contributor. He currently works at Cybergizer in a hybrid SWE/CRE/SRE role, focusing on production reliability, systems design, and cross-functional engineering using languages like Ruby, Elixir, and Rust.
He is a member of the Diesel.rs contributor team and the creator of opencryptolist.xyz, a platform dedicated to fostering open-source contributions in the blockchain industry. Vlad is also the author of idlGuesser.xyz – a tool to get IDL and source code info from closed-source Solana programs, using AI-based reverse engineering. He has open-sourced, maintained, and contributed to several libraries in the Ruby and Rust ecosystems (including pkcs12cracker, solscan-mcp, and visual-cryptography).
He is also a writer for EffectiveProgrammer, AI Advances, IT Next, and Level Up Coding, and a three-time hackathon winner.
Wilfried Bécard is a hacker and researcher working at Synacktiv. With a particular interest in Active Directory and Azure exploitation, his passion lies in uncovering new techniques to enhance cybersecurity in these areas. Constantly experimenting, testing, and collaborating with the security community, he aims at constantly improving his knowledge in these fields.