Alex is a researcher affiliated with public institutions in Germany and Sweden, focusing on security, privacy, and compliance by design. Prior to his research career, he worked as an information security engineer, consultant, and process architect.
Benjamin began his career as a Cyber Security Consultant and has since developed into a specialist at the intersection of machine learning and security. His work focuses on the practical evaluation and implementation of the OWASP Top 10 for Machine Learning and Large Language Models (LLMs), particularly through hands-on experience with RAG-based LLM systems in real-world security contexts.
Benjamin also works on secure system design, applying threat modeling and Security by Design in alignment with ISMS principles. His current research includes supervised learning techniques to reduce false positives in vulnerability detection, as well as risk analysis in LLM systems – always aiming to bridge the gap between research and secure implementation.
Daniel Schwendner is a DevOps Engineer with a strong passion for Cyber Security. With a background in mobile application security and hardware security, he participates in bug bounty hunting and shares his security knowledge online.
Georg is a seasoned professional in the offensive security domain. Currently, he serves as a Red Teamer at NVISO ARES (Adversarial Risk Emulation & Simulation). In this role, he leads and conducts Red Team operations and is responsible for NVISO’s physical security capabilities. Whether it is a locked PC, an Network Access Control (NAC) or a closed door, Georg thrives to bypass it.
Javier Vazquez Vidal is a hardware security specialist with a lifelong passion for electronics and embedded systems security, who has been delivering hands-on hardware security trainings for over a decade. He released his first public research project at Black Hat Arsenal USA 2013 and DEFCON with the ECU tool, followed by the CAN Hacking Tool (CHT) at Black Hat Asia 2014 and his research that demonstrated that it was possible to compromise the Spanish smart power grid at Black Hat Europe.
If you see him around and want to talk with him or ask him some questions, make sure to bring an extra beer or coffee along, depending on the time of the day.
Founder & Security Community Expert @ FullCyrcle Security
Juliane Reimann has worked as a cybersecurity consultant for large companies since 2019, with a focus on DevSecOps and community building. Her expertise includes building security communities among software developers and establishing developer-centric communication around secure software development topics. Before entering the cybersecurity field, she founded several companies in web development. Her web development background provides her with extensive knowledge of the software development lifecycle. Since 2024, she has been a core member of the OWASP Security Champions Guide Community.
Lisi found tech as her place to be in 2009 and has grown as a specialized generalist ever since. Building great products that deliver value together with great people motivates her and lets her thrive. As a security engineer, she’s now fully focusing on all things product security to help build more secure solutions. She’s committed to testing and quality, passionate about whole-team approaches to increase effectiveness and resilience, and enjoys experimenting and learning continuously. Having received a lot from communities, Lisi is paying it forward by sharing her stories and learning in public. She posts on Mastodon as @lisihocke@mastodon.social and blogs at www.lisihocke.com. In her free time, she plays indoor volleyball or delves into computer games and stories of all kinds.
Marius worked for 5 years at the German Patent and Trademark Office on the electronic patent and trademark filing systems. Since 2025, he has been working at the University of Applied Sciences Munich as a researcher and PhD student investigating the resiliency of operational technology at the HM-SecLab.
Since his master’s degree in 2023, he has been working on SBOMs and is a regular contributor to SBOM projects. Mostly, he can be found with the SBOM-Everywhere Working Group at the OpenSSF. He is one of the maintainers and developers of the SBOM-Tooling Catalog hosted by the OpenSSF.
Michael Kerrisk is a trainer, author, and programmer who has a passion for investigating and explaining software systems. He is the author of “The Linux Programming Interface”, a widely acclaimed book on Linux (and UNIX) system programming. He has been actively involved in the Linux development community since 2000, operating mainly in the area of testing, design review, and documentation of kernel-user-space interfaces. From 2004 to 2021, he maintained the Linux “man-pages” project, which provides the primary documentation for Linux system calls and C library functions. Michael is a New Zealander, living in Munich, Germany, from where he operates a training business (man7.org) providing low-level Linux programming courses in Europe, North America, and occasionally further afield.
Samuel Hopstock is a software engineer at Guardsquare, where he was one of the first engineers working on AppSweep, a mobile app security testing tool. Initially, he contributed to the Java bytecode analysis engine for Android apps. Since then he has shifted his focus to analyzing and protecting native iOS, Android, and Flutter binaries.
Sarah is a Senior Consultant at NVISO, with a focus on Red Team Assessments. Complementing her cybersecurity experience, she has developed proficiency in Operational Technology (OT) assessments and continues to specialize further in this area.
She possesses a Master’s degree in Applied IT Security, which has been enriched by her diverse experiences in cybersecurity roles across various companies.
In addition to her professional work, Sarah is dedicated to contributing to the community by leading workshops and delivering presentations at industry conferences.
Platform Engineer | OSS Contributor |
Vlad is a seasoned full-stack developer with over a decade of experience building and maintaining scalable B2B platforms, as well as a dedicated open-source contributor. He currently works at Cybergizer in a hybrid SWE/CRE/SRE role, focusing on production reliability, systems design, and cross-functional engineering using languages like Ruby, Elixir, and Rust.
He is a member of the Diesel.rs contributor team and the creator of opencryptolist.xyz, a platform dedicated to fostering open-source contributions in the blockchain industry. Vlad is also the author of idlGuesser.xyz – a tool to get IDL and source code info from closed-source Solana programs, using AI-based reverse engineering. He has open-sourced, maintained, and contributed to several libraries in the Ruby and Rust ecosystems (including pkcs12cracker, solscan-mcp, and visual-cryptography).
He is also a writer for EffectiveProgrammer, AI Advances, IT Next, and Level Up Coding, and a three-time hackathon winner.