
Aishwarya Desai is a Senior Digital Forensics and Incident Response (DFIR) Consultant at Aon, with 5 years of experience in the field. He has led numerous engagements, including ransomware attacks, unauthorized access incidents, and business email compromise cases.
- Ransomware Response in Action: Lessons from the Frontlines

Alex Malashev brings over 20 years of experience in IT, with expertise spanning system and cloud engineering, security, and management roles. A graduate of American Military University with a Master of Science in Information Assurance (MSIA) and a perfect 4.0 GPA, Alex has also earned an impressive array of certifications, including CCP, CISSP, VCP-NV, CCSP, CCNA, PMP, CRISC, PenTest+, and CISM. His extensive career has primarily focused on supporting federal contracts for the Department of Energy (DoE), Department of Justice (DoJ), and Department of Defense (DoD). Currently, Alex serves as the Sr. Manager of Security Services at Philips, where he leads compliance efforts for federal contracts, combining technical proficiency with strong leadership and management skills
- Quantifying Breach Impact Mitigation by ZTA

Allyn Stott is a senior staff engineer at Airbnb where he works on the InfoSec Technology Leadership team. He spends most of his time working on enterprise security, threat detection, and incident response. Over the past decade, he has built and led detection and response programs at companies including Delta Dental of California, MZ, and Palantir. Red team tears are his testimonials.
Allyn has previously presented at Black Hat (Europe, Asia, MEA), Kernelcon, The Diana Initiative, Blue Team Con, Swiss Cyber Storm, SecretCon, Texas Cyber Summit, and BSides around the world. He received his Master’s in High Tech Crime Investigation from The George Washington University as part of the Department of Defense Information Assurance Scholarship Program.
In the late evenings, after his toddler ceases all antics for the day, Allyn writes a semi-regular, exclusive security newsletter that you can subscribe to at meoward.co.
- Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots

Anthony Hendricks is a legal problem solver and litigator at Crowe & Dunlevy, one of Oklahoma’s largest and oldest firms. At Crowe & Dunlevy, Anthony serves as founder and chair of the firm’s Cybersecurity and Data Privacy Practice Group. His legal practice focuses on data privacy compliance, regulatory enforcement and permitting, and other “bet-the-company” suits in the areas of data security, privacy, and other complex business litigation. Anthony is an adjunct professor who teaches Cybersecurity Law and Information Privacy courses at Oklahoma City University School of Law. He also hosts “Nothing About You Says Computer Technology,” a weekly podcast on cybersecurity and data privacy viewed through the lens of diverse voices. To learn more about Anthony’s current projects, upcoming speaking events or listen to the latest episodes of his podcast, visit www.anthonyjhendricks.com
- Throwback Thursday: How Cybercriminals are Exploiting Old Vulnerabilities and Using Past Scams to Target Us

Bonifacio Capuyan is a cybersecurity professional with over 20 years of experience. He holds a degree in Business Management and maintains several certifications, including ServiceNow Certified System Administrator (CSA), Certified Application Developer (CAD), Certified Implementation Specialist – Vulnerability Response (CIS-VR), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM). At ServiceNow, he works within the ServiceNow Security Organization (SSO) and was most recently a lead on the Platform Engineering and Development team. He is currently transitioning into a Product Management role, where he will partner with customers and product teams to deliver meaningful, value driven solutions to the SecOps Software Suite. Outside of work, Bonifacio is passionate about mentoring and dedicates his time to guiding aspiring cybersecurity students.
- What I Learned Mentoring 130+ Cybersecurity Students into Tech

Crystal is a former engineer turned hacker and product marketing leader who lives at the intersection of software security, social engineering, and national defense. With roots in the security community and a deep love for high-integrity code, she’s on a mission to make software safer—not just for users, but for the stability of nations. After witnessing insider threats and systemic risks firsthand from inside a fast-moving engineering org, Crystal now advocates for software supply chain transparency, secure-by-default development, and public-private collaboration to protect the digital infrastructure we all depend on. Whether she’s breaking down SBOMs or breaking into mindsets, Crystal brings a uniquely human approach to securing what matters.
- Securing Open Source: A National Security Imperative

Kicking off my cybersecurity career during 11 years with the US Air Force, I specialized in incident response, threat hunting, and cloud security. My time included formative tours with the Air Force CERT (AFCERT) and a National Cyber Protection Team, tackling real-world threats head-on. Transitioning to the private sector, I now contribute to Google/Mandiant's mission, focusing on advancing Digital Forensics and Incident Response (DFIR) capabilities and applying lessons learned from the front lines. Outside the digital trenches, I enjoy quality coffee, exploring new tech, family time, and catching up on good TV shows.
- Copy, Paste, Compromise: The Danger of ClickFix Attacks

Dirce currently works as a seasoned Cybersecurity GRC Leader in the FinTech and Financial Services sector. With over 17 years of experience spanning across Information and Cyber Security, Cyber Threat Risk Management, Cybersecurity IT Audit, and Cyber Security Research in various industries; specifically Texas State Government, Higher Education, Healthcare and Financial Sectors. Dirce holds both a Bachelor's degree in Computer Information Systems and E-Commerce, and a Master's degree in Information Security and Information Assurance Management from Our Lady of the Lake University. He holds the following industry certifications: Associate, C|CISO, CISA, CISM, CRISC, CPDSE, CSX. In addition to his professional career, Dirce is involved with higher education in a professor capacity teaching Organizational leadership, Cybersecurity, and general IT courses for several colleges and Universities.
- All Eyes on AI Governance: Perspectives from Security Practitioners

Divi Anand is a Cybersecurity Analyst with a Master’s in Cybersecurity from Northeastern University. She has gained valuable experience working with exceptional teams during her internships at Mayo Clinic and NRG Energy, where she now continues her professional journey. Divi is deeply passionate about making cybersecurity more accessible and helping individuals better understand what they’re truly agreeing to in today’s hyper-digital world.
Driven by curiosity and a commitment to continuous learning, Divi has earned several certifications, including CompTIA Security+ and EC-Council’s CHFI, active member of WiCyS (Women in Cybersecurity group). Whether tackling technical challenges or engaging in people-focused initiatives, Divi finds purpose in contributing to conversations that empower users, raise awareness, and illuminate the often-overlooked areas of the cybersecurity realm.
- From Evidence to Insight: Digital Forensics Made Easy with FTK Imager

Dr. Diana Orozco is a passionate cybersecurity advocate and leader supporting critical national security initiatives while creating pathways for emerging talent. Diana leads all aspects of Business Development operations for BreakPoint Labs, a cybersecurity services firm located in the National Capital Region. With a mission to bridge the gap between technical excellence and mission impact, Diana champions innovative, forward-thinking strategies that elevate cyber and resilience across the defense and private sectors. Her professional and volunteer work focuses on building effective cybersecurity ecosystems through collaboration, education, and community outreach. Known for her commitment and drive towards a more secure cyberspace, Diana continues to shape the future of cybersecurity—one learner, one mission, and one breakthrough at a time.
- Hacker Reels: Cyber Cinema Sins

With a sharp focus on operational impact, Dr. J drives cyber mission planning and convergence strategies that fuse intelligence with execution to enhance mission success. Her background spans purple teaming, threat hunting, ICS security, and cyber threat intelligence, delivering results in complex and high-pressure environments—including incident response. Outside of her professional role, she actively empowers the next generation of cybersecurity leaders through her mentorship of a local CyberPatriot team.
- Hacker Reels: Cyber Cinema Sins

Dwayne has been working as a Developer Advocate since 2014 and has been involved in tech communities since 2005. His entire mission is to “help people figure stuff out.” He loves sharing his knowledge, and he has done so by giving talks at hundreds of events worldwide. He has been fortunate enough to speak at institutions like MIT and Stanford and internationally in Paris and Iceland. Dwayne currently lives in Chicago. Outside of tech, he loves karaoke, live music, and crochet.
On LinkedIn at https://www.linkedin.com/in/dwaynemcdaniel/
- I'm A Machine, And You Should Trust Me: The Future Of Non-Human Identity
- Hacker Reels: Cyber Cinema Sins

Senior Security Consultant at Beazley Security
Jacob is a seasoned cybersecurity expert currently serving as a Senior Security Consultant at Beazley Security. In this role, Jacob collaborates with clients on proactive security engagements, implements effective security controls post-incident, and assists with Incident Response (IR) as a special resource when needed.
With a diverse background spanning various sectors, Jacob brings a wealth of knowledge and experience to the field of cybersecurity.
- The Human Cost of Cyber Attacks: Beyond the Financial Impact
- Analysts, Architects, Engineers, and Responders - A Beginner's Roadmap to Security Careers

Jonathan Gonzalez graduated from the University of Texas at San Antonio with a major in Cybersecurity and Information Systems and a minor in Digital Forensics in 2020. During his collegiate career he worked in Application Security, Security Operations and Vulnerability Management before doing Digital Forensics and Incident Response (DFIR) at Crowdstrike. He is now an Assistant Vice President (AVP) of Cyber Threat Intelligence at Synchrony Financial, where he works to build and test enterprise defenses for key stakeholders. Currently, he is a graduate student studying Global Security Studies at Johns Hopkins University, deepening his understanding of the intersection between cybersecurity and global security. Outside of his professional and academic pursuits, Jonathan enjoys lifting weights, traveling, engaging with the Warhammer 40k universe, and reading military history.
- Your Info, Their Payday: A Look into the Infostealer Economy

Josh Prager has over 13 years’ experience focusing on DoD red team infrastructure, cyber threat emulation, and threat hunting. As a former threat hunter in the Federal industry, he provided various cyber threat emulation and threat hunting assessments throughout DOD environments. As a principal consultant at SpecterOps, he guides clients in developing the maturity of their detection and response programs, building their detection engineering capabilities, and ensuring detective and preventive coverage of offensive techniques.
- Detections and Evasions for Configuration Manager Attack Paths
Information Security Manager at AMD with over a decade in experience in offensive security.
- Automate All the Things! No-Code Edition (Security Nightmares Included)

Matthew Gracie is a defensive security specialist with fifteen years of Blue Team experience in higher education, manufacturing, financial services, and healthcare. He is currently a Senior Engineer on the professional services team at Security Onion Solutions, as well as an adjunct professor of Cybersecurity in the graduate school at Canisius University. Matt is also the lead organizer of Infosec 716, a monthly meetup for security enthusiasts in Western New York, and the BSides Buffalo technology conference. He enjoys good beer, mountain bikes, open source security tools, and college hockey, and can be found on Bluesky as @InfosecGoon.
- My Cyber Sense Is Tingling! Detection Engineering With Free Tools

Matt has been involved with all things Security, Open Source and Linux since before they were cool. He's worked with everything from Fortune 100's and Wall Street Fintech firms to a tropical fish wholesaler. When not working tech, hiking or bicycling, he enjoys geeking out with symphonies, prog rock, jazz, bluegrass and whatever else tickles his melodic, harmonic and rhythmic fancy, because it don't mean a thing if it ain't got that certain je ne sais quoi. Matt holds CISSP & CISA certifications and is currently serving as the President of the Capitol of Texas chapter of the Information Systems Security Association in Austin.
- Encrypting Your Infrastructure Without Getting Fired

Pete is responsible for the business architecture of the Identity and Access Management (IAM) Program at a Fortune 200 financial company. Pete has been an Information Security professional for over 25 years. Prior to his current role, Pete had experience with Information governance, InfoSec strategy, built several Security Operations Centers, and did InfoSec outsourcing for over 10 years. Pete also proudly served in the United States Navy, where he was a Search and Rescue Swimmer.
- Identity and Access Management (IAM) - How it all fits together

Peyton has spent 10+ years in cyber security with an emphasis in Red Team, Incident Response, and Threat Intelligence. He was a member of CrowdStrike Services from 2018 - 2023 where he split time between Incident Response and Red Team. He was a first responder to many of the most sophisticated nation state and e-crime cyber intrusions in the world. He also performed numerous red team exercises across a range of industry verticals and breached 20+ Fortune 1000 organizations.
Today, Peyton is the founder and CEO of Specular where he's focused on combining cyber security and AI to augment the identification, assessment, and remediation of cyber security vulnerabilities and misconfigurations.
- AI Agents: Augmenting Vulnerability Analysis and Remediation

Phillip Wylie is a cybersecurity professional with over 21 years of experience and currently serves as xIoT Security Evangelist at Phosphorus Cybersecurity. His specialization is offensive security, including network, Wi-Fi, and application pentesting, and he formerly taught pentesting at Dallas College. He co-authored The Pentester Blueprint and hosts The Phillip Wylie Show. Phillip is also a frequent international speaker and workshop instructor in the cybersecurity community.
- Pwning Web Apps (Conf. Rm. B)
Radioteacher has over 25 years of experience working with financial institutions, keeping their employees, customers, and data safe.
- Locks, Common Vulnerabilities and Exposures

With over 24 years of hands-on experience in information security and IT, specializing in developing security programs with a focus on risk management, I've consistently delivered value for Fortune 100 and 500 companies, as well as the public sector. As the former CISO at Portland Community College, I orchestrated the alignment of security initiatives with the organization's mission and objectives.
- Hacking the Machine: Unmasking the Top 10 LLM Vulnerabilities and Real-World Exploits

Rob is a 27-year US Army veteran who retired as a Chief Warrant Officer 3 in 2004. During his service, Rob was a Communications Intelligence Analyst conducting network exploitation. In 1993, after being assigned to San Antonio, Rob began working in computer network operations, focusing on defensive and offensive activities.
During this time, Rob assisted the Land Information Warfare Activity (LIWA) in developing the Army’s Computer Emergency Response Team (ARCERT) and the Army’s Blue Team. Additionally, Rob worked with the US Army Reserve Command in establishing its Reserve Component Computer Security Teams.
Rob was an Army certified instructor and an adjunct instructor for the National Security Agency
- Tabletop Exercise, Shadows to Stability: Protecting the Community from Disruptive Cyber Attacks (Conf. Rm. C)

Rob Kraus is the Founder & CEO of Vulnerex, LLC, providing expert penetration testing and offensive security services. With 20+ years in cybersecurity, Rob previously led Offensive Cyber Operations at Evolve Security and served as Senior Director at NTT's Global Threat Intelligence Center. He's co-authored two cybersecurity books, reported 20+ CVEs, and holds an MBA, BSIT in Software Development, and industry certifications including CISSP and CEH.
- Automate All the Things! No-Code Edition (Security Nightmares Included)

https://www.rodneybeede.com/curriculum%20vitae/bio.html
- Pen-Testing Cloud REST APIs (Conf. Rm. B 🎉)

Ryan René Rosado is a pillar of expertise in the global cybersecurity landscape, with an illustrious career spanning over a decade. Ryan is a Teaching Assistant with Harvard Extension School for a course on Network and Cloud Security as well as an Advisor to a startup, Ally Security. Having fortified the cybersecurity domains of powerhouse organizations such as EY, Avanade, and Optiv, she carved her path from an enlisted Cyber Intelligence Analyst in the US Air Force, dual-majored in Cybersecurity and Disaster Management and is an emerging influence in the private sector. Her success in incident response, threat intelligence, risk management, and compliance are a testament to her strategic and analytical acumen.
Ryan often appears on The Security Happy Hour podcast and was a moderator for "The Future CISO" podcast, was published in Dark Reading and Signal IT Magazines, and presented at the Texas Cyber Summit in 2022.
- Your AI-Cybersecurity Crash Course

Working in the field of Digital Identity since 2002, SciaticNerd is actively involved in the San Antonio Information Security community. He participates in other local groups and diligently works to promote involvement with computing, security, and technology, and works to support the security curious.
- Starting Your Homelab

Steven Ollek is a seasoned technology leader with over 20 years of experience in the US Public Sector and Department of Defense. Currently serving as the Senior Director of Innovation at Metronome, Steven brings a people-first philosophy to his work, focusing on technological innovation, growth strategies, product development, and customer relationship management.
Before joining Metronome, Steven held several key positions, including Delivery Account Manager for the Air Force at Defense Unicorns, where he led the Air Force Portfolio across the Delivery Segment. He also served as the Platform One Party Bus Driver at DoD Platform One, directing a portfolio of services totaling $45 million to enable value across customer organizations.
Steven's career is marked by his dedication to driving transformation and fostering a culture of innovation. His leadership style emphasizes collaboration, integrity, and continuous improvement, making him a respected figure in the tech & defense sectors.
- Bridging the Gap: Empowering Non-Technical Teams in Information Security

Wes Wright is a Senior Security Consultant at Bishop Fox and the founder of Hill Country Hacking. With over 10 years of experience in the cybersecurity industry, Wes has conducted offensive engagements against web and mobile applications, cloud infrastructure, and enterprise networks. He is also experienced in on-site and remote social engineering.
He holds a B.S. in Computer Engineering from Texas A&M University and is completing a Master of Science in Information Security Engineering from the SANS Institute of Technology. Wes also maintains 11 GIAC certifications, along with his CISSP and CompTIA A+.
- Offensive by Design: GenAI and Docker for the Lazy Hacker

W. Garrett Myler, Sr. OT cybersecurity Specialist at Red Trident Inc. and proud U.S. Air Force Reservist, has over a decade of experience supporting threat intelligence and cyber operations within the U.S. Department of Defense - from strategic to tactical levels of operation. He has traveled the world performing vulnerability assessments on industrial control systems (ICS) supporting critical infrastructure. Mr. Myler is an experienced and engaging cybersecurity instructor and presenter and has trained professionals and addressed audiences from around the world. He is a CISSP, GIAC Certified Forensic Analyst, an ISA 62443 certified "expert", and has a Masters of Science in Digital Forensics and Cyber Investigation. Mr. Myler is honored to fill the roles of husband to his wife Julie and father to their five children.
- Training Isn't Enough: Hacking Hackers via Flipper Zero + Evil Portals

The Women’s Society of Cyberjutsu – Alamo Chapter is the San Antonio arm of a national 501(c)(3) nonprofit committed to empowering women to break barriers and build careers in cybersecurity. Rooted in the heart of Military City USA, our chapter supports local talent through hands-on learning, mentorship, and community-driven events that reflect the strength and diversity of the South Texas cyber ecosystem.
Mission Statement:
To advance women in cybersecurity across the San Antonio region by offering accessible training, mentorship, educational resources, and professional networking. Through local partnerships and a strong community focus, the Alamo Chapter is helping shape a more inclusive and skilled cyber workforce—right here in Texas.
- Hacker Reels: Cyber Cinema Sins