
Alain Mowat is the Head of Research & Development at Orange Cyberdefense Switzerland. He joined the company (then called SCRT) in 2009 as a penetration tester and subsequently led the offensive security team in the same company for many years until turning towards R&D. While still performing various engagements throughout the year, Alain is also dedicated to exploring new approaches to be used by the offensive security industry to better secure client infrastructures.
Aside from these activities, Alain was an active member in the 0daysober CTF team that finished 3rd at DEFCON CTF in 2015 and has responsibly disclosed vulnerabilities in multiple products such as Citrix NetScaler, SonicWall, Barracuda, Twitter and McAfee.
Alain is also responsible for giving various security-related trainings at Orange Cyberdefense Switzerland and has presented at several conferences, such as Insomni’hack, where he is also one of the organisers, Secure IT VS, CyberSecurity Alliance, SIGS and Area41.
- SonicDoor - Cracking open SonicWall's Secure Mobile Access

Senior at Utah State University with a Bachelor’s of Science in Data Analytics, second Bachelor’s in Information Systems Cybersecurity, and a minor in Anticipatory Intelligence. These studies have been formative in his roles as a cyber intrusion analyst, threat intelligence research engineer, and senior threat hunter.
Chandler is an active leader in the cybersecurity community from founding the Student Organization for Cybersecurity at his university to speaking at local events and global cybersecurity conferences including SANS Institute Summits.
He is an organizer for HackUSU, Utah’s largest hackathon and was a guest on CrowdStrike’s Adversary Universe Podcast. Chandler is an advocate for mentorship and giving back to the cyber community.
www.linkedin.com/in/chandlermcclellan
- Hack the Gap - Closing the CTI Divide Between Small Teams and Big Players

Christien 'DilDog' Rioux is a member of The Cult Of The Dead Cow, the author of remote-access utility Back Orifice 2000, and a thorn in Microsoft's side for over a decade. DilDog is the creator of StuntBanana, a caller-id spoofing system, and is proprietor of the hacker-fashion line HACK.XXX. He is also Co-Founder and former Chief Scientist of Veracode, on the founding team of @stake, as well as a member of L0pht Heavy Industries. DilDog is a staunch believer that if you want to change the present you need to build the future, and is very sorry for having helped create "InfoSec" from hacking, and would like to undo the damage.
- Privacy, Veilid, And You

Csaba Fitzl graduated in 2006 as a computer engineer. He worked for 6 years as a network engineer, troubleshooting and designing big networks. After that, he worked for 8 years as a blue and red teamer focusing on network forensics, malware analysis, adversary simulation, and defense bypasses.
Then he moved on to the macOS world and developed a 'macOS Exploitation and Penetration Testing' training at OffSec. Currently he works as a Principal macOS Security Researcher at Kandji. He gave talks and workshops at various international IT security conferences, including Hacktivity, BlackHat, Troopers, SecurityFest, DEFCON, and Objective By The Sea.
Csaba spends his free time with his family, hikes and runs in the mountains.
- Finding Vulnerabilities in Apple packages at Scale

Emil Trägårdh is a Swedish "hacker" and entrepreneur. At the age of 14 he created his first botnet and somewhere in high school he hacked his first city. At the age of 20 he founded a web dev agency and four years later he did his first large-scale government contract. Somewhere in the middle he traveled the world with his family for a year and he no longer works as regular people do. Instead, he devotes most of his time to security because it's fun!
- Closer to 0-day

Eric Capuano is a Director at LimaCharlie and a SANS DFIR Instructor with over a decade of experience in Security Operations, Digital Forensics, and Incident Response. He began his Information Security career as a Tactics Developer for the United States Air Force, later transitioning to Cyber Warfare Operations. After his military service, Eric led cybersecurity operations across private and government sectors, including serving as CTO of Recon Infosec, a company he founded to deliver enterprise-grade security to organizations of all sizes. In 2016, he developed OpenSOC, a blue team CTF that has trained thousands of SOC and IR professionals worldwide. Eric also managed the Security Operations Center for the Texas Department of Public Safety, where he established the agency's first CSIRT. In his spare time, Eric shares technical training labs on his blog at https://blog.ecapuano.com. His certifications include GIAC, GCFE, GCFA, CEH, Security+, Linux+, LPIC-1, PCNSE, and A+.
- Modernizing Incident Response Using Techniques that Scale

John Wilander is the author of hacker thrillers Identified (2022) and Submerged (coming soon). Find out more about John at his website (https://hackerfiction.net/) and reach him on Mastodon (mastodon.social/@wilander).
- Hackers in Fiction: Tropes, Reality, and Friggin' Awesome

Author of the chapter 'Hashcat – A Race Against Time in the Function of Power and Resources' in the book 'Introduction to IT Security' by Sekurak, and the creator of ChatNMI, an innovative open-source, homebrew application designed for transparency and wide accessibility, integrating modern AI models. An Offensive Security expert and conference speaker, I possess extensive experience in IT Security Incident Response, Threat Hunting, IT Forensics, and network/infrastructure security. Actively engaged in AI-related initiatives and discussions, I am a recognized expert with the AI Security Foundation, contributing to the development of secure and ethical practices in the deployment of artificial intelligence technologies.
- Integrating AI with Retro Hardware: A Commodore 64 LLM Module

He gained experience in both small companies and large corporations, such as Samsung, Trustwave and Microsoft, working as an engineer, pentester and manager. In the security industry for more than 14 years. Experience in the area of penetration testing, reverse engineering or vulnerability finding. Multiple conference speaker in Poland (Confidence, WTH) and abroad (HiTB, PacSec, DefCamp, H2HC, BlueHat)
Co-creator of the AI project called ChatNMI
- Integrating AI with Retro Hardware: A Commodore 64 LLM Module

Patricia Lindén is the IT Security Manager at Stadium, stores and e-commerce for an active lifestyle. Patricia brings over 15 years of experience in Information and IT Security, many of the years in defense and defense industry before transferring her knowledge to retail.
Her passion is raising the Security awareness among coworkers, friends, students and those who wants to listen.
- Is there a before and an after, or a happily ever after?

Stephan Berger has over a decade of experience in cybersecurity. Currently working with the Swiss-based company InfoGuard, Stephan investigates breaches and hacked networks as Head of Investigation of the Incident Response team. An avid Twitter user under the handle @malmoeb, he actively shares insights on cybersecurity trends and developments. Stephan also authors the blog DFIR.ch, where he provides in-depth analysis and commentary on digital forensics and incident response. Stephan has spoken at numerous conferences, sharing his expertise with audiences worldwide.
- Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant)

CTO and entrepreneur with a strong Cybersecurity and AI development background.
Years of software development, penetration testing and risk analysis has led to his firm believe that information security and data protection should be a part of the design of any information system, not just an afterthought.
Thomas is a multi time Black Hat speaker and the founder of the security conference sec-t.org
- Hack in a box: Local Language Models for automating Red Teaming and penetration testing.

Whitney is the lead solutions architect at LimaCharlie and a co-founder and former lead architect of Recon InfoSec. She is a seasoned security architect and engineer with over 15 years of experience in designing and automating large-scale security infrastructure. She began her journey as a web and flash developer and sysadmin in the 90s and early 2000s, and after college became a security analyst for the Navy. Her work spans across building advanced security platforms, managing complex multi-environment deployments, and architecting comprehensive solutions that integrate cutting-edge tools and technologies. This includes building, automating, and maintaining the range environments and platforms used to drive and support our trainings. With extensive experience in both the private and public sectors, she excels at automating and orchestrating massive environments and streamlining security operations. Whitney’s passion for security and infrastructure drives her to continuously innovate and enhance the efficiency of security teams and operations. Her certifications include RHCA, RHCE, RHCVA, CISSP, CEH, Security+, Linux+, among others.
- Modernizing Incident Response Using Techniques that Scale

Will (@Stealthsploit) has been in infosec for over 15 years, co-founded In.security in 2018 and as a pentester has helped secure many organisations through technical security services and training. Will's a Black Hat trainer and has taught and spoken at several conferences and events, as well as helping run Password Village at DEFCON. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer.
- Plundering and pillaging password and passphrase plains for profit