{"id":562,"date":"2023-09-12T20:34:27","date_gmt":"2023-09-13T01:34:27","guid":{"rendered":"https:\/\/dev.phreaknic.info\/?page_id=562"},"modified":"2023-10-30T21:19:10","modified_gmt":"2023-10-31T02:19:10","slug":"talks-and-speakers","status":"publish","type":"page","link":"https:\/\/dev.phreaknic.info\/index.php\/talks-and-speakers\/","title":{"rendered":"Speakers"},"content":{"rendered":"\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Elonka is a longtime PhreakNIC attendee, whose solution of the PhreakNIC 3.0 Code launched her public career in codebreaking. She is the author or co-author of four books on cryptography, the most recent of which just came out a few months ago: “Codebreaking (Expanded Edition)”.She currently lives in Washington DC with her cat, Crypto Kitty<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
The \u201cCivilian Architect of Information Warfare\u201d
– Commodore Pat Tyrrell OBE Royal Navy, 1996<\/p>\n\n\n\n
Winn has lived Cybersecurity since 1983, and now says, \u201cI think, maybe, I\u2019m just starting to understand it.\u201d His predictions about the internet & security have been scarily spot on. He coined the term \u201cElectronic Pearl Harbor\u201d while testifying before Congress in 1991. His seminal book, \u201cInformation Warfare\u201d showed the world how and why massive identity theft, cyber-espionage, nation-state hacking, and cyber-terrorism would be an integral part of the future (today\u2019s present).<\/p>\n\n\n\n
His upcoming book, “Metawar,\u201d (a term he coined) describes the art and science of reality distortion, disinformation, manipulation, and addiction in the metaverse. Increasingly impressive immersive technologies, active metacontent orchestration, and powerful feedback systems (OODA loops) will amplify disinformation through believable simulations and the powerful addictive effects of reward-based virtual existences. At some distant date, the metapoint will be reached, where persistent immersive simulations will be indistinguishable from our default \u2018reality\u2019. Just with current and short-term technological capabilities, the security, privacy, ethics, and global policy implications are staggering.<\/p>\n\n\n\n
His last book, \u201cAnalogue Network Security\u201d is a time-based probabilistic approach to justifiable security. By hybridizing analogue and digital security techniques, he offers methods to \u201cfix security and the internet\u201d, including fake news, spam, phishing, DDoS, and more. It will twist your mind. \u201cThe Best Cybersecurity Book of All Time,\u201d Cyber Defense Magazine.<\/p>\n\n\n\n
\u2022 Fellow, Royal Society of the Arts
\u2022 Distinguished Fellow: Ponemon Institute
\u2022 Lifetime Achievement Award, DefCon XXXI
\u2022 30 Year DefCon Goon Retirement
\u2022 International Security Hall of Fame: ISSA
\u2022 Top-20 industry pioneers: SC Magazine.
\u2022 Top 25 Most Influential: Security Magazine
\u2022 Top 5 Security Thinkers: SC Magazine.
\u2022 Power Thinker and one of the 50 most powerful people: Network World.
\u2022 30 Year DefCon Goon (Ret.)
\u2022 Top Rated (4.85\/5) RSA Speaker
\u2022 Top Rated Webinar: 4.56 (ISC2)
\u2022 .001% Top Influencer RSAC
\u2022 Global Power Speaker<\/p>\n\n\n\n
Author: \u201cPearl Harbor Dot Com\u201d (Die Hard IV; the world’s first novel-on-the-net 1993, Project Gutenberg) 3 volumes of \u201cInformation Warfare\u201d, \u201cCyberShock\u201d, \u201cInternet and Computer Ethics for Kids\u201d (The Best Security Book Ever Written, Dr. Fred Cohen) and a few more.<\/p>\n\n\n\n
Executive Producer: \u201cHackers Are People Too\u201d
Founder: The Security Awareness Company, Hacker Jeopardy, Security Experts, InfowarCon. Former recording engineer and producer.<\/p>\n\n\n\n
http:\/\/www.WinnSchwartau.com
@WinnSchwartau
www.linkedin.com\/in\/winnschwartau
https:\/\/en.wikipedia.org\/wiki\/Winn_Schwartau
https:\/\/www.facebook.com\/winn.schwartau<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
poiupoiu lives in Huntsville, AL and loves some FFmpeg, rsync, SSH, and the Oxford Comma. He has spoken at PhreakNIC previously regarding FFmpeg, Video Editing, and other nerdy subjects. This year, he brings a new nerdy talk to the table!<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Ron has been breaking applications for over 20 years. From early days at SUN Microsystems to currently being the director of appsec testing at saltworks security the passion to hack all the things is part of his DNA<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Tain is a Maker, originally from Huntsville, AL. His interests include his family, hobby CNC wood working, 3d printing, and pottery.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Tyler Crumpton thrives on creating things that wouldn’t exist otherwise, especially if they have the potential to inspire others. From playful and interactive LED displays, to silly useless IoT projects, down to synthesizers built from hot dogs, his quest is aimed at sparking a bit of joy where least expected. His toybox usually includes microcontrollers, laser cutters, 3D printers, CNC machines, and whatever else makes it easier to go from goofy idea to goofy reality.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Had a pretty awesome carrier as far as engineers go, first job after college was a 12hr\/day 7 days\/week in Afghanistan fixing bomb robots, followed by a job doing biometrics and then testing of a ICBM interceptor, and now the main engineer for a wide variety of projects.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Hunter “hfuller” Fuller is a network engineer by trade, hacker by destiny, and Huntsville resident by wacky happenstance. They climb towers, fire lasers, and write to mailing lists, all with reckless abandon. Their hobbies including making lights blink and observing lights that are already blinking.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
I am an experienced IT security professional with over 20 years of hands-on experience in networking and information security. I have a passion for growing local information security groups and talent by speaking at conferences, creating online videos\/articles, and teaching Red\/Blue Team at a local maker space. Sharing my knowledge and learning from others is something I truly enjoy.<\/p>\n\n\n\n
Throughout my career, I have worked with various platforms and networks in small to Fortune 500 companies. I can assist in identifying and collaborating to resolve both known and previously unknown issues.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
My name is Mike, and I\u2019m a Security Engineer with a passion for building and problem-solving. I\u2019ve had the privilege of working in a variety of security roles, including as a penetration tester and system administrator, and have always been fascinated by how things work.
Over the course of my career, I\u2019ve had the opportunity to help build and improve security programs for a number of organizations, primarily startups. I\u2019ve deployed various security controls to help mature these programs, and I\u2019m always looking for new ways to improve and enhance security.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Security Engineer at CAT Labs \u2013 a tech startup building tools to fight crypto crime. Pentester who lives and breathes cybersecurity. Finished in the top 3% in National Cyber League CTF with over 6000 competitors. Kennesaw State University graduate with a BS in Information Technology and Founder of Information Systems Security Association at KSU with over 300 members.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Joe Cathell is an Senior Cybersecurity Engineer at for TechGuard Security. When not putting corporate security through it’s paces, he can usually be found at the Arch Reactor Hackerspace in St. Louis, MO. Joe is one of the founding members of Arch Reactor. He is also the co-organizers of the monthly STL2600 \/ DC314 meetup, as well as a regular presenter.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
Dr. James Church is an Associate Professor of Computer Science and Information Technology at Austin Peay State University since 2016. He completed his Ph.D. in Computer Science from the University of Mississippi in 2014. In 2017, he started and continues to lead APSU Coding Camps, which teach computer literacy, online safety, and programming skills to young children, and over 2,000 children have been through program. In addition to teaching, he\u2019s been the program chair of the ACM Mid-Southeast Conference since 2019. He has authored one book, \u201cLearning Haskell Data Analysis,\u201d and one popular Amazon Alexa game that has been played over 20,000 times titled \u201cHunt the Yeti.\u201d He enjoys traveling with his wife, Michelle Allen, and playing with their adorable pet iguana, Khan.<\/p>\n<\/div>\n<\/div>\n\n\n\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n