Keith Watson has been an information security professional since 1997. He started as a software developer for security tools and moved into more advanced roles as a product manager for operating system security, a consultant, a security researcher, an enterprise security architect, a team leader, and a trusted advisor and director for threat management solutions. Keith has a degree in Computer Science and an MBA. How also holds the CISSP-ISSAP, CCSP, CISA, and other certifications.
George Smith has spent more than 25 years in the IT industry. During this time he has held a variety of positions, starting with web UI development and business analysis, progressing with system administration and infrastructure, then switching to core systems programming, technical consulting, and finally becoming an E-Commerce Architect and Subject Matter Expert. He is well versed in modern trends like Containerization, Infrastructure as Code, Serverless computing models, and more. George demo
... morenstrates a passion for cutting-edge system design leveraging the latest in tech to help enterprises achieve their desired business results. He has recently published "IT Career Paths: Take the Helicopter" on Amazon KDP. George holds a Master in IT degree from Bentley University (Boston, MA) and Master in Business Administration from the University of Ottawa.
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 14+ years of IT experience, 10 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Malek Mohammad is an Information Security Consultant and Penetration Tester with previous software development experience. Malek works on making payment applications more secure through Penetration Testing and Threat Modeling. In addition, He helped many software developers in designing their application with security in mind, and not as an afterthought. Malek still has enthusiasm for software development, he uses Python to automate attack scenarios.