Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation. Leveraging his administration and automation experience, Aaron actively contributes to multiple open and closed source security operation platform projects and continues to create tools and content to benefit the community. As an educator & cyber security researcher at Pluralsight, he is focused on advancing cyber secur
... moreity workforce and technologies for business and national enterprises alike. In support of the Air National Guard, he contributes those skills part time in various initiatives to defend the nation in cyberspace. Certifications: GIAC GCIA, GIAC GCED, CCNA Cyber Operations, Pentest+, CySa+, CASP
www.AaronRosenmund.com
@arosenmund
"ironcat"
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 14+ years of IT experience, 10 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Tim is a believer, husband, father, veteran, software developer, web application security engineer, and the founder of PractiSec (Practical Security Services). With extensive experience in web application security and software development, Tim currently conducts consultative engagements, manages multiple open source software projects (Recon-ng Framework, the HoneyBadger Geolocation Framework, PwnedHub, etc.), writes technical articles (lanmaster53.com), and frequently instructs and presents on s
... moreecurity topics independently and at major information security conferences (DerbyCon, ShmooCon, DefCon, Black Hat, and Wild West Hackin' Fest, etc.). Tim is an industry leader in all things Burp Suite Pro, a Portswigger Preferred Burp Trainer, and an expert in making HTTP requests tremble.
Rishalin is a prolific author and cybersecurity expert. He has authored several video courses on Pluralsight, as well as three books: "Learn Penetration Testing", "Offensive Shellcode from Scratch." and "Ethical Hacking Workshop". He is also a technical contributor to many other books on topics such as dark web analysis, Kali Linux, offensive security, and SECOPS. He has received the Microsoft Content Publisher Gold and Platinum awards for his contributions to the cybersecurity industry. Rishal
... morein is currently a Principal Red Team Consultant for the Google Red Team.
With over two decades of experience in the security industry, Lee is a seasoned professional with a proven track record of delivering top-notch security services to a diverse range of organizations. From Internet Service Providers and computer manufacturers to global pharmaceutical companies, public universities, and a major bank, Lee has worked with some of the biggest names in the industry. With experience as a leader of the penetration testing team at a large bank, Lee has developed deep expe
... morertise in identifying vulnerabilities and developing effective mitigation strategies. He is also an author, having published multiple books on penetration testing and creating more than a dozen video courses on various security topics for Pluralsight. Currently, Lee is focused on leveraging his skills in static application security testing to help financial institutions strengthen their defenses against cyber threats.
Keith Watson has been an information security professional since 1997. He started as a software developer for security tools and moved into more advanced roles as a product manager for operating system security, a consultant, a security researcher, an enterprise security architect, a team leader, and a trusted advisor and director for threat management solutions. Keith has a degree in Computer Science and an MBA. How also holds the CISSP-ISSAP, CCSP, CISA, and other certifications.
Kirk Carter is a cybersecurity professional and penetration tester that is passionate about information security and teaching. A 13-year active duty US Army Veteran, Kirk currently serves as a technical training lead for his Army organization’s cyber operations platform and as a security consultant for Unveil Security Group. He also mentors cybersecurity program students as an Adjunct Instructor at the University of Central Florida. Previously, Kirk has led a threat emulation team to support blu
... moree team training events as well as a team lead on a threat hunting and incident response team. He frequently contributes to the information security community through his LinkedIn and has recently started a blog at https://cartercyber.com. He holds CISSP, OSCP, GDAT, GCIH, as well as other various SANS and CompTIA certifications. During his down time, he likes to spend time with his family, volunteers at the USWOA, enjoy outdoor sports activities, and plays the occasional video game.
Matt Glass is a Service Delivery Manager in Naples, Italy, working as a government contractor. Matt has 15 years of IT experience in a variety of roles. Consistently finding joy in developing the skills of others and helping their careers, he joined Pluralsight in 2017 to pass on the lessons he learned. Matt is married and the father of four children.
Christopher Curry is a full-time offensive security engineer working as a government vendor and a part time Air Force Cyber Officer. He specializes in offensive cyber capability development, vulnerability research, red team engagements, and building Software Defined Radio applications. He has professional performed all phases and roles of offensive cyberspace operations.
Aaron Diaz has worked primarily as a government contractor working with different branches of the military and government agencies. Aaron has worked as a Threat Hunter, Malware Reverse Engineer, Software Developer, and a Penetration tester. He is passionate about reverse engineering software and all things related to offensive security (malware/exploit development). During his tenure on a Threat Hunting team, he became the lead Malware Reverse Engineer. This sparked a love for understanding how
... moreAPTs develop their malware and the creativity of their designs. Currently, Aaron is a penetration tester working with a small team specializing in reverse engineering and exploit development. Aaron is the founder and CEO of Elusive Threat Research, specializing in offensive and defensive research for sophisticated threats.
Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer with the FLARE team at Google, where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineer
... moreing, and other security related topics.
Casey Dunham is an independent security researcher and consultant specializing in application security. His passion for software development began at the impressionable age of 8, when he taught himself Atari Basic - setting the stage for his career ever since. After being exposed to the 2600 community in middle-school and later on attending DEF CON for the first time, Casey switched from building to breaking software. Currently, his primary focus is helping clients build resilient and secure app
... morelications across a variety of industries. Casey is passionate about education and routinely delivers specialized training for clients. Outside of technology, Casey spends time working on a Philosophy degree, table-top gaming, and world travel.
Jeff Stein is an Information Security Architect focused on topics covering Governance, Application, Cloud, Network, Data and Physical security with an eye towards building robust security programs. In addition to security he has a background in Systems Engineering and Administration. Jeff has written on various security topics for industry publications and has worked in both the tech and fintech space. His background in IT also includes employment with the U.S. House of Representatives and the U
... more.S. Senate. Jeff received a Master of Science in Information Security & Assurance from Western Governors University and holds numerous certifications, including his CISSP, GCED, Certified Ethical Hacker, CHFI, Security+ and Palo Alto ACE. Prior to becoming an IT professional, Jeff served in the U.S. Peace Corps as a community development worker and teacher in the Federated States of Micronesia. He spends his free time collecting comic books, playing guitar and with his wife and two children.
FC is a well-known ethical hacker and social engineer. He has been working in the information security field for over 20 years and excels at circumventing access controls. FC legally ‘breaks into’ hundreds of banks, offices and government facilities around the world. His work demonstrating weaknesses in physical, personnel and digital controls assists organisations to improve their security. He is motivated by a drive to make individuals, organisations and countries more secure and better-able
... more to defend themselves from malicious attack. FC has held positions in his career such as Senior Penetration Tester as well as Head of Social Engineering and Physical Assessments for renowned security companies. Having worked as Head of Cyber Research for Raytheon Missile Systems, collaborating alongside intelligence agencies, he has cemented his skillset and knowledge whilst helping governments take correct courses of action against national threats. He is the Co-Founder & CEO of Cygenta
Malek Mohammad is an Information Security Consultant and Penetration Tester with previous software development experience. Malek works on making payment applications more secure through Penetration Testing and Threat Modeling. In addition, He helped many software developers in designing their application with security in mind, and not as an afterthought. Malek still has enthusiasm for software development, he uses Python to automate attack scenarios.
Kat Seymour is a Security Author with 20 years of experience in technology and information security. With a wide breadth of experience, Kat's focus is on Red, Blue, and Purple team operations, tools, and techniques. Kat retired from a decades long career in Fintech to pursue her passion of mentoring and teaching full time. Throughout her career Kat has worked to build and innovate technology at a Fortune 100 Financial Institution including development of the first formalized application monitori
... moreng team, the initial groundwork for the first purple team structure, and the first Red Team mentoring program for cross-training and internal talent development. Kat's passion for technology and security are matched only by her passion to empower the next generation of security professionals through mentorship and knowledge sharing.
Jurrien started off in a datacenter fixing up issues for customers which had their server compromised. Moved into the IT Security field, making him a seasoned IT Security Specialist. Working for and with fortune 500 companies and critical infrastructure as a consultant he has proven himself to be a capable ethical hacker. He has also helped develop procedures and best practices for growing departments and furthering the security maturity of the organization as a whole. While his focus has shifte
... mored from ethical hacking to setting up Red Teams, he regularly gets his hands dirty to keep up with developments and to learn new skills. As he called it "The more you learn, the more you see that there is so much more that you haven't discovered yet."
Dawid Czagan is listed among the Top 10 Hackers by HackerOne. He has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter, and other companies. Due to the severity of these bugs, he has received numerous awards for his findings. He has delivered security training courses at key industry conferences, such as Hack In The Box, CanSecWest, 44CON, Hack In Paris, DeepSec, BruCON, and for many corporate clients. His students include security specialists from Oracle, Adobe, Red H
... moreat, Trend Micro, Philips, ESET, ING, and the government sector. Dawid Czagan is founder and CEO at Silesia Security Lab, which delivers specialized security auditing and training services.
Gavin has 20 years’ experience writing software in regulated environments and for global organisations. The last five years of his development career were spent with a focus on security, becoming the security lead for a significant payments project at a FTSE 100 company. He has experience with languages from COBOL to .Net and many languages in between. Gavin's experience of secure development revealed a passion for security, leading him to become a speaker and blogger on the subject. He has held
... more the Certified Secure Software Lifecycle Professional (CSSLP) and Scrum Master certifications and is currently part of an offensive security team, using his defensive knowledge to aid offensive security work.
Guillaume Ross is an experienced information security professional, providing services to many organizations as the lead consultant and founder of Caffeine Security Inc. Having worked in multiple verticals, from Fortune 50 to startups, his specialty is providing the right security program and architecture for each specific environment and company, and leading blue teams.
Maril Vernon, “SheWhoHacks,” is an IT security expert specializing in pentesting who has helped people start new careers in cyber security from a long tenure in a non-technical industry. After entering cyber security for the National Guard in 2018, in just over 1 year Maril has achieved 7 certifications in pentesting and security in unprecedented time including: Metasploit Pro Certified Specialist, AppSpider Pro Certified Specialist, AWS Cloud Certified Practitioner, Atomic Purple Teaming, and S
... moreecurity+. Maril’s expertise will be featured as a contributing editor of the CIS AWS Foundation Benchmark v1.3 and CSFI. Closing the gap between enterprise risk and IT security, Maril discovered a need for a new kind of expert who could speak to non-technical audiences. Drawing on her multiple degrees from UCSD and other universities, and a family of technical engineers and developers, Maril is uniquely qualified to demystify the terminology, testing, compliance, and tools of cyber security.
Zach describes himself as “an ordinary guy who’s extraordinarily curious about technology.” This curiosity has led to roles in Software Development, Application Security, DevOps, and Security Engineering. Currently, Zach is the Lead Security Engineer at Credible where he helps lead the security vision of a highly sensitive Fintech product. Outside of his day job, Zach has spoken at SyntaxCon, created cybersecurity tutorials through Securing The Stack, led an AWS Meetup group, and has provided cy
... morebersecurity consulting services. When not hitting the keyboard, Zach is hitting the trails! He is an avid hiker and enjoys the simplicity of nature. In fact, Zach’s favorite quote is “Simplicity is the ultimate sophistication” by Leonardo Da Vinci. Zach’s fondness of simplicity has manifested in his tutorials, where he aims to simplify complex topics in the areas of Software Development, DevOps, and Security.
Cristian took part in auditing and implementation of infosec capabilities to uplift security posture. He managed codification efforts to extract indicators of compromise and created rules in the scope of defending
against new emerging threats. He has also developed tools and scripts to overcome security gaps within the
corporate network. Cristian has mentored L1 and L2 analysts to increase triage efficiency and combat new
threats. He has experience in the field of Application Security and has pr
... moreovided Source Code Auditing for AAA game titles on mobile and PC platforms. Cristian has delivered Secure Coding training to development teams based on
common SDLC pitfalls and industry best practices.
With over twelve years of rich experience in IT, Uzair Ansari has been a noteworthy professional in the Windows identity and automation area. He's an AI enthusiast and is currently working as a DevOps engineer. You may know him from his tech blog work at powershellstore.com, but he can also be credited with his contributions to the Microsoft TechNet script center. He holds a Masters degree in Information Technology. During his professional tenure, he has worked on technologies like Windows Power
... moreShell, Python, CI/CD technologies, Linux, Windows Active Directory, public key infrastructure, and Windows Server. He likes to learn and share his knowledge with others.
Pinal Dave is an SQL Server Performance Tuning Expert and independent consultant with over 22 years of hands-on experience. He holds a Master of Science degree and numerous database certifications. Pinal has authored 14 SQL Server database books and 81 Pluralsight courses. To freely share his knowledge and help others build their expertise, Pinal has also written more than 5,800 database tech articles on his blog at https://blog.sqlauthority.com.