Sean McKeever

Teaching Kids Makes You a Better Hacker - New Speaker - Time 15:30

Sean McKeever Is a Program Manager at GRIMM, previously he worked as a Cybersecurity Architect at global automotive OEM where he secured advanced transportation mobility platforms and served as the company’s Bug Bounty Program Manager for the first public bug bounty program for an automotive OEM. Outside of Sean’s employment, he co-founded the Detroit chapter of the Automotive Security Research Group (ASRG), developed the RoboCar Platform, and contributed to CTFs at DEFCON, GRRCon, Converge and BSides Detroit.


A Beginner’s Guide to Hacking Your Cybersecurity Career - New Speaker - Time 13:15

Dawnlight is a passionate infosec advocate. She provides creative ideas to deliver general cybersecurity education and raise security awareness. She is interested in giving back to the InfoSec community, security education, risk and compliance, penetration testing, vulnerability management, and vehicle security.

Wolfgang Goerlich

Shall We Play a Game? - Expert Speaker - Time 14:00

J. Wolfgang Goerlich is an Advisory CISO for Cisco Secure. Prior to this role, he led IT and IT security in the healthcare and financial services verticals. Wolfgang has held VP positions at several consulting firms, leading advisory and assessment practices.

Bryan Bradford

I want all the DATA! Why death by logging and alerts is bad - New Speaker - Time 12:30

Bryan Bradford is a retired Army service member with over 25 years of IT & Cyber experience. He has spent all forms of blue team and some red team work. His security passions include purple team, threat emulation, and malware analysis. He is dedicated to bringing the red and the blue together to form more effective teams. This will be Bryan's first talk and hopes to do more in the future. In his spare team he spends time with his wife, 3 kids, 2 dogs and 2 cats.

SCYTHE Blue Team Workshop

Run by Chris Peacock - Starting at 1300

The SCYTHE Blue Team Workshop will guide students through the detection engineering process. Students will take curated threat actor procedures and emulate them in a lab environment to generate the necessary logs. Following the emulation phase, we will cover the detection engineering cycle. During the detection engineering cycle, we will dive into identifying key detection opportunities, finding applicable data sources, and engineering detection logic.

Vivek Ponnada

Who's on the Losing End of Ransomware? Not OT. - Expert Speaker - Time 12:30

Vivek Ponnada is the Director of ICS Security for ICI Electrical Engineering, focusing on securing Industrial Control Systems in Critical Infrastructure across Canada. Previously, he was a Service, Sales & Business development manager (Control system upgrades and Cybersecurity solutions) for GE in North America. Prior to that, Vivek started his career as a Controls technician then progressed to a Field Engineer commissioning turbine controls systems in Europe, Africa, Middle-East and South East Asia. He is passionate about ICS/OT Security and enjoys learning & contributing to the security community.

Elaine Harrison-Neukirch

Fun with MITRE ATT&CK and NIST 800-53 - New Speaker - Time 17:00

Elaine Harrison-Neukirch has over 10 years of experience in cyber security working in the healthcare and financial services industries. She currently runs the customer support program at SCYTHE. Elaine loves giving back to the community and volunteers for the Cyber Security Non Profit ( She has written several blogs for them. Elaine advocates for Women in Cybersecurity; she is a member of both Women in Cybersecurity and Women’s Society of Cyberjitsu. Grimm Con is Elaine's first presentation, she hopes to do more in the future.

Marie Williams

Pivoting In Life: Making Lateral Movements - New Speaker - Time 14:45

Marie is an Intern Cybersecurity Analyst at Bitdefender. She recently graduated with a second Associates (Cybersecurity) and is moving on to her next degree for her Bachelor’s in Cybersecurity. Her interests are both Red & Blue team and leadership. She is a Cyber Patriot Mentor, Member Chair of the Association of Computing Machinery, Member of Phi Theta Kappa, past VP of NSLS Honor Society, President of SALUTE Veterans Honor Society and a WICYs Member. If she’s not trying to help where she can, she loves chasing peaks and eating pretty food. She has persevered in the face of challenges and encourages others to stay motivated.

Teresa Rothaar

What Is a Cybersecurity Copywriter, Anyway? - New Speaker - Time 14:00

Teresa Rothaar is a self-employed cybersecurity copywriter who fell into infosec when a GRC software developer solicited her writing services on a gig platform. She has since produced hundreds of blogs and ghostwritten articles, dozens of whitepapers and case studies, and other thought leadership content for cybersecurity firms ranging from small startups to multinational corporations. Teresa holds a B.S. in mathematics and computer science from Temple University, as well as an MBA and an MS in management information systems from Wilmington University. Outside of work, her passions are distance running, writing X-Files fanfic, watching The X-Files, Star Trek, and scores of other mytharc TV programs, and collecting photos of herself standing next to actors at comic cons.

Ian Tabor

Value_pasta_auto, how I built it and saved $28000 - Expert Speaker - Time 15:30

"Network / security architect that has a passion for car hacking, found vulnerabilities in his own car and private Car bug bounties. Now runs Car Hacking Village UK and is part of the team behind CHV at defcon. Has created the nano-can pcb and software, which can allow potential car hackers to build a cheap OBD2 (<£10) car hacking device. "

Keenan Skelly

Bad Legislation turned Good (Part 2): CISA FTW - Expert Speaker - Time 13:15

Ms. Skelly has more than twenty years’ experience in providing security and strategic solutions across a wide array of platforms to include personnel, physical, and cyber security. She brings more than ten years in government service with a focus on National and Homeland Security. Ms. Skelly served in the US Army as an Explosive Ordnance Disposal Technician and went on to work for the Department of Homeland Security in the Office for Infrastructure Protection. In this capacity she ran vulnerability assessments and exercises on Critical Infrastructure assets throughout the Nation and helped to develop the first systems assessment approach for Critical Infrastructure and Key Resources. In addition to government service, Skelly has ten years’ experience with the private sector in Technology & Security Business Management and Strategy. Her former roles include Director of Strategic Partnerships, VP of Sales and Marketing, VP of Global Partnerships, Chief Revenue Officer, CEO, and Board Member. Her expertise in business strategy, crisis management, cybersecurity, intelligence analysis, and Homeland Security make her an admired and respected leader among her colleagues. Skelly has been recognized as one of the Top 25 Women in Cybersecurity 2019 by Cyber Defense Magazine, by The Software Report in the Top 25 Women Leaders in Cybersecurity 2019, and one of the Top Female Executives by Women World Awards in 2019. Skelly is also a mentor and coach for Cyber Patriot, Girls Who Code and, was awarded the Women’s Society of Cyberjutsu Mentor of the Year for 2019, and Top Women in Cybersecurity 2020 by Cyber Defense Magazine.

Nikki Robinson

Trapping the Truth: Using Behavioral Analysis Techniques to Improve Security- Expert Speaker - Time 14:45

I am a Security Architect as well as an Adjunct Professor, and hold a Doctorate of Science in CyberSecurity, as well as several industry certifications (CISSP, CEH, MCITP, etc). I am currently working on a PhD in Human Factors and research blending psychology and cybersecurity. I have a background in IT Operations and Engineering, and moved into Security several years ago. My expertise is in vulnerability management, security architecture and design, as well as integrating human factors into security engineering practices.

Jorge Orchilles

The State of C2 with the C2 Matrix - Expert Speaker - Time 11:45

Jorge Orchilles is SCYTHE’s Chief Technology Officer and co-creator of the C2 Matrix project. He is a published author who holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science, respectively. Jorge led the offensive security team at Citi for 10 years; is a SANS Certified Instructor; author of Security 564: Red Team Exercises and Adversary Emulation; author of the Purple Team Exercise Framework; founding member of MITRE Engenuity Center of Threat-Informed Defense; contributor to MITRE ATT&CK and Atomic Red Team; CVSSv3.1 working group voting member; co-author of a Framework for the Regulatory Use of Penetration Testing in the Financial Services Industry; ISSA Fellow; and NSI Technologist Fellow.

Thomas Somerville

CTI For The Rest Of Us - New Speaker - Time 16:15

Tom is a security researching at Grimm. He is an active member of the infosec community, has a love for vulnerability and threat hunting, and loves talking shop for hours on end over beers with friend. Also, lacks an affinity for writing bios, so this is short.

Paul Cummings

Building a Whole Cyber Human Candidate - New Speaker - Time 11:45

"Visionary Paul Cummings is a retired 20-year US Navy Information Systems Technology Chief, currently working as an Information Systems Security Engineer and Cyber Security Research Engineer for Stephenson Technologies Corporation. He brings a comprehensive background in executive-level planning, managing IT and Cyber Security teams, and program management derived from both global and domestic maritime operations. Mr. Cummings has led 15 Navy Warfighting Ships and 176 Information Security Managers and Security Network Engineers to support over 7,000 enterprise users, enforced a 95% patch management and hardening efficiency for five consecutive years with less than 24 hours of critical service downtime. Built and Established a 38-person Cyber Protection Team and managed a $6M training budget that led the team to be fully qualified a year ahead of schedule and successfully led a large-scale incident response operation which was awarded the Department of the Navy IT Team Excellence Award for 2017. He has helped realign budget for personnel by forecasting Life Cycle Ends and computer system upgrades. His dedication to the success of others has led him to establish Veterans Breaking into IT/Cybersecurity Mentorship Campaign, an organization where he hosts monthly engagements with transitioning service members, veterans, military spouses, and aspiring civilian professionals found on YouTube under Paul Cummings Veterans Breaking into IT Cyber. He actively volunteers with Vets2Industry, Npower, Evolutionary Skills Development Network Discord, and Vicious Vineyards Discord. Career is supported by various certifications and receipt of personal achievements awards: Defense Meritorious Service Medal, the Joint Service Achievement Medal, the Navy Commendation Medal (3 awards), Navy Achievement Medal (4 awards), and the Navy Good Conduct Medal (5 awards), Military Outstanding Volunteer Service Medal, and Department of the Navy IT Excellence Award 2017."

Wesley Lee

Coach to Bryan Bradford

Wesley Lee has over 10 years of cybersecurity experience. Wesley currently works for a consulting firm where he manages and leads his firm OT/ICS security monitoring program and helps OT/ICS organizations secure themselves from modern and unique adversaries. Wesley started his career as a Security Operation Center analyst with the United States Department of Defense, where he also had the opportunity to perform, security audits, network and web application penetration testing, digital forensics, incident response, governance and compliance, OT/ICS security, and cyber threat intelligence on some of the most sophisticated systems around the world. Wesley holds a master’s degree in Cybersecurity from the University of Maryland Global College and obtained a number of information security certifications including CISM, CISSP, GMON, GSEC and GPEN. When Wesley is not working on solving cybersecurity issues, he is looking for a new place in the world to explore in hopes to see more than half of the world.

Mark Griffin

Coach to Sirani McNeill

Mark is a senior security researcher with GRIMM, where he specializes in code auditing, reverse-engineering, and fuzzing. Mark has designed and taught courses in secure software development and exploitation for both undergraduates and professionals. He is also the author of several tools for the visualization of vulnerability research data and automating code coverage analysis.

Catherine Ullman

Coach to Marie Williams

Dr. Catherine J. Ullman is a security researcher, speaker, and Senior Information Security Forensic Analyst at University at Buffalo with over 20 years of highly technical experience. In her current role, Cathy is a digital forensics and incident response (DFIR) specialist, performing incident management, intrusion detection, investigative services, and personnel case resolution in a dynamic academic environment. She additionally builds security awareness among faculty and staff via a department-wide program which educates and informs users about how to prevent and detect social engineering threats, and how to compute and digitally communicate safely. Cathy has presented at numerous information security conferences including DEF CON and BlueTeamCon. In her (minimal) spare time, she enjoys visiting her adopted two-toed sloth Flash at the Buffalo Zoo, researching death and the dead, and learning more about hacking things to make the world a more secure place.

Micah Brown

Coach to Elaine Harrison-Neukirch

Micah K Brown is a member of the IT Security Architecture & Engineering team at a large financial organization. He is focused on building out the next generation of IT Security services and IT Security controls to protect the organization, the employees, the partners, and the customers. Afterhours, Micah volunteers with the Greater Cincinnati ISSA Chapter and has had the honor to present at many prestigious IT Security Conferences.

Daniel Borges

Keylogging on Major Operating Systems (Windows, Linux, macOS) - Expert Speaker - Time 16:15

Dan has been hacking in the infosec scene for 10+ years. A volunteer for CCDC red team for 8+ years and leads the virtual CCDC red team. Also a director for the CPTC for the last 6 years. Recently wrote a book “Adversarial Tradecraft in Cybersecurity”. Writes a blog at

Tim Medin

Access (Still) Granted - Expert Speaker - Time 17:00

Tim runs the Red Siege, a firm performing client focused penetration tests. He is also a Senior Instructor and course author (SEC560) at The SANS Institute. Tim is an experienced international speaker, having presented to organizations around the world. Tim is the creator of the Kerberoasting, a widely utilized Red Team penetration test technique to extract kerberos tickets in order to offline attack the password of enterprise service accounts. He also hates pants.

Hise Gibson

Building Agile Tech Organizations - Keynote Speaker - Time 11:00

Hise Gibson Is a faculty member at the Harvard Business School. Most recently he was an Academy Professor of Systems Engineering at the United States Military Academy at West Point. Dr. Hise O. Gibson graduated with a B.S. in Operations Research from the U.S. Military Academy at West Point. He received his M.S. in Operations Research from the Naval PostgraduateSchool, a Masters in Operations from the Air Command and Staff College, and a Doctor of Business Administration (DBA) in Technology and Operations Management from Harvard Business School. He is a career military officer who attained the rank of Colonel and is a master-aviator in the UH-60 Blackhawk helicopter who has been awarded the Bronze Star medal. He has led large and small teams globally, most recently as a Battalion Commander in the historic 82nd Airborne Division. He also was a fellow at MIT Lincoln Laboratory engage in strategic research initiatives with the DoD. His expertise is the intersection of operational effectiveness and human capital development. He has also worked with midsize and large transportation and distribution organizations, retailers, finance, energy, and tech startups on operational issues and pathways to better leverage their human capital in more effective ways maximizing the intersection of Technology, People, and Processes.

Charles Shirer

Beautiful Baud Breaking Back into the future (A New Outlook on Infosec) - Keynote Speaker - Time 17:45

Charles is a Penetration Tester/RedTeamer/Security Researcher. He has 20 years of overall IT experience with the last 8 years in Information Security performing web application network and wireless penetration test. In his spare time Charles plays retro video games, works on the SECBSD open source project which is a penetration testing distro based on the OpenBsd Operating System, Works as Staff at several Security Conferences, runs a Podcast and enjoy helping others whenever possible.

Keynote Speakers

Speakers & Coaches