BSides Memphis 2013

| June 5, 2013
September 7, 2013 all-day
Southwest TN Community College
5983 Macon Cove
Memphis, TN 38134

BSides Memphis 2013 - Security BSides LogoBSides Memphis 2013

BSidesMemphis 2013 is a local presence, in the Mid-South, of Security BSides. BSides is a community-driven framework for building events revolving around the topic of information security. In an open manner, all people are encouraged to assist in the creation and support of each BSides event. You can get involved by presenting a talk, planning, sponsorship, getting the word out or by attending the conference. View the schedule for The 2013 BsidesMemphis Conference here. The schedule also includes what each session will cover.


Joe McCray (@j0emccray) is an Air Force Veteran and has been in security for over 10 years. Joe has been involved in over 150 very high level pentesting assessments and has some major hacking accomplishments that he can share with his classes. His extensive experience and deep knowledge, mixed with his comedic style has lead Joe to be one of the most highly sought after speaking experts in the industry. Joe makes speaking appearances and gives seminars at major events in the security community such as Black Hat, DefCon, BruCon, Hacker Halted and more. Joe is the recipient of the 2009 EC-Council Instructor Circle of Excellence Award and the 2010 EC-Council Instructor of the Year Award. Joe is the founder and CEO of an IT Security consulting firm that provides in-depth technical security assessments of your network, web application, and regulatory compliance gap analysis.

Kevin Poniatowski spent the first ten years of his career learning and implementing insecure coding techniques while developing software for two Department of Defense contractors. His thirst for knowledge and understanding of application security convinced him to escape his cubicle prison six years ago. He has since spent his time atoning for every buffer and heap overflow vulnerability he has written by traveling the world spreading the good word of secure coding as an application security instructor and Director of Instructor led Services for Safelight Security. In his spare time, he visits local open mike stand up comedy nights to inflict his sense of humor upon unfortunate audiences.

Chris Haggard manages an Application Security team in Memphis, TN. He and his team are responsible for driving the secure development and implementation of applications and systems across the global enterprise. He is an advocate of educating developers, enabling secure systems development and evaluating the effectiveness of security assurance activities. His prior experience includes software development and security consulting positions as well as computer operations, development and security in the U.S. Air Force. He holds CISSP, GSSP, and ITIL certifications.

Paul Coggin (@PaulCoggin) is an Internetwork Consulting Solutions Architect with Dynetics in Huntsville, Alabama. Paul is responsible for designing and building broadband multi-service networks supporting Smart Grid, MPLS, VoIP, and IPTV for service providers, leading cyber security research efforts, in addition to performing network security architecture assessments and penetration tests for enterprises, utilities and service providers. Paul is a Cisco Systems Certified Instructor # 32230 and a Certified EC-Council Instructor. He has a BS in Mathematics, MS in Computer Information Systems. In addition he holds a wide array of certifications, including CEH, ECSA, CPTS, CISSP, CCNA SPOPS, CCNP, CCDP, CCIP, CCSP, and CCNP-Voice.

Josh Scott (@scottjosh) is an InfoSec enthusiast from the Dallas, TX area. I am a Husband, Father, InfoSec Enthusiast, Privacy Advocate, and Programmer. When I’m not spending time with my wife and daughters I am organizing CryptoParties in Dallas to teach people how to protect themselves from unwanted surveillance and invasions of privacy.

Matt Smith is Principal Security Analyst at Sword&Shield Enterprise Security

Phil Grimes (@grap3_ap3) is an Information Security Professional with experience in providing application security assessments and penetration testing services to organizations ranging from small businesses, financial institutions, e-commerce, telecommunications, manufacturing, education and government agencies, as well as international corporations. Phil started learning networking and Internet security as a hobby with AOL in 1996, developing his technical skill set independently until joining the MicroSolved Team in 2009. After leaving MicroSolved in 2012, vulnerability research and exploit development became a main focus of attention. Phil’s experience in application security, penetration testing, mobile/SmartPhone security, and social engineering have proven successful in assessments for high profile customers both domestically and around the globe. An accomplished speaker and presenter, Phil has engaged on various topics for MSI’s “State of the Threat” webinars, CUISPA conferences, and at the Central Ohio ISSA InfoSec Summit in addition to various other speaking appearances to a wide range of audiences.

Hal Humphreys is a nerd, an entrepreneur, an investigator, a former research analyst and a valuation specialist. He’s a writer, a pub radio producer, and an educator. He’s a founding partner at Storyboard EMP, LLC, education media publishers.

Hal founded [FIND] Investigations as a professional investigator. He’s a former real estate appraiser. He’s a fly fisherman, hiker, and food lover.

His professional expertise: tech/education/creative startups, product development, old-school marketing, business intelligence, deep research, background investigations.

What is BSides?

Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

This post was imported from a CSV/ICS file.


Comments are closed.