Speakers

We’re thrilled to present a powerhouse lineup of cybersecurity experts, thought leaders, and industry pioneers at Offensive X! While we can’t reveal all the speakers just yet, rest assured that we’re diligently curating an exceptional roster that will redefine the boundaries of IT security.

DAY
65
HRS
07
MIN
32
SEC
02

We’re thrilled to present a powerhouse lineup of cybersecurity experts, thought leaders, and industry pioneers at Offensive X! While we can’t reveal all the speakers just yet, rest assured that we’re diligently curating an exceptional roster that will redefine the boundaries of IT security.

Keynote Speakers

Tom Brennan

Executive Director of CREST Americas Region

Charles Henderson

Executive Vice President of Cyber Security Services Coalfire

Speakers

Alessandro Magnosi

Alessandro Magnosi is an accomplished Principal Cyber Security Consultant, boasting over a decade of expertise in the IT sector. He is currently a key member of the Security Testing Team at BSI, the United Kingdom's national standards body, known globally for its certification, training, and cybersecurity services. In addition to his primary role, Alessandro engages as an independent researcher and bug hunter for Synack RT. In his spare time, Alessandro is particularly active in developing and maintaining Open Source Software (OSS) projects, with a primary focus on offensive security.

Emeric
Nasi

I am a french cybersecurity researcher and the founder of BallisKit. Passionate about all infosec subject, especially offensive security subjects, my main research interests mitigation bypass, malware writing, exploit weaponization. I have been speaker at conferences (OffensiveCon, SisSegV, TyphoonCon). I also published some blog posts on various topics such as Antivirus Evasion, UAC bypasses, Initial Access, Linux and Windows security, etc. At BallisKit, I am now focused on R&D for RedTeams and I am the author of MacroPack Pro and ShellcodePack.

Vincent Yiu

Vincent Yiu, a seasoned offensive cybersecurity consultant, has spent over a decade specializing in Red Team operations. His expertise has greatly enhanced the security of a diverse range of entities, from Fortune 500 companies and banks to fintech firms and critical infrastructures. Vincent is at the helm of SYON Security, a firm renowned for its proficiency in advanced offensive security testing, Red Team, and Purple Team services. His strategic approach harmonizes business objectives with cybersecurity defenses, marked by comprehensive testing and introspective analyses. Beyond shoring up technological defense lines, Vincent fosters a culture of cyber resilience within the organizations he serves. His dedication to navigating the dynamic landscape of cyber threats, combined with his proactive approach, positions Vincent as a valued contributor in the sector.

Panagiotis Chartas

Panagiotis Chartas (aka t3l3machus), is a Senior Penetration Tester & Cybersecurity Researcher, currently working at KMD, a leading IT and software company in Denmark. Apart from his primary role, he is an offensive security tools developer, renowned for his impactful contributions to the cybersecurity domain. His ingenuity is evident in the creation of widely-utilized tools such as the Villain C2 Framework (featured in Kali Linux's official repositories), HoaxShell (integrated with revshells.com), Toxssin, Psudohash, Eviltree, CVE-2023-22960, and more.

Pieter Ceelen

Pieter Ceelen a seasoned red teamer & security researcher. At Outflank, Pieter is involved in red teaming and the software development of Outflank Security Tooling, a broad arsenal of red team tools. Pieter performs research into offensive use of MS office and tries to locate new abuse mechanisms. He presented his work at various security conferences such as Troopers, Derbycon, Blackhat and Brucon

Vangelis Stykas

Vangelis began as a developer from Greece. Seven years ago he realized that only his dog didn’t have an API, so he decided to steer his focus towards security. That led him to pursue a PhD in Web Application Security with an extra focus on machine learning. He’s still actively pursuing it. He currently applies his skills as a Chief Technology Officer at Atropos, and during his free time, Vangelis is helping start-ups secure themselves on the internet and get a leg up in security terms. His love of a simplistic approach to hacking by exploiting vulnerable APIs led him to publish research regarding API controlling ships, smart locks, IP cameras, car alarms, EV chargers, and many other IoT devices. Since our lives are nowadays extremely cyber-dependent, his goal is to convince all companies to never neglect their API security as rush-to-market mentality is almost certain to lead to catastrophic security failure.

Efstratios Chatzoglou

Efstratios Chatzoglou received the M.Sc. degree in Security of Information and Communication Systems from the University of the Aegean, Samos, Greece. He has worked more than 3 years in the field of cybersecurity. Currently, he is a Penetration Tester with the Exelasis Ltd., Greece, and a PhD candidate at the University of the Aegean. He has identified more than 25 different CVE IDs from well-known vendors, like ASUS, MediaTek, Netgear, Huawei, LiteSpeed, etc. The most recent one is the CVE-2023-23349 from Kaspersky. He has published more than 15 research papers in well-known conferences and academic journals.

Yashin Mehaboobe

Yashin Mehaboobe is a security consultant at Xebia and has more than 8 years experience in the embedded systems security domain. His primary areas of interest is blackbox vulnerability analysis and pentesting of common IoT devices with focus on Internet facing scalable attacks. He's also identified several fault injection attacks in open source embedded software and modern microcontrollers. In his spare time he likes to travel, take photographs, bake and read.

Andrzej Dyjak

His cybersecurity career began over 15 years ago, transitioning from hacking to securing systems, which provided him with valuable insights from both an attacker's and a defender's perspectives. He currently manages a consulting and training company named Bezpieczny Kod, where he focuses on empowering teams with essential skills and advising on best practices for securing software across the Software Development Life Cycle (SDLC). Additionally, he is an active content creator, building an open community around application security via Discord, running a YouTube channel and a podcast, and disseminating a weekly newsletter. He has also developed an online course titled "Offensive Testing of Web Applications" (OTWA) and is in the process of creating another course on the topic of DevSecOps. His efforts are dedicated to educating and fostering a space for IT professionals to exchange knowledge.

Konrad Jedrzejczyk

The first man who has ever publicly showcased an unmodified Commodore 64 as an attacking machine during modern penetration tests. An Information Security expert and conference speaker with a comprehensive background in Cyber Security (defense). Co-creator of the AI project called ChatNMI

Marek Zmysłowski

He gained experience in both small companies and large corporations, such as Samsung, Trustwave and Microsoft, working as an engineer, pentester and manager. In the security industry for more than 14 years. Experience in the area of penetration testing, reverse engineering or vulnerability finding. Multiple conference speaker in Poland (Confidence, WTH) and abroad (HiTB, PacSec, DefCamp, H2HC, BlueHat) Co-creator of the AI project called ChatNMI

Patroklos Argyroudis(argp)

He is a computer security researcher at CENSUS S.A. His main expertise is vulnerability research, exploit development, reverse engineering and source code auditing. Patroklos has presented his research at several international security conferences (Black Hat USA, Black Hat EU, Infiltrate, CanSecWest, Chaos Communication Congress, PH-Neutral, ZeroNights, etc.) on topics such as kernel and heap exploitation, kernel protection technologies, and network security protocols. He holds a PhD from Trinity College Dublin, where he has also worked as a postdoctoral researcher on applied cryptography.

Zisis Sialveras

He is a computer security researcher from Greece, is currently employed at CENSUS S.A. His professional portfolio encompasses a diverse array of tasks including vulnerability research, reverse engineering, source code auditing, and exploit development. Previously, he delved into experimenting with knowledge-based fuzzers and breaking hypervisors. However, his recent endeavors have steered towards exploring the intricacies of browser security.

Submit a Talk