top of page
BSidesPR 2024

2024 Speakers

Adrian Wood

Adrian Wood

Closing Keynote:
State of the Offensive ML Union

Antonio "Specter" Juanilla

Antonio "Specter" Juanilla

Unlocking the Secret to Building a Fortified Software Development Lifecycle SDLC with Open Source Power

Destiney M. Plaza, CISSP

Destiney M. Plaza, CISSP

I Spy With My Hacker Eye: How Hackers Use Public Info to Crack Your Creds

Dr. Fatou Sankare

Dr. Fatou Sankare

The Dark Side of AI: Unveiling Ethical Dilemmas

Gabriel Schram, Senior Analyst, Cyber Fusion Center

Gabriel Schram, Senior Analyst, Cyber Fusion Center

Leveraging SOC Capabilities to Build Ransomware Resilience

J Wolfgang Goerlich

J Wolfgang Goerlich

Human Factor and Risk: The Behavior Science of Risk

Michael Aguilar (v3ga) - Principle Consultant - Secureworks Adversary Group

Michael Aguilar (v3ga) - Principle Consultant - Secureworks Adversary Group

A Backdoor Into My Heart: Connected Medical Device Security in the 21st Century

Nitin Natarajan

Nitin Natarajan

Secure Our Healthcare: How to Beat the Computer

Peter Halberg

Peter Halberg

Keynote:
AI for Pentesters

RoRo

RoRo

A passion for helping others turned towards helping others hack Government

Susan Peediyakkal

Susan Peediyakkal

Foundations of Building a Threat Intelligence Program

Alberto J. Garcia Vera, MS

Alberto J. Garcia Vera, MS

My Journey to successfully implement a Global Red Team Program

Cándido López, MS Cybersecurity, OSCP, CRTO, PNPT, Sgt. CPD, Evolve Academy Instructor

Cándido López, MS Cybersecurity, OSCP, CRTO, PNPT, Sgt. CPD, Evolve Academy Instructor

The Struggle is Real: Embracing Challenges and Overcoming Obstacles in OSCP Preparation

Dontae Tyler, The Cyber Hygienist

Dontae Tyler, The Cyber Hygienist

Cyber Hygiene (Not your average Security Awareness Training)

Eric J. Belardo

Eric J. Belardo

Unidos Se Puede, Obsidis Consortia & Raices Cyber: A Bright New Future for the Island

Gaspard Baye

Gaspard Baye

Embracing Future Cybersecurity: Hacking Generative AI and Language Models with A.I. Red Teaming and Beyond

Jan Nuñez

Jan Nuñez

Neural Nets and Flying Saucers

Mike Landeck

Mike Landeck

Betrayed by Your Browser: How Third-Party Tracking Systems Are Following You Online

Omar A. Rivera Merced

Omar A. Rivera Merced

Cyber Tabletop Exercises: Going Beyond the Compliance Checkmark

Professor Roger "Mr. Fundamentals"

Professor Roger "Mr. Fundamentals"

How to Build My First Cyber Virtual Home Lab (With NO Money)

Ronald Pazo Torres

Ronald Pazo Torres

Honeypot with caution: Executing malware and learning from our automated adversaries.

Tom VanNorman co-founder ICS Village

Tom VanNorman co-founder ICS Village

The hidden lifeline of hospitals

Andy Dennis

Andy Dennis

Shift Down - Foundational Security with Internal Developer Platforms (IDP)

Daniel Pastrana

Daniel Pastrana

Breaking Barriers Safely: Mastering Physical Penetration Testing in Healthcare Security

Dr. Aunshul Rege

Dr. Aunshul Rege

Social engineering based cyberattacks in the health sector

Frances M. Romero-Torres, Lt Col, USAF

Frances M. Romero-Torres, Lt Col, USAF

Is it legal? Use of AI in Government and Healthcare

Ian Dávila

Ian Dávila

Threat-Informed Defense: The Balancing Act

José Fernández

José Fernández

Workshop:
Using containers to analyze malware at scale

Nannette Martínez

Nannette Martínez

Nannette Martínez - Founder, Onboard Cyber

Paul McCulloch-Otero

Paul McCulloch-Otero

Legal & Regulatory Considerations and Opportunities in Strengthening and Securing Healthcare Infrastructure and the Corresponding Supply Chain in Puerto Rico

Raae Wolfram

Raae Wolfram

The Fax and the Furious: A Prescription for Modern Healthcare Data Exchange

Stefani Goerlich

Stefani Goerlich

The Authenticity Patch: Addressing Privacy and Security Concerns with Sexual Wellness Products

Will Baggett, CCEE, CFE

Will Baggett, CCEE, CFE

Conti Leaks and CARVER Analysis for Threat Intel Analysts

bottom of page