CarolinaCon Online 3

The speaker’s profile picture
Chris Horner

Chris is a Cybersecurity Engineer with Triaxiom Security, a consultancy based in Charlotte, NC. During his career, he has held both client facing and technical operational positions, working with business owners and executives in these roles. He merged his interest of technology and business by organizing community events, bringing local business leaders together to educate them on how to keep their data and their businesses safe. This led further into studying the offensive security side to better help companies test and solidify their security posture. With Triaxiom, he has carried out social engineering engagements and penetration tests against numerous companies over a wide range of industries – from small software developers to large healthcare providers.

He is very active in the local business community, sitting on non-profit Boards that support entrepreneurial initiatives. He is also in regular attendance at technology related events to stay current on business technology initiatives, and gives presentations at regional conferences.

  • Protecting Yourself From People Like Me
The speaker’s profile picture
Corey Overstreet

Corey Overstreet is an experienced penetration tester and red team operator. He has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare. Additionally, he has over five years of systems administration and VMWare administration experience. He has participated as a member of the SECCDC Red Team from 2016-2019. Corey holds the OSCP, OSEP, OSCE, and OSEE certifications.

  • Recon 101: Huge Needles, Small Haystack
The speaker’s profile picture
Dylan Schopmann

Student at the University of North Georgia

  • Kali Ma: Pen-Testing the Connection Between IMDs and HMDs
The speaker’s profile picture
Harvey Cary

As an experienced IT Cloud Security Architect, Harvey Cary has a well-established background in leadership positions in multiple Fortune 500 companies. He is an expert in cybersecurity, with a focus on cloud, network, and software architecture. He obtained his ISC2 CISSP in January 2000 and has continuously expanded his security expertise. He obtained his Certificate of Cloud Security Knowledge (CCSK) from the Cloud Security Alliance in 2015 and his Azure Security credentials in 2020. He holds a Bachelor of Science in Information Technology with a specialization in Information Assurance and Security from Capella University and an A.A.S. Degree in Electrical Engineering Technology from SUNY Broome College.

Harvey is the Lead Security Cloud Architect for several internal projects in AWS and Azure. His core responsibilities include designing and validating architecture to support multiple mission-critical applications. This includes cloud architecture, application architecture including containerized environments on Kubernetes, and ensuring compliance and security throughout the application life cycle.

  • Dynamic Database Credentials: A Secure and Efficient Approach
The speaker’s profile picture
Huxley Barbee

Huxley Barbee (aka void *) s the organizer for BSidesNYC and security evangelist at runZero. Huxley previously worked at Datadog, where he formulated their Cloud Security Platform. Earlier at Cisco, he led a team that automated SecOps and IR playbooks. He holds both the CISSP and CISM certifications.

  • Shining a light into the security blackhole of IoT and OT
The speaker’s profile picture
John F. Davis

John (Math400) has given three talks at CarolinaCon. He is technology enthusiast and a fan of builders and creators.

  • icy bridge project needs your help
The speaker’s profile picture
Joshua Crumbaugh

Joshua Crumbaugh is a world-renowned ethical hacker, social engineer, author, keynote speaker, and entrepreneur. He is the founder of PhishFirewall, a leading cybersecurity company that specializes in providing businesses with cutting-edge solutions to protect against phishing attacks. Joshua's expertise in the field of cybersecurity is unmatched and he is widely recognized for his extraordinary hacking and social engineering feats, such as remotely taking control of an oil pipeline and successfully talking his way into a bank vault.

As an author and keynote speaker, Joshua shares his knowledge and insights on cybersecurity with audiences around the world. He is a peer-reviewed published author and has contributed to several books and articles on the subject.

With a passion for cybersecurity and a deep understanding of the latest threats and trends, Joshua is an expert in the field of ethical hacking and social engineering. He has helped many organizations improve their security and has been an instrumental force in raising awareness about the importance of cybersecurity. Joshua's dedication and expertise make him an invaluable asset in the fight against cybercrime.

  • How to Rob a Bank Over the Phone
The speaker’s profile picture
Matt Agius
  • #BadgeLife The CarolinaCon Online 3 Badge
The speaker’s profile picture
Mike

wonkey.org

  • #BadgeLife The CarolinaCon Online 3 Badge
The speaker’s profile picture
Rodolpho Concurde (ROd0X)

Brazilian, certified C|EH, having begun his studies about Information Security 13 years ago, and passed 11 years has realized projects of Application/Infrastructure Penetration Test, Security Analysis, Code Review and Hardening for industries such as: Telecommunications, Aviation, Financial Institutions, Information Technology and Mining.
In his free time like of research and practice news techniques of Attack and something of Reverse Engineering.
Speaker at many conferences as: Hack In The Box, Ekoparty, Arab Security Conference, Red Team Village, Stackconf, MorterueloCON, BSides Calgary, BSides Newcastle, BSides Athens, etc...
Author:
From SEH Overwrite to get a shell – Pentest Magazine
Covert Channel Technique Explained - Pentest Magazine
From Fuzzing to Get a Shell – Pentest Magazine
Stack Overflow - Hakin9 Magazine

  • Fuzzing: Finding Your Own Bugs and 0days!
The speaker’s profile picture
Trevon
  • Deconstructing Firewalls
The speaker’s profile picture
elrey741 (Alex R.)

Working with automation & leveraging the power of the Linux kernel are some of my favorite projects. While not the most experienced in the security industry, I try to be the most curious and listen as much as I can. While I work with a lot of technologies, ranging from bash scripts to Vagrant-ception, and even more at work, I love using and building Open Source tools. I also enjoy using them in creative and interesting ways. Lastly, I love listening to podcasts!
Learn more about me here: elrey.casa/me

  • The (hash)Cat Factory