Speakers

Josh Summitt

With over 18 years of experience in application security, Josh has played diverse roles—from being a penetration tester and reverse engineer to serving as a full-stack developer and CTO of a cybersecurity startup. He founded Faction Security, an organization committed to hosting open-source tools with the goal of supporting security teams by providing resources that enhance collaboration and efficiency. In addition to making open-source security tools, Josh builds custom modular synths and generally enjoys making strange and unusual noise making devices.

Nirtom

I have been coming to PhreakNIC since 2011. I have previously given presentations on “Meat Hacking” at PN17, where we discussed making Jerky. And at PN23 we discussed the art of “Pen Testing” and turning pens (and other items) on a wood lathe. I have 20ish years in the IT field, currently working as an IT Director. I absolutely hate public speaking and PhreakNIC is one of the exceptions I make because of the wonderful community. As for this talk, I have had my plex pass since 2013, and have been a Starlink User for a little over 2 years. PS- Stop by the CTF, im sure it will be fun again this year!

_NSAKEY

I’m either a backdoor or a conspiracy theory. Who really knows?

M-Nelly

Security Engineer | Penetration Tester | Linux Enthusiast

Ron Foster

Ron Foster has thirteen years working in the application security field and seven additional working with quality and performance testing. His knowledge spans multiple pillars of application security testing. From DAST and Mobile Apps, SAST and SCA to integrating pipelines and process, Ron’s holistic approach to application security keeps his approach flexible and custom. His natural passion and interest in the field keeps him current. Ron speaks at conferences on topics like Integrating Burp into your SDLC, Drone Hacking, and Pentest Delivery. Ron has been instrumental in the development of SaltMiner PenTest, an industry first in standardizing the way PenTest results are consolidated into consistent results. He excels at providing quality in-depth results to customers and mentoring his team in being able to consistently do the same.

Matt Varian

Matt really enjoys making all things hardware, and sadly sometimes software. Enjoys exploring new technologies and using those to better understand things as a whole.

Mike Ivey

My name is Mike, and I’m a Security Engineer with a passion for building and problem-solving. I’ve had the privilege of working in a variety of security roles, including as a penetration tester and system administrator, and have always been fascinated by how things work.
Over the course of my career, I’ve had the opportunity to help build and improve security programs for a number of organizations, primarily startups. I’ve deployed various security controls to help mature these programs, and I’m always looking for new ways to improve and enhance security.

brimstone

Matt Robinson (brimstone) is a long time attendee, sometimes speaker to Phreaknic, co-organizer of DC404 out of Atlanta, and current organizer of ATL2600.

r0nk

Hacker and Coder,
Finding patterns in the noise
Mysteries emerge.

Tyler Crumpton

Tyler Crumpton thrives on creating things that wouldn’t exist otherwise, especially if they have the potential to inspire others to try something new. From playful and interactive LED displays, to silly useless IoT projects, down to synthesizers built from hot dogs, his quest is aimed at highlighting technologies that are easy to learn and sparking a bit of joy where least expected. His toybox usually includes microcontrollers, laser cutters, 3D printers, CNC machines, and whatever else makes it easier to go from goofy idea to goofy reality.

Altk3y (Evelyn)

Altk3y likes big bots and she can not lie. She’s passionate about cybersecurity and committed to advancing the field through innovative solutions and continuous learning (and putting Doom on as many devices as possible). Her experience spans from creating patent-pending security technologies to advising training programs for law enforcement agencies on critical security practices and mentoring through ISSA @ KSU.

mog

Mog is a 6 foot tall ape descendant.
Aliases: 96bcaa76-0f27-45e7-9aa3-65c535e53a05, Matthew O’Gorman, Matt, Dad, just this guy you know

Elonka Dunin

Elonka is a longtime PhreakNIC attendee, whose solution of the 1999 PhreakNIC 3.0 Code launched her public career in codebreaking. She is the author or co-author of four books on cryptography, the most recent of which came out in September 2023: “Codebreaking (Expanded Edition)”.She currently lives in Washington DC with her cat, Crypto Kitty.

Forbin

More to follow, Or talk to me before/after the talk.