Day-Con X
Learn, Work & Play Harder
Angus Blitter - Your host and resident media whore. Angus is the founder of Hack Sec Klahn, a like-minded group of technologists. Angus is also the creator of PacketWars™ ( the World's first Cyber Sport. Angus believes diversity is good for the species and hackers are a national resource. Old school, grey hat and previously plump, Angus still likes to eat, drink and hack.
Sergey Bratus - Is a Research Assistant Professor of Computer Science at Dartmouth College. His research interests include designing new operating system and hardware-based features to support more expressive and developer-friendly debugging, secure programming and reverse engineering; Linux kernel security (kernel exploits, LKM rootkits, and hardening patches); data organization and other AI techniques for better log and traffic analysis; and various kinds of wired and wireless network hacking. Before coming to Dartmouth, he worked on statistical learning methods for natural text processing and information extraction at BBN Technologies. He has a Ph.D. in Mathematics from Northeastern University. @sergeybratus
Brian Butterly - Is a security researcher, analyst and simply a hacker at Heidelberg (Germany) based ERNW GmbH. Coming from the field of electronic engineering he tends to choose alternate approaches when hitting new projects. He currently works on the intersection of embedded-, mobile and telco-security, with tasks and research ranging from evaluating apps and devices through to analyzing their transport networks and backend infrastructures. Resulting from the broad range of practical experience and natural curiosity he has developed a very diverse set of skills and knowledge. He enjoys cracking open black boxes and learning about their details down to the electronic circuits and creating the tools he needs on the way. He is always happy to share his knowledge and findings.Is a security researcher and pentester for the Mobile Security Team at ERNW. Coming from the field of electrical engineering he tends to seek alternate approaches when looking at new devices. He recently started a research project on the functionality and security in LTE networks.
Dr. Katherine Rogers Davis - Is a Research Scientist in the Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign. Her research interests include data-enhanced power system modeling and analysis, security-oriented cyber-physical techniques for studying the interdependencies of electrical and cyber infrastructures, and making algorithms more robust with respect to untrustworthy inputs. She has worked closely with other TCIPG researchers at the University of Illinois on the protection of the power grid. Davis received the B.S. degree in electrical engineering from the University of Texas at Austin in 2007 and the M.S. and Ph.D degrees in electrical engineering from the University of Illinois at Urbana-Champaign in 2009 and 2011, respectively. Before joining ITI, she worked as a Software Engineer and Senior Consultant at PowerWorld Corporation as well as an Adjunct Assistant Professor in ECE at the University of Illinois at Urbana-Champ
Birk Kauer - Is a Security Researcher at ERNW and enjoys exploitation the most, especially in very tricky and complex situations. He often attends CTFs (Capture the Flags) to challenge himself with tricky exploits while keeping up with daily consulting and assessment work. He currently holds OSCP and OSCE certificates from offsec (Offensive-Security).

Kate Kuehn - Is currently the Deputy CISO, Head of Security Practice – BT Americas. She has been an active thought leader in Security & Advanced Network Technologies for close to 20 years.   She evolved as a thought leader from her years first at MCI & Verizon where she lead the industry’s first projects Ethernet as a network (CPA), IAAS, and helped develop the 1st Secured Proximity Financial Hosting Centers globally to facilitate electronic trading.  Kate went on to lead the Financial Services Complex Solutions team for Verizon before joining BT in late 2011.  Since joining BT, Kate has been active the development of BT’s current Global Services go to market strategy & took over as Head of the Security Practice in April of 2015.  She is passionate about developing Women in Technology, and participates in a number of mentoring programs and BT’s Women’s network.  Kate has attended Marquette & Northwestern Universities & holds certificates in International Politics from The Les Aspin Center for Government & Oxford University.  A mother of four, when not focusing on Security, Kate loves leading her girls Girl Scout troop, and spending as much time possible sailing / boating with her family. Kate’s areas of focus include understanding the role of the modern CISO, the correlation between Security & traditional IT initiatives & STEM outreach for girls.
Josh More - Has more than fifteen years of experience in security, IT, development and system and network administration. Currently, he runs Eyra Security, a security and business improvement consulting firm based in Minneapolis, MN. Josh holds several security and technical certifications and has served in a leadership position on several security-focused groups. He writes a blog on security at, often taking a unique approach to solving security problems by applying lessons from other disciplines like Agile Development, Lean Manufacturing, Psychology, Economics and Complexity Science.
Twitter:  @entropologist
Graeme Neilson - Is the Chief Research Officer at RedShield Security. He has had a varied career, including stints as a street performer, software developer and hacker. He has carried out security testing for government and corporate clients around the globe for the last 10 years and has spoken at security conferences including Day-Con, Troopers, H2HC, BlackHat, CanSecWest, Ruxcon and Kiwicon.

Brittany Postnikoff - Is an information privacy and security, human-computer interaction, and social robotics researcher rooted in academia. She is a graduate student by day, and a slightly more tired graduate student by night. Brittany enjoys entirely theoretical discussions about the best ways in which a hypothetical super villain might cause the rapid development of key areas of technology. ... and also, baby alpacas.
Bruce Potter, CTO of the KEYW Corporation, has over 20 years of experience focused on tackling high-end information security research and engineering problems. During his career, Bruce has built and lead teams focused on hard problems in information security such as cyber security risk analysis, telecommunications security, system and network engineering, computer and information security, advanced software analysis techniques, wireless security, and IT operations best practices. Bruce is also the founder of The Shmoo Group, a non-profit think tank comprising security, privacy, and crypto professionals who donate time to information security research and development. Bruce assists in the organization of ShmooCon, an annual computer security conference in Washington, DC. The most recent conference had over 2,000 attendees from a broad cross section of the security community and included presentations by industry professionals on a variety of contemporary security issues. Bruce has authored many publications and has delivered numerous presentations at various security and network conferences and private events including DefCon, BlackHat USA, ShmooCon, the United States Military Academy, Johns Hopkins University, and the Library of Congress.
Enno Rey - Is a proud veteran of the point-of-origin, non-Con, Day-Con. In Heidelberg, Germany Enno is the founder and Managing Director of ERNW GmbH, where he and his crew focus on consulting and testing in all areas of IT security. With 20+ years of experience in network security, Enno has also published books and white papers (in the recent years mainly on IPv6), with an ongoing interest in the ethical parameters of those in and around the IT Security world (meaning everyone). He is honored to be the keynote speaker for Day-Con’s 10-year celebration. @Enno_Insinuator

Edmond Rogers ‘bigezy’ - Before joining the University of Illinois Information Trust Institute (ITI), Edmond Rogers was actively involved as an industry participant in many research activities in ITI’s TCIPG Center, including work on CyPSA Cyber Physical Situational Awareness,  NetAPT (the Network Access Policy Tool) and LZFuzz (Proprietary Protocol Fuzzing). Prior to joining ITI, Rogers was a security analyst for Ameren Services, a Fortune 500 investor-owned utility, where his responsibilities included cyber security and compliance aspects of Ameren’s SCADA network. Before joining Ameren, he was a security manager and network architect for Boston Financial Data Systems (BFDS), a transfer agent for 43% of all mutual funds. He began his career by founding Bluegrass.Net, one of the first Internet service providers in Kentucky. Rogers leverages his wealth of experience to assist ITI researchers in creating laboratory conditions that closely reflect real-world configurations.
Hendrik Schmidt - Is a seasoned security researcher with vast experiences in large and complex enterprise networks. He is a pentester at the German based ERNW GmbH with focus on telecommunication networks. Over the years he evaluated and reviewed all kind of network protocols and applications. He loves to play with complex technologies and networks and demonstrated several implementation and design flaws. In this context he learned how to play around with core and back haul networks, wrote protocol fuzzers and spoofers for testing implementations and security architecture. As his profession of pentester, security researcher and consultant he  will happily share his knowledge with the audience.
Jacob Torrey - Is an Advising Research Engineer at Assured Information Security, Inc. where he leads the Computer Architectures group and acts as the site lead for the Colorado branch. Jacob has worked extensively with low-level x86 and MCU architectures, having written a BIOS, OS, hypervisor and SMM handler. His major interest is how to (mis)use an existing architecture to implement a capability currently beyond the limitations of the architecture. In addition to his research, Jacob volunteers his time organizing conferences in Denver (RMISC & BSidesDenver) and regular meet-ups across the front range. @JacobTorrey
Patricia Vendt - Has worked in IT for over thirty years at Wright State University. She has served as a Systems Administrator, Network Manager and Information Security Officer for the university and actively involved most recently in the implementation and management of Microsoft’s Office 365 program. She participated in various Programs such as FIRST, Internet2 and regional topical groups for the State of Ohio and University Consortiums.
Gabriel Weaver - Is a Research Scientist at the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign.  He is currently working to develop a Cyber-Physical Topology Language (CPTL) to communicate and analyze cyber-physical systems. CPTL builds upon the observation that researchers and practitioners -- through network diagrams, documentation, and publications -- communicate domain-specific languages that solve specific problems. The intent of CPTL is to help experiments be more readily reproduced and enable tools to operate upon a common language.  Just as Unix text-processing tools operate upon files and lines, so can CPTL-based tools operate upon higher-level language constructs currently used to describe cyber-physical systems.

While working on his doctoral thesis at Dartmouth College, he created eXtended Unix tools (XUTools) to process a broader class of languages in which security-policies are expressed in the language-theoretic sense. XUTools allows practitioners to extract, count, and compare files in terms of high-level language structures found in modern markup, programming, and configuration languages. UTools is already in demand by practitioners and articles on his research have been featured in news outlets such as ComputerWorld, CIO Magazine, Communications of the ACM, and Slashdot.

Throughout the historical transmission of text and diagram, people have identified meaningful substrings of text and categorized them into groups such as sentences, pages, lines, function blocks, and books to name a few. His thesis research interprets these useful structures as different context-free languages (or visual units) by which we can analyze text (or diagram). This research evolved from Gabriel's previous work in the Classics, in which he worked with The Perseus Project at Tufts University, Harvard's Center for Hellenic Studies, and the Archimedes Palimpsest Project, to develop new ways to reference, retrieve, and analyze the historical transmission of text and diagram.