Hours

0

Speakers

0

Tracks

0

Workshops

0

Sponsors

0

What is VetSecCon?

VetSecCon Junior started as a convention by veteran members of VetSec, Inc. to teach newer members about topics ranging from mental health to job hunting and, of course, topics on information security. Our first convention was in April of 2020 and was a resounding success with our members.

What is VetSecCon?

What’s New This Year?

This year, as the non-profit grows, we are looking for more presenters to expand our convention to meet our entire demographic, from active-duty military seeking knowledge on how to transfer, to those just getting started in information security, and we still want some advanced material for those mid-career infosec veterans in our membership. Additionally, with COVID-19 still taking its toll, we are inviting more speakers to discuss mental health and other issues we face in information security.

REGISTER NOW
What's New This Year?

Who’s Speaking

We are still accepting speakers for all three tracks! Let us know if you’d like to present!

Chloé MessdaghiVP of Strategy at Point3 Security

Chloé Messdaghi is the VP of Strategy at Point3 Security. She is an InfoSec Advocate & Activist who strongly believes that information security is a humanitarian issue. Besides her passion to keep people safe and empowered online & offline, she is driven to fight for hacker rights. She is the founder of WeAreHackerz (formerly known as WomenHackerz) & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine's The Uncommon Journey, and runs the Hacker Book Club.

Chloé MessdaghiVP of Strategy at Point3 Security

Chloé Messdaghi is the VP of Strategy at Point3 Security. She is an InfoSec Advocate & Activist who strongly believes that information security is a humanitarian issue. Besides her passion to keep people safe and empowered online & offline, she is driven to fight for hacker rights. She is the founder of WeAreHackerz (formerly known as WomenHackerz) & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine's The Uncommon Journey, and runs the Hacker Book Club.

closepopup
Matt Kiely
Matt KielyAuthor: huskyhacks.dev / USMC

Matt is a cybersecurity practitioner and student of ethical hacking. A US Marine Corps veteran, Matt is an avid outdoors enthusiast and was thru-hiking the Appalachian Trail when the global coronavirus pandemic hit. He was a recent recipient of the Penetration Testing Extreme course as a joint effort between VetSec and eLearnSecurity.

Matt Kiely
Matt KielyAuthor: huskyhacks.dev / USMC

Matt is a cybersecurity practitioner and student of ethical hacking. A US Marine Corps veteran, Matt is an avid outdoors enthusiast and was thru-hiking the Appalachian Trail when the global coronavirus pandemic hit. He was a recent recipient of the Penetration Testing Extreme course as a joint effort between VetSec and eLearnSecurity.

closepopup
Tom Marsland
Tom MarslandBoard Chair at VetSec, Inc. / USN

Tom Marsland is an active duty US Navy Master Chief Petty Officer and the Board Chair at VetSec, Inc. He has been on active duty for 19 years and has travelled from the Equator to the North Pole. He has a passion for cybersecurity and helping to make sure no veteran goes unemployed.

Tom Marsland
Tom MarslandBoard Chair at VetSec, Inc. / USN

Tom Marsland is an active duty US Navy Master Chief Petty Officer and the Board Chair at VetSec, Inc. He has been on active duty for 19 years and has travelled from the Equator to the North Pole. He has a passion for cybersecurity and helping to make sure no veteran goes unemployed.

closepopup
Katelyn BowdenFounder & CEO of BADASS (Battling Against Demeaning & Abusive Selfie Sharing)

Founded in August of 2017, BADASS is a nonprofit organization dedicated to providing support to victims of revenge porn/image abuse, and eradicating the practice through education, advocacy, and legislation. Our goal is to arm victims with the tools they need to become their own advocates for justice, and provide the resources they need to regain control of their images, empower themselves, and get justice.

Katelyn BowdenFounder & CEO of BADASS (Battling Against Demeaning & Abusive Selfie Sharing)

Founded in August of 2017, BADASS is a nonprofit organization dedicated to providing support to victims of revenge porn/image abuse, and eradicating the practice through education, advocacy, and legislation. Our goal is to arm victims with the tools they need to become their own advocates for justice, and provide the resources they need to regain control of their images, empower themselves, and get justice.

closepopup
Lesley CarhartPrincipal Industrial Incident Responder at Dragos, Inc.

Lesley Carhart is a Principal Threat Analyst, Threat Operations Center at the industrial cyber security company Dragos, Inc. She is recognized as a subject matter expert in cybersecurity incident response and digital forensics, regularly speaking on the topic at conferences and universities. She has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy focus on response to nation-state adversary attacks. Prior to Dragos, she was the incident response team lead at Motorola Solutions, performing digital forensics and incident handling services for both enterprise and public safety customers. Her focus at Dragos is developing forensics and incident response tools and processes for uncharted areas of industrial systems. She is also a certified instructor for the Dragos “Assessing, Hunting and Monitoring Industrial Control System Networks” course.

In 2017, Lesley was named a “Top Woman in Cybersecurity” by Cyberscoop news and received the Guidance Enfuse conference “Women in Technology” award. She holds a Bachelor’s Degree in Network Technologies from DePaul University, A.A.S. in Avionics Systems and Electronics Systems, GIAC GCIH, GREM, GCFA, and GCFE certifications, and currently serves as a Cyber Systems NCO in the US Air Force Reserves.

In her free time, Lesley co-organizes resume and interview clinics at several cybersecurity conferences, blogs and tweets prolifically about infosec, and is a youth martial arts instructor.

Lesley CarhartPrincipal Industrial Incident Responder at Dragos, Inc.

Lesley Carhart is a Principal Threat Analyst, Threat Operations Center at the industrial cyber security company Dragos, Inc. She is recognized as a subject matter expert in cybersecurity incident response and digital forensics, regularly speaking on the topic at conferences and universities. She has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy focus on response to nation-state adversary attacks. Prior to Dragos, she was the incident response team lead at Motorola Solutions, performing digital forensics and incident handling services for both enterprise and public safety customers. Her focus at Dragos is developing forensics and incident response tools and processes for uncharted areas of industrial systems. She is also a certified instructor for the Dragos “Assessing, Hunting and Monitoring Industrial Control System Networks” course.

In 2017, Lesley was named a “Top Woman in Cybersecurity” by Cyberscoop news and received the Guidance Enfuse conference “Women in Technology” award. She holds a Bachelor’s Degree in Network Technologies from DePaul University, A.A.S. in Avionics Systems and Electronics Systems, GIAC GCIH, GREM, GCFA, and GCFE certifications, and currently serves as a Cyber Systems NCO in the US Air Force Reserves.

In her free time, Lesley co-organizes resume and interview clinics at several cybersecurity conferences, blogs and tweets prolifically about infosec, and is a youth martial arts instructor.

closepopup
Jonathan HelmusPenetration Tester at Nordstroms and Adjust Professor at City University of Seattle

Jon Helmus is a Navy veteran who is now a security engineer and educator who has been working in engineering, security, and information technology for 10 years. His specializations are in Penetration Testing, Threat and Adversarial Assessments, Vulnerability Management, Cloud Technology (AWS). Jon is also a big fan of academia and loves using his experience as a Technical Educator and University Level Professor to help direct students and veterans into cybersecurity.

Jonathan HelmusPenetration Tester at Nordstroms and Adjust Professor at City University of Seattle

Jon Helmus is a Navy veteran who is now a security engineer and educator who has been working in engineering, security, and information technology for 10 years. His specializations are in Penetration Testing, Threat and Adversarial Assessments, Vulnerability Management, Cloud Technology (AWS). Jon is also a big fan of academia and loves using his experience as a Technical Educator and University Level Professor to help direct students and veterans into cybersecurity.

closepopup
Michael SmithIndependent Consultant

Michael Smith is an independent consultant with over 25 years
experience in the IT security and intelligence fields performing roles
in management, engineering, software development, auditing, incident
response, and threat intelligence.

Michael SmithIndependent Consultant

Michael Smith is an independent consultant with over 25 years
experience in the IT security and intelligence fields performing roles
in management, engineering, software development, auditing, incident
response, and threat intelligence.

closepopup
James MurphyCEO at TechVets

James is a British Military veteran of 19 years having specialised as an Infantry soldier before moving into Intelligence where he ended his service as the lead for multiple regions in a global intelligence requirement management programme. During his service James deployed to Northern Ireland; Helmand Province, Afghanistan; East Africa, Beijing, China.
Upon leaving the Military, James Joined the Government Digital Service, part of the Cabinet Office - in which he provided strategic intelligence support to senior leaders as the Cyber Threat Intelligence Lead.

James joined Techvets in January this year as our first CEO.

James MurphyCEO at TechVets

James is a British Military veteran of 19 years having specialised as an Infantry soldier before moving into Intelligence where he ended his service as the lead for multiple regions in a global intelligence requirement management programme. During his service James deployed to Northern Ireland; Helmand Province, Afghanistan; East Africa, Beijing, China.
Upon leaving the Military, James Joined the Government Digital Service, part of the Cabinet Office - in which he provided strategic intelligence support to senior leaders as the Cyber Threat Intelligence Lead.

James joined Techvets in January this year as our first CEO.

closepopup
Gary TsaiStrategist at Veterans Voice NYC

Gary served as an Aviation Life Support Specialist during his career in the U.S Navy. Upon separation, his initial decision was to major in B.A in Criminology due this his fear of MATH courses while having zero clue about his career goal. After completing his first ever course on Criminology, he became bored about that topic and ran down to his academic advisement department to change his college major to B.S in Computer Science & Information Security. There, he decided to conquer his fear of MATH and utilized his golden opportunity (POST 911 G.I Bill) to reinvent his life. During his college tenure, Gary discovers a new calling, offering assistance to other veterans on tutoring, housing, Veterans benefits, and career guidance.

After completing his B.S degree (pun intended), Gary became an uncompromisingly forthright engineer who loves to share his knowledge on technology and co-founded "Veterans Voice NYC" podcast to highlight veterans' transitional struggles.

Gary TsaiStrategist at Veterans Voice NYC

Gary served as an Aviation Life Support Specialist during his career in the U.S Navy. Upon separation, his initial decision was to major in B.A in Criminology due this his fear of MATH courses while having zero clue about his career goal. After completing his first ever course on Criminology, he became bored about that topic and ran down to his academic advisement department to change his college major to B.S in Computer Science & Information Security. There, he decided to conquer his fear of MATH and utilized his golden opportunity (POST 911 G.I Bill) to reinvent his life. During his college tenure, Gary discovers a new calling, offering assistance to other veterans on tutoring, housing, Veterans benefits, and career guidance.

After completing his B.S degree (pun intended), Gary became an uncompromisingly forthright engineer who loves to share his knowledge on technology and co-founded "Veterans Voice NYC" podcast to highlight veterans' transitional struggles.

closepopup
Brad RhodesHead of Cybersecurity at zvelo

Brad Rhodes is the Head of Cybersecurity for zvelo in Greenwood Village, CO. He holds numerous professional certifications including CISSP-ISSEP, CISM, PMP, C|EH,
RHCSA, and GIAC (GCED, GMON, and GCIH) to name a few. He has over 23 years of experience in the military, government, and private sectors. Brad continues to serve in the Colorado Army National Guard as a LTC, Cyber Warfare Officer leading the next generation
of Soldiers in today's Cyber fight. In the last year he has presented on cyber incident response to over 1000 emergency management personnel helping to prepare the nation in advance of the 2020 elections. Brad's major research areas include utilizing Open Source capabilities to help organizations close gaps in their security, characterize the cyber operating environments, and gain visibility into stacks of data. He's been known to drown a few Lego people to illustrate the practical reality of cyber effects.

Brad RhodesHead of Cybersecurity at zvelo

Brad Rhodes is the Head of Cybersecurity for zvelo in Greenwood Village, CO. He holds numerous professional certifications including CISSP-ISSEP, CISM, PMP, C|EH,
RHCSA, and GIAC (GCED, GMON, and GCIH) to name a few. He has over 23 years of experience in the military, government, and private sectors. Brad continues to serve in the Colorado Army National Guard as a LTC, Cyber Warfare Officer leading the next generation
of Soldiers in today's Cyber fight. In the last year he has presented on cyber incident response to over 1000 emergency management personnel helping to prepare the nation in advance of the 2020 elections. Brad's major research areas include utilizing Open Source capabilities to help organizations close gaps in their security, characterize the cyber operating environments, and gain visibility into stacks of data. He's been known to drown a few Lego people to illustrate the practical reality of cyber effects.

closepopup
Aaron PerkinsDirector, Intelligence Operations Production at Retail & Hospitality ISAC

Aaron Perkins is the Director of Intelligence Production at Retail and Hospitality ISAC (RH-ISAC). In this
position, Aaron is responsible for conducting research, engaging with RH-ISAC members, and creating a
wide variety of threat intelligence reports for the RH-ISAC community.
Aaron has over a decade of experience in the security and intelligence industry, and was previously a Sr.
Security Intelligence Writer at global cybersecurity firm NTT Security (now NTT Ltd.) Prior to NTT
Security, Aaron was heavily involved with startups as a web developer and content manager, and also
managed software and web development projects directly after his Army career.
Aaron spent nearly 8 1⁄2 years in the U.S. Army and held positions including Threat Intelligence Team
Manager, Security Intelligence Operations Manager, and Intelligence Collections Manager, among
others. Aaron deployed to combat three separate times, once to Afghanistan and twice to Iraq.
Aaron is also the host and founder of the Veteran-focused Courage to Fight Again podcast, and has
recently released a book, RESOLVE: A Step-By-Step Guide for Veterans Seeking to Rediscover Purpose,
Meaning & Passion in Post-Military Life.

Aaron PerkinsDirector, Intelligence Operations Production at Retail & Hospitality ISAC

Aaron Perkins is the Director of Intelligence Production at Retail and Hospitality ISAC (RH-ISAC). In this
position, Aaron is responsible for conducting research, engaging with RH-ISAC members, and creating a
wide variety of threat intelligence reports for the RH-ISAC community.
Aaron has over a decade of experience in the security and intelligence industry, and was previously a Sr.
Security Intelligence Writer at global cybersecurity firm NTT Security (now NTT Ltd.) Prior to NTT
Security, Aaron was heavily involved with startups as a web developer and content manager, and also
managed software and web development projects directly after his Army career.
Aaron spent nearly 8 1⁄2 years in the U.S. Army and held positions including Threat Intelligence Team
Manager, Security Intelligence Operations Manager, and Intelligence Collections Manager, among
others. Aaron deployed to combat three separate times, once to Afghanistan and twice to Iraq.
Aaron is also the host and founder of the Veteran-focused Courage to Fight Again podcast, and has
recently released a book, RESOLVE: A Step-By-Step Guide for Veterans Seeking to Rediscover Purpose,
Meaning & Passion in Post-Military Life.

closepopup
Jax Scott
Jaclyn "Jax" ScottFounder at Outpost Gray

As a tenured Special Operations Warrant Officer, tech blogger, small business owner and Senior Analyst in Global Intelligence, Jaclyn “Jax” Scott has sought to expand her skills within cybersecurity. Jax has held positions on boards of nonprofits providing tactical advice to reduce injury to women and children effected by sex trafficking and held executive leadership roles providing cybersecurity guidance to foreign leaders. She is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-pear attacks.
Jax has nearly 17 years’ experience working in military operations where she worked on a special unit that offered gender specific intelligence and security solutions. She is committed to her growth as a leader and is currently finishing her Master’s in Cybersecurity Risk Management at Georgetown University.

Jax Scott
Jaclyn "Jax" ScottFounder at Outpost Gray

As a tenured Special Operations Warrant Officer, tech blogger, small business owner and Senior Analyst in Global Intelligence, Jaclyn “Jax” Scott has sought to expand her skills within cybersecurity. Jax has held positions on boards of nonprofits providing tactical advice to reduce injury to women and children effected by sex trafficking and held executive leadership roles providing cybersecurity guidance to foreign leaders. She is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-pear attacks.
Jax has nearly 17 years’ experience working in military operations where she worked on a special unit that offered gender specific intelligence and security solutions. She is committed to her growth as a leader and is currently finishing her Master’s in Cybersecurity Risk Management at Georgetown University.

closepopup
James SmithSr. Security Engineer at W. Capra Consulting Group

James Smith has always had an interest in computers since he was a young child. He began experimenting with Information Security in High School and has maintained an interest ever since. He enlisted in the Army as an analyst and went on to Special Forces after earning his Green Beret. Then he spent some time as a military and commercial aviator until he decided to finally take his interest in Information Security and turn it into an obsession and a career. He is now a senior Cyber Warfare Operations Technician for the Army National Guard as a senior leader of a Cyber Protection Team. In his civilian life he a Senior Cyber Security Engineer and moon lights as a Digital Forensicator, Adjunct Professor, and mentor.

James SmithSr. Security Engineer at W. Capra Consulting Group

James Smith has always had an interest in computers since he was a young child. He began experimenting with Information Security in High School and has maintained an interest ever since. He enlisted in the Army as an analyst and went on to Special Forces after earning his Green Beret. Then he spent some time as a military and commercial aviator until he decided to finally take his interest in Information Security and turn it into an obsession and a career. He is now a senior Cyber Warfare Operations Technician for the Army National Guard as a senior leader of a Cyber Protection Team. In his civilian life he a Senior Cyber Security Engineer and moon lights as a Digital Forensicator, Adjunct Professor, and mentor.

closepopup
Kristin JudgeCEO/President at Cybervrime Support Network

Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by
technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

To address the needs of cybercrime victims, Kristin founded the nonprofit Cybercrime Support Network (cybercrimesupport.org) and works with federal, state and local law enforcement and consumer protection agencies to help consumers and small businesses affected by cybercrime.

Kristin JudgeCEO/President at Cybervrime Support Network

Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by
technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

To address the needs of cybercrime victims, Kristin founded the nonprofit Cybercrime Support Network (cybercrimesupport.org) and works with federal, state and local law enforcement and consumer protection agencies to help consumers and small businesses affected by cybercrime.

closepopup
Kim NguyenTeaching Assistant at CityU School of Technology and Computing

Kim is working as a Teaching Assistant at CityU School of Technology & Computing, while being a full time M.S. Computer Science student and Security researcher. Currently, Kim focuses on exploit development and mobile application exploitation. Besides advancing her profession, Kim finds her passion in helping people elevate their technical skills and knowledge, especially the ones who come from non-tech expertises, since Kim also transitioned from Business background. As the completion of Kim's M.S. Computer Science is approaching, she aspires to become an enthusiastic red team member after graduation.

Kim NguyenTeaching Assistant at CityU School of Technology and Computing

Kim is working as a Teaching Assistant at CityU School of Technology & Computing, while being a full time M.S. Computer Science student and Security researcher. Currently, Kim focuses on exploit development and mobile application exploitation. Besides advancing her profession, Kim finds her passion in helping people elevate their technical skills and knowledge, especially the ones who come from non-tech expertises, since Kim also transitioned from Business background. As the completion of Kim's M.S. Computer Science is approaching, she aspires to become an enthusiastic red team member after graduation.

closepopup
Brian DavidsonDirector of REDI Core Development at Refinitiv

Brian Davidson is a Director of Software Engineering for the award-winning REDI financial trading platform. Before that role, he was at Amazon.com, the Bureau of Labor Statistics - Current Employment Statistics (the jobs report), and the Marine Corps. Brian has a B.S. in Computer Science from Oregon State University and a B.A. in Economics and Geography from Rutgers University. He currently holds the GCIH, GPEN, and GWAPT SANS certifications.

During market hours, Brian engineers a secure global financial trading platform that handles high-value transactions from world-leading financial institutions. After market hours, he stops playing bit-jitsu and seeks out his next big information security challenge.

Brian DavidsonDirector of REDI Core Development at Refinitiv

Brian Davidson is a Director of Software Engineering for the award-winning REDI financial trading platform. Before that role, he was at Amazon.com, the Bureau of Labor Statistics - Current Employment Statistics (the jobs report), and the Marine Corps. Brian has a B.S. in Computer Science from Oregon State University and a B.A. in Economics and Geography from Rutgers University. He currently holds the GCIH, GPEN, and GWAPT SANS certifications.

During market hours, Brian engineers a secure global financial trading platform that handles high-value transactions from world-leading financial institutions. After market hours, he stops playing bit-jitsu and seeks out his next big information security challenge.

closepopup
Kevin GaddOhio Program Manager for Apprenti

CMSgt (RET) Kevin Gadd is the Ohio Program Manager for Apprenti, a national non-profit that helps veterans, people of color and women get into technology careers through registered apprenticeship. During his 23 years of service, he served 18 years in Air Force communications and technology roles and capped his career as the state diversity officer for the Ohio Air National Guard and Director, ANG Mission Driven Mentoring Program. He has cofounded, funded, and mentored several technology based companies and taught entrepreneurship at The Ohio State University and Dar Al-Hekma in Jeddah, Saudi Arabia.

Kevin GaddOhio Program Manager for Apprenti

CMSgt (RET) Kevin Gadd is the Ohio Program Manager for Apprenti, a national non-profit that helps veterans, people of color and women get into technology careers through registered apprenticeship. During his 23 years of service, he served 18 years in Air Force communications and technology roles and capped his career as the state diversity officer for the Ohio Air National Guard and Director, ANG Mission Driven Mentoring Program. He has cofounded, funded, and mentored several technology based companies and taught entrepreneurship at The Ohio State University and Dar Al-Hekma in Jeddah, Saudi Arabia.

closepopup
James BierlyOwner at Secure Point Solutions

James Bierly is the owner and principal cybersecurity consultant for Secure Point Solutions in Central Iowa.

With 13 years in the Navy operating on both surface ships and submarines as a Sonar Analyst, he is very excited to speak at VetSecCon. James had an unusual transition from military to civilian; from physical security to selling cars, James ultimately found opportunities to learn Information Technology while working overseas. He began a series of positions with increasing responsibility working with the state lottery and technology giants like Microsoft and Hewlett-Packard.

He has spent the last 6 years supporting small businesses as part of a managed service provider and now operates his own information security company. James holds certifications from CompTIA and (ISC)2.

He is married to an amazing woman and together are raising 4 children and 3 dogs for the imminent zombie apocalypse.

James BierlyOwner at Secure Point Solutions

James Bierly is the owner and principal cybersecurity consultant for Secure Point Solutions in Central Iowa.

With 13 years in the Navy operating on both surface ships and submarines as a Sonar Analyst, he is very excited to speak at VetSecCon. James had an unusual transition from military to civilian; from physical security to selling cars, James ultimately found opportunities to learn Information Technology while working overseas. He began a series of positions with increasing responsibility working with the state lottery and technology giants like Microsoft and Hewlett-Packard.

He has spent the last 6 years supporting small businesses as part of a managed service provider and now operates his own information security company. James holds certifications from CompTIA and (ISC)2.

He is married to an amazing woman and together are raising 4 children and 3 dogs for the imminent zombie apocalypse.

closepopup
Ron WoernerChief Security Officer, Educator, Keynote Speaker, Author

Ron Woerner, CISSP, CISM is a noted consultant, speaker and writer in the security industry. Ron established the Cybersecurity Studies program at Bellevue University, an NSA Center of Excellence where he still teaches. He has been a featured speaker for TED, (ISC)2, ISACA, and RSA conferences and numerous industry podcasts and webinars. As President and Chief Security Evangelist at Cyber-AAA (https://www.cyber-aaa.com/), he works as a Security Consultant delivering awareness, performing security risk assessments and advising small, medium, and large organizations. His crowning achievement was being selected as the Air Force Association CyberPatriot Mentor of the Year in 2014 for his work coaching High School Students in cybersecurity. Ron has numerous technology degrees and is passionate about building the next generation of cyber professionals.

Ron WoernerChief Security Officer, Educator, Keynote Speaker, Author

Ron Woerner, CISSP, CISM is a noted consultant, speaker and writer in the security industry. Ron established the Cybersecurity Studies program at Bellevue University, an NSA Center of Excellence where he still teaches. He has been a featured speaker for TED, (ISC)2, ISACA, and RSA conferences and numerous industry podcasts and webinars. As President and Chief Security Evangelist at Cyber-AAA (https://www.cyber-aaa.com/), he works as a Security Consultant delivering awareness, performing security risk assessments and advising small, medium, and large organizations. His crowning achievement was being selected as the Air Force Association CyberPatriot Mentor of the Year in 2014 for his work coaching High School Students in cybersecurity. Ron has numerous technology degrees and is passionate about building the next generation of cyber professionals.

closepopup
Omar SantosPrincipal Engineer - Product Incident Response Team at Cisco

Omar Santos is an active member of the security community, where he leads several industry-wide initiatives. Omar is the author of over 20 books and video courses; numerous white papers and articles. Omar is a Principal Engineer of Cisco’s Product Security Incident Response Team (PSIRT) where he mentors and lead engineers and incident managers during the investigation and resolution of security vulnerabilities. Omar is the chair of the Common Security Advisory Framework (CSAF) Technical Committee; the co-chair of the Forum of Incident Response and Security Teams (FIRST) Open Source Security working group; and the co-lead of the DEF CON Red Team Village. Omar has been quoted by numerous media outlets, such as TheRegister, Wired, ZDNet, ThreatPost, CyberScoop, TechCrunch, Fortune Magazine, Ars Technica, and more.

Omar SantosPrincipal Engineer - Product Incident Response Team at Cisco

Omar Santos is an active member of the security community, where he leads several industry-wide initiatives. Omar is the author of over 20 books and video courses; numerous white papers and articles. Omar is a Principal Engineer of Cisco’s Product Security Incident Response Team (PSIRT) where he mentors and lead engineers and incident managers during the investigation and resolution of security vulnerabilities. Omar is the chair of the Common Security Advisory Framework (CSAF) Technical Committee; the co-chair of the Forum of Incident Response and Security Teams (FIRST) Open Source Security working group; and the co-lead of the DEF CON Red Team Village. Omar has been quoted by numerous media outlets, such as TheRegister, Wired, ZDNet, ThreatPost, CyberScoop, TechCrunch, Fortune Magazine, Ars Technica, and more.

closepopup

Testimonials

See what other people are saying about us.

Owen WatkinsArmy Veteran

"The opportunities and benefits I have seen from Veteran Security (VetSec) in my limited time with them are second to none for any Veteran in or entering Cyber Security."

Ryan H.Cyber Security Engineer / USAF Veteran

“If you're a veteran already in or looking to break into the information security industry, make sure to join Veteran Security (VetSec) for guidance, networking, and engagement with a group of fellow veterans helping others who have served our country!"

Matthew FigueroaSecurity Analyst / Veteran

“If you're a veteran here on my network and you're trying to get onto cyber security, you need to join Veteran Security (VetSec)."

Recent Posts

See how we're getting ready for VetSecCon 2020 below!

Contact Us

We look forward to hearing from you!

Send Message

If you have any questions or just want to get in touch, use the form below. We look forward to hearing from you!