Meet Our Trainers

MEET OUR TECHNICAL TRAINERS

Slawomir_jasek (TT1)
Slawomir Jasek

Speaker, trainer and IT security consultant with 20 years of experience. MSc in automatics & robotics, developed secure embedded systems certified to use by national agencies. As a pentester participated in dozens of assessments of systems’ and applications’ security for leading financial companies, public institutions and cutting edge startups. Currently focuses on security research of various new technologies (especially Bluetooth Low Energy and NFC/RFID) and provides training in regards to security of devices – based among others on contemporary electronic access control systems and smart locks. Besides training and research, he also provides security assessments and consultation on secure design for various software and hardware projects – preferably starting from design ideas. 

Despite having long lost count of the number of BLE devices he owns, he still impulsively acquires more and more and enjoys reversing and breaking them. 

Slawomir loves sharing his knowledge via trainings, workshops, talks and open source hackme’s (www.smartlockpicking.com) – at BlackHat, HackInTheBox, Hardwear.io, HackInParis, Deepsec, Appsec EU, BruCon, Confidence, and many others, including private on-demand sessions.

Richard Johnson (TT3)
Richard Johnson

Richard Johnson is a computer security specialist with a focus on software vulnerability analysis. Currently Principal Security Researcher at FUZZING IO, a research and development company offering professional training and consulting services, Richard offers over 18 years of professional expertise and leadership in the information security industry including past positions as Director of Security Research at Oracle Cloud Infrastructure and Research Lead roles at Cisco Talos and Microsoft.

Richard has published research papers focused on the development of advanced fuzzing and crash analysis technologies facilitating the automation of the vulnerability triage and discovery process. Richard has also delivered training and presented annually at top-tier industry conferences worldwide for over 15 years and is an invited speaker and trainer at several leading events. Richard was also co-founder of the Uninformed Journal and was on program committees for the USENIX Workshop on Offensive Technologies, Recon, and Toorcon.

Nikhil Joshi (TT2)
Nikhil Joshi

Nikhil Joshi is an AI Security Researcher. He is currently working on implementations of ML in offensive and defensive security products. He has orchestrated methodologies to pen-test Machine Learning applications against ML-specific vulnerabilities and loves to explore new ways to hack ML-powered applications. Parallelly Nikhil’s research is focused on security implications in Deep Learning applications such as Adversarial Learning, Model stealing attacks, Data poisoning, etc.

Nikhil is an active member of local Data Science and Security groups and has delivered multiple talks and workshops. He has spoken at HITB Amsterdam, PhDays Russia, and IEEE conferences. And trainer at the Nullnon and Troopers. Being an Applied Mathematics enthusiast, recent advances in Machine Learning and its applications in security, behavioral science, and telecom are of major interest to Nikhil.

Optimized by JPEGmini 3.14.14.72670860 0xed9ddbcb
Raghunath Gopinath

Raghunath is an information security enthusiast primarily focused on Application security stack. He has an overall experience of 12+ years and has helped clients in improving security posture, setting up security practices across multi-domain industries like Transport, Finance, Design Platforms, E-Commerce applications etc.

He currently runs his own Application Security Consulting Services and Training as part of Eracorp Technologies based out of India. Offering expertise on Web, Cloud Security & DevSecOps services. He is also a core member of null Hyderabad chapter, an open information security community.

Raghu even has a history of training students on performing penetration testing, Application security assessments, cloud security and DevSecOps practices in local communities and at various international security conferences like Blackhat, OWASP Appsec, nullcon etc. Lastly, he is an OSCP and CEH certified professional.

Hari (TT5) profile pix
Hari Valugonda

Hari Valugonda is Information security enthusiast, with over a decade of information security experience. His area of interest includes penetration testing, securing Web Applications and DevSecOps. He has implemented Devsecops pipelines for clients from scratch and optimized existing pipelines, He is Null Hyderabad chapter Leader and also the winner of Global Cyberlympics hacking competition. He is usually seen speaking in conferences like Brucon, Nullcon, OWASP and null chapters.

Himanshu Chauhan
Himanshu Chauhan

An IoT Security Researcher focused on researching hardware devices and finding security loopholes. Have more than one year of experience in testing IoT/Embedded devices. Currently researching on side-channel attacks.

Abhinav Thakur
Abhinav Thakur

A cybersecurity professional having 2+ years of experience, mostly involved with low-level security research areas alongside designing frameworks and tools in both offensive and defensive domains of cybersecurity. Having experience in malware research and currently inclined towards breaking IOT systems – mainly firmware security.

Hemant Sonkar
Hemant Sonkar

As a dedicated and accomplished Hardware Security Researcher with 2.5 years of experience in the field. With a strong focus on ensuring robust security measures, he has contributed to the implementation of effective hardware security solutions. Through his expertise in analyzing hardware vulnerabilities, conducting risk assessments, and understanding countermeasures, he has successfully pen-tested various types of IoT devices. Hemant’s in-depth knowledge of emerging technologies and industry best practices enables him to stay at the forefront of hardware security advancements.

MEET OUR LAB TRAINERS

Jay Turla profile pix (lab)
Jay Turla

Jay Turla is a Principal Security Consultant at VikingCloud, and one of the goons of ROOTCON. He has presented at international conferences like ROOTCON, HITCON, Nullcon, DEFCON, etc. He used to work for HP Fortify and Bugcrowd in the areas of appsec.

His main interest or research right now is about car hacking and is currently one of the main organizers of the Car Hacking Village of ROOTCON / Philippines which is recognized and supported by the Car Hacking Village community.

KaiJern
Lau Kai Jern (xwings)

Founder of open source reverse engineering project, Qiling Framework (https://qiling.io). His research topic is mainly on developing cutting edge cross platform reverse engineering framework, embedded devices security, blockchain security, and various security topics.

He presented his findings in different international security conferences like Blackhat, Defcon, HITB, Codegate, QCon, KCon, Brucon, H2HC, Nullcon, etc. He conducted hardware hacking courses in various conferences around the globe. He is also actively involved in Unicorn Engine (https://unicorn-enigne.org), Capstone Engine (https://capstone-engine.org), Keystone Engine (https://keystone-engine.org) and hackersbage.com

slawomir_jasek
Slawomir Jasek

Speaker, trainer and IT security consultant with 20 years of experience. MSc in automatics & robotics, developed secure embedded systems certified to use by national agencies. As a pentester participated in dozens of assessments of systems’ and applications’ security for leading financial companies, public institutions and cutting edge startups. Currently focuses on security research of various new technologies (especially Bluetooth Low Energy and NFC/RFID) and provides training in regards to security of devices – based among others on contemporary electronic access control systems and smart locks. Besides training and research, he also provides security assessments and consultation on secure design for various software and hardware projects – preferably starting from design ideas. 

Despite having long lost count of the number of BLE devices he owns, he still impulsively acquires more and more and enjoys reversing and breaking them. 

Slawomir loves sharing his knowledge via trainings, workshops, talks and open source hackme’s (www.smartlockpicking.com) – at BlackHat, HackInTheBox, Hardwear.io, HackInParis, Deepsec, Appsec EU, BruCon, Confidence, and many others, including private on-demand sessions.

Moonbeom
Moonbeom Park

Moonbeom working at government agency of incident response sector as general researcher, have 15 years of experience in hacking analysis, digital forensic, research on hacking and tracking hacking source.

And not only one of experts among government and private sector in fields of forensic, hacking analysis, hacker profiling, counter-attack on hackers, but also mentor of Korea’s next generation security leader training program ‘Best of the Best(a.k.a BoB).

He is tracking APT attack groups based on the attack techniques and attack vectors used by specific country based APT attack groups, and researching on specific APT attack group profiling base on TTPs. And has been presented findings at conferences such as FIRST, HITB, HITCON, TROOPERS, and SCSD.

Currently, he is working as a special professor at a university in Seoul, Korea until this year.

Abd Halim Bin Mahmood

Graduated in bachelor of Information and Communication Technology from International Islamic University Malaysia (IIUM). Vast experience as a Performance Tester for one of the banks in Malaysia and is interested in cybersecurity. Current position as a Network Security Engineer for Eclogic Sdn Bhd.

Scroll to top