HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"count": 14,
"next": null,
"previous": null,
"results": [
{
"code": "AG9NKZ",
"name": "Wolfgang Hotwagner",
"biography": "Wolfgang Hotwagner is a Research-Engineer at the ICT Security Research Team of the Austrian Institute of Technology(AIT), where he works on various topics like \"Pentesting\", \"Log File Anomaly Detection\" and \"Cyberrange\". He is a linux enthusiast and practices it-security in his spare time.",
"submissions": [
"C8S7CE"
],
"avatar": null
},
{
"code": "TNADSL",
"name": "Max Landauer",
"biography": "Max Landauer, MSc, finished his Bachelor’s Degree in Business Informatics at the Vienna University of Technology in 2016. In 2017, he joined the Austrian Institute of Technology in 2017 where he carried out his Master Thesis. He started his PhD studies in 2018 and is currently employed as a Junior Scientist at AIT. His main research interests are anomaly detection, cyber threat intelligence, and log data analysis.",
"submissions": [
"E8GCJX"
],
"avatar": null
},
{
"code": "KSJR9L",
"name": "Markus Wurzenberger",
"biography": "Markus Wurzenberger, MSc, finished his Bachelor’s Degree in Mathematics in Science and Technology in 2013. In 2014 he joined AIT as a freelancer and finished his Master’s Degree in Technical Mathematics in 2015. In the end of 2015 he joined AIT’s Cyber Security research group as Junior Scientist and is working on national and international research projects. His primary research interest is log data analysis with focus on anomaly detection. In 2016 Markus started his PhD studies in Computer Science.",
"submissions": [
"E8GCJX"
],
"avatar": null
},
{
"code": "9H9FAN",
"name": "Roman Graf",
"biography": "Roman Graf, Ph.Dr., OSCP, research engineer at Center for Digital Safety & Security in Austrian Institute of Technology GmbH, works on AI, Cyber Security and Data Analytics topics, contributing to the development of several European research projects like EDSI, MAL2, EARK, DMA, SonnenWende+, Ecossian, Planets, Assets and SCAPE. He has published widely in the area of AI, Cyber Security and risk management, being an active member of the Open Preservation Foundation (OPF). Finally, Dr. Graf supported the development of File Format Metadata Aggregator (FFMA) and cyber threat intelligence solution CAESAIR serving as one of a key developer and contributed a module to the Open Source Threat Intelligence Platform (MISP)",
"submissions": [
"HFYJGR"
],
"avatar": "https://cfp.bsidesvienna.at/media/Graf__016.jpg"
},
{
"code": "ZXJYVR",
"name": "Olivia Dinica",
"biography": "Olivia Dinica holds a PhD in Computational Chemistry from the University of Texas at Austin, where she worked on charge transfer in organic semiconductors. Upon graduation she joined Simulmedia Inc. in New York City where she worked as a Senior Data Scientist in the area of predictive modelling for advertising. She recently joined AIT and currently works on machine learning projects in cyber security and autonomous driving.",
"submissions": [
"HFYJGR"
],
"avatar": null
},
{
"code": "RKDGSX",
"name": "Christina Lekati",
"biography": "Christina Lekati is a psychologist and a social engineer. With her background and degree in psychology, she learned the mechanisms of behavior, motivation, decision making, as well as manipulation and deceit. She became particularly interested in human dynamics and passionate about social engineering.\r\n\r\nContrary to typical career paths, her history and involvement in the cyber-security field started quite early in her life. Being raised by a cyber security expert, she found herself magnetized by the security field at a very young age. Growing up, she was able to get involved in different projects that were often beyond her age, that gave her an edge in her own knowledge and experience.\r\n\r\nChristina has participated among other things in penetration tests, in training to companies and organizations, and in needs and vulnerability assessments. She is today a trainer and consultant, focusing on social engineering and the human element of cybersecurity.",
"submissions": [
"G7GJHF"
],
"avatar": "https://cfp.bsidesvienna.at/media/Christina.Lekati_2.JPG"
},
{
"code": "AWMK99",
"name": "Aaron",
"biography": "Works at nic.at / CERT.at since 2008. Studied CS & maths. Founder Funkfeuer.at.",
"submissions": [
"HFYJGR"
],
"avatar": "https://cfp.bsidesvienna.at/media/monad_small.png"
},
{
"code": "BFWBVR",
"name": "Philipp Krenn",
"biography": "Philipp lives to demo interesting technology. Having worked as a web, infrastructure, and database engineer for over ten years, Philipp is now working as a developer advocate at Elastic — the company behind the Elastic Stack consisting of Elasticsearch, Kibana, Beats, and Logstash. Based in Vienna, Austria, he is constantly traveling Europe and beyond to speak and discuss open source software, search, databases, infrastructure, and security.",
"submissions": [
"7TCLST"
],
"avatar": "https://www.gravatar.com/avatar/ce4685da897c912aa41a815435b40a5a"
},
{
"code": "KLCZV3",
"name": "Albert Zsigovits",
"biography": "Albert works as a Threat Researcher at Sophos.\r\n\r\nHe joins us from a traditional blue team background, kickstarting his cyber career analyzing security events as an IDS analyst, and later investigating breaches as an incident responder for a Fortune 50 company.\r\n\r\nHis specialities include threat hunting, memory forensics and signature development. In his spare-time he enjoys reverse engineering malware and diving deep into deep-web territories, connecting the dots between criminals leveraging threat intelligence and open source intelligence techniques.",
"submissions": [
"7SLXUG"
],
"avatar": null
},
{
"code": "WL9UNU",
"name": "Ahmed Sherif (@_ahmadsherif)",
"biography": "Ahmed is a professional penetration tester with over 5 years of experience in penetration testing including but not limited to the web application, infrastructure, and mobile security testing. During his work, Ahmed occupied the role of penetration tester in various industries and companies helping the clients securing their applications and infrastructure. His main focus was not only on performing penetration tests but also the application security is an interest, working closely with the development teams starting from the design to the deployment of the solutions to advice on security manners.\r\n\r\nAhmed performed security tests for many high profile entities in the Middle East and Europe, Highly skilled hands-on application security assessment and development of security tools with a deep understanding of vulnerability management process and risk assessment.\r\n\r\nIn his spare time, he used to play CTF and discover vulnerabilities affecting different products. He has been acknowledged for his security findings in a different hall of fame of different vendors.\r\n\r\n\r\n**https://twitter.com/@_ahmadsherif**",
"submissions": [
"JFSZRC"
],
"avatar": "https://cfp.bsidesvienna.at/media/pp.jpeg"
},
{
"code": "X9FEBZ",
"name": "Christoph Rottermanner",
"biography": "My name is Christoph Rottermanner and I come from Randegg in Lower Austria. In 2015 I finished my bachelor degree in IT-Security at the University of Applied Sciences in Sankt Pölten and in 2017 the master degree in Information-Security. I am currently employed at it.sec, where I mainly perform penetration tests of web applications as well as on-site infrastructure tests. In April 2016, I successfully completed the OSCP (Offensive Security Certified Professional) certification. In my spare time I develop projects in Python, search for vulnerabilities in websites by taking part in bug bounty programs or deal with current security-related topics. I can be found on Twitter under @pycycle and I have my own [blog](https://pycycle.info).",
"submissions": [
"RHQGV7"
],
"avatar": "https://cfp.bsidesvienna.at/media/police-tux.png"
},
{
"code": "EKXLQE",
"name": "attendees and crew",
"biography": null,
"submissions": [
"B3GGCG"
],
"avatar": null
},
{
"code": "CFESVA",
"name": "Michael Kafka",
"biography": "Michael \"MiKa\" Kafka\r\n\r\nMiKa started with networking in the mid 80ies, and in the early 90ies\r\nhe began to work with Firewalls and Encryption devices. Since 1997 he is\r\nCertified Cisco Systems Instructor for Routing, Switching and Security\r\nTopics. He is currently teaching network and security topics, working on\r\nnetwork projects and conducts network pentests ans audits.",
"submissions": [
"RNZD3W"
],
"avatar": null
},
{
"code": "MRDQQE",
"name": "Philip Madelmayer",
"biography": null,
"submissions": [
"RHQGV7"
],
"avatar": null
}
]
}