SANS Rocky Mountain Fall is Live Online! Join us Nov 2-7 MT for 17 interactive courses + NetWars. Save $300 thru 10/7.

HackFest & Ranges Summit - Live Online

Virtual, US Mountain | Thu, Jun 4 - Sat, Jun 13, 2020

The advisory board members are volunteers from the cybersecurity community who provide input on topics, review CFP submissions, help recruit speakers, and provide mentoring to selected speakers. Interested in serving on the advisory board for a future Summit? Email SummitSpeakers@sans.org.


Joe Gervais @TryCatchHCF

Joe Gervais is CISO of Brightside Benefit. Previous roles have included Technical Director / Red Team Ops at Symantec, Principal InfoSec Engineer, and Lead Penetration Tester. He has 25+ years of security- and software engineering experience, mostly working with US government/DoD, and served as an Intelligence Analyst, Intelligence Chief, and Counterintelligence Specialist in the United States Marine Corps. Joe has been breaking into systems (and helping to secure them) since the early 1980s. His education includes a bachelors degree in Cognitive Science, a masters degree in Information Assurance, and is currently pursuing his PhD in Human Systems Engineering at Arizona State University. GitHub repository: https://github.com/trycatchhcf ]


Rob Lee @robtlee

Rob has more than 18 years of experience in digital forensics, vulnerability and exploit discovery, intrusion detection/prevention, and incident response.
Rob graduated from the U.S. Air Force Academy and served in the U.S. Air Force as a founding member of the 609th Information Warfare Squadron, the first U.S. military operational unit focused on information operations. Later, he was a member of the Air Force Office of Special Investigations (AFOSI) where he led a team conducting computer crime investigations, incident response, and computer forensics. Prior to starting his own firm, he directly worked with a variety of government agencies, U.S. Department of Defense, and intelligence communities as the technical lead for a vulnerability discovery and an exploit development team, lead for a cyber forensics branch, and lead for a digital forensic and security software development team. Rob was also a director for MANDIANT, a company focused on investigating advanced adversaries, such as the APT, for five years prior to starting his own business.
Rob co-authored the book Know Your Enemy, 2nd Edition. Rob earned his MBA from Georgetown University in Washington DC. Rob is also a co-author of the MANDIANT threat intelligence report M-Trends: The Advanced Persistent Threat.


Kelly Lum @aloria

Kelly has “officially” been working in information security for over a decade in application and network security from everything from financial and government sectors to the startup space. She works to lead Application Security programs, building secure architecture, and training up developers with the skills do build products securely. She is also an adjunct professor of Application Security at NYU Tandon School of Engineering.


James Lyne @jameslyne

James Lyne is the CTO for SANS Institute. He is a self-professed 'massive geek' and has technical expertise spanning a variety of the security domains from forensics to offensive security. James has worked with many organisations on security strategy, handled a number of severe incidents and is a frequent industry advisor. He is a certified instructor at the SANS Institute and is often a headline presenter at industry conferences.


Omar Santos @santosomar

Omar Santos is an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures. Omar is the author of more than a dozen books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io.


Stephen Sims @Steph3nSims

Stephen Sims is an industry expert with over 15 years of experience in information technology and security. Stephen currently works out of San Francisco as a consultant performing reverse engineering, exploit development, threat modeling, and penetration testing. Stephen has a MS in information assurance from Norwich University and is a course author and a Faculty Fellow for the SANS Institute. He is the author of SANS' only 700-level course, SEC760: Advanced Exploit Development for Penetration Testers, which concentrates on complex heap overflows, patch diffing, and client-side exploits. Stephen is also the lead author on SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking. He holds the GIAC Security Expert (GSE) certification as well as the CISSP, CISA, Immunity NOP, and many other certifications. In his spare time Stephen enjoys snowboarding and writing music.


Jessica Solper @jessploit

Jessica Solper is the Offensive Security Manager at Salesforce, where she runs the internal red team. She has 19 years of information technology and security experience in industries ranging from luxury real estate to aerospace to security consulting. She is active in the security community and has organized a hacker conference in Arizona since 2012. Jessica holds a BA in English Literature and an MS in Information Management from Arizona State University.


Kevin Tyers @waronshrugs

Kevin Tyers, Head of Infrastructure, iCTF, is a SANS Instructor who teaches SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling. He is also the head of cyber intelligence engineering for a Fortune 250 company, and the head of infrastructure for iCTF. Kevin holds the GCIH, GPEN, GCIA, GNFA, GCWN, and GCUX certifications. He is the cofounder of the Information Security group DC480 in Phoenix, Arizona.


Crystal Wilson @unluckynum7

Crystal Wilson is currently an associate security specialist, physical pen tester, and social engineer at GreyCastle Security. Crystal brings over 12 years of military intelligence experience from her previous career and is currently in the Army National Guard (17 years). She was on the Defensive Cybersecurity Operations Element (DCO-E) in the Army but has made the transition to the Cyber Protection Team (CPT), completing her full Red Team transformation. She holds a bachelor’s degree in digital forensics from the University at Albany – State University of New York where she graduated Magna Cum Laude. Crystal holds the GSEC certification and is currently studying for the GCIH and Network+ certifications.