One More Week for MacBook Air, $400 Amazon Gift Card, or Take $400 Off with OnDemand Training

Threat Hunting & IR Summit 2020 - Live Online

Virtual, US Eastern | Thu, Sep 10 - Sat, Sep 19, 2020

The advisory board members are volunteers from the cybersecurity community who provide input on topics, review CFP submissions, help recruit speakers, and provide mentoring to selected speakers. Interested in serving on the advisory board for a future Summit? Email

David Bianco

David Bianco @DavidJBianco

David has been involved in information security for more than 20 years, working with Fortune 500 companies, Wall Street firms, public utilities, and major universities on incident detection and response. He credits his early focus on network security with honing his skills in extracting the most information possible from just the network data, before moving ahead to other areas. Today, he's a Principal Engineer for cybersecurity at Target Corporation.

Matt Bromiley

Matt Bromiley @_bromiley

Matt Bromiley is a principal incident response consultant at a top digital forensics and incident response (DFIR) firm where he assists clients with incident response, digital forensics, and litigation support. He also serves as a SANS GIAC Advisory Board member, a subject-matter expert for the SANS Securing The Human Program, and a technical writer for the SANS Analyst Program. Matt brings his passion for digital forensics to the classroom as a SANS instructor for FOR508: Digital Forensics, Incident Response, and Threat Hunting, and FOR572: Advanced Network Forensics, where he focuses on providing students with implementable tools and concepts.

Daniel Garcia

Daniel Garcia

Daniel’s interests have always been in Information Technology, whether dissembling his first PC to see how components worked in order to later build his own, or learning about intrusion techniques and how to detect and respond to better secure enterprise environments. He’s been a blue teamer since 2013, performing roles in Incident Response, Malware Analysis, Threat Hunting and Intelligence, and he has occasionally dipped his toes into the red team's pool. An avid gamer, reader, pop culture collector, and foreign language enthusiast, his mantra is continuous learning and enjoyment.

Phil Hagen

Phil Hagen @PhilHagen

Phil began his studies at the U.S. Air Force Academy's Computer Science Department, where he focused on network security and was an inaugural member of the computer security extracurricular group. He served in the Air Force as a communications officer at Beale AFB and the Pentagon. In 2003, Phil moved over to a position with a government contractor, providing technical services for various IT and information security projects.

Today, Phil's career has spanned the full attack life cycle - tool development, deployment, operations, and the investigative aftermath - giving him rare and deep insight into the artifacts left behind. Phil has covered deep technical tasks, managed an entire computer forensic services portfolio, and handled executive responsibilities. He's supported systems that demanded 24x7x365 functionality, managed a team of 85 computer forensic professionals in the national security sector, and provided forensic consulting services for law enforcement, government, and commercial clients. All of that brings Phil to his role today as the DFIR strategist at Red Canary, where he supports the firm's managed threat detection service.

Phil is also a senior instructor for the SANS Institute, and is the course lead and author of FOR572: Advanced Network Forensics and Analysis. This six-day course provides a hands-on curriculum to learn the skills necessary to perform investigations of network-based incidents, where the hard drives or memory of compromised systems are often missing.

Ben Johnson

Ben Johnson

Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company's Chief Security Strategist. As the company's original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space. Prior to Carbon Black, Ben was an NSA computer scientist and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community. Ben is active in the cybersecurity community, where he is a technical advisor to the US FISA Court and sits on the boards of multiple security startups. Ben earned a bachelor's degree in computer science from the University of Chicago and a master's degree in computer science from Johns Hopkins University. He lives in Newport Beach, CA with his wife and three sons.

Katie Nickels

Katie Nickels @likethecoins

The human element of cybersecurity, rather than the technical aspect, is what first attracted Katie Nickels to the field. Initially drawn to a career in journalism, Katie found a job at the U.S. Department of Defense (DoD) in cybersecurity that piqued her interest, and then she was hooked.

Today, Katie is a Principal Intelligence Analyst for Red Canary. She has worked on cyber threat intelligence (CTI), network defense, and incident response for nearly a decade for the DoD, MITRE, Raytheon, and ManTech.

Katie also serves as an instructor for the SANS FOR578: Cyber Threat Intelligence course, enabling her to share her passion for CTI more broadly. "Early on in my own career, I took SANS SEC401: Security Essentials Bootcamp with Dr. Eric Cole, and learning from his insights helped shape the entire course of my career," Katie says. Now as a SANS instructor, she hopes to provide the same career-shaping support for her students.

Cat Self

Cat Self @coolestcatiknow

Cat started her career as a developer implementing and designing a metric to evaluate the security posture of technology products, known as the Product Intelligence Score (patent pending). She transitioned to the red team, implementing APT techniques and learning the value of being offensive. She now works as a threat hunter at Target, continuing to specialize in offensive security. She previously served in Military Intelligence with the U.S. Army, including two combat deployments.