Editing Pwn Your Own
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 5: | Line 5: | ||
In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world. The first few months will feature Carl Sue as the main speaker as we build a following.<br><br> | In the future there will be a more diverse speaker line up with guest speakers from around the Info-Sec world. The first few months will feature Carl Sue as the main speaker as we build a following.<br><br> | ||
'''Carl "Cobolt" Sue'''<br> | '''Carl "Cobolt" Sue'''<br> | ||
Formerly a San Diego hacker, Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Areas of expertise include wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols, such as shared key and social network security validation.Β | Formerly a San Diego hacker, Sue was a quick study of published documents and books from industry defining security professionals with a background in translating technical principals into layman terms and examples. Areas of expertise include wireless security, lock picking, and network attack strategies. Other experience includes cryptology and study of protocols, such as shared key and social network security validation.Β She is an up-and-comer in the security field new to the IRL community with over 12 years of underground training and growth in field.<br><br> | ||
'''More Speakers to come''' | '''More Speakers to come''' |