Speakers

Mathé Hertogh Ph.D. student @ VUSec Amsterdam

Although originally a mathematician, I became very enthusiastic about computer security in recent years. Currently I am a PhD student at VU Amsterdam within the VUSec research group, (co)supervised by Cristiano Giuffrida and Herbert Bos. My research focuses on microarchitecture security, and in particular, transient execution vulnerabilities (e.g. Spectre & friends). More broadly, I am excited about computer architecture, operating systems, virtualization, and their security aspects.
Some example projects so far include: OS/hypervisor redesign for microarchitectural defense-in-depth, new Spectre exploitation with next-gen CPU features, combining Rowhammer and (Half-)Spectre, and microarchitectural exploitation of real-world commercial clouds.

Talk: Rain: Microarchitectural Cloud Leakage

Betta Lyon Delsordo Penetration tester @ AWS

Betta Lyon Delsordo began her cyber journey at the age of 13 when she started teaching herself to code. This grew into freelance web development work for small businesses in Montana, where she soon realized she needed to know more about application security to keep her clients safe. She began learning more about secure coding and interned with a hacking firm, and realized she was pretty good at it. After completing a Master's in Cybersecurity at Georgia Tech, obtaining certifications such as the GPEN, and working her way up through pentesting, Betta is now working as a Penetration Tester at Amazon Web Services in Italy. Her areas of expertise include application security, secure code review, cloud security, and AI hacking. She has also built several AI tools for her employers to improve processes such as secure code review and threat intelligence insights. Betta is very involved in the cybersecurity community and with organizations that support women in technology. She has been a mentor for 10 years with Technovation (an international girls coding program), and is an organizer and speaker for organizations promoting diversity in technology including RTC, WiCyS, WISP, and WSC. Betta is a frequent conference speaker on topics ranging from AI hacking to secure coding, and has spoken for the World Bank and conferences like DEF CON 33, ESET World 2025, CyberCon 2025, and WiCyS 2025.

Talk: It’s Giving Insecure Vibes: Secure Coding Literacy for Vibe Coders

Marco Paciaroni

I am a cybersecurity researcher specialized in Windows kernel and user-land reverse engineering.
I have recently switched to iOS offensive R&D professionally although I've always remained a "Windows-head" at heart.
I have been working in cybersecurity for the past 3 years professionally.

Windows has always had a sweet spot in my heart given it was the first platform I targeted my effort towards, initally (4 yrs ago) I had begun doing windows user-land and malware R&D, creating my own very small malware samples and testing them against some popular anti-viruses.

Eventually I switched over to kernel research and reverse engineering, with the particular goal in mind of developing my own kernel drivers, and also hypervisor engines.

With this new engine of mine I started analyzing Anti-Cheats, what techniques they use, what they check, etc.

I have spent most of my free time in the past few years analyzing how anti-cheats work and developing "bypasses" for their checks and detections. I have sporadically done vulnerability research although with varying success, only finding one bug in the windows kernel crash dump parser usermode library which couldn't be exploited further.

I have worked for almost 2 years professionally in Windows offensive R&D, specifically focused on researching obfuscation techniques, AV detection bypasses and data exfiltration.
My current focus is on iOS, specifically on user-land internals.

Talk: Detection Engineers Hate This One Weird Trick (Anti-Cheat Devs Don't)

Giacomo Pope

Giacomo Pope (he/him) is a security consultant working with the cryptography services team at NCC Group and co-founder of the learning platform CryptoHack. He is additionally interested in isogeny-based cryptography in both cryptanalysis and in the design of protocols such as digital signature algorithm SQIsign.

Talk: From CTFs to Cryptographic Consultancy

Raffaele Bova

Raffaele is a Vulnerability Researcher at Nozomi Networks. He enjoys reverse engineering for finding out just how badly things can be implemented, he also enjoys (literally) breaking IoT devices.

Talk: A Tale of a Silent Console