Speakers
Mathé Hertogh
Ph.D. student @ VUSec Amsterdam
Although originally a mathematician, I became very enthusiastic about computer security in recent years. Currently I am a PhD student at VU Amsterdam within the VUSec research group, (co)supervised by Cristiano Giuffrida and Herbert Bos. My research focuses on microarchitecture security, and in particular, transient execution vulnerabilities (e.g. Spectre & friends). More broadly, I am excited about computer architecture, operating systems, virtualization, and their security aspects.
Some example projects so far include: OS/hypervisor redesign for microarchitectural defense-in-depth, new Spectre exploitation with next-gen CPU features, combining Rowhammer and (Half-)Spectre, and microarchitectural exploitation of real-world commercial clouds.
Talk: Rain: Microarchitectural Cloud Leakage
Betta Lyon Delsordo
Penetration tester @ AWS
Betta Lyon Delsordo began her cyber journey at the age of 13 when she started teaching herself to code. This grew into freelance web development work for small businesses in Montana, where she soon realized she needed to know more about application security to keep her clients safe.
She began learning more about secure coding and interned with a hacking firm, and realized she was pretty good at it.
After completing a Master's in Cybersecurity at Georgia Tech, obtaining certifications such as the GPEN, and working her way up through pentesting, Betta is now working as a Penetration Tester at Amazon Web Services in Italy. Her areas of expertise include application security, secure code review, cloud security, and AI hacking. She has also built several AI tools for her employers to improve processes such as secure code review and threat intelligence insights.
Betta is very involved in the cybersecurity community and with organizations that support women in technology. She has been a mentor for 10 years with Technovation (an international girls coding program), and is an organizer and speaker for organizations promoting diversity in technology including RTC, WiCyS, WISP, and WSC.
Betta is a frequent conference speaker on topics ranging from AI hacking to secure coding, and has spoken for the World Bank and conferences like DEF CON 33, ESET World 2025, CyberCon 2025, and WiCyS 2025.
Talk: It’s Giving Insecure Vibes: Secure Coding Literacy for Vibe Coders
Luigi Gubello
Security Engineer. Sometimes I try to hack stuff. Investigated by the authorities due to an SQL injection, financed by the powers that be, someone said.
Talk: Exploit is in the logic: Reversing an Android application to hack transactions on an NFC tag.
Marco Paciaroni
I am a cybersecurity researcher specialized in Windows kernel and user-land reverse engineering.
I have recently switched to iOS offensive R&D professionally although I've always remained a "Windows-head" at heart.
I have been working in cybersecurity for the past 3 years professionally.
Windows has always had a sweet spot in my heart given it was the first platform I targeted my effort towards, initally (4 yrs ago) I had begun doing windows user-land and malware R&D, creating my own very small malware samples and testing them against some popular anti-viruses.
Eventually I switched over to kernel research and reverse engineering, with the particular goal in mind of developing my own kernel drivers, and also hypervisor engines.
With this new engine of mine I started analyzing Anti-Cheats, what techniques they use, what they check, etc.
I have spent most of my free time in the past few years analyzing how anti-cheats work and developing "bypasses" for their checks and detections. I have sporadically done vulnerability research although with varying success, only finding one bug in the windows kernel crash dump parser usermode library which couldn't be exploited further.
I have worked for almost 2 years professionally in Windows offensive R&D, specifically focused on researching obfuscation techniques, AV detection bypasses and data exfiltration.
My current focus is on iOS, specifically on user-land internals.
Talk: Detection Engineers Hate This One Weird Trick (Anti-Cheat Devs Don't)
Giacomo Pope
Giacomo Pope (he/him) is a security consultant working with the cryptography services team at NCC Group and co-founder of the learning platform CryptoHack. He is additionally interested in isogeny-based cryptography in both cryptanalysis and in the design of protocols such as digital signature algorithm SQIsign.
Talk: From CTFs to Cryptographic Consultancy
Raffaele Bova
Raffaele is a Vulnerability Researcher at Nozomi Networks. He enjoys reverse engineering for finding out just how badly things can be implemented, he also enjoys (literally) breaking IoT devices.
Talk: A Tale of a Silent Console