This year, we have exciting line up of speakers and trainers from all over the world.


Faiz Shuja is a security expert who brings a tremendous amount of designing, implementing, and managing secure infrastructure expertise. He has been involved in intrusion detection/prevention systems, firewalls, honeypots/honeynets, penetration testing, vulnerability analysis, incident handing, and forensics analysis. His specific research interests include enterprise security monitoring and data analysis.

Faiz is a well-established entrepreneur with a long track record of success. He’s the CEO of Rewterz, a specialized information security company. He’s also the CEO of The Honeynet Project, a non-profit, all-volunteer organization dedicated to Honeynet research, and the is president of PAKCON, a non-profit organization which organizes yearly cyber security conventions in Pakistan.

He has spoken at various conferences and organizations, including US NSA (National Security Agency), US DoD (Department of Defense), IEEE (Institution of Electronic Engineers), FIA (Federal Investigation Agency), and many more.

Yi-Lang Tsai is the leader of The Honeynet Project Taiwan Chapter, Cloud Security Alliance Taiwan Chapter and OWASP Taiwan Chapter. He is the chairman of Taiwan Cyber Security Alliance to contributing management policy, technology and industry development. He is a research fellow with the National Center for High-performance Computing and lead TWCSRT to handling information security incident in Taiwan. His works include the research projects for the detection, the analysis and the honeypot related information security technologies and also in the cloud security technologies for industry、government and academy. In the past years, his team has published malware knowledge base and cyber defense exercise platform. He is the expert in UNIX/Linux, Windows OS, communication network technology, network security, ISMS, digital forensics. He is also known as the famous IT and cyber security commentator in Taiwan. He has published 35 books and many columns on the professional IT publications.

Lukas Rist is a contributing member of the Honeynet Project since 2009, two year member of the board of directors, volunteers as its Chief Research Officer these days. Most of his engagement is focused on working with students, providing project management and incubating ideas. He always had a strong interest in honeypot development, which started in the field of web applications, shifted then into industrial security (Conpot) and focuses currently on generic honeypots (Glutton) and detection technologies (go-dpi) and some reborn love for web apps (Snare).

He worked in the security industry on the detection of malicious samples by sandboxing their execution and classification of their behavior, and ventured recently into the startup world, saving lives by making sure those (mathematical) tensors keep flowing.

Maximilian Hils is a PhD student at the University of Innsbruck, Austria. He is one of the main developers of mitmproxy and actively contributes to several other high-profile open-source projects. Starting as a Google Summer of Code (GSoC) student at The Honeynet Project in 2012, he now leads the GSoC program at Honeynet.

Marco Ochse is working as a Senior Security Expert for T-Systems International’s Telekom Security Division. His work focuses on enterprise mobility and office communication security especially with regard to new innovations and technologies.

Marco started working on the DT honeypot initiative shortly after joining the DT Group Security back in 2011. Before signing on for Deutsche Telekom Marco was working as a security consultant specializing in internal and perimeter security with customers mainly from within the finance and insurance sector.

Markus Schmall is working as Vice President IT Security & Pentesting for T-Systems International’s Telekom Security Division. He is responsible within DTAG group for IT security, penetration testing including Red Teaming and the honeypot system.

Markus is in the security community since 1988, when he developed an antivirus (“Virusworkshop”) for the AMIGA platform. Markus started his professional career as antivirus developer for Computer Associates.

Sebastien Tricaud is a software developer and long time hacker, works for Splunk as Product Solutions Architect. Former CTO of the Honeynet Project and current member of the Board of Directors. Worked on numerous software mostly open-source: Linux PAM, Prelude SIEM, etc. Lectured at Usenix, CanSecWest, FIRST, and other Honeynet Workshops. Happy to share a beer to anyone that has read this so far!

Adel Karimi is a security engineer and threat hunter, works for Salesforce as a Senior Detection Engineer. He has been an active member and chapter lead at the Honeynet Project since 2010, and has spoken at several conferences such as BSides and Honeynet Workshops. He is the developer of honeyλ and honeybits, and loves teaching, playing with honeypots and hunting the bad guys!

Christopher Lek has more than 16 years of IT experience with the last 8 years working in global conglomerate various roles in cyber defence, incident response, security architecture and risk management. He has previously worked for a financial institution and Internet Service Provider.

Chris graduated from Nanyang Technological University (Computer Engineering) and is a certified in CISSP, PMP, ITIL and also SANs Certified in Digital forensic, Malware Analysis,Incident response and ICS security.

Being active in the IT Security community, Christopher is involved in The Honeynet Project (Singapore Chapter) and has been workshop committee member for Global Honeynet Workshop held in Warsaw (2014). He has contributed to open source project and spoke in tertiary institutions and conferences.

Max Kilger is an Associate Professor in Practice in the Department of Information Systems & Cyber Security at the University of Texas at San Antonio and Director of the Masters in Data Analytics Program. Max received his Ph.D. in Social Psychology from Stanford University. He has over 18 years of experience in the area of information security concentrating on the social and psychological factors motivating malicious online actors, hacking groups and cyberterrorists.

Max has written and co-authored a number of journal articles, book chapters and books on profiling, the social structure of the hacking community, cyberviolence and the emergence of cyberterrorism. He co-authored the popular book Reverse Deception: Organized Cyberthreat Counter-Exploitation and has just co-authored his second book Deception in the Digital Age. He is a founding and board member of The Honeynet Project. Max was a member of a National Academy of Engineering committee dedicated to make recommendations for combating terrorism.

He is also a member of a multinational instructional team for a NATO counterterrorism course and a faculty member of the Cyber Center for Security and Analytics. He sits on the scientific board of the graduate cyber security program at LUISS Guido Carli University in Rome.

Max is a frequent national and international speaker to industry, federal law enforcement, the military and intelligence communities.

Tan Kean Siong is an independent security researcher and active member of The Honeynet Project. He is a member of the Board of Directors at The Honeynet Project. He contributes efforts in open source network honeypot development, including Dionaea, Honeeepi and Glutton. He has spoken in various conferences e.g. DEF CON Packet Hacking Village, HoneyCon Taiwan, HITCON, VXCON, Hack In The Box and many more.

Rubio Wu is working as a threat researcher in Trend Micro, currently focusing on tracking spamming botnets' activities. He is interested in reverse engineering and threat intelligence in cybercriminal field.

Anita Hsieh is working as a threat researcher in Trend Micro, currently focusing on tracking spamming botnets' activities. She is interested in threat intelligence in cybercriminal field and data visualization.

Lo Wen-Ling is an Analyst and Team Leader of Research and Development for Taiwan Computer Emergency Response Team / Coordination Center(TWCERT/CC). Her job is to led the team to develop systems, including incident report system, ticketing system, malware analysis and report system and so on. She is also responsible for the international collaboration with international CERTs and related organization. Also, she had experience in designing the scenarios of international cyber drill. Currently, she is interested in how to raise the cyber awareness of the people in Taiwan and improve the cyber security incident report procedure with system.

Cheng Yi Lin is working as a cyber threat researcher in the National Center for Cyber Security Technology(NCCST).His works include developing honeypots, analyzing trap data, and cyber threat intelligence sharing. He is interested in researching botnet variants with its attack patterns and focuses on trapping cyber attack in industrial control systems.

Chia Hung Lin is a security engineer of National Center for Cyber Security Technology(NCCST), his works include design, deploy and maintain the honeynet system of NCCST, and research honeypot/honeynet technology. He focus on analysis of security events, use the result and experience to advance the capture ability of honeynet system, and he also have interesting in research of virtualization, data collection, data visualization and date analysis about the honeynet system.