This information is from a previous year. Please visit shellcon.io for up to date information.
Want to know what it will take to be considered for the promotion you’ve always wanted, how to nail a tough interview question, what to include on your resume as a jobseeker or find out if you qualify for a clearance? Our panel of seasoned experts will give you advice to help you reach your next career goal in security. We will feature a corporate Recruiter that specializes in hiring people with clearances, a corporate Recruiting Manager, a Hiring Manager for security and IT roles and an agency Recruiter who all want to share some great tips with you. Please come prepared with questions to ask our panel and a resume if you’re in the job search, because they are hiring!
Moderated by: Merissa Villalobos
Read MoreMerissa Villalobos, has been a Cybersecurity Recruitment professional for over 10 years and she has built a national Talent Acquisition department from the ground up, managed a global recruiting team...
Read More
Currently working as a corporate recruiter for HireRight, David is a professional recruiting consultant who has had the opportunity to work with and “place” some of the top talent in...
Read More
Chrissy Morgan is a specialist Cyber Security Recruiter with Tiro Security in Los Angeles. She is a record setting top biller with two strong years of technical recruitment experience. Chrissy...
Read More
Charles holds a B.S in Information Sciences and Technology from Pennsylvania State University, where he specialized in Information Assurance and Security. He has 13 years of experience and is currently...
Read More
A career change to cybersecurity doesn’t mean you have to start your career over. In this session we will discuss how to leverage your current job skills and life experiences to help you transition your career to the exciting world of cybersecurity.
Read MoreJohn Sicklick has over 30 years of experience in the aerospace industry as a software developer, systems administrator, systems integrator, and systems security engineer. John is a retired U.S. Navy...
Read More
A quick summary of free information available to get started, professional meetings to attend, certifications to look at, and random thoughts on the industry. Questions encouraged.
Read MoreNathan has had three software/IT related careers: flight simulation, software test and security. He has worked in big corporations and small companies and in verticals such as defense and consulting....
Read More
Are you getting (back) into the job market? What is important to do for your CV, your LinkedIn profile, and what should you prepare for in interviews? I’ll take you through a speed review of items I look for, as well as link you to some available resources to hopefully increase your chances of landing a job. Please note all companies and fields have their own unique expectations and needs, so advice can never be one size fits all.
Read MoreNicole Schwartz is a Product Manager for the GitLab Secure team. In her career, she has been in Product, System Administration, and Agile coaching. Before her career ever started she...
Read More
Many industries have well-defined points of entry and well-understood education and training requirements. Information Security is not one of those industries. Successful infosec pros often have wildly diverse backgrounds so it is difficult to know which is the “correct” way to enter this field. As our industry has evolved and matured, what do organizations now look for in a candidate? What combination of skills, experience, and education will get you in your “dream job?” SPOILER - there are many predictors of success, and organizations have different priorities, so there is no single answer.
Read MoreDamon Small began his career studying music Louisiana State University. Leveraging computer skills learned in the LSU recording studio, he became a systems administrator in the mid 1990s. In 2005,...
Read More
Want to know how to get into InfoSec, especially without a technical background? Fuzzing Panda will share her story and methodology for how she recareered from working in clinical medicine to application security.
Read MorePanda joined a Linux User Group while working on a masters in sports medicine. From there, she jumped down the rabbit hole called information security and that led to ShellCon.io....
Read More
A review of the root causes and contributing factors behind impostor syndrome, and a discussion of how to recognize, treat, and systemically guard against professional feelings of inferiority.
Read MoreOpportunities at small businesses are often overlooked when it comes to mature Security Operations. This is a huge gap, especially in the face of supply chain attacks, and breaches like Target. When you consider their place in the security ecosystem, these businesses are “too small to fail.”
This talk gives practical steps for those new to Information Security, those trying to hone their skills, or new to the unique differences in securing these types of business. Attendees will walk away with a practical guide for ““how”” these businesses are secured, with explanations that are approachable to people who do not yet have a deep Information Security background.
Read MoreHudson Bush is a Security Architect that injects Threat Modeling into everything he does. He mostly works with Government Regulatory Compliance, Risk Management, and Business Impact Analysis. His goal is...
Read More
One CISO’s journey from a Marine Corps Private (and eventually Seargent) to Chief Information Security Officer. The discussion will include steps I took prior to leaving the Marines and the steps taken outside of the military. This includes principles to live by, selecting a mentor and how to determine what you have as your real goal versus the components of your goal.
Read MoreVeterans representing multiple branches of military service and a wide breadth of personal experience share their stories and advice about transitioning to careers in Information Security.
Moderated by: Malia Mason
Read MoreMalia is an experienced cyber security engineer and the recent co-founder and CEO of Integrum, a cyber security consulting firm focusing on security compliance for small businesses and non-profit organizations....
Read More
Jawana McFadden is a proud member of the United States Army, with this year marking her 21st year of service. She has been involved in the practice of Diversity and Inclusion...
Read More
Currently a senior security engineer at HireRight. I engineer SIEM Solutions that ingest logs and data from various security technologies and operate as both forensics researcher/incident responder during security incidents....
Read More
Aaron Binkowski is a seasoned veteran in the tech industry, a former tech company owner, and Force Reconnaissance Marine veteran; leveraging his past experiences in cybersecurity and the military, he...
Read More
Lisa Jiggetts is the Founder and President of the Women’s Society of Cyberjutsu (WSC), one of the fastest growing nonprofits dedicated to women in cybersecurity. WSC provides women with the...
Read More
In Strategic Planning and Resume Guidance for Transitioning Veterans and Spouses presentation, you will learn important points on how to plan your transition into civilian employment and how to translate your military experience into a 2-page resume.
This is the content of the curriculum but at full scale which will be tailored for the event.
Jamie Rimphanli joined Hire Heroes USA in May 2015, and started as a Transition Specialist. She was promoted to Area Manager of the Los Angeles office before moving to Employment...
Read More
It can be hard to get away from the defense industry after military service, this talk will cover some of the issues I had and how I found eventual success. Also, I’ll cover some thoughts to prepare folks for their first full-time security position.
Read MoreYou may have heard about the lack of diversity in cybersecurity and wondered what that really meant to you. Perhaps you even asked yourself, “Why should I care?” The answer will resonate strongly with security professionals, who know they could never depend on only one tool during incident response. They use multiple tools, each one providing a different piece of valuable information and coming together to form a complete picture. This is analogous to the concept of team diversity, and during this discussion we’ll explore how diversity can provide your operation with a competitive edge in the realm of cybersecurity.
Read MoreAspen works a Threat Analyst at CrowdStrike and is the VP of WiCyS SoCal Affiliate. She loves analyzing files and logs to determine if the activity seen is legitimate or...
Read More
Ever wonder what its like to work in Application Security? This presentation will answer the questions: What is application security, when and why organizations may consider outsourcing, and what are the various roles and responsibilities of vendors and clients? Dant35An0nym0u5, a security advisor at an international vulnerability management company (vendor side), and Fuzzing Panda, a security specialist at a fortune 50 (client side), will tell you their stories of what it’s like to work in application security.
Read MorePanda joined a Linux User Group while working on a masters in sports medicine. From there, she jumped down the rabbit hole called information security and that led to ShellCon.io....
Read More
From notepad to Dreamweaver to Flash to the CMS, this failed web developer turned hacker back in the early 2000’s. It wasn’t until his own apps began getting hacked that...
Read More