This information is from a previous year. Please visit shellcon.io for up to date information.

RaiseMe Talks
  • Track RaiseMe (Harbor I & II): Friday 1000-1050

Want to know what it will take to be considered for the promotion you’ve always wanted, how to nail a tough interview question, what to include on your resume as a jobseeker or find out if you qualify for a clearance? Our panel of seasoned experts will give you advice to help you reach your next career goal in security. We will feature a corporate Recruiter that specializes in hiring people with clearances, a corporate Recruiting Manager, a Hiring Manager for security and IT roles and an agency Recruiter who all want to share some great tips with you. Please come prepared with questions to ask our panel and a resume if you’re in the job search, because they are hiring!

Moderated by: Merissa Villalobos

Read More

Merissa Villalobos, has been a Cybersecurity Recruitment professional for over 10 years and she has built a national Talent Acquisition department from the ground up, managed a global recruiting team...
Read More

Currently working as a corporate recruiter for HireRight, David is a professional recruiting consultant who has had the opportunity to work with and “place” some of the top talent in...
Read More

Chrissy Morgan is a specialist Cyber Security Recruiter with Tiro Security in Los Angeles. She is a record setting top biller with two strong years of technical recruitment experience. Chrissy...
Read More

Charles holds a B.S in Information Sciences and Technology from Pennsylvania State University, where he specialized in Information Assurance and Security. He has 13 years of experience and is currently...
Read More

Zak has been working in the cybersecurity field for over six years, in roles spanning between both Sales and Talent Acquisition. Today, Zak is responsible for the Talent Acquisition of...
Read More

  • Track RaiseMe (Harbor I & II): Friday 1100-1150
  • Slides
  • Video

A career change to cybersecurity doesn’t mean you have to start your career over. In this session we will discuss how to leverage your current job skills and life experiences to help you transition your career to the exciting world of cybersecurity.

Read More

John Sicklick has over 30 years of experience in the aerospace industry as a software developer, systems administrator, systems integrator, and systems security engineer. John is a retired U.S. Navy...
Read More

  • Track RaiseMe (Harbor I & II): Friday 1330-1350
  • Slides
  • Video

A quick summary of free information available to get started, professional meetings to attend, certifications to look at, and random thoughts on the industry. Questions encouraged.

Read More

Nathan has had three software/IT related careers: flight simulation, software test and security. He has worked in big corporations and small companies and in verticals such as defense and consulting....
Read More

  • Track RaiseMe (Harbor I & II): Friday 1400-1420
  • Slides
  • Video

Are you getting (back) into the job market? What is important to do for your CV, your LinkedIn profile, and what should you prepare for in interviews? I’ll take you through a speed review of items I look for, as well as link you to some available resources to hopefully increase your chances of landing a job. Please note all companies and fields have their own unique expectations and needs, so advice can never be one size fits all.

Read More

Nicole Schwartz is a Product Manager for the GitLab Secure team. In her career, she has been in Product, System Administration, and Agile coaching. Before her career ever started she...
Read More

  • Track RaiseMe (Harbor I & II): Friday 1430-1450
  • Slides
  • Video

Many industries have well-defined points of entry and well-understood education and training requirements. Information Security is not one of those industries. Successful infosec pros often have wildly diverse backgrounds so it is difficult to know which is the “correct” way to enter this field. As our industry has evolved and matured, what do organizations now look for in a candidate? What combination of skills, experience, and education will get you in your “dream job?” SPOILER - there are many predictors of success, and organizations have different priorities, so there is no single answer.

Read More

Damon Small began his career studying music Louisiana State University. Leveraging computer skills learned in the LSU recording studio, he became a systems administrator in the mid 1990s. In 2005,...
Read More

  • Track RaiseMe (Harbor I & II): Friday 1500-1520
  • Slides
  • Video

Want to know how to get into InfoSec, especially without a technical background? Fuzzing Panda will share her story and methodology for how she recareered from working in clinical medicine to application security.

Read More

Panda joined a Linux User Group while working on a masters in sports medicine. From there, she jumped down the rabbit hole called information security and that led to ShellCon.io....
Read More

  • Track RaiseMe (Harbor I & II): Friday 1530-1550
  • Slides
  • Video

A review of the root causes and contributing factors behind impostor syndrome, and a discussion of how to recognize, treat, and systemically guard against professional feelings of inferiority.

Read More

Adrigon “Rig” Moroi is a social worker and educator who enjoys recoding people in her spare time. Beyond her B.A. in Linguistics and Psychology (Human Development) and her M.A.Ed. in...
Read More

  • Track RaiseMe (Harbor I & II): Friday 1600-1650

Opportunities at small businesses are often overlooked when it comes to mature Security Operations. This is a huge gap, especially in the face of supply chain attacks, and breaches like Target. When you consider their place in the security ecosystem, these businesses are “too small to fail.”

This talk gives practical steps for those new to Information Security, those trying to hone their skills, or new to the unique differences in securing these types of business. Attendees will walk away with a practical guide for ““how”” these businesses are secured, with explanations that are approachable to people who do not yet have a deep Information Security background.

Read More

Hudson Bush is a Security Architect that injects Threat Modeling into everything he does. He mostly works with Government Regulatory Compliance, Risk Management, and Business Impact Analysis. His goal is...
Read More

  • Track Salute (Harbor I & II): Saturday 1000-1020
  • Slides
  • Video

One CISO’s journey from a Marine Corps Private (and eventually Seargent) to Chief Information Security Officer. The discussion will include steps I took prior to leaving the Marines and the steps taken outside of the military. This includes principles to live by, selecting a mentor and how to determine what you have as your real goal versus the components of your goal.

Read More

Paul Love joined CO-OP Financial Services as Chief Information Security Officer in 2017 where he leads the Information Security and Privacy program. Mr. Love brings more than 25 years in...
Read More

  • Track Salute (Harbor I & II): Saturday 1030-1120
  • Video

Veterans representing multiple branches of military service and a wide breadth of personal experience share their stories and advice about transitioning to careers in Information Security.

Moderated by: Malia Mason

Read More

Malia is an experienced cyber security engineer and the recent co-founder and CEO of Integrum, a cyber security consulting firm focusing on security compliance for small businesses and non-profit organizations....
Read More

Jawana McFadden is a proud member of the United States Army, with this year marking her 21st year of service. She has been involved in the practice of Diversity and Inclusion...
Read More

Currently a senior security engineer at HireRight. I engineer SIEM Solutions that ingest logs and data from various security technologies and operate as both forensics researcher/incident responder during security incidents....
Read More

Aaron Binkowski is a seasoned veteran in the tech industry, a former tech company owner, and Force Reconnaissance Marine veteran; leveraging his past experiences in cybersecurity and the military, he...
Read More

Lisa Jiggetts is the Founder and President of the Women’s Society of Cyberjutsu (WSC), one of the fastest growing nonprofits dedicated to women in cybersecurity.  WSC provides women with the...
Read More

  • Track Salute (Harbor I & II): Saturday 1130-1220
  • Video

In Strategic Planning and Resume Guidance for Transitioning Veterans and Spouses presentation, you will learn important points on how to plan your transition into civilian employment and how to translate your military experience into a 2-page resume.

This is the content of the curriculum but at full scale which will be tailored for the event.

  1. Strategic Planning – Introduce current facts about the job market as well as veteran and spouse-specific realities
    • Truth About the Job Market
    • Roadmap to Your Career Transition
    • Self-Perpetual Barriers to Employment
    • Statistics: Veteran Barrier Perceptions
    • Employer-Identified Advantages to Hiring a Veteran
    • Conduct a SWOT Analysis
    • Veteran Education
    • Labor Market Information
    • Salary, Median Earnings, and Income
    • Make Your Exit Plan
    • Job Search Strategies
  2. Resume Writing – Discuss the fundamentals of resume writing that will get the resume beyond the application
    • Types of Resumes
    • Overview of Core Categories for Corporate Resume
    • 10... Read More

Jamie Rimphanli joined Hire Heroes USA in May 2015, and started as a Transition Specialist. She was promoted to Area Manager of the Los Angeles office before moving to Employment...
Read More

  • Track Salute (Harbor I & II): Saturday 1400-1420
  • Video

It can be hard to get away from the defense industry after military service, this talk will cover some of the issues I had and how I found eventual success. Also, I’ll cover some thoughts to prepare folks for their first full-time security position.

Read More

I’m a retired Air Force Lt Col. My military career spanned engineering, acquisitions, intelligence, and operations with the 67th Cyberspace Wing. I successfully transitioned to commercial life in 2016. I...
Read More

  • Track Salute (Harbor I & II): Saturday 1430-1450
  • Video

You may have heard about the lack of diversity in cybersecurity and wondered what that really meant to you. Perhaps you even asked yourself, “Why should I care?” The answer will resonate strongly with security professionals, who know they could never depend on only one tool during incident response. They use multiple tools, each one providing a different piece of valuable information and coming together to form a complete picture. This is analogous to the concept of team diversity, and during this discussion we’ll explore how diversity can provide your operation with a competitive edge in the realm of cybersecurity.

Read More

Aspen works a Threat Analyst at CrowdStrike and is the VP of WiCyS SoCal Affiliate. She loves analyzing files and logs to determine if the activity seen is legitimate or...
Read More

  • Track RaiseMe (Harbor I & II): Saturday 1500-1550
  • Video

Ever wonder what its like to work in Application Security? This presentation will answer the questions: What is application security, when and why organizations may consider outsourcing, and what are the various roles and responsibilities of vendors and clients? Dant35An0nym0u5, a security advisor at an international vulnerability management company (vendor side), and Fuzzing Panda, a security specialist at a fortune 50 (client side), will tell you their stories of what it’s like to work in application security.

Read More

Panda joined a Linux User Group while working on a masters in sports medicine. From there, she jumped down the rabbit hole called information security and that led to ShellCon.io....
Read More

From notepad to Dreamweaver to Flash to the CMS, this failed web developer turned hacker back in the early 2000’s. It wasn’t until his own apps began getting hacked that...
Read More


© 2019 ShellCon