Speakers
Chris Horner, Information Security Consultant - Rebyc
- Presenation: "From Cookie to Catastrophe: The Infostealer Economy".
- It'll be a deep dive into what infostealers are, why they're such a problem today, how they work, and of course ways for companies to protect themselves from these.
Bio: Chris is a
PNPT, PORP, and eJPT certified ethical hacker. Proficient in using Linux pen-testing tools and Microsoft applications. Experienced in carrying out social engineering campaigns. Able to communicate professionally in person and in writing across all levels of an organization. Work with a variety of clients across multiple industries to understand and service their cybersecurity needs. Have given cybersecurity presentations at regional conferences and local groups such as BSides, ISSA, CarolinaCon, and CackalackyCon. Have written guest articles on business topics (Links under publications below). Actively involved in the local business community through Board seats and volunteer work. Over 20 years of public speaking experience. Fun fact: As an avid auto enthusiast, I have sampled just about every kind of car you can imagine.
Torry Crass - Charlotte BSides
Presentation: TBA
Bio: I help build and advise on cybersecurity programs that positively transform organizations and strengthen resiliency: from commercial entities, startups, state-level initiatives protecting millions of citizens, to enterprise environments defending critical infrastructure. With 25+ years in technology and deep expertise in both cybersecurity and IT operations, I bring both technical depth and strategic vision while partnering with other executive and senior leaders to help organizations reduce risk and support business success. As North Carolina's former State Chief Risk Officer, I led the state's enterprise security program and championed the "Whole-of-State" cybersecurity initiative, bringing together state, local, and education entities for collective cyber defense. This built on my years of experience working with corporate cybersecurity programs and as Agency CISO for the NC State Board of Elections, where I helped build a robust agency cybersecurity program from the ground up, while cultivating partnerships with National Guard, FBI, CISA, DHS, the Secret Service and others. I'm also engaged in the cybersecurity community serving on multiple advisory boards, holding leadership and board positions for industry conferences, as a trainer educating future cybersecurity experts, and regularly attending and presenting at cybersecurity events such as Black Hat, DefCon, SecureWorld, and BSides conferences. RECENT & SIGNIFICANT RECOGNITION - Order of Thor (Silver) - Military Cyber Professionals Association, 2026 - Finalist, CISO of the Year - NC TECH, 2024 - FBI Director's Community Leadership Award, 2020 RECENT KEYNOTES The Citadel, CHARIoTS 2.0 Keynote, Oct 2025 FedInsider Summit Keynote, Dec 2024 CyberSC Conference Keynote, Nov 2024 Cyber Shield Exercise, Distinguished Visitor Day Keynote, Jun 2024 Whether I'm partnering with boards and executives, building programs from the ground up, or navigating complex public sector challenges, I focus on translating technical complexity into actionable strategy that delivers measurable results. Let's connect if you're building resilient cyber programs, navigating security challenges, or looking for strategic leadership and trusted advisory expertise.
Lieutenant Colonel, USMC (Retired) Bill Hagestad - Author, Keynote Speaker, Researcher!
Presentation:
Bio: Lieutenant Colonel, USMC (Retired) Bill Hagestad a field experienced international cyber warfare officer. Specializing in both defensive & offensive cyber operations. He has taught graduate level cyber intelligence & protecting critical infrastructure at the National Security Agencies’ Cyber Center of Excellence. Bill has recently concluded two foreign military cyber deployments to South America, where he discovered a national critical infrastructure vulnerability, and the Balkans.
An internationally registered white hat hacker, Bill has extensive global experience advising foreign military and other governmental agencies and has led to penultimate recognition & respect as a military authority on the People’s Republic of China, and her use use of computer and information network systems as a weapon. He speaks internationally on the subject of China’s hegemony in the information age.
In 2012, Bill’s first book “21st Century Chinese Cyber Warfare” debuted. In 2013 he published another seminal work about the People’s Republic of China’s Cyber Activities “Operation Middle Kingdom: China's Use of Computers & Networks as a Weapon System”. In 2014, Bill has also published both “Chinese Information Warfare Doctrine Development 1994 – 2014”; and “China's Plans for Winning Information Confrontation: Important Chinese Information Warfare Articles - Information Confrontation”.
During August 2015, Bill wrote and published “Chinese Cyber Crime” a view into the Chinese hacking underworld and a 2nd edition in February 2016. During 2020, Bill published the 2nd edition of “21st Chinese Cyber Warfare” in 2022.
October 2024, Bill published “21st Century Chinese Cognitive Warfare”. His current work Dragon's Algorithm- China's Military Artificial Intelligence Strategy in the 21st Century” was launched at IS25 in Prague, during June 2025.
Lieutenant Colonel Hagestad provides current cyber defensive and counter-offensive threat assessments to international defense, intelligence, and law enforcement entities. He speaks both domestically and internationally on strategic information security threats based upon the Chinese cyberwar threat. His blog www.reddragon1949.com provides ongoing research into the Chinese military’s use of informatization, intelligentization, cyber war and influence operations.
Bill’s education includes a Bachelor of Arts in Mandarin Chinese, with minor emphasis in Classical Chinese and Modern Japanese, University of Minnesota. He earned a Master of Science in Military Strategy from the US Marine Corps Command & Staff College in 2002. He holds a Master of Science in Security Technologies from the College of Science & Engineering, University of Minnesota and a Master of Science in the Management of Technology from the Technological Leadership Institute, University of Minnesota.
Bill is also the author of “21st Century Chinese Cyber Warfare”, ISBN 978-1849283342 published in 2012, and 2013: “Operation Middle Kingdom: China's Use of Computers & Networks as a Weapon System ISBN: 978-1482577105 and Chinese Cyber Crime 2016, 2nd edition ISBN: 978-1523816552
LinkedIn: https://www.linkedin.com/in/reddragon1949/
Twitter @RedDragon1949