As BSidesPDX has evolved over the years into a larger event, the process of curating the content has evolved as well. In an effort to recognize that the goal of BSidesPDX is to support the local information security community, we’ve recruited a set of local experts to help with the selection process.

Joe FitzPatrick

Joe FitzPatrick is a Trainer and Researcher at (@securinghw). Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUs, SoCs, and microcontrollers. He has spent the past 5 years developing and leading hardware security related training, instructing hundreds of security researchers, pen testers, and hardware validators worldwide. When not teaching Applied Physical Attacks training, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects, which he regularly presents at all sorts of fun conferences.

Topher Timzen

Topher Timzen is currently a Vulnerability Enthusiast at a Fortune 50 Red Team and enjoys causing constructive mischief. Topher has spoken at conferences such as DEF CON, SecTor and BSidesPDX on offensive security research. Enjoying teaching, particularly about exploitation, he has been running the CTF at BSidesPDX for the past few years. Topher is located in the woods hiking or mountain biking when not computing. More information can be found at & @TTimzen.

Maggie Jauregui

Maggie Jauregui is a Security Researcher for the Platform Armoring and Resiliency team at Intel Corporation. Maggie focuses on firmware security. She has presented her research at conferences such as DEF CON, CanSecWest, DerbyCon, Grace Hopper, BSidesPDX, and UEFI Plugfest.

Jesse Michael

Jesse Michael is an experienced security researcher focused on vulnerability detection and mitigation who has worked at all layers of modern computing environments from exploiting worldwide corporate network infrastructure down to hunting vulnerabilities inside processors at the hardware design level. His primary areas of expertise include reverse engineering embedded firmware and exploit development. He has also presented at DEF CON, Black Hat, PacSec, Hackito Ergo Sum, and BSides Portland.

Timothy D. Morgan

Timothy D. Morgan (@ecbftw) taught himself how to write software at the age of twelve and began tinkering with security shortly thereafter. After earning his computer science degrees (B.S., Harvey Mudd College and M.S., Northeastern University) and spending a short time as a developer, he began his career as a pentester and security researcher. Tim's work in application security spans 13 years and includes the publication of dozens of vulnerabilities in widely used software. He has been teaching application security throughout that time, delivering trainings and talks at major conferences, including OWASP AppSecUSA and BlackHat USA. Tim currently resides in Portland, Oregon where he volunteers for the local OWASP chapter.

Forrest Rae

Forrest Rae is a self taught technology enthusiast, software engineer, and vulnerability researcher who guides a team of hackers at Fortune 100 company. He's got a long history of taking things apart. Forrest currently resides just east of Portland in the Columbia River Gorge.

Kees Cook

Kees Cook (@kees_cook) has been working with Free Software since 1994, and has been a Debian Developer since 2007. He is currently employed as a Linux kernel security engineer by Google, working on Android and Chrome OS. From 2006 through 2011 he worked for Canonical as the Ubuntu Security Team's Tech Lead, and remains on the Ubuntu Technical Board. Before that, he worked as the lead sysadmin at OSDL, before it was the Linux Foundation. He has written various utilities including GOPchop and Sendpage, and contributes randomly to other projects including fun chunks of code in OpenSSH, Inkscape, Wine, MPlayer, and Wireshark. He's been spending most of his time lately focused on security features in the Linux Kernel.

Emily Cain

Emily Cain (@data_bae) is a programmer, writer, and software educator. She creates instructional videos and articles on software monitoring for New Relic University. Her other projects include a Twitter bot that creates fictional medications, a Glitch project to teach children to make websites using dog memes, and writing on sites such as the O’Reilly Media blog and In her free time she enjoys the outdoors, board games, and volunteering.

Marion Marschalek

Marion Marschalek (@pinkflawd) is a former Malware Analyst and x86 Reverse Engineer who changed tactics and now works at Intel in order to look at neat challenges above and below x86. She has spoken at all the conferences and such, and seen all the things, and if you want more details on her current activities you'll have to < redacted >. Also, she runs a free reverse engineering bootcamp for women, to make our community a happier place for everyone..