As BSidesPDX has evolved over the years into a larger event, the process of curating the content has evolved as well. In an effort to recognize that the goal of BSidesPDX is to support the local information security community, we’ve recruited a set of local experts to help with the selection process.

Michael Leibowitz

Michael Leibowitz (@r00tkillah) has done hard-time in real-time. An old-school computer engineer by education, he spends his days hacking the mothership for a fortune 100 company. Previously, he developed and tested embedded hardware and software, fooled around with strap-on boot roms, mobile apps, officesuites, and written some secure software. On nights and weekends he hacks on electronics, writes CFPs, and contributes to the NSA Playset. He is the chairman of our CFP this year.

Joe FitzPatrick

Joe FitzPatrick (@securelyfitz) is an Instructor and Researcher at SecuringHardware.com. Joe has spent most of his career working on low-level silicon debug, security validation, and penetration testing of CPUs, SoCs, and microcontrollers. He has spent the past decade developing and delivering hardware security related tools and training, instructing hundreds of security researchers, pen testers, and hardware validators worldwide. When not teaching Applied Physical Attacks training, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects, which he regularly presents at all sorts of fun conferences.

Maggie Jauregui

Maggie Jauregui (@_m46s) is a firmware and hardware security researcher for Intel's PSG focused on low level platform security. Maggie is part of Black Hat's review board and President of BSides Portland. Throughout her career, Maggie has presented her research and delivered technical training on firmware and physical attack security topics at conferences around the world including DEFCON, Black Hat, CanSecWest, and hardwear.io among others. For fun, Maggie likes designing PCB art and geeky LED fashion.

Marion Marschalek

Marion Marschalek is a security engineer at a large cloud provider, and enjoys reverse engineering and all things binary analysis. With some background in malware analysis, incident response and microarchitecture security, her interests are quite varied. In 2015 Marion founded BlackHoodie, a series of hacker bootcamps which successfully attracts more women to the security industry. In her sparetime she runs, hikes, mountain bikes and swims laps in mountain lakes.

Wu-chang Feng

Wu-chang Feng is a professor of Computer Science at Portland State University where he works on building capture-the-flag games and codelabs for teaching students a range of topics including web application exploitation, cloud security, blockchain vulnerabilities, reverse engineering, fuzzing, and symbolic execution. He also participates in security education outreach via high-school camps and internships such as CyberPDX and Saturday Academy.

Gabriel Gomes

Gabriel Gomes is a security researcher at Intel. He started his career as a telecom hardware designer for small companies but later migrated to software development and big enterprises. Because of this transition and his work with virtual machines, binary translators, compilers, system libraries, and even software distribution, one could say that he is all over the place, which he thinks is a good thing. Gabriel is particularly fond of his contributions to Glibc and user-space live patching, and is very happy to be a Debian Developer. His work at Intel revolves around memory safety and CPU security. As hobbies, Gabriel builds keyboards and kites.