Our Speakers

Check out all the world-class speakers at PFIC 2020!

Amber Schroader

CEO & Founder, Paraben Corporation
Throughout the past two decades, Ms Schroader has been a driving force for innovation in digital forensics. Ms. Schroader has developed over two-dozen software programs designed for the purposes of recovering digital data from mobile phones, computer hard drives, email, and live monitoring services. Ms. Schroader has taught and designed the established protocols for the seizure and processing of digital evidence that has been used by numerous organizations throughout the world. Ms. Schroader has coined the concept of the “360-degree approach to digital forensics” as well as started the momentum and push to the “Forensics of Everything-FoE” with her focus to unique problems in digital evidence and solutions. Ms. Schroader has been a huge industry influence in pushing for a big-picture consideration of the digital evidence and the acquisition process and analysis techniques used. An accomplished curriculum developer and instructor; Ms. Schroader has written and taught numerous classes for this specialized field as well as founded multiple certifications. Ms. Schroader continues to support through book contributions and other industry speaking engagements.

Chet Hosmer

Chet Hosmer is the Founder of Python Forensics, Inc. a non-profit organization focused on the collaborative development of open source investigative technologies using the Python programming language.   Chet has been researching and developing technology and training surrounding forensics, digital investigation and steganography for over two decades. He has made numerous appearances to discuss emerging cyber threats including National Public Radio’s Kojo Nnamdi show, ABC’s Primetime Thursday, NHK Japan, CrimeCrime TechTV and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to cyber security and forensics and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com and Wired Magazine.

Chet is the author of five recent Elsevier/Syngress Books. Passive Python Network MappingPython ForensicsIntegrating Python with Leading Computer Forensic Platforms, Data Hiding which is co/authored with Mike Raggo, and Executing Windows Command Line Investigation, which is co/authored with Joshua Bartolomie and Ms. Rosanne Pelli.

Chet serves as a visiting professor at Utica College in the Cybersecurity Graduate program where his research and teaching focus on advanced steganography/data hiding methods and the latest active cyber defense methods and techniques.  Chet is also an adjunct professor at Champlain College, where his research and teaching focus on applying the Python programming language to solve challenging problems in digital investigation and forensics.

Chet delivers keynote and plenary talks on various cybersecurity-related topics around the world each year.  He is also well-known as the Co-Founder of WetStone Technologies, Inc. a renowned cybersecurity organization developing malware and steganography solutions in use by Law Enforcement, Defense and the Private sector world-wide.

Jeff Shackelford

Jeff Shackelford is an Applications Engineer and Digital Forensics Specialist for PassMark Software, makers of OSForensics. As a former Digital Forensics Lab Director, Supervisory Special Agent, and Certified Law Enforcement Instructor, Jeff has over 17 years of law enforcement experience and has been an active member, practitioner and speaker in the digital forensics and cyber-crime communities for the past 12+ years. Now with PassMark Software, Jeff utilizes his prior training and ‘real-world’ experience to help design, develop, and implement new features for OSForensics.

John Wilson

John Wilson is a licensed private investigator, certified examiner, and information technology veteran with over two decades of experience working with the US government, public, and private companies. He serves clients in many industries as a trusted advisor to law firms, corporate legal departments, outside counsel and executives on best practices for litigation readiness.

As CISO at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody. He develops forensic workflows and processes for clients including major financial institutions, Fortune 500 companies, AmLaw 100 law firms as well as many other organizations.

Larry Leibrock

Larry Leibrock has over thirty years of computer security, incident response and digital forensics experience.  He has revolved in careers with IT industry, academic research and teaching and US government service.  He lives on airplanes and has base camps in Texas, Idaho and wherever.

 

Mike Raggo

Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is wireless IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2nd Edition”. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of FSISAC/BITS and PCI, and is a frequent presenter at security conferences, including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS.

 

Stephen Ramey

Stephen Ramey advises clients on data breach response, digital investigations, and computer security. He has particular expertise in digital forensics, litigation support, and incident response. Stephen has led numerous high-profile incident response teams investigating nation-state sponsored attacks, ransomware outbreaks, and breaches that resulted from IT misconfigurations. He currently holds a SANS GIAC Information Security Professional (“GISP”) certification.