Thomas Reed has been a Mac user since 1984, and is a self-taught developer and security researcher. He is the founder of The Safe Mac and creator of the AdwareMedic adware removal tool for Macs.
He is currently Director of Mac & Mobile at Malwarebytes, where he directs product development and Mac security research. His hobbies include hiking and photography, and he is happily married with four children.
Sarah is an senior digital forensic analyst who has worked with various federal law enforcement agencies. She has performed a variety of investigations including computer intrusions, criminal, counter‐intelligence, counter-narcotic, and counter‐terrorism.
Sarah's research and analytical interests include Mac forensics, mobile device forensics, digital profiling and malware reverse engineering. Sarah has presented at the following industry conferences; Shmoocon, CEIC, Bsides*, TechnoSecurity, HTCIA and the SANS DFIR Summit. She has a Bachelor of Science in Information Technology from Rochester Institute of Technology and a Masters in Information Assurance from Capitol College. Sarah is the author of the new SANS Mac Forensic Analysis Course - FOR518.
Jonathan Levin is a trainer and consultant specializing in operating system internals. He is the author of definitive books on Android Internals as well as "*OS Internals" series, and provides plentiful tools and research for the community on the books' web sites.
He is founder and CTO of Technologeeks.com, a group of like-minded expert trainers and consultants.
As Patrick has worked at NASA and the NSA, as well as presented at countless security conferences, he is intimately familiar with aliens, spies, and talking nerdy.
Wardle is passionate about macOS security and thus spends his days finding Apple 0-days, analyzing macOS malware and writing free open-source security tools to protect Mac users.
Richie Cyrus is a Senior Threat Hunter at SpecterOps where he specializes in detection of advanced adversaries with a focus in MacOS and Linux environments.
Richie has a background in incident response, forensics and security operations spanning across Fortune 500 companies and the public sector, to include Apple Inc. and CME Group Inc. He currently maintains a DFIR focused blog at securityneversleeps.net.
Brandon Azad is an independent macOS/iOS security researcher who enjoys finding 0-days, developing elegant exploits, and writing articles about security.
His significant projects include a macOS/iOS kernel inspection tool called memctl as well as an IDA Pro toolkit for analyzing Apple kernelcache files called ida_kernelcache.
Josh is the co-founder of Digita Security where he engineers enterprise security tools, while leading a team of passionate macOS security professionals.
His previous roles as a VP at IronNet Cybersecurity and developer at the NSA, have given him valuable insight into both offensive and defensive cyber-security operations. When he's not writing code or running a company, he's enjoys spending time with his family or catching the occasional football game at the horseshoe.
Jon is the co-founder and CTO of Digita Security where he architects enterprise security tools, designs scalable backend software stacks, and creates beautiful, yet practical user interfaces.
Jon is a passionate technologist with over 15 years of experience in malware analysis, reverse engineering, and product development. When his eyes are not glued to a screen, he is a family man, a runner, and can often be seen cheering on the Cyclones.
Mikhail Sosonkin is a Security Researcher with Synack who enjoys hacking devices, reversing malware and looking for cracks in security for the greater good.
Mikhail has a Computer Science degree from NYU, where he has also taught Application Security, and a Software Engineering master's from Oxford University. His interests are always in building and breaking things that are made of bits. Mikhail much enjoys speaking at such conferences as ZeroNights, DefCon and Objective By The Sea!"
Jaron started his career out of college as an incident responder for APT based intrusions at a very large corporation. From there he went on to CrowdStrike where he’s done work in many different areas including intrusion analysis, detection engineering, and research. A large portion of his time is spent investigating Mac and Linux based intrusions as it is his personal belief that these platforms do not gain enough attention in the security industry. Jaron is the author of the book OS X Incident Response Scripting and Analysis which he wrote while living on The Big Island.
After Objective by the Sea, you will likely find him in Hilo eating a moco or swimming in the Wailuku River.
Mike Lynn is a Client Platform Engineer at Facebook, helping to design and debug device management systems.
He enjoys disassembling and diving into OS internals to keep open-source community tools working smoothly. He's an active member of the MacAdmins.org Slack and an advocate of learning to code. In his free time, he's a husband, a dad, and performs voodoo with pyobjc.