Exposing What's Behind the Curtain

Speakers

From the Show-Me State to the Land of Oz comes the twister. OzCon—the Kansas-built, no-fluff information security event that pulls back the curtain on how attacks win the war on physical and technical security.

No gray smoke. No booming voices. Real talk, real tactics, real fast. Live demos (select), sharp case studies, and straight-up playbooks you can use the minute you’re back at your desk.

Meet the OzCon Wizards

OzCon is Kansas’ Own Hacking & InfoSec Con — New Stage, Proven Pedigree.

OzCon brings together practitioners who’ve shaped how security is attacked, defended, and reimagined. We’re keeping the bar where it belongs: HIGH. These experts pull back the curtain on how attacks really work and how to better defend your organization. Meet the confirmed speakers joining us in Kansas:

 

Winn Schwartau

Electronic Pearl Harbor Prophet

Keynote Speaker

Winn Schwartau has lived cybersecurity — and warped minds — since 1983. A pioneer in information security and strategic foresight, his creative and original thinking has shaped decades of predictions about the internet, technology, privacy, and security — many of which proved unsettlingly accurate.

In 1991, Winn coined the term “Electronic Pearl Harbor,” framing the concept of large-scale cyber conflict years before it entered mainstream policy and defense discussions. He is the author of numerous influential works, including the seminal book Information Warfare, which helped define the modern understanding of cyber conflict and national security risk.

Today, Winn focuses on Cognitive Security, the next frontier of defense. In his latest work, The Art & Science of Metawar, he examines how humans must strengthen cognitive defenses against AI-driven reality distortion, disinformation, manipulation, and algorithmic addiction. His work explores how the parallels between silicon and carbon systems offer defenders an existing framework for building mental immunity against information pathogens — at national, enterprise, and personal levels.

Winn currently serves as Director of Special Projects at the Cognitive Security Institute, where he concentrates on the intersection of cybersecurity, cognitive security, ethics, privacy, and global policy. The implications of this convergence, he argues, are profound — and unavoidable.

His most recent book, Analogue Network Security, introduces a time-based approach to justifiable security and has been called “The Best Cybersecurity Book of All Time” by Cyber Defense Magazine. Across his career, Winn has authored or contributed to dozens of books and publications, produced films and documentaries, founded major security initiatives, and helped shape the global security conversation for more than four decades.

Winn is a Lifetime Achievement Award recipient at DEF CON, a Distinguished Fellow of the Ponemon Institute, a Fellow of the Royal Society of the Arts, and an inductee into the ISSA International Security Hall of Fame. He is widely recognized as “the grandfather of security awareness” and “the civilian architect of information warfare.”

Len Noe

I Am Machine

Keynote Speaker

Len Noe is a Technical Evangelist, White Hat Hacker, and Transhuman, known for his dynamic presence as an international security speaker.

With over 30 years of experience in the tech and security fields, Len has delivered impactful presentations in more than 60 countries and at renowned security conferences worldwide. His notable speaking engagements include the prestigious World Conference in The Hague, C.E.R.T. EU, and multiple government briefings.

Len is the author of Human Hacked: My Life and Lessons as the World’s First Augmented Ethical Hacker.

In this groundbreaking book, he explores the subculture of Transhumanism, detailing the capabilities of this new breed of human and the associated cybersecurity risks. As a co-host of the Cyber Cognition Podcast, Len continues to shape the conversation around Transhumanism and cybersecurity. His book further delves into his personal evolution, positioning him as one of the leading authorities on this transformative movement.

Expanding his storytelling into film, Len is the subject of the documentary I-Am-Machine, which offers a compelling look into his journey as an augmented human and ethical hacker. The film has received international recognition, including Official Selection honors at the Documentaries Without Borders International Film Festival and the Filmmaker Sessions Volume 10.

Passionate about the Transhuman/Human+ movement, Len actively employs 11 microchip implants to advance cybersecurity and enhance the human experience. His pioneering research has earned international acclaim.

Johnny Xmas

Community Connector

“I don’t seek to be well-known, I seek to be worth knowing”

Johnny Xmas, a prominent figure in the Information Security community since 2002, has been a dedicated contributor to public forums, sharing his extensive research and knowledge. Most notably recognized for his pivotal role in exposing the American TSA Master Key leaks (2014-2018), uncovering Venmo stalking vulnerabilities (2018), and being an overall nuisance.

Past experience includes being: Director of Cyber Training at security research firm GRIMM, defending against the automated abuse of web infrastructure with Kasada, and as the Lead Researcher on Uptake’s Industrial Cybersecurity Platform. Before this, he spent many years in the field as a penetration tester, security engineer for a global Fortune 500 retail corporation, and Mainframe auditor and Systems Engineer for several IT asset recovery firms.

Today, Johnny continues to shape and elevate the Information Security landscape with his expertise and contributions as the President of the Burbsec Information Security Network and the Head of Offensive Security for a massive, global manufacturing and agriculture corporation.

Aamir Lakhani

Dr. Chaos

Aamir Lakhani is Global Director of Threat Intelligence and Artificial Intelligence, and a recognized authority in cybersecurity, advanced threat detection, and AI innovation. With over 20 years of experience, Aamir leads global initiatives that integrate cutting-edge AI technologies into cyber defense strategies for Fortune 500 enterprises, government agencies, and national security operations.

He is known for designing and executing large-scale threat intelligence programs, offensive and defensive cyber operations, and AI-driven security architectures. Aamir has developed and deployed AI agents to simulate threat actor behavior, test system resilience, and drive next-generation SOC automation. His work spans adversarial AI, agentic AI systems, deepfake detection, and advanced ML-based malware analysis.

Aamir’s background includes creating offensive countermeasures for the U.S. Department of Defense and advising national intelligence agencies. He has helped organizations fortify both their digital and physical environments against state-sponsored threats and cybercriminal syndicates operating on the darknet.

With a deep technical foundation, Aamir has spent two decades researching artificial intelligence, writing and testing AI/ML models, and operationalizing them for cyber use cases. His expertise spans cyber defense, AI-driven reconnaissance, mobile threats, APT research, and the weaponization of machine learning by threat actors.

Aamir is a published author and regular contributor to books, threat research reports, and white papers. He has been featured on FOX Business News, National Public Radio (NPR), and other national media outlets as an expert in cybersecurity and artificial intelligence.

Under the pseudonym Dr. Chaos, Aamir also operates a widely followed cybersecurity blog at DrChaos.com, where he shares insights on emerging threats, AI trends, and real-world attack simulations.

In its list of ”46 Federal Technology Experts to Follow on Twitter,” Forbes described him as “a blogger, InfoSec specialist, superhero…and all-around good guy.”

Valerie Thomas

The Hacktress

Valerie Thomas is a Principal Security Consultant renowned in the offensive security community as The Hactress. She leads technical consulting and penetration testing engagements, helping organizations uncover critical weaknesses across software, hardware, and physical environments.

Valerie specializes in cyber-physical penetration testing, social engineering, and physical intrusion assessments, with extensive experience in industrial control systems (ICS), SCADA, and operational technology environments — including power, transportation, and other critical infrastructure sectors.

Her work combines technical hacking, physical security exploitation, and human-factor assessment. In practice, she is professionally trusted to break into systems and facilities before real-world adversaries can. Her insights span hardware hacking, bypassing physical access controls, and exposing procedural vulnerabilities that traditional testing often overlooks.

Valerie’s path into security began with a Bachelor’s degree in Electronic Engineering and an instinctive drive to understand how systems really work. She discovered ethical hacking early in her career and built her expertise through hands-on experience, mentorship, and deep engagement with technical communities.

A familiar voice in the security community, Valerie shares practical, experience-driven insight under the handle @hacktress09, contributing to discussions on ICS/OT safety, physical security best practices, and real-world defensive measures.

Valerie is a speaker at major cybersecurity and cyber-physical security events, including DEF CON and the Third Annual Cyber Physical Convergence Forum in Washington, DC (2025), where she brings real-world perspective from hands-on penetration testing across critical infrastructure environments.

Bryan Fite

AI Sherpa

As a committed security practitioner and serial entrepreneur, Bryan uses Facilitated Innovation to solve “Wicked Business Problems.” Having spent over 25 years in mission-critical environments, Bryan is uniquely qualified to advise organizations on what works and what doesn’t. Bryan has worked with businesses in every major vertical throughout the world – establishing himself as a trusted advisor.

“The challenges facing organizations today require a business reasonable approach to managing risk, trust and limited resources, while protecting what matters.”

Bryan’s “Bliss Index” is rocking because he is currently a TSA III @ World Wide Technology with AI Focus. Translation: AI Sherpa.

Professional Highlights:

  • Founder of the Deep Fake Justice League
  • Host of annual Dayton Security Summit
  • Creator of Packetwars™
  • Introduced Forensix™
  • Published AFIRM
  • Founded GETSecure™

Focus Areas:

SOC of the Future (today), Generative AI, Threat & Control, Information Assurance, Executive Protection, Security Governance, Risk Management, Facilitated Innovation, Business Development, Trust Enhanced Risk Management (TERM), Cyber-Physical System (CPS) Security & Hacking Arts

Dr. Catherine Ullman

The Active Defender

Dr. Catherine J. Ullman is a seasoned security researcher, speaker, and author with more than 25 years of deeply technical experience in cybersecurity. She currently serves as Principal Technology Architect, Security at the University at Buffalo, where she operates at the intersection of digital forensics, incident response, and real-world intrusion investigations.

As a DFIR specialist, Cathy leads incident management, investigative services, intrusion detection, and personnel case resolution within a complex academic environment — where assumptions fail fast and attackers don’t follow playbooks. In parallel, she builds security awareness programs that equip faculty and staff to recognize social engineering threats and communicate and compute more safely in an increasingly hostile digital landscape.

Cathy is a frequent speaker at major information security conferences, including DEF CON and Blue Team Con, and is a recognized voice in the defender community. She is the author of The Active Defender and contributor to O’Reilly’s 97 Things Every Information Professional Should Know, bringing practitioner insight to both the written page and stage.

Outside of work, Cathy’s curiosity runs wide. From researching death and the dead, to hacking systems to make the world more secure, to visiting her adopted two-toed sloth, Flash, at the Buffalo Zoo.

Gregory Carpenter

Voice of OzCon

Opening the Curtain and Introducing the Wizards of OzCon.

Gregory Carpenter is the Principal Partner of CW PENSEC, a Fellow of the Royal Society for the Arts, and the National Security Agency’s Operations Officer of the Year. He serves on the Board of Directors for ATNA Systems, is a Senior Advisor to ARIC, Inc., and is a member of the Special Operations Medical Association and the Military Cyber Professionals Association. His prior advisory roles include EC-Council University and the Mackenzie Institute.

Dr. Carpenter is a cybersecurity, information warfare, and biomedical research practitioner with nearly four decades of experience across the U.S. military, intelligence community, and federal government. His work includes sustained operational support to the National Security Agency, Army Cyber Command, and other federal cyber Task Forces, with a focus on cyber operations, SIGINT, counterintelligence, and mission assurance. He has held senior leadership roles spanning cyber offense and defense, medical technology security, and public health operations, and now leads advanced cybersecurity and biomedical initiatives in the private sector.