I like sharing knowledge. I’ll be doing so in the following public areans in the coming months:

Blue Team Con

  • September 6-7, 2025
  • Fairmont Chicago, Millenium Park
  • Chicago, IL
  • blueteamcon.com

A defense-focused con with a very different vibe from other conferences I’ve attended. Very beginner-friendly and a little more “soft skills” focused. I’ll be co-presenting with pal Eric Woodruff about a wild hybrid Microsoft identity idea: using a “red tenant” to administer an on-prem Active Directory.

PancakesCon 6

This free virtual security conference is a little different from other cons. All talks must include two parts: a bit about cybersecurity and a bit about something NOT cybersecurity. For example, I met my friend Brandon Colley at PancakesCon 3 when he gave a short talk demonstrating the benefits of hacking yourself and followed it with some close-up magic!

My talk is titled “PKI and Powerlifting!” Not surprisingly, I’ll be talking about PKI and powerlifting. Some PancakesCon speakers do their portions separately, but I’m going to try and combine them. Will it work?! 🤷

HIP (Hybrid Identity Protection) Conf

  • October 7-9, 2025
  • Charleston Place
  • Charleston, SC
  • hipconf.com

This conference is put on by my employer, but it’s not a user conference. This is a space for leaders in the identity space to share modern approachs to defending the enterprise. For example, my previous boss spoke there last year. I was chosen to speak, so I’ll be talking about combining Low- and Medium-severity AD CS issues into Critical issues that can result in complete forest compromise.

Anti-Cast Training

Public Key Infrastructure (PKI) has a reputation for being complicated, but it doesn’t have to be. In this talk, we’ll walk together through core cryptography concepts step by step. We’ll start with symmetric encryption and shared keys, then move into asymmetric encryption, hashing, signing, and certificates. From there, we’ll connect the pieces and show how they come together in an actual PKI. Each concept builds on the last to you a clear, practical understanding of how PKI works and how to spot its components in the wild. No math, no crypto proofs, just the essentials developers need.