Please register for each session that you plan to attend.
The registration link is included in the description of the session.
Details to access each of the sessions that you register for will be sent to the email address provided during registration.
avatar for Matt Miller

Matt Miller

Principal Security Engineer
Charlotte, North Carolina
Matthew Miller began his career in information security as a Cyberspace Control Officer in the United States Air Force. His first tour was to the United Kingdom as part of Europe’s special operations tactical communication unit. In this role, Matt would often lead a team to deploy to an open field and within 12 hours set-up unclassified and classified networks supporting up to 2,000 personnel. Most notably, Matt was awarded the Joint Service Achievement Medals for establishing a forward operating base supporting operations over Libya. His next assignment was to Hurlburt Field, Florida, where he was tasked with performing cybersecurity evaluations of command and control assets as part of an operational test and evaluation squadron. In this role, Matt evaluated the information security posture of critical defense assets such as the Integrated Air Defense system over Washington D.C. and Los Angeles, ensuring their continued availability in a contested environment. Finally, while in the Air Force, Matt graduated from the Air Force’s Network Warfare Training program.

Once out of the Air Force, Matt remained in information security performing penetration tests and audits against a myriad of customers ranging from small regional hospitals to Fortune-500 companies. In this role, Matt gained a wealth of hands-on experience performing penetration tests across all sectors. Some notable tests include an internal penetration test which led to full access of the SCADA systems of an offshore oil rig, an external penetration test of an international drug development company that led to the takeover of their presence in China, and a social engineering engagement of a major health insurance company which led to 55 out of 60 targets compromising their password and clicking a link which gave the attack team full control of the victim’s computer.