2015 BASC Speakers

Luke Donoho
Luke Donoho is a security professional with over 15 years of security expertise within the United States. He holds a Bachelor's Degree in Computer Science from Illinois State University, and a Master's Degree in Computer Science from Boston University. He is experienced in the EDA, Healthcare, and Financial verticals. In his current role he provides security consulting to internal technology teams as well as developing and running the organization's security development life cycle program.

Luke’s technical background is in full stack Microsoft technologies, code analysis, vulnerability assessments, and security engineering. His career has had him engaged in various security roles such as: Enterprise Security Architect, Web Systems Engineer, Hosting Manager, and IT Security Engineer. Luke holds CSSLP and CEH certifications. He is also passionate about drones, artificial intelligence, .NET development, Azure, machine learning, threat modeling, and security education.

Brian Heemsoth
Aetna Brian Heemsoth is an experienced Information Security Professional. He currently leads Aetna's Mobile Security & Software Security Groups, and is responsible for stewarding Aetna's Software & Mobile Security Programs, and for continually evolving the resources and controls applied to Aetna's web, mobile, and other software platforms. Prior to joining the Software Security Group, Brian worked as a Security Engineer supporting encryption & key management technologies, Identify & Access Management platforms, and other security technologies. Brian is a Threat Lecturer for the National Health ISAC, and is active within the Financial Services ISAC, and BSIMM Community.

Mike Pittenger
Black Duck Software Mike Pittenger is Black Duck Software's Vice President of Product Strategy. His 30-year technology and management career includes 15 years in security. He previously served as Vice President and General Manager of @stake’s product division. After @stake’s acquisition by Symantec, Mike led the spin-out of his team to form Veracode. He later served as Vice President of the product and training division of Cigital. Mike has consulted independently for several security companies including Bit9, KoreLogic, Digital Guardian, Verisign, and Beyond Trust.

Casey Dunham
GuidePoint Security Casey Dunham is a Security Consultant in the Application Security practice at GuidePoint Security. Casey has over 10 years experience in IT, most of which have been focused on application development. Casey has worked in the industrial control and finance industries, as well as in academia. Casey has a bachelor’s degree from the University of Southern Maine in Computer Science and is currently working on the Offensive Security Certified Professional certification and many interests include OSINT, reverse engineering and exploit development.

Amin Kharraz
Northeastern University-iSecLab Amin is a PHD candidate in systems security at Northeastern University and iSeclab at Boston. His primary area of research lies on low-level system security. This encompasses program analysis, vulnerability detection and system hardening. During his studies he collaborated with multiple research labs in US and Europe. His current research is to develop behavior-based malware detection tools to detect/defend zero-day malware attacks.

Tony Martin
Tony Martin is a security architect at Fortune 100 networking company and is part of the corporate, secure development lifecycle team (SDLC). He has previously worked at a defense contractor conducting software-defined radio security research and was the system architect at a point of sale, identity fraud prevention company. He has an undergrad, CS degree from UMaine and a Master’s in CS with a concentration in security from BU. Tony volunteers many places including DefCon’s Packet Hacking / Wall of Sheep Village.

Kellen Kleinfelter
Akamai Technologies Kellen is a Specialist with Akamai's Security Operations Center. He mitigates volumetric and application attacks on some of the busiest sites on the web. Additionally he handles analysis, incident response, custom solutions, and tuning. Outside of that he enjoys abusing in-game mechanics for NES game speed-running.