Matt Scheurer

Cincinnati Metropolitan Area Contact Info
3K followers 500+ connections

Join to view profile

About

Matt Scheurer is a show host for the ThreatReel Podcast, and Vice President of Computer…

Contributions

Activity

Experience & Education

  • ThreatReel

View Matt’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Public Speaker

    Information Security Conference Speaking Engagements

    - Present 8 years 11 months

    Science and Technology

    Annual InfoSec Conferences where I've presented:

    DerbyCon 5.0
    DerbyCon 7.0
    10th Annual Northern Kentucky University Cybersecurity Symposium
    BSides Columbus 5.0
    BSides Indianapolis 2018
    BSides Cincinnati 5
    11th Annual Central Ohio InfoSec Summit
    Circle City Con 5.0
    BSides Cleveland 2018
    12 year Ohio Information Security Forum (OISF) Anniversary Conference
    11th Annual Northern Kentucky University Cybersecurity Symposium
    4th Annual SecureWorld…

    Annual InfoSec Conferences where I've presented:

    DerbyCon 5.0
    DerbyCon 7.0
    10th Annual Northern Kentucky University Cybersecurity Symposium
    BSides Columbus 5.0
    BSides Indianapolis 2018
    BSides Cincinnati 5
    11th Annual Central Ohio InfoSec Summit
    Circle City Con 5.0
    BSides Cleveland 2018
    12 year Ohio Information Security Forum (OISF) Anniversary Conference
    11th Annual Northern Kentucky University Cybersecurity Symposium
    4th Annual SecureWorld Cincinnati
    Ohio Information Security Conference 2019 (OISC)
    12th Annual Central Ohio InfoSec Summit
    13 year Ohio Information Security Forum (OISF) Anniversary Conference
    ISSA International Summit, 2019
    Hack3rCon X
    Ohio Information Security Conference 2020 (OISC)
    Circle City Con 7.0 Apocalypse
    BSides Columbus 2020
    SecureWV 11
    CONHESI 2021 (Congreso Internacional de Hacking Ético y Seguridad Informatica)
    BSides Cleveland 2021
    15 year Ohio Information Security Forum (OISF) Anniversary Conference
    14th Annual Northern Kentucky University Cybersecurity Symposium
    15th Annual Central Ohio InfoSec Summit
    BSides Cleveland 2022
    16 year Ohio Information Security Forum (OISF) Anniversary Conference
    Blue Team Village at DEF CON 30
    2022 Cybersecurity Midwest Summit
    Secure Digital Conference 2022
    SecureWV Lucky 13
    Information Security Summit 2022
    BSides Dayton 2022
    HackCon Online 2023
    Ohio Information Security Conference 2023 (OISC)
    BSides Nashville 2023
    16th Annual Central Ohio InfoSec Summit
    17 year Ohio Information Security Forum (OISF) Anniversary Conference
    BSides Las Vegas 2023
    Black Hat USA 2023
    2023 Cybersecurity Midwest Summit
    CornCon 9
    Secure Digital Conference 2023
    Three Rivers Information Security Symposium 2023
    SecureWV 14
    Information Security Summit 2023
    GPSec 2023
    Queen City Con 0x1
    BSides Rochester 2024
    Cincinnati Leadership Exchange
    North Dakota Cyber Security Conference
    BSides Nashville 2024
    CackalackyCon 2024
    BSides Knoxville 10

  • Instructor

    Information Security Conference Training Sessions Delivered

    - Present 2 years 9 months

    Science and Technology

    Annual InfoSec Conferences where I volunteered as a "Trainer"...

    Hardware Hacking Village (IoT) Assistant, Hackers Teaching Hackers, 11/04/2021
    CircleCityCon 9.0 (Saturday Morning Cartoons), Wireshark Workshop, 09/18/2022
    Hardware Hacking Village (IoT) Assistant, Hackers Teaching Hackers, 11/03/2022
    Hardware Hacking Village (IoT) Assistant, Hackers Teaching Hackers, 11/02/2023

  • Public Speaker

    Misc. Speaking Engagements

    Science and Technology

    Other Technology Conferences where I've presented on Information Security topics:

    Akamai Sales Academy, 2019
    Momentum Developer Conference, 2019

    Monthly scheduled meetup groups, and other special events where I've presented:

    (ISC)2 Cincinnati Chapter
    Ascend Technologies, Executive Briefing: The State of Cybersecurity (Panel)
    Butler Tech Student Assembly
    CiNPA (Cincinnati Networking Professionals Association, Hackers' Night)
    Cincinnati State Master…

    Other Technology Conferences where I've presented on Information Security topics:

    Akamai Sales Academy, 2019
    Momentum Developer Conference, 2019

    Monthly scheduled meetup groups, and other special events where I've presented:

    (ISC)2 Cincinnati Chapter
    Ascend Technologies, Executive Briefing: The State of Cybersecurity (Panel)
    Butler Tech Student Assembly
    CiNPA (Cincinnati Networking Professionals Association, Hackers' Night)
    Cincinnati State Master Classes
    CiNPA Security SIG
    Cloud Security Alliance (CSA) Northeast Ohio (Cleveland) Chapter
    Cyber Defense Exchange (CDX) 2022 Capture The Flag (CTF) competition
    Dallas Hackers Association (Dallas Hackers)
    DC414 - Public Hacker Meetup
    Dayton Microcomputer Association
    Greater Cincinnati ISSA Chapter
    Internship Summit Academy
    Ohio Information Security Forum (OISF)
    OWASP Cincinnati Chapter
    [Private Event] Social Engineering Conference
    [Private Event] Career Day ("A Day in the Life" Panel)
    [Private Event] ("A Day in the Life" Panel)
    [Private Event] Attack Surface Focus Group Leader Guest Interview
    Pwn School
    Tanium Users Group
    [Private Event] My Mentorships Engagement Panel
    [Private Event] Architecture Community of Practice
    [Private Event] Endpoint Security Collaborative
    [Private Event] Cloud Security Collaborative
    [Private Event] Early Careers Discovery Program (College Juniors)

    NOTE: I have given talks at most of the above list multiple times.

  • Public Speaker

    Guest Appearances, Industry Blogs, and Media Interviews

    - Present 6 years 6 months

    Science and Technology

    Podcasts (Guest Interviews):

    Bring Your Own Security Radio: February 1, 2018
    Bring Your Own Security Radio: September 27, 2018
    Bring Your Own Security Radio: January 29, 2019
    Cyber Life podcast: August 2, 2019
    Bring Your Own Security Radio: February 12, 2020
    Moscow Mules and NOP Slides: November 18, 2020
    ITSPmagazine, The Hacker Factory Podcast: January 7, 2022
    SecurityGuyTV (Vimeo): July 13, 2022
    Bishop Fox DEF CON live stream: August 12, 2022
    Shared Security…

    Podcasts (Guest Interviews):

    Bring Your Own Security Radio: February 1, 2018
    Bring Your Own Security Radio: September 27, 2018
    Bring Your Own Security Radio: January 29, 2019
    Cyber Life podcast: August 2, 2019
    Bring Your Own Security Radio: February 12, 2020
    Moscow Mules and NOP Slides: November 18, 2020
    ITSPmagazine, The Hacker Factory Podcast: January 7, 2022
    SecurityGuyTV (Vimeo): July 13, 2022
    Bishop Fox DEF CON live stream: August 12, 2022
    Shared Security Show: November 14, 2022
    Tanium Tech Talks: August 2, 2023
    ThreatConnect "Smarter Security" series: January - February 2024
    The Philip Wylie Show: June 18, 2024

    Blogs:

    https://www.rapid7.com/blog/post/2019/01/02/facing-the-future-rapid7s-2019-security-predictions/
    https://www.rapid7.com/blog/post/2020/01/01/cheers-to-a-new-year-rapid7s-2020-security-predictions/
    https://bishopfox.com/blog/black-hat-def-con-2022
    https://bishopfox.com/blog/12-hacking-influencers
    https://blog.gitguardian.com/bsides-knoxville-2024/

    Media Interviews:

    https://www.cdomagazine.tech/community/infosec-experts-sharpen-tactics-at-cybersecurity-midwest-summit

  • Public Speaker

    Misc. Speaking Engagement Details

    Science and Technology

    List of places where I've presented (Most multiple times):

    Charleston, WV
    Cincinnati, OH
    Cleveland, OH
    Columbus, OH
    Dallas, TX
    Davenport, IA (Quad Cities)
    Dayton, OH
    Fargo, ND
    Highland Heights, KY (Greater Cincinnati)
    Indianapolis, IN
    Knoxville, TN
    Las Vegas, NV
    Louisville, KY
    Nashville, TN
    Online / Virtual
    Pittsburgh, PA
    Raleigh-Durham, NC (Research Triangle)
    Rochester, NY

    Original InfoSec Workshops I've developed and…

    List of places where I've presented (Most multiple times):

    Charleston, WV
    Cincinnati, OH
    Cleveland, OH
    Columbus, OH
    Dallas, TX
    Davenport, IA (Quad Cities)
    Dayton, OH
    Fargo, ND
    Highland Heights, KY (Greater Cincinnati)
    Indianapolis, IN
    Knoxville, TN
    Las Vegas, NV
    Louisville, KY
    Nashville, TN
    Online / Virtual
    Pittsburgh, PA
    Raleigh-Durham, NC (Research Triangle)
    Rochester, NY

    Original InfoSec Workshops I've developed and delivered:

    Password Cracking Workshop (2 Hours, 12/2019)
    CyberChef Workshop (2 Hours, 12/2020)
    Wireshark Workshop (2 Hours, 12/2021)

  • Women's Security Alliance Graphic

    Mentor

    Women's Security Alliance

    - Present 3 years 5 months

    Science and Technology

    Mentorship for women seeking a technical career in Information Security. Working with mentees by providing insights as they explore different cybersecurity career path options. Sharing expertise and experience is what the mentorship program is all about. Being a WomSA Mentor provides:

    • An opportunity to give back by sharing experience and skills
    • A platform to network by collaborating with peer mentors
    • A seat on the WomSA Advisory Board to provide feedback and vision
    •…

    Mentorship for women seeking a technical career in Information Security. Working with mentees by providing insights as they explore different cybersecurity career path options. Sharing expertise and experience is what the mentorship program is all about. Being a WomSA Mentor provides:

    • An opportunity to give back by sharing experience and skills
    • A platform to network by collaborating with peer mentors
    • A seat on the WomSA Advisory Board to provide feedback and vision
    • Participation on a panel at WomSA events

  • Warren County Career Center Graphic

    Board of Advisors

    Warren County Career Center

    - Present 8 months

    Education

    IT and Cybersecurity Programs

  • Security Director

    Cincinnati Networking Professionals Association

    - 4 years 2 months

    Science and Technology

    The Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG) holds monthly meetings on the third Thursday of each month starting at 6:30 p.m. The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the technical aspects of InfoSec, but we occasionally touch on other areas of…

    The Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG) holds monthly meetings on the third Thursday of each month starting at 6:30 p.m. The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the technical aspects of InfoSec, but we occasionally touch on other areas of cybersecurity as well. Information security news, announcements, and round-table discussions follow our main meeting topics.

    Duties:
    • Ambassadorship for CiNPA and the affiliated Security Special Interest Group
    • Meeting Organizer for the CiNPA Security SIG monthly meetings
    • Meeting Host and Conference Room Proctor
    • Record Keeping and Retention of monthly meeting attendance
    • Presiding officer and occasional speaker

    Accomplishments:
    • Procured a new monthly meeting location in 2017
    • Increased average monthly meeting attendance by over 400% in 2017
    • Promoted other Tri-state information security conferences and events
    • Scheduled knowledgeable speakers presenting on a variety of interesting InfoSec topics
    • Received overwhelmingly positive feedback from meeting attendees
    • Zero canceled meetings under my tenure as the CiNPA Security SIG Chair
    • Helped attendees learn, grow, and improve their skills as information security practitioners
    • Transitioned to online-only virtual meetings (3/2020 to 7/2020) due to COVID-19
    • Procured a new permanent monthly meeting location in August of 2021

  • Bugcrowd Graphic

    Ambassador

    Bugcrowd

    - 1 year 1 month

    Science and Technology

    Ambassador duties include the following:

    • Promote Bugcrowd
    • Promote Bugcrowd University to aspiring ethical hackers
    • Promote bug bounty opportunities to potential researchers through involvement in the Information Security (InfoSec) community
    • Educate potential researchers on bug hunting and pentest tools, techniques, and methodologies
    • Present on bug bounties at security conferences and other events

  • Public Speaking

    Conference Keynotes

    - Present 10 months

    Science and Technology

    Conference Keynote talks delivered:

    10/26/2023, Information Security Summit 2023, I--X Center, Cleveland, Ohio

    11/18/2023, Queen City Con 0x1, Cincinnati, Ohio

    04/17/2024, Cybersecurity Collaboration Forum: Cincinnati Leadership Exchange, Cincinnati, Ohio

Projects

  • Chief Technology Adviser, Wireless Dayton Days

    -

    Wireless Dayton Days (WDD) is a project of the Dayton Microcomputer Association, Inc. (DMA). The WDD project was designed to educate users and to promote interest in a free, public-access wireless (WiFi), grid network for residents and visitors to the City of Dayton and surrounding communities. Volunteers of WDD have demonstrated the free network at numerous public event venues in and around Downtown Dayton. As the Chief Technology Adviser I reported to WDD Chairman, Peter Hess, and my…

    Wireless Dayton Days (WDD) is a project of the Dayton Microcomputer Association, Inc. (DMA). The WDD project was designed to educate users and to promote interest in a free, public-access wireless (WiFi), grid network for residents and visitors to the City of Dayton and surrounding communities. Volunteers of WDD have demonstrated the free network at numerous public event venues in and around Downtown Dayton. As the Chief Technology Adviser I reported to WDD Chairman, Peter Hess, and my responsibilities included: recommendation of IT and wireless solutions to demonstrate the operation and use of the network; testing and preparation of demo systems; presenting to city officials and other VIPs; training other volunteers in wireless networking technologies along with their use and application; assisting with the setup and tear down of demonstration areas; educating the public and keeping Dayton citizens and visitors interested in free WiFi. Locally-owned, International WiFi provider HarborLink Ltd. helped considerably with this project.

    Other creators
    See project

Honors & Awards

  • Bricata NDR CTF Winner

    OpenText

    OpenText NDR Capture the Flag (CTF) Threat Hunting Challenge. The CTF contains several different challenges related to alert triage and threat hunting. Each challenge has a series of questions that the players answer using the information they can find related to the alert or threat hunt. The questions have points associated with them and they accumulate with correct answers. The goal is for the user to gain an understanding of the visibility and rich context that OT NDR provides the…

    OpenText NDR Capture the Flag (CTF) Threat Hunting Challenge. The CTF contains several different challenges related to alert triage and threat hunting. Each challenge has a series of questions that the players answer using the information they can find related to the alert or threat hunt. The questions have points associated with them and they accumulate with correct answers. The goal is for the user to gain an understanding of the visibility and rich context that OT NDR provides the analyst.

    The CTF took place virtually (online) on 04/04/2023. I finished in first place, scoring 50 points (the second-place participant had 38 points), during the CTF.

  • Top 12 Hacking Influencer

    Bishop Fox

    Staying in the know on the latest happenings in cybersecurity, especially from those on the frontlines and conducting cutting-edge research, is of utmost importance in today’s complex digital world. With all the different resources available on the internet, it can be difficult to keep track of what sources to look at and what topics to filter. We have created a list of our favorite cybersecurity influencers to help guide you on your…

    Staying in the know on the latest happenings in cybersecurity, especially from those on the frontlines and conducting cutting-edge research, is of utmost importance in today’s complex digital world. With all the different resources available on the internet, it can be difficult to keep track of what sources to look at and what topics to filter. We have created a list of our favorite cybersecurity influencers to help guide you on your journey.

    https://bishopfox.com/blog/12-hacking-influencers

  • 3rd Place Finish CTF Team

    Cyber Defense Exercise (CDX)

    The [REDACTED] Cyber Defense Exercise (CDX) is a Capture The Flag (CTF) that was developed in 2016 to enhance cyber defense capabilities and strengthen relationships.

    Teams

    Organizations will compete with a team comprised of nine individuals. These individuals are divided into three roles:

    Red Team (4): Tasked to exploit weaknesses in other teams' defended environments.

    Blue Team (4): Tasked with protecting their team's competition environment from…

    The [REDACTED] Cyber Defense Exercise (CDX) is a Capture The Flag (CTF) that was developed in 2016 to enhance cyber defense capabilities and strengthen relationships.

    Teams

    Organizations will compete with a team comprised of nine individuals. These individuals are divided into three roles:

    Red Team (4): Tasked to exploit weaknesses in other teams' defended environments.

    Blue Team (4): Tasked with protecting their team's competition environment from attacks.

    Controller/Team Lead (1): Coordinates team efforts and strategies.

    The CDX competition simulates real-world scenarios by enabling offensive and defensive security professionals to demonstrate their skills of capturing flags and preventing capture respectively.

    Attack & Defense CTF Structure

    Each team has a set of intentionally insecure network environments. Players defend their infrastucture to earn points, and attack opponents to gain additional points.

    Skills needed to participate

    Players will need to have some basic knowledge of networking. There will be a mix of Windows, Linux, and Unix machines in the environment, so comfortability with each is recommended. This includes Linux/Unix command line and Windows PowerShell. Basic programming and scripting skills are a plus, but not specifically required. Knowledge of penatration testing, system adminstration, and network defense methodologies are recommended.

    For the CTF competition, some types of challenges that participants may encounter:

    - Broken Access Control
    - Cryptographic Failures
    - Injection Vulnerabilities
    - Insecure Design
    - Security Misconfiguration
    - Vulnerable and Outdated Components
    - Identification and Authentication Failures
    - Software and Data Integrity
    - Security Logging and Monitoring Failures
    - Request Forgery

  • comSpark 2019 "Rising Tech Stars" Award

    comSpark

    Rising Star (person)

    - Not a current CIO or head of IT at a given organization
    - Leadership Capabilities
    - Success in providing a technology solution for a business challenge
    - Investment in themselves (MBA, IT Leaders, etc)
    - Community Leadership/Impact

  • CiNPA Security SIG “Threat Intelligence Challenge” Award Winner

    Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)

    After a quick introductory kick-off presentation. Our "Threat Intelligence" discussion will be a bit different from usual meeting formats. Contestants will write out a definition for "Threat Intelligence" using their own words and present it to the group in a 30-second elevator pitch format. We will conduct a blind vote to determine the best definition for "Threat Intelligence". The winner will receive a CiNPA Security SIG “Threat Intelligence Challenge” certificate award at the June meeting.

  • Certificate of Recognition as an Ambassador for ACM

    Association for Computing Machinery (ACM)

    In Appreciation for Membership Recruitment for Advancing Computing as a Science & Profession.

Organizations

  • Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)

    Chair

    - Present

    The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the defensive side of information security, but we delve into all other areas of cyber-security as well. Information security news, announcements, and round-table discussions follow our main meeting topics.

  • Information Systems Security Association (ISSA)

    Member

    - Present

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and…

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure. Core Purpose: To promote a secure digital world.

  • Cincinnati Security MBA (Cincinnati SMBA)

    Attendee

    - Present

    Cincinnati SMBA allows for Information Security Professionals to get together and discuss current information security related topics. As the Information Security field is broad, so are the range of topics, which include network, host and application security, privacy, law, cryptography, copyrights & patents, physical security, fire suppression, DR/BCP, ethics, forensic, biometrics, identity management, firearms, project management, development, data integrity, records retention and storage…

    Cincinnati SMBA allows for Information Security Professionals to get together and discuss current information security related topics. As the Information Security field is broad, so are the range of topics, which include network, host and application security, privacy, law, cryptography, copyrights & patents, physical security, fire suppression, DR/BCP, ethics, forensic, biometrics, identity management, firearms, project management, development, data integrity, records retention and storage, optics, chemistry, hacking, red teams, DHS, NSA, FBI, ATF, etc. And beer. We operate under the Chatham House rule.

  • Association for Computing Machinery (ACM)

    Member

    - Present

    ACM, the world's largest educational and scientific computing society, delivers resources that advance computing as a science and a profession. ACM provides the computing field's premier Digital Library and serves its members and the computing profession with leading-edge publications, conferences, and career resources.

  • Ohio Information Security Forum (OISF)

    Attendee

    - Present

    The Ohio Information Security Forum (OISF) is a group of professionals and enthusiasts with a shared information security, network and system administration, engineering, and related computing technology backgrounds. Peer-to-Peer Networking · Sharing knowledge of security technologies · Sharing expertise and solutions to issues · Collaborating with fellow information security peers · Conducting training programs for security and non-security professionals · Sharing experiences with security…

    The Ohio Information Security Forum (OISF) is a group of professionals and enthusiasts with a shared information security, network and system administration, engineering, and related computing technology backgrounds. Peer-to-Peer Networking · Sharing knowledge of security technologies · Sharing expertise and solutions to issues · Collaborating with fellow information security peers · Conducting training programs for security and non-security professionals · Sharing experiences with security products and solutions We all have the common objective to better secure our digital world. In doing so, open discussions center on security issues which include: · Emerging threats and vulnerabilities · Hacking techniques and trends · Defense techniques & strategies · Laws & regulations · Recent trends in security

  • Cincinnati Networking Professionals Association (CiNPA)

    Member

    - Present

    The Cincinnati Networking Professionals Association (CiNPA) is dedicated to the promotion and advancement of the art and science of Computer Networking and Information Technology in the Greater Cincinnati, Ohio area. CiNPA members are computer networking practitioners of various backgrounds, experience and knowledge levels, and technical interests who are united in our strong commitment to improving the profession of computer networking and our own skills and practices within the field.

  • Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)

    Meeting Organizer

    -

    The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the defensive side of information security, but we delve into all other areas of cyber-security as well. Information security news, announcements, and round-table discussions follow our main meeting topics.

  • Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)

    Attendee

    -

    The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the defensive side of information security, but we delve into all other areas of cyber-security as well. Information security news, announcements, and round-table discussions follow our main meeting topics.

Recommendations received

View Matt’s full profile

  • See who you know in common
  • Get introduced
  • Contact Matt directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Matt Scheurer

Add new skills with these courses