“I cannot think of a more difficult position to step into than an existing Enterprise admin position. Immediately expected to produce credible results in a very complex environment with 24x7x365 uptime and proprietary software, Matt seamlessly integrated into the team and delivered experienced, measured results. Along with a great personality and willingnes to pass knowledge and experience to team members, he certainly is a pleasure to work with.”
About
Contributions
-
You're scheduled to speak at an event. How can you make sure organizers stick to your allotted time?
Be considerate of the conference schedule and the next speaker. Few things are more infuriating as a speaker than somebody running over their allotted time slot. Make ending your presentations on time a priority. Be ready to cut off Q&A at an appropriate time as well, and then promptly get out of the way. Remember that the next speaker or conference organizer needs adequate setup time to load a slide deck and sync up with a projector to begin their talk on time. Chances are that the next speaker has carefully prepared and timed their presentation.
Activity
-
The Cybersecurity Conference CDO Magazine has meticulously curated a remarkable lineup of industry experts and niche information security subjects…
The Cybersecurity Conference CDO Magazine has meticulously curated a remarkable lineup of industry experts and niche information security subjects…
Liked by Matt Scheurer
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Public Speaker
Information Security Conference Speaking Engagements
- Present 8 years 11 months
Science and Technology
Annual InfoSec Conferences where I've presented:
DerbyCon 5.0
DerbyCon 7.0
10th Annual Northern Kentucky University Cybersecurity Symposium
BSides Columbus 5.0
BSides Indianapolis 2018
BSides Cincinnati 5
11th Annual Central Ohio InfoSec Summit
Circle City Con 5.0
BSides Cleveland 2018
12 year Ohio Information Security Forum (OISF) Anniversary Conference
11th Annual Northern Kentucky University Cybersecurity Symposium
4th Annual SecureWorld…Annual InfoSec Conferences where I've presented:
DerbyCon 5.0
DerbyCon 7.0
10th Annual Northern Kentucky University Cybersecurity Symposium
BSides Columbus 5.0
BSides Indianapolis 2018
BSides Cincinnati 5
11th Annual Central Ohio InfoSec Summit
Circle City Con 5.0
BSides Cleveland 2018
12 year Ohio Information Security Forum (OISF) Anniversary Conference
11th Annual Northern Kentucky University Cybersecurity Symposium
4th Annual SecureWorld Cincinnati
Ohio Information Security Conference 2019 (OISC)
12th Annual Central Ohio InfoSec Summit
13 year Ohio Information Security Forum (OISF) Anniversary Conference
ISSA International Summit, 2019
Hack3rCon X
Ohio Information Security Conference 2020 (OISC)
Circle City Con 7.0 Apocalypse
BSides Columbus 2020
SecureWV 11
CONHESI 2021 (Congreso Internacional de Hacking Ético y Seguridad Informatica)
BSides Cleveland 2021
15 year Ohio Information Security Forum (OISF) Anniversary Conference
14th Annual Northern Kentucky University Cybersecurity Symposium
15th Annual Central Ohio InfoSec Summit
BSides Cleveland 2022
16 year Ohio Information Security Forum (OISF) Anniversary Conference
Blue Team Village at DEF CON 30
2022 Cybersecurity Midwest Summit
Secure Digital Conference 2022
SecureWV Lucky 13
Information Security Summit 2022
BSides Dayton 2022
HackCon Online 2023
Ohio Information Security Conference 2023 (OISC)
BSides Nashville 2023
16th Annual Central Ohio InfoSec Summit
17 year Ohio Information Security Forum (OISF) Anniversary Conference
BSides Las Vegas 2023
Black Hat USA 2023
2023 Cybersecurity Midwest Summit
CornCon 9
Secure Digital Conference 2023
Three Rivers Information Security Symposium 2023
SecureWV 14
Information Security Summit 2023
GPSec 2023
Queen City Con 0x1
BSides Rochester 2024
Cincinnati Leadership Exchange
North Dakota Cyber Security Conference
BSides Nashville 2024
CackalackyCon 2024
BSides Knoxville 10 -
Instructor
Information Security Conference Training Sessions Delivered
- Present 2 years 9 months
Science and Technology
Annual InfoSec Conferences where I volunteered as a "Trainer"...
Hardware Hacking Village (IoT) Assistant, Hackers Teaching Hackers, 11/04/2021
CircleCityCon 9.0 (Saturday Morning Cartoons), Wireshark Workshop, 09/18/2022
Hardware Hacking Village (IoT) Assistant, Hackers Teaching Hackers, 11/03/2022
Hardware Hacking Village (IoT) Assistant, Hackers Teaching Hackers, 11/02/2023 -
Public Speaker
Misc. Speaking Engagements
Science and Technology
Other Technology Conferences where I've presented on Information Security topics:
Akamai Sales Academy, 2019
Momentum Developer Conference, 2019
Monthly scheduled meetup groups, and other special events where I've presented:
(ISC)2 Cincinnati Chapter
Ascend Technologies, Executive Briefing: The State of Cybersecurity (Panel)
Butler Tech Student Assembly
CiNPA (Cincinnati Networking Professionals Association, Hackers' Night)
Cincinnati State Master…Other Technology Conferences where I've presented on Information Security topics:
Akamai Sales Academy, 2019
Momentum Developer Conference, 2019
Monthly scheduled meetup groups, and other special events where I've presented:
(ISC)2 Cincinnati Chapter
Ascend Technologies, Executive Briefing: The State of Cybersecurity (Panel)
Butler Tech Student Assembly
CiNPA (Cincinnati Networking Professionals Association, Hackers' Night)
Cincinnati State Master Classes
CiNPA Security SIG
Cloud Security Alliance (CSA) Northeast Ohio (Cleveland) Chapter
Cyber Defense Exchange (CDX) 2022 Capture The Flag (CTF) competition
Dallas Hackers Association (Dallas Hackers)
DC414 - Public Hacker Meetup
Dayton Microcomputer Association
Greater Cincinnati ISSA Chapter
Internship Summit Academy
Ohio Information Security Forum (OISF)
OWASP Cincinnati Chapter
[Private Event] Social Engineering Conference
[Private Event] Career Day ("A Day in the Life" Panel)
[Private Event] ("A Day in the Life" Panel)
[Private Event] Attack Surface Focus Group Leader Guest Interview
Pwn School
Tanium Users Group
[Private Event] My Mentorships Engagement Panel
[Private Event] Architecture Community of Practice
[Private Event] Endpoint Security Collaborative
[Private Event] Cloud Security Collaborative
[Private Event] Early Careers Discovery Program (College Juniors)
NOTE: I have given talks at most of the above list multiple times. -
Public Speaker
Guest Appearances, Industry Blogs, and Media Interviews
- Present 6 years 6 months
Science and Technology
Podcasts (Guest Interviews):
Bring Your Own Security Radio: February 1, 2018
Bring Your Own Security Radio: September 27, 2018
Bring Your Own Security Radio: January 29, 2019
Cyber Life podcast: August 2, 2019
Bring Your Own Security Radio: February 12, 2020
Moscow Mules and NOP Slides: November 18, 2020
ITSPmagazine, The Hacker Factory Podcast: January 7, 2022
SecurityGuyTV (Vimeo): July 13, 2022
Bishop Fox DEF CON live stream: August 12, 2022
Shared Security…Podcasts (Guest Interviews):
Bring Your Own Security Radio: February 1, 2018
Bring Your Own Security Radio: September 27, 2018
Bring Your Own Security Radio: January 29, 2019
Cyber Life podcast: August 2, 2019
Bring Your Own Security Radio: February 12, 2020
Moscow Mules and NOP Slides: November 18, 2020
ITSPmagazine, The Hacker Factory Podcast: January 7, 2022
SecurityGuyTV (Vimeo): July 13, 2022
Bishop Fox DEF CON live stream: August 12, 2022
Shared Security Show: November 14, 2022
Tanium Tech Talks: August 2, 2023
ThreatConnect "Smarter Security" series: January - February 2024
The Philip Wylie Show: June 18, 2024
Blogs:
https://www.rapid7.com/blog/post/2019/01/02/facing-the-future-rapid7s-2019-security-predictions/
https://www.rapid7.com/blog/post/2020/01/01/cheers-to-a-new-year-rapid7s-2020-security-predictions/
https://bishopfox.com/blog/black-hat-def-con-2022
https://bishopfox.com/blog/12-hacking-influencers
https://blog.gitguardian.com/bsides-knoxville-2024/
Media Interviews:
https://www.cdomagazine.tech/community/infosec-experts-sharpen-tactics-at-cybersecurity-midwest-summit -
Public Speaker
Misc. Speaking Engagement Details
Science and Technology
List of places where I've presented (Most multiple times):
Charleston, WV
Cincinnati, OH
Cleveland, OH
Columbus, OH
Dallas, TX
Davenport, IA (Quad Cities)
Dayton, OH
Fargo, ND
Highland Heights, KY (Greater Cincinnati)
Indianapolis, IN
Knoxville, TN
Las Vegas, NV
Louisville, KY
Nashville, TN
Online / Virtual
Pittsburgh, PA
Raleigh-Durham, NC (Research Triangle)
Rochester, NY
Original InfoSec Workshops I've developed and…List of places where I've presented (Most multiple times):
Charleston, WV
Cincinnati, OH
Cleveland, OH
Columbus, OH
Dallas, TX
Davenport, IA (Quad Cities)
Dayton, OH
Fargo, ND
Highland Heights, KY (Greater Cincinnati)
Indianapolis, IN
Knoxville, TN
Las Vegas, NV
Louisville, KY
Nashville, TN
Online / Virtual
Pittsburgh, PA
Raleigh-Durham, NC (Research Triangle)
Rochester, NY
Original InfoSec Workshops I've developed and delivered:
Password Cracking Workshop (2 Hours, 12/2019)
CyberChef Workshop (2 Hours, 12/2020)
Wireshark Workshop (2 Hours, 12/2021) -
Mentor
Women's Security Alliance
- Present 3 years 5 months
Science and Technology
Mentorship for women seeking a technical career in Information Security. Working with mentees by providing insights as they explore different cybersecurity career path options. Sharing expertise and experience is what the mentorship program is all about. Being a WomSA Mentor provides:
• An opportunity to give back by sharing experience and skills
• A platform to network by collaborating with peer mentors
• A seat on the WomSA Advisory Board to provide feedback and vision
•…Mentorship for women seeking a technical career in Information Security. Working with mentees by providing insights as they explore different cybersecurity career path options. Sharing expertise and experience is what the mentorship program is all about. Being a WomSA Mentor provides:
• An opportunity to give back by sharing experience and skills
• A platform to network by collaborating with peer mentors
• A seat on the WomSA Advisory Board to provide feedback and vision
• Participation on a panel at WomSA events -
Board of Advisors
Warren County Career Center
- Present 8 months
Education
IT and Cybersecurity Programs
-
Security Director
Cincinnati Networking Professionals Association
- 4 years 2 months
Science and Technology
The Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG) holds monthly meetings on the third Thursday of each month starting at 6:30 p.m. The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the technical aspects of InfoSec, but we occasionally touch on other areas of…
The Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG) holds monthly meetings on the third Thursday of each month starting at 6:30 p.m. The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the technical aspects of InfoSec, but we occasionally touch on other areas of cybersecurity as well. Information security news, announcements, and round-table discussions follow our main meeting topics.
Duties:
• Ambassadorship for CiNPA and the affiliated Security Special Interest Group
• Meeting Organizer for the CiNPA Security SIG monthly meetings
• Meeting Host and Conference Room Proctor
• Record Keeping and Retention of monthly meeting attendance
• Presiding officer and occasional speaker
Accomplishments:
• Procured a new monthly meeting location in 2017
• Increased average monthly meeting attendance by over 400% in 2017
• Promoted other Tri-state information security conferences and events
• Scheduled knowledgeable speakers presenting on a variety of interesting InfoSec topics
• Received overwhelmingly positive feedback from meeting attendees
• Zero canceled meetings under my tenure as the CiNPA Security SIG Chair
• Helped attendees learn, grow, and improve their skills as information security practitioners
• Transitioned to online-only virtual meetings (3/2020 to 7/2020) due to COVID-19
• Procured a new permanent monthly meeting location in August of 2021 -
Ambassador
Bugcrowd
- 1 year 1 month
Science and Technology
Ambassador duties include the following:
• Promote Bugcrowd
• Promote Bugcrowd University to aspiring ethical hackers
• Promote bug bounty opportunities to potential researchers through involvement in the Information Security (InfoSec) community
• Educate potential researchers on bug hunting and pentest tools, techniques, and methodologies
• Present on bug bounties at security conferences and other events -
Public Speaking
Conference Keynotes
- Present 10 months
Science and Technology
Conference Keynote talks delivered:
10/26/2023, Information Security Summit 2023, I--X Center, Cleveland, Ohio
11/18/2023, Queen City Con 0x1, Cincinnati, Ohio
04/17/2024, Cybersecurity Collaboration Forum: Cincinnati Leadership Exchange, Cincinnati, Ohio
Projects
-
Chief Technology Adviser, Wireless Dayton Days
-
Wireless Dayton Days (WDD) is a project of the Dayton Microcomputer Association, Inc. (DMA). The WDD project was designed to educate users and to promote interest in a free, public-access wireless (WiFi), grid network for residents and visitors to the City of Dayton and surrounding communities. Volunteers of WDD have demonstrated the free network at numerous public event venues in and around Downtown Dayton. As the Chief Technology Adviser I reported to WDD Chairman, Peter Hess, and my…
Wireless Dayton Days (WDD) is a project of the Dayton Microcomputer Association, Inc. (DMA). The WDD project was designed to educate users and to promote interest in a free, public-access wireless (WiFi), grid network for residents and visitors to the City of Dayton and surrounding communities. Volunteers of WDD have demonstrated the free network at numerous public event venues in and around Downtown Dayton. As the Chief Technology Adviser I reported to WDD Chairman, Peter Hess, and my responsibilities included: recommendation of IT and wireless solutions to demonstrate the operation and use of the network; testing and preparation of demo systems; presenting to city officials and other VIPs; training other volunteers in wireless networking technologies along with their use and application; assisting with the setup and tear down of demonstration areas; educating the public and keeping Dayton citizens and visitors interested in free WiFi. Locally-owned, International WiFi provider HarborLink Ltd. helped considerably with this project.
Other creatorsSee project
Honors & Awards
-
Bricata NDR CTF Winner
OpenText
OpenText NDR Capture the Flag (CTF) Threat Hunting Challenge. The CTF contains several different challenges related to alert triage and threat hunting. Each challenge has a series of questions that the players answer using the information they can find related to the alert or threat hunt. The questions have points associated with them and they accumulate with correct answers. The goal is for the user to gain an understanding of the visibility and rich context that OT NDR provides the…
OpenText NDR Capture the Flag (CTF) Threat Hunting Challenge. The CTF contains several different challenges related to alert triage and threat hunting. Each challenge has a series of questions that the players answer using the information they can find related to the alert or threat hunt. The questions have points associated with them and they accumulate with correct answers. The goal is for the user to gain an understanding of the visibility and rich context that OT NDR provides the analyst.
The CTF took place virtually (online) on 04/04/2023. I finished in first place, scoring 50 points (the second-place participant had 38 points), during the CTF. -
Top 12 Hacking Influencer
Bishop Fox
Staying in the know on the latest happenings in cybersecurity, especially from those on the frontlines and conducting cutting-edge research, is of utmost importance in today’s complex digital world. With all the different resources available on the internet, it can be difficult to keep track of what sources to look at and what topics to filter. We have created a list of our favorite cybersecurity influencers to help guide you on your…
Staying in the know on the latest happenings in cybersecurity, especially from those on the frontlines and conducting cutting-edge research, is of utmost importance in today’s complex digital world. With all the different resources available on the internet, it can be difficult to keep track of what sources to look at and what topics to filter. We have created a list of our favorite cybersecurity influencers to help guide you on your journey.
https://bishopfox.com/blog/12-hacking-influencers -
3rd Place Finish CTF Team
Cyber Defense Exercise (CDX)
The [REDACTED] Cyber Defense Exercise (CDX) is a Capture The Flag (CTF) that was developed in 2016 to enhance cyber defense capabilities and strengthen relationships.
Teams
Organizations will compete with a team comprised of nine individuals. These individuals are divided into three roles:
Red Team (4): Tasked to exploit weaknesses in other teams' defended environments.
Blue Team (4): Tasked with protecting their team's competition environment from…The [REDACTED] Cyber Defense Exercise (CDX) is a Capture The Flag (CTF) that was developed in 2016 to enhance cyber defense capabilities and strengthen relationships.
Teams
Organizations will compete with a team comprised of nine individuals. These individuals are divided into three roles:
Red Team (4): Tasked to exploit weaknesses in other teams' defended environments.
Blue Team (4): Tasked with protecting their team's competition environment from attacks.
Controller/Team Lead (1): Coordinates team efforts and strategies.
The CDX competition simulates real-world scenarios by enabling offensive and defensive security professionals to demonstrate their skills of capturing flags and preventing capture respectively.
Attack & Defense CTF Structure
Each team has a set of intentionally insecure network environments. Players defend their infrastucture to earn points, and attack opponents to gain additional points.
Skills needed to participate
Players will need to have some basic knowledge of networking. There will be a mix of Windows, Linux, and Unix machines in the environment, so comfortability with each is recommended. This includes Linux/Unix command line and Windows PowerShell. Basic programming and scripting skills are a plus, but not specifically required. Knowledge of penatration testing, system adminstration, and network defense methodologies are recommended.
For the CTF competition, some types of challenges that participants may encounter:
- Broken Access Control
- Cryptographic Failures
- Injection Vulnerabilities
- Insecure Design
- Security Misconfiguration
- Vulnerable and Outdated Components
- Identification and Authentication Failures
- Software and Data Integrity
- Security Logging and Monitoring Failures
- Request Forgery -
comSpark 2019 "Rising Tech Stars" Award
comSpark
Rising Star (person)
- Not a current CIO or head of IT at a given organization
- Leadership Capabilities
- Success in providing a technology solution for a business challenge
- Investment in themselves (MBA, IT Leaders, etc)
- Community Leadership/Impact -
CiNPA Security SIG “Threat Intelligence Challenge” Award Winner
Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)
After a quick introductory kick-off presentation. Our "Threat Intelligence" discussion will be a bit different from usual meeting formats. Contestants will write out a definition for "Threat Intelligence" using their own words and present it to the group in a 30-second elevator pitch format. We will conduct a blind vote to determine the best definition for "Threat Intelligence". The winner will receive a CiNPA Security SIG “Threat Intelligence Challenge” certificate award at the June meeting.
-
Certificate of Recognition as an Ambassador for ACM
Association for Computing Machinery (ACM)
In Appreciation for Membership Recruitment for Advancing Computing as a Science & Profession.
Organizations
-
Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)
Chair
- PresentThe CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the defensive side of information security, but we delve into all other areas of cyber-security as well. Information security news, announcements, and round-table discussions follow our main meeting topics.
-
Information Systems Security Association (ISSA)
Member
- PresentThe Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and…
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure. Core Purpose: To promote a secure digital world.
-
Cincinnati Security MBA (Cincinnati SMBA)
Attendee
- PresentCincinnati SMBA allows for Information Security Professionals to get together and discuss current information security related topics. As the Information Security field is broad, so are the range of topics, which include network, host and application security, privacy, law, cryptography, copyrights & patents, physical security, fire suppression, DR/BCP, ethics, forensic, biometrics, identity management, firearms, project management, development, data integrity, records retention and storage…
Cincinnati SMBA allows for Information Security Professionals to get together and discuss current information security related topics. As the Information Security field is broad, so are the range of topics, which include network, host and application security, privacy, law, cryptography, copyrights & patents, physical security, fire suppression, DR/BCP, ethics, forensic, biometrics, identity management, firearms, project management, development, data integrity, records retention and storage, optics, chemistry, hacking, red teams, DHS, NSA, FBI, ATF, etc. And beer. We operate under the Chatham House rule.
-
Association for Computing Machinery (ACM)
Member
- PresentACM, the world's largest educational and scientific computing society, delivers resources that advance computing as a science and a profession. ACM provides the computing field's premier Digital Library and serves its members and the computing profession with leading-edge publications, conferences, and career resources.
-
Ohio Information Security Forum (OISF)
Attendee
- PresentThe Ohio Information Security Forum (OISF) is a group of professionals and enthusiasts with a shared information security, network and system administration, engineering, and related computing technology backgrounds. Peer-to-Peer Networking · Sharing knowledge of security technologies · Sharing expertise and solutions to issues · Collaborating with fellow information security peers · Conducting training programs for security and non-security professionals · Sharing experiences with security…
The Ohio Information Security Forum (OISF) is a group of professionals and enthusiasts with a shared information security, network and system administration, engineering, and related computing technology backgrounds. Peer-to-Peer Networking · Sharing knowledge of security technologies · Sharing expertise and solutions to issues · Collaborating with fellow information security peers · Conducting training programs for security and non-security professionals · Sharing experiences with security products and solutions We all have the common objective to better secure our digital world. In doing so, open discussions center on security issues which include: · Emerging threats and vulnerabilities · Hacking techniques and trends · Defense techniques & strategies · Laws & regulations · Recent trends in security
-
Cincinnati Networking Professionals Association (CiNPA)
Member
- PresentThe Cincinnati Networking Professionals Association (CiNPA) is dedicated to the promotion and advancement of the art and science of Computer Networking and Information Technology in the Greater Cincinnati, Ohio area. CiNPA members are computer networking practitioners of various backgrounds, experience and knowledge levels, and technical interests who are united in our strong commitment to improving the profession of computer networking and our own skills and practices within the field.
-
Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)
Meeting Organizer
-The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the defensive side of information security, but we delve into all other areas of cyber-security as well. Information security news, announcements, and round-table discussions follow our main meeting topics.
-
Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG)
Attendee
-The CiNPA Security SIG's monthly meeting format typically consists of one or two main monthly meeting topics featuring live presentations or demonstrations promoting open and interactive group discussions. Our focus is primarily on the defensive side of information security, but we delve into all other areas of cyber-security as well. Information security news, announcements, and round-table discussions follow our main meeting topics.
Recommendations received
3 people have recommended Matt
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Matt Scheurer
2 others named Matt Scheurer are on LinkedIn
See others named Matt Scheurer