Chris Campbell is a security practitioner with over a decade of experience attacking and securing enterprise networks. Currently, he is a security researcher and developer for the Harris Corporation. Formerly, Chris spent over 12 years in the U.S. Army Reserve and spent four years as an operator in the Computer Exploitation section of the U.S. Army Red Team. He has a M.S. in Information Assurance from Capitol College and holds several industry certifications that he’d prefer you not hold against him. Chris is one of the developers of PowerSploit and has given presentations at Black Hat USA, Derbycon, ShmooCon Firetalks and multiple BSides events. He maintains a blog at www.obscuresec.com and is active on twitter (@obscuresec).
Joe 'clymb3r' Bialek (@JosephBialek) is currently a security engineer on the MSRC REACT team at Microsoft where he helps find, triage, and fix security issues. Prior to MSRC, Joe spent several years as a network penetration tester, focused primarily on attacking Windows domains. Joe was a contributor to Microsoft's Pass the Hash guidance paper, and has been a contributor to other large security efforts within the company.