November 15-17, 2017

Reserve Your Seat Before It Sells Out



Brad Duncan

Threat Intelligence Analyst
at Palo Alto Networks

After 21 years of classified intelligence work for the US Air Force, Brad transitioned to cyber security in 2010, specializing in network traffic analysis at Palo Alto Networks. He is also a handler for the Internet Storm Center (ISC) and has posted more than 100 diaries at Brad routinely blogs technical details and analysis of infection traffic at, where he provides traffic analysis exercises and over 1,000 malware and pcap samples to information security professionals.

Brennan Lodge

Team Lead
at Bloomberg LP

I am a data nerd. I have been working in the financial industry for the last 10 years focusing on cyber security and data analytics. I hold a masters degree in Business Analytics from NYU Stern School of Business. In my spare time, I enjoy volunteering with DataKind to work on data science projects for non-profits. I am also an avid swimmer and water polo player. Twitter: @blodge8

Giuseppe Longo

Software Developer
at Stamus Networks

Giuseppe is an open source software developer involved in the development of network security software. He started his contribution in the open source world with Netfilter organization, which he is still a member of, then he joined OISF. He is involved in Suricata development at Stamus Networks.

Peter Manev

Security Solution Architect
at OISF / Stamus Networks

Peter has 15 years experience in the IT industry, including enterprise level IT security practice. An adamant admirer and explorer of innovative open source security software, Peter is currently a Security Solution Architect. He maintains some additional info points of interest about Suricata:,, and

Kelley Misata

Executive Director at OISF

Kelley combines over 15 years in business with a passion for facilitating conversations around responsible digital citizenship, digital safety, and free speech online. Kelley combines her skill in strategic business development with a unique perspective as a survivor of cyberstalking. Drawing on current trends and conversations in digital security with local and federal law enforcement, information security experts and national resources she creates strategies incorporating the human side of information security. Kelley holds a BS in Marketing, an MBA and a PhD in Information Security from Purdue.

Jack Mott

Security Researcher
at Emerging Threats / Proofpoint / OISF

Jack is a security researcher who focuses on open source solutions to detect, track and hunt malware and malicious activity. He has been a signature writer for the Emerging Threats team for several years, producing community / premium Suricata signatures to help protect networks worldwide. Jack is a strong believer in the open source mission as well as helping people and organizations solve security issues with open source solutions. He can be reached on Twitter: @malwareforme and resides in the USA.

Michal Purzynski

Senior Network Security Engineer
at Mozilla Corporation

Michal is part of the Enterprise Information Security team at Mozilla. He protects the Fox. The Firefox. From bad actors. He has designed and deployed the NSM stack in Mozilla datacenters, offices, and cloud. He is one of a two-person team who watches the alerts and reacts, helps with the DFIR, and works closely with the Network Operations team, helping them to review the network architecture (which is changing all the time) from a security point of view.

Anthony Tellez

Global Lead Consultant
at Splunk

Anthony supports customers in EMEA, APAC, Americas, and Public Sector with internet of things and machine learning use cases. Anthony works closely with the product team to implement new premium Business Analytics & IoT solutions for Splunk’s customers. His previous roles include cloud strategy, data governance, product development, and geospatial analysis. Anthony is the developer of the Splunk TA for Suricata, which integrates Suricata with Splunk for real-time analysis and correlation.

Jason Williams

Security Researcher
at Emerging Threats / Proofpoint / OISF

Jason is a security researcher with global enterprise experience in detecting, hunting and remediating threats with open source technologies. Primarily focusing on network communications, Jason has written thousands of commercial and community Suricata rules for Emerging Threats to help defenders protect their networks. Jason participates as a Signature Development and User Training instructor for the OISF.

Brad Woodberg

Group Product Manager
at Proofpoint Inc.

He is a four-time published author of network security books through O’Reilly and Syngress. Prior to his current role at Proofpoint, he spent six years at Juniper Networks as a layer 7 security product manager and product line engineer. He started his endeavors in the network security industry working for a security consulting company in Ann Arbor Michigan for four years delivering a variety of network security technologies and services.






Endace logo


Stamus logo



Protectwise Logo - Achieve pervasive visibility, high-performance threat hunting and accelerated incident response; across your security environment and across time.




There is a $150 attendance fee for the 3-day conference.

Register Now!


Hotel Grandior Prague
Na Poříčí 42
110 00 Praha 1-Florenc
Czech Republic

Reserve a Room


Contact Us
For more information
send us an email:

Suricata Training

Join us 2 days early (November 13-14) for a 2-day Suricata training led by Suricata’s lead developers. The training is being held the same week and the same location as SuriCon 2017. Attend both and receive a 20% discount your registration for the training!



Suricata - an open source, high performance Network IDS, IPS and Network Security Monitoring engine.

Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. It is open source and owned by a community-run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.