Arun Gupta
OpenSSF Board Chair & Vice President and General Manager, Open Ecosystem Initiatives, Intel Corporation
Arun Gupta is vice president and general manager of Open Ecosystem Initiatives at Intel Corporation. He is an open source strategist, advocate, and practitioner for nearly two decades. He has taken companies such as Apple, Amazon, and Sun Microsystems through systemic changes to embrace open source principles, contribute and collaborate effectively.
Arun Gupta is vice president and general manager of Open Ecosystem Initiatives at Intel Corporation. He is an open source strategist, advocate, and practitioner for nearly two decades. He has taken companies such as Apple, Amazon, and Sun Microsystems through systemic changes to embrace open source principles, contribute and collaborate effectively. As an elected chair of the Cloud Native Computing Foundation (CNCF) Governing Board, Arun works with CNCF leadership and member companies to grow cloud native ecosystem. He has delivered technical talks in 45+ countries, authored multiple books, and is a Docker Captain, Java Champion, and Java User Group leader. He also founded the Devoxx4Kids chapter in the U.S. and continues to promote technology education among children. Arun holds two patents on using XML and XSL for an efficient generation of test reports. Arun is an avid runner, and is easily accessible at @arungupta on Twitter.
Brian Fox
CTO, Sonatype
Brian is Co-founder and Chief Technology Officer at Sonatype. He has extensive open source experience as a member of the Apache Software Foundation and former Chair of the Apache Maven project. Brian was a direct contributor to the Maven ecosystem, including the maven-dependency-plugin and maven-enforcer-plugin.
Brian is Co-founer and Chief Technology Officer at Sonatype. He has extensive open source experience as a member of the Apache Software Foundation and former Chair of the Apache Maven project. Brian was a direct contributor to the Maven ecosystem, including the maven-dependency-plugin and maven-enforcer-plugin. He has over 20 years of experience driving the vision behind, as well as developing and leading the development of software for organizations ranging from startups to large enterprises. Brian is a frequent speaker at national and regional events including Java User Groups and other development related conferences.
David DeSanto
Chief Product Officer, GitLab (General Mem Rep)
David DeSanto is the Chief Product Officer of GitLab Inc., the leading DevSecOps platform. GitLab’s platform enables organizations to plan, code, build, secure, deploy, and monitor software in one application with a unified data model and one interface.
David DeSanto is the Chief Product Officer of GitLab Inc., the leading DevSecOps platform. GitLab’s platform enables organizations to plan, code, build, secure, deploy, and monitor software in one application with a unified data model and one interface.
As Chief Product Officer, David is focused on delivering a stellar product experience to GitLab’s users from startups to global enterprises. He leads GitLab’s Product division (Product Management, Product Monetization and Operations, User Experience) to define and execute GitLab’s product vision and roadmap, and is responsible for facilitating strong collaboration between Product, Engineering, the CEO, and other executives. David also leverages customer and industry feedback to build, ship, and support products that improve GitLab’s position within the DevSecOps market.
Declan O’Donovan
VP, Security Architecture, IAM and Application Security, Morgan Stanley
Declan is the VP of Security Architecture, IAM and Application Security at Morgan Stanley.
Declan is the VP of Security Architecture, IAM and Application Security at Morgan Stanley.
Emilio Escobar
Chief Information Security Officer, Datadog
With two decades of experience in Information Security and Compliance, Emilio has worked at large enterprises, medium-sized companies, and governmental organizations. Previously, Emilio served as the VP of Information Security for Hulu, where he played a pivotal role in setting up key security functions. Prior to that, Emilio worked for PlayStation, where he built and ran the software security teams.
With two decades of experience in Information Security and Compliance, Emilio has worked at large enterprises, medium-sized companies, and governmental organizations. Previously, Emilio served as the VP of Information Security for Hulu, where he played a pivotal role in setting up key security functions. Prior to that, Emilio worked for PlayStation, where he built and ran the software security teams. Emilio’s unique approach to security and compliance has always prioritized partnerships and people—hiring the right talent to build the processes, procedures, and technologies that unite Security, Engineering, and Operations teams. Emilio holds a bachelor’s degree in Computer Science from the University of Puerto Rico.
Eric Brewer
VP of Infrastructure & Google Fellow, Google
Eric Brewer is professor emeritus of computer science at the University of California, Berkeley and vice-president of infrastructure at Google. His research interests include operating systems and distributed computing. He is known for formulating the CAP theorem about distributed network applications in the late 1990s.
Eric Brewer is professor emeritus of computer science at the University of California, Berkeley and vice-president of infrastructure at Google. His research interests include operating systems and distributed computing. He is known for formulating the CAP theorem about distributed network applications in the late 1990s.
Graham Hill
Managing Director, Cybersecurity & Technology Controls at JPMorgan Chase & Co.
Graham is the Managing Director, Cybersecurity & Technology Controls at JPMorgan Chase & Co.
Graham is the Managing Director, Cybersecurity & Technology Controls at JPMorgan Chase & Co.
Ian Dunbar-Hall
Chief Engineer, Lockheed Martin (General Mem Rep)
Ian holds the position of Chief Engineer for Lockheed Martin Software Factory and specializes in DevSecOps and full stack engineering. He is responsible for technical direction for repeatable development processes and tooling that is leveraged across Lockheed Martin to expedite software delivery.
Ian holds the position of Chief Engineer for Lockheed Martin Software Factory and specializes in DevSecOps and full stack engineering. He is responsible for technical direction for repeatable development processes and tooling that is leveraged across Lockheed Martin to expedite software delivery. As part of this software delivery, his team develops Software Bill of Materials tooling and Attestation processes to be compliant with White House Executive Order 14028. These areas of focus have led to involvement in the Security Tooling WG, SBOM Everywhere SIG, and SBOMit project.
Jamie Thomas
GM, Technology Lifecycle Services, and IBM Enterprise Security Executive
Jamie Thomas has a history of setting innovation agendas that provide business solutions to clients worldwide. She has extensive organizational experience with R&D and client support transformation. She currently serves as General Manager, IBM Technology Lifecycle Services and IBM Enterprise Security.
Jamie Thomas has a history of setting innovation agendas that provide business solutions to clients worldwide. She has extensive organizational experience with R&D and client support transformation. She currently serves as General Manager, IBM Technology Lifecycle Services and IBM Enterprise Security.
In this role, Jamie oversees IBM Technology Lifecycle Services including the delivery of client support and services, providing clients with predictive, preventative, and technical support solutions focused on IBM Logo as well as multi-vendor infrastructure support. Jamie’s team partners with worldwide, leading technology providers to provide exceptional compute, storage and networking capability. She serves all of IBM as leader of the IBM Enterprise Security team, which protects IBM and IBM’s clients in an ever-changing and challenging cybersecurity environment by driving security and privacy by design into all of IBM’s offerings and providing industry regulatory and compliance leadership. Jamie serves as the board chair for the Open Source Security Foundation (OpenSSF), focused on addressing hardware and software open-source supply chain security.
Jinguo Cui
Executive Director of Open Source Security and Infrastructure, Huawei
Jinguo Cui serves as a leader of open source security and infrastructure strategies and ecosystem development in Huawei. He devotes long-term efforts to the software development, planning and software supply chain security. He is also an executive member of CCF Open Source Development Committee and AII Open Source SIG.
Jinguo Cui serves as a leader of open source security and infrastructure strategies and ecosystem development in Huawei. He devotes long-term efforts to the software development, planning and software supply chain security. He is also an executive member of CCF Open Source Development Committee and AII Open Source SIG.
John Roese
Global Chief Technology Officer Products and Operations, Dell Technologies
John is the Global CTO of Dell Technologies. Previously he was Global CTO DellEMC, Global CTO EMC Corporation, SVP/GM Huawei, Global CTO of Nortel, Enterasys and Cabletron Systems and Broadcom ENG.
John is the Global CTO of Dell Technologies. Previously he was Global CTO DellEMC, Global CTO EMC Corporation, SVP/GM Huawei, Global CTO of Nortel, Enterasys and Cabletron Systems and Broadcom ENG.
Jonathan Meadows
Head of Cloud Cybersecurity Engineering and Software Supply Chain Security at Citibank
Jonathan has extensive software engineering experience in the financial services industry coupled with an in-depth knowledge of Cybersecurity. He is working closely with other industry leaders in the field of Software Supply Chain Security. He is a keen advocate of DevSecOps culture with heavy use of threat modelling, codified security controls and automated security testing.
Jonathan has extensive software engineering experience in the financial services industry coupled with an in-depth knowledge of Cybersecurity. He is working closely with other industry leaders in the field of Software Supply Chain Security. He is a keen advocate of DevSecOps culture with heavy use of threat modelling, codified security controls and automated security testing. Jonathan also started the CNCF Financial Services user group and ran their recent Kubernetes Threat Model project. He actively contributes to the community as board member for the Open Source Security Foundation (OSSF), he is the creator of the CNCF Software Supply Chain Working Group and is the co-author of the CNCF Supply Chain best practices. His current role at Citibank coupled with being a Citi Tech Fellow means that Jonathan is at the forefront of cloud native technology for the bank as he collaborates with peers in other organisations to push the industry forward.
Justin Cappos
Associate Professor, New York University Tandon School of Engineering (SCIR)
Justin Cappos is an associate professor at NYU's Tandon School of Engineering. He has worked in software supply chain for 2 decades and is the creator of the Linux Foundation projects TUF, in-toto, Uptane, SBOMit, and gittuf. Justin's research philosophy focuses on improving real world systems, often by addressing issues that arise in practical deployments.
Justin Cappos is an associate professor at NYU’s Tandon School of Engineering. He has worked in software supply chain for 2 decades and is the creator of the Linux Foundation projects TUF, in-toto, Uptane, SBOMit, and gittuf. Justin’s research philosophy focuses on improving real world systems, often by addressing issues that arise in practical deployments. Justin’s research philosophy focuses on improving real world systems, often by addressing issues that arise in practical deployments.
His dissertation work was on Stork, the first package manager designed for environments that use operating system virtualization, such as cloud computing. Improvements in Stork, particularly relating to security, have been widely adopted and are used on the majority of Linux systems via integrations into Apt, YUM, YaST, and Pacman. His later research advances have been adopted into production use including by Microsoft, IBM, VMware, Cloudflare, Docker, RedHat, ControlPlane, Datadog, and git, as well as a substantial percentage of automobiles. More information is available
Kelly Ann
Cloud Infrastructure Security Engineer, Apple
Kelly leads design and implementation of training, tooling, and processes as a cloud infrastructure security engineer at Apple. She combines decades of work spanning intelligence and investigations, software development, and penetration testing with a passion for empathetic engagement and honest communication to holistically reduce risk across the software development lifecycle.
Kelly leads design and implementation of training, tooling, and processes as a cloud infrastructure security engineer at Apple. She combines decades of work spanning intelligence and investigations, software development, and penetration testing with a passion for empathetic engagement and honest communication to holistically reduce risk across the software development lifecycle. Kelly spent years intervening in illegal poaching operations aboard Sea Shepherd ships, working with confidential sources and evading high-tech tracking by nation-state actors, whalers in Antarctica, and pirates in Somali waters. She misses ocean sunsets, but relishes a life without seasickness.
Mark Russinovich
Azure CTO and Technical Fellow, Microsoft
Mark Russinovich is Chief Technology Officer of Microsoft Azure, where he oversees the technical strategy and architecture of Microsoft’s cloud computing platform. He is a widely recognized expert in distributed systems, operating system internals, and cybersecurity. He is the author of the Jeff Aiken cyberthriller novels, Zero Day, Trojan Horse, and Rogue Code, and co-author of the Microsoft Press Windows Internals books.
Mark Russinovich is Chief Technology Officer of Microsoft Azure, where he oversees the technical strategy and architecture of Microsoft’s cloud computing platform. He is a widely recognized expert in distributed systems, operating system internals, and cybersecurity. He is the author of the Jeff Aiken cyberthriller novels, Zero Day, Trojan Horse, and Rogue Code, and co-author of the Microsoft Press Windows Internals books. Russinovich joined Microsoft in 2006 when Microsoft acquired Winternals Software, the company he cofounded in 1996, as well as Sysinternals, where he authors and publishes dozens of popular Windows administration and diagnostic utilities. He is a featured speaker at major industry conferences, including Microsoft Ignite, Microsoft //build, RSA Conference, and more.
Mark Ryland
Director, Office of the CISO AWS Security
Mark works for the Chief Information Security Officer of AWS, leading a team of cloud security experts who interface with customers, partners, and internal stakeholders around security in the AWS cloud, and information security more generally.
Mark works for the Chief Information Security Officer of AWS, leading a team of cloud security experts who interface with customers, partners, and internal stakeholders around security in the AWS cloud, and information security more generally.
Michael Lieberman
Co-Founder & CTO, Kusari (General Mem Rep)
Michael Lieberman is co-founder and CTO of Kusari. His passion is in applying his expertise to use cases where privacy and security are paramount. Mostly recently he has been focused on work within the software supply chain security space. He is also highly committed to open-source, having co-created projects like GUAC and FRSCA, along with having co-lead white papers like the CNCF’s Secure Software Factory Reference Architecture.
Michael Lieberman is co-founder and CTO of Kusari. His passion is in applying his expertise to use cases where privacy and security are paramount. Mostly recently he has been focused on work within the software supply chain security space. He is also highly committed to open-source, having co-created projects like GUAC and FRSCA, along with having co-lead white papers like the CNCF’s Secure Software Factory Reference Architecture. He is an OpenSSF SLSA steering committee member, tech lead for the CNCF Security Technical Advisory Group (STAG), and formerly co-chaired the CNCF FinServ User Group. His career has led him from startups to multinational financial institutions and everything in between.
Mike Benjamin
Cyber Chief Technology Officer, Capital One
Mike is the Cyber Chief Technology Officer for Capital One, responsible for setting cyber technology direction through strategic initiatives on new tech and leadership of the cyber product management and architecture teams. Previously Mike held the role of VP Security Research at Fastly where his team focused on researching the latest attack and defensive methodologies in the application security space.
Mike is the Cyber Chief Technology Officer for Capital One, responsible for setting cyber technology direction through strategic initiatives on new tech and leadership of the cyber product management and architecture teams. Previously Mike held the role of VP Security Research at Fastly where his team focused on researching the latest attack and defensive methodologies in the application security space.
Prior to Fastly, Mike was VP of Security at Lumen Technologies where he led security product engineering, operations, and the Black Lotus Labs threat intelligence team. Mike has spent his career focused on creating secure and scalable technology for his customers.
In his free time, Mike enjoys time with his family, photography, home automation, and being outdoors
Mike Hanley
Chief Security Officer, GitHub
Mike is the Chief Security Officer at GitHub.
Mike is the Chief Security Officer at GitHub.
Per Beming
VP and Head of Standards & Industry Initiatives, Ericsson
Per Beming is Vice President and Head of Standards & Industry Initiatives based in Stockholm and reporting to Ericsson Group CTO. In this capacity he drives the technology leadership work in Standardization, and industry initiatives, including open source, for the Ericsson Group.
Per Beming is Vice President and Head of Standards & Industry Initiatives based in Stockholm and reporting to Ericsson Group CTO. In this capacity he drives the technology leadership work in Standardization, and industry initiatives, including open source, for the Ericsson Group. In previous roles Beming was responsible for Radio’s 5G program targeting 5G RAN products and demos, in addition to driving the architecture at Business Area Networks. Beming has been Director of RBS Systems at Development Unit Radio, Business Unit Networks. Beming has also held a role of Expert in Radio Access Architecture at Ericsson Research and being the head of Ericsson’s delegation to 3GPP RAN for WCDMA, HSPA and LTE standardization. Beming joined Ericsson Research in 1994 and holds an M.Sc. in Applied Physics and Electrical Engineering (1994).
Rebecca Rumbul
Executive Director & CEO, Rust Foundation (Associate Mem Rep)
Rebecca is the Executive Director and CEO of the Rust Foundation, a global non-profit stewarding the Rust language, supporting maintainers, and ensuring that Rust is safe, secure, and sustainable for the future. She holds a PhD in Politics and Governance, and has worked as a consultant and researcher with governments, parliaments and development agencies all over the world, advocating for openness and transparency, and developing tools to improve digital participation.
Stephen Augustus
Head of Open Source, Cisco
Stephen is the Head of Open Source at Cisco, working within the Strategy, Incubation, & Applications (SIA) organization. Across the wider LF (Linux Foundation) ecosystem, Stephen has the pleasure of serving as a member of the OpenSSF Governing Board, the Kubernetes Steering Committee, and the TODO Group Steering Committee. Previously, he was one of the Program Chairs for KubeCon / CloudNativeCon, the cloud native community’s flagship conference.
Stephen is the Head of Open Source at Cisco, working within the Strategy, Incubation, & Applications (SIA) organization.
For Kubernetes, he has co-founded transformational elements of the project, including the KEP (Kubernetes Enhancements Proposal) process, the Release Engineering subproject, and Working Group Naming. Stephen has also previously served as a chair for both SIG PM and SIG Azure.
He continues his work in Kubernetes as a Steering Committee member and a Chair for SIG Release.
Across the wider LF (Linux Foundation) ecosystem, Stephen has the pleasure of serving as a member of the OpenSSF Governing Board and the TODO Group Steering Committee.
Previously, he was a CNCF (Cloud Native Computing Foundation) TAG Contributor Strategy Chair and one of the Program Chairs for KubeCon / CloudNativeCon, the cloud native community’s flagship conference.
He is a maintainer for the Scorecard and Dex projects, and a prolific contributor to CNCF projects, amongst the top 40 (as of writing) code/content committers, all-time.
In 2020, Stephen co-founded the Inclusive Naming Initiative, a cross-industry group dedicated to helping projects and companies make consistent, responsible choices to remove harmful language across codebases, standards, and documentation. He leads the Community/Open Source workstream and maintains the initiative’s infrastructure.
He has previously held positions at VMware (via Heptio), Red Hat, and CoreOS.
Stephen is based in New York City.
Vincent Danen
Vice President of Product Security, Red Hat
Vincent Danen is the Vice President of Product Security at Red Hat, which is responsible for security and compliance activities for all Red Hat products and services. Vincent has been involved with open source and software security for over 20 years, leading security teams and participating in open source communities and development.
Vincent Danen is the Vice President of Product Security at Red Hat, which is responsible for security and compliance activities for all Red Hat products and services. Vincent has been involved with open source and software security for over 20 years, leading security teams and participating in open source communities and development.