J. Gdanski

J. Gdanski is the Founder and CEO of Evertas, where he has led Evertas’s technical development and underwriting, as well as secured multiple rounds of funding from top investors; he is a security, privacy, and risk expert. J. is also a founder of CryptoISAC.

Prior to launching Evertas, he was a leader in the enterprise blockchain space and was one of the first to work on institutional custody for crypto. In this capacity he served as an early, significant contributor to blockchain consortia including R3 and Enterprise Ethereum Alliance, of which he was a founding member. He was an integral part of the first enterprise blockchain RFP and has worked on numerous blockchain-based systems. He was the first dedicated hire in the space for a bulge bracket bank and the world’s largest custodian bank and has presented to regulators, legislators, politicians, and business executives, including from Fortune 50 companies.

Caleb Gross

Caleb Gross is an offensive security engineer at Aurora Innovation where he secures autonomous vehicles. As prior Director of Capability Development at Bishop Fox, he led a team of offensive security professionals specializing in attack surface research and vulnerability intelligence. Caleb also served as an exploitation operator in the US Department of Defense’s most elite computer network exploitation (CNE) unit.

Jennifer Hay

Jennifer Hay is a national security leader with deep expertise at the intersection of technology, policy, and defense. Most recently, she served as Director of the Defense Digital Service (DDS), where she led a cross-functional team of engineers, product managers, and designers delivering rapid software solutions across the Department of Defense.

Previously, Jennifer led Global Government Relations at DataRobot, an enterprise AI platform, where she shaped policy on responsible AI and supported deployments for the Department of Defense, Intelligence Community, and public good organizations.

Over her two-decade career, Jennifer has held key roles at the Department of Defense and the White House, including positions at the National Security Council, the Deputy Secretary of Defense’s office, the Office of the Under Secretary for Intelligence & Security, and the Defense Intelligence Agency.

She holds an M.A. in International Affairs from The George Washington University and a B.A. in Political Science from Pepperdine University. She lives in Arlington, MA, with her husband, son, dog, and cat.

Vlad Ionescu

Vlad Ionescu is the co-founder and CTO of RunSybil, where they are working with a cracked team building AI hackbots and hackbot accessories.

OMAR

Omar is a Staff Security Engineer focusing on building secure and reliable systems, stopping fraudsters, and in general enabling people to do their best work safely and securely. Aside from hacking, Omar enjoys drinking iced coffee year round, collecting pointy toe boots, and tending to his plants with his lovely assistant, Dumpling.

Tom Ritter

Tom Ritter works for Mozilla and does security things. That includes anti-exploitation, the bug bounty program, security advisories, 0-day response, static analysis, and as of recently – web layer privacy stuff. He’s also a Tor Browser developer and maintains much of their code present in Firefox. He previously did consulting for iSEC Partners and NCC Group, and founded their Cryptography Services practice.

Guanxing Wen

Guanxing Wen is a security researcher with over a decade of experience uncovering critical vulnerabilities in low-level systems, spanning TrustZone, kernels, IoT, and infotainment. A two-time top winner in the Huawei Bug Bounty (2021 & 2022), he has presented at Black Hat, MOSEC, INFILTRATE, and 44CON. He currently works at CertiK, where he explores the messy edges where low-level systems meet blockchain infrastructure — most recently, DePIN.

Thomas Wilson

Thomas is a red teamer and penetration tester at Bishop Fox, originally with a background in mobile and cloud security, and always with a tendency to dig deep into weird edge cases. Whether it’s bending MDMs, abusing OAuth flows, or standing up cursed infrastructure just to tear it down again, he’s most at home when things aren’t working as intended. Outside of hacking, he makes glitchy pop music, which probably explains his love for beautiful chaos.

SUMMERCON 2025 – Dates, Tickets

As we said during the closing ceremonies of Summercon 2024, Summercon 2025 is July 11 – July 12, 2025, once again at Littlefield in Brooklyn, NY. We have a block of early bird tickets available.

Register now!

Volunteer for Summercon

Service Guarantees Admission

Use this Volunteer Form to enlist in the Summercon Volunteer Corps.

A vintage-style Summercon recruitment poster featuring a confident woman in a red "SUMMERCON" shirt and cap, saluting with determination. The background is cream and red with bold, patriotic design elements. Text reads “I’M DOING MY PART!” at the top and “SERVICE GUARANTEES ADMISSION” below.
Includes the link https://summercon.org/volunteer

Want to attend Summercon 2025 for free?
Step up. Pitch in.

Would you like to know more?

Volunteering isn’t just an honor—it’s how the show runs. Join the Volunteer Corps and earn your place on the front lines of America’s oldest hacker conference.

Mission Briefing: Volunteer Roles

“The bugs are inside the firewall. We’re deploying countermeasures.”

Volunteers are assigned to critical support operations, including:

  • ID verification and badge scanning
  • Cable deployment & field logistics
  • Speaker escort and green room security
  • Merch & T-shirt distribution operations
  • AV ops and comms monitoring
  • Crowd flow & line integrity enforcement
  • Afterparty support (DJ liaison, door ops, hydration logistics)

Everyone rotates. Nobody gets stuck. The Captain will debrief you daily.

Rewards for Service

Volunteers receive:

  • Full admission to Summercon 2025
  • Access to the green room and volunteer HQ
  • A limited-edition Volunteer Corps shirt
  • Snacks, drinks, and situational awareness
  • Eternal glory in the eyes of your peers

“Would you like to know more?”

Deployment Qualifications

We’re seeking candidates who:

  • Report on time and follow mission orders
  • Maintain morale under pressure
  • Are comfortable lifting, moving, scanning, or yelling (lightly)
  • Can serve 1–2 shifts (~3–4 hours each) over the course of the con
  • Are prepared for unexpected bugs—both literal and metaphorical

Experience not required. We’ll train you in the field.

Operation Timeline

  • Pre-Con Prep: Thursday, July 10
  • Main Engagement: Friday–Saturday, July 11–12
  • You’ll serve up to 8 hours across the weekend—plenty of time left to attend talks, party, and conspire

Enlistment Protocol

“Enlist now, and secure your place in hacker history.”

Use our Google Form
Deadline to apply: June 10, 2025
Confirmations sent: June 20, 2025

Questions?

Report [email protected]
For field chatter: DM us @summerc0n on Twitter, Mastodon, or Bluesky.

Hall of Heroes

These brave volunteers answered the call. Will you?