Mark Griffin is a veteran security researcher specializing in code analysis, fuzzing, and tooling to augment expert workflows. He has built and released several Binary Ninja plugins and writes about the intersection of security, software, and visualization on his blog. He now focuses on helping people understand code faster and more intuitively through the work at his company Undaunted Development.
Caleb Gross
Caleb Gross is an offensive security engineer at Aurora Innovation where he secures autonomous vehicles. As prior Director of Capability Development at Bishop Fox, he led a team of offensive security professionals specializing in attack surface research and vulnerability intelligence. Caleb also served as an exploitation operator in the US Department of Defense’s most elite computer network exploitation (CNE) unit.
Jennifer Hay
Jennifer Hay is a national security leader with deep expertise at the intersection of technology, policy, and defense. Most recently, she served as Director of the Defense Digital Service (DDS), where she led a cross-functional team of engineers, product managers, and designers delivering rapid software solutions across the Department of Defense.
Previously, Jennifer led Global Government Relations at DataRobot, an enterprise AI platform, where she shaped policy on responsible AI and supported deployments for the Department of Defense, Intelligence Community, and public good organizations.
Over her two-decade career, Jennifer has held key roles at the Department of Defense and the White House, including positions at the National Security Council, the Deputy Secretary of Defense’s office, the Office of the Under Secretary for Intelligence & Security, and the Defense Intelligence Agency.
She holds an M.A. in International Affairs from The George Washington University and a B.A. in Political Science from Pepperdine University. She lives in Arlington, MA, with her husband, son, dog, and cat.
Vlad Ionescu
Vlad Ionescu is the co-founder and CTO of RunSybil, where they are working with a cracked team building AI hackbots and hackbot accessories.
OMAR
Omar is a Staff Security Engineer focusing on building secure and reliable systems, stopping fraudsters, and in general enabling people to do their best work safely and securely. Aside from hacking, Omar enjoys drinking iced coffee year round, collecting pointy toe boots, and tending to his plants with his lovely assistant, Dumpling.
Tom Ritter
Tom Ritter works for Mozilla and does security things. That includes anti-exploitation, the bug bounty program, security advisories, 0-day response, static analysis, and as of recently – web layer privacy stuff. He’s also a Tor Browser developer and maintains much of their code present in Firefox. He previously did consulting for iSEC Partners and NCC Group, and founded their Cryptography Services practice.
Guanxing Wen
Guanxing Wen is a security researcher with over a decade of experience uncovering critical vulnerabilities in low-level systems, spanning TrustZone, kernels, IoT, and infotainment. A two-time top winner in the Huawei Bug Bounty (2021 & 2022), he has presented at Black Hat, MOSEC, INFILTRATE, and 44CON. He currently works at CertiK, where he explores the messy edges where low-level systems meet blockchain infrastructure — most recently, DePIN.
Thomas Wilson
Thomas is a red teamer and penetration tester at Bishop Fox, originally with a background in mobile and cloud security, and always with a tendency to dig deep into weird edge cases. Whether it’s bending MDMs, abusing OAuth flows, or standing up cursed infrastructure just to tear it down again, he’s most at home when things aren’t working as intended. Outside of hacking, he makes glitchy pop music, which probably explains his love for beautiful chaos.
SUMMERCON 2025 – Dates, Tickets
As we said during the closing ceremonies of Summercon 2024, Summercon 2025 is July 11 – July 12, 2025, once again at Littlefield in Brooklyn, NY. We have a block of early bird tickets available.
Use this Volunteer Form to enlist in the Summercon Volunteer Corps.
Want to attend Summercon 2025 for free? Step up. Pitch in.
Would you like to know more?
Volunteering isn’t just an honor—it’s how the show runs. Join the Volunteer Corps and earn your place on the front lines of America’s oldest hacker conference.
Mission Briefing: Volunteer Roles
“The bugs are inside the firewall. We’re deploying countermeasures.”
Volunteers are assigned to critical support operations, including:
ID verification and badge scanning
Cable deployment & field logistics
Speaker escort and green room security
Merch & T-shirt distribution operations
AV ops and comms monitoring
Crowd flow & line integrity enforcement
Afterparty support (DJ liaison, door ops, hydration logistics)
Everyone rotates. Nobody gets stuck. The Captain will debrief you daily.
Rewards for Service
Volunteers receive:
Full admission to Summercon 2025
Access to the green room and volunteer HQ
A limited-edition Volunteer Corps shirt
Snacks, drinks, and situational awareness
Eternal glory in the eyes of your peers
“Would you like to know more?”
Deployment Qualifications
We’re seeking candidates who:
Report on time and follow mission orders
Maintain morale under pressure
Are comfortable lifting, moving, scanning, or yelling (lightly)
Can serve 1–2 shifts (~3–4 hours each) over the course of the con
Are prepared for unexpected bugs—both literal and metaphorical
Experience not required. We’ll train you in the field.
Operation Timeline
Pre-Con Prep: Thursday, July 10
Main Engagement: Friday–Saturday, July 11–12
You’ll serve up to 8 hours across the weekend—plenty of time left to attend talks, party, and conspire
Enlistment Protocol
“Enlist now, and secure your place in hacker history.”
Use our Google Form Deadline to apply: June 10, 2025 Confirmations sent: June 20, 2025
Questions?
Report [email protected] For field chatter: DM us @summerc0n on Twitter, Mastodon, or Bluesky.
Hall of Heroes
These brave volunteers answered the call. Will you?