SharkFest'24 EU

André Luyer

André is a senior Performance Consultant and troubleshooter at Rabobank, and has been analyzing packets for over 25 years. He started his career as a troubleshooter for network issues, both hard- and software, and later specialized in performance testing, which requires a combination of in-depth knowledge of networking protocols and coding skills. André also delivers an in-house ‘Wireshark bootcamp’ training course and contributed to the Wireshark project.

  • Everything is encrypted
Chris Greer

Chris Greer is a Network Analyst for Packet Pioneer. He has worked with companies around the world, helping them to solve pesky network
problems at the packet level, primarily with Wireshark and other open-source tools. Chris has a passion for helping others to learn about packet
analysis and teaches Wireshark Courses to private companies as well as public audiences. You can follow him on his YouTube channel at
- https://www.youtube.com/user/packetpioner

  • Pre-Conference Class I: Core Wireshark Skills for Network Engineers and Security Pros - 2-day class (4-5 November)
  • Pre-Conference Class II: Cybersecurity Threat Hunting - Go Deep with Wireshark
Eddi Blenkers

For over 20 years, Eddi has been looking at network protocols to find (or rule out) network problems, vulnerabilities, ongoing hacking attacks or just for fun.

Working for the Swiss train company BLS as IT security analyst, he is reviewing the configuration of a multitude of systems to improve the overall security of the domain. Wireshark is one of the tools to verify the outcome of a configuration change.

Shameless promotion: Visit https://www.bls.ch/en/freizeit-und-ferien/ausflug to find some of the best destinations in Switzerland.

  • Kerberos Deep Dive
  • Compare the accuracy of trace files captured with a tap and Cisco ACI
Ivan Nardi
  • A Deep Dive Into Traffic Fingerprints using Wireshark
Jaap Keuter

Studied telecommunications and computer systems. Worked for a PABX manufacturer and currently for a manufacturer of Ethernet switching and telecommunication transmission systems, in the role of embedded software engineer. Along the way I started using what was then called Ethereal, enhancing it and providing bug fixes, which eventually lead to becoming a core developer.

Besides this I like to spend time in the air, either skydiving or flying sailplanes.

  • Dissector developer design notes
Jasper Bongertz

Jasper Bongertz is a network security expert with focus on network forensics and incident response at Airbus Defence and Space CyberSecurity. He started working freelance in 1992 while he was studying computer science at the Technical University of Aachen. In 2009, Jasper became a Senior Consultant and Trainer for Fast Lane, where he created a large training portfolio with a special focus on Wireshark and network hacking. In 2013, he joined Airbus Defence and Space CyberSecurity, before moving on to G Data Advanced Analytics in 2019 where he is now the head of the CyberSecurity Incident Response Team (CSIRT).

Jasper is the creator of the packet analysis tool TraceWrangler, which can be used to convert, edit and sanitize PCAP files. His blog regarding network analysis, network forensics and general security topics can be found at blog.packet-foo.com.

  • Advanced TCP Troubleshooting
Jean-Paul ARCHIER

Jean-Paul has been working as a System and Network Engineer for more than 30 years. Since 2010, he has run his own company and is mainly focused on network training and consultancy. He is the author of several books for the French publisher ENI: VPN, IPv6, Cisco ASA, Postfix.
He regularly gives training sessions on Wireshark and other network-related topics. As a certified trainer, he also delivers training about VPNs and network security for WatchGuard resellers and clients.

  • IPsec VPN Analysis and troubleshooting
Johannes Weber

Johannes is a dedicated network security consultant at SVA System Vertrieb Alexander GmbH in Germany, with a master's degree in IT Security, specializing in IPv6 Security. He excels in implementing next-gen firewalls, DNS appliances, and IPv6 connectivity at customer sites. As a trainer, Johannes conducts classes on IPv6 and DNS, focusing on technical deep dives and security features. His insights and tutorials on IPv6, VPNs, DNSSEC, NTP, Wireshark, and enterprise-grade firewalls (Palo Alto Networks, Fortinet) can be found on his blog, https://netsec.blog/.

  • Unveiling Network Errors: A Deep Dive into ICMP 'Destination Unreachable' Messages
Josh Clark

Josh has both academic and real-world experience in the world of protocol analysis. He holds an M.S. degree in Computer Engineering with a focus in network engineering and has spent the past 8 years designing, troubleshooting, and optimizing networks and applications.

  • Beyond Network Latency: Chasing Latency up the Stack
  • Optimizing Server Settings Using Packet Captures
Katherine Leese

Katherine is a tech professional with 18 months of experience, having retrained in her 40s to become a Computer Expert, specialising in System Integration. Originally from New Zealand, she is currently based in Germany. During her training, she undertook a practicum at SevenShift, a boutique IoT cybersecurity company in Cologne that recognised her talent and dedication, ultimately hiring her. She is now in a training position, where she is honing her skills and contributing to the company's security initiatives. Outside of her professional life, Katherine is a dedicated single mother to a teenager. She also plays bass guitar and provides backing vocals in a punk band, and if there's any time left over, you will find her on the netball court. She is also a member of the Haecksen, the FINTA branch of the CCC.

  • Dissecting the Client Hello with Pyshark
Luca Deri

Luca Deri is the leader of the ntop project (www.ntop.org), aimed at developing an open-source monitoring platform for high-speed traffic analysis and cybersecurity. He worked for the University College of London and IBM Research, before receiving his PhD at the University of Berne with a thesis about software components for traffic monitoring applications. Well-known in the open-source and Linux community, he currently shares his time between the ntop project and the University of Pisa where he has been appointed as a lecturer in the CS department.

  • A Deep Dive Into Traffic Fingerprints using Wireshark
Mark Stout

24 years in wireless technologies CDMA, LTE, and 5G. Daily user of wireshark fort troubleshooting network, and design issues.

  • 3GPP, a walk through the LTE, and 5G networks
Markus Liechti

Markus Liechti is a veteran network analyst working for the Swiss Federal Office of Information Technology and Communication.

Among other tools, he uses WireShark to investigate network problems small, big, and exceptionally big.

  • Compare the accuracy of trace files captured with a tap and Cisco ACI
Matthias Kaiser

Matthias started working in network analysis in 1996 as a Sniffer University staff instructor at Network General, where he delivered Sniffer University training and coordinated the European instructor team. In 2004, as a freelance instructor and network consultant, he wrote his own courseware on troubleshooting networks with Wireshark. Since 2009, Matthias has been working for ExperTeach, a German training and consulting company, where he manages and teaches the ExperTeach packet analysis curriculum for business customers. He has trained many individuals on Wireshark and helped them identify network and application-related problems since.

  • Pre-Conference Class III: WebRTC Network Analysis Masterclass
Megumi Takeshita

Megumi Takeshita, packet otaku, runs a packet company, ikeriri network service in Japan. Ikeriri offers services such as packet analysis for troubleshooting, debugging, security inspection. Ikeriri is also a reseller of wired/wireless capture and analysis products. Megumi has authored 10+ books about Wireshark and packet analysis. She also instructs Wireshark for Japanese companies including Japan Self Defense Forces and Chuo university as lecturer. She is one of contributors to the Wireshark projects including Japanese localization.

  • Capturing WiFi7, understand WiFi again with catching up an Extremely High Throughput mode of IEEE802.11be
Michal Soltysik

Michał Sołtysik is a Cybersecurity Consultant and Deep Packet Inspection Analyst specializing in network edge profiling and 0-day attacks (one of the most difficult to detect).
With a focus on IT, OT, and IoT areas, he has identified so far 254 protocols used for cyberattacks.
Michał is also a skilled Digital and Network Forensics Examiner, a CyberWarfare Organizer, and a SOC Trainer, enhancing his cybersecurity roles with a broad range of expert knowledge.
More information available at https://michalsoltysik.com/

  • Deep packet inspection analyses: Unveiling a shocking RDP Attack through unusual protocol combinations
Pierre Besombes

Pierre brings over a decade of experience in designing, managing, and troubleshooting networks and IT infrastructures. Starting his career as a consulting engineer, he has supported a diverse range of businesses, from large corporations to small firms. His early work focused extensively on packet captures, which he considers the most reliable method for uncovering the "truth". Over the years, Pierre's role has evolved to encompass system and platform engineering, some aspects of IT security, as well as reflecting on organizational and human factors.

  • VXLAN, EVPN and other intricacies unpacked
Robert Hess

Starting with a small Web conferencing startup in Germany in 1999 and still with the same people after a long chain of acquisitions and mergers.
These days I help transitioning the venerable GoToMeeting to the modern WebRTC based GoTo.
My day job is helping our developers as well as our customers to analyse and understand intricate network problems in the context of various communication protocols and complex corporate networks. As such I'm proficient in network analysis tools like Wireshark as well as in log analysis tools like Splunk. In my spare time, I read, do the odd triathlon together with my colleagues and fancy ice bathing.

  • Pre-Conference Class III: WebRTC Network Analysis Masterclass
  • Communication breakdown - making online conferencing work in secured company networks
Roland Knall

Roland Knall is a veteran software developer with 25 years of experience, specializing in machine safety network protocols and industrial automation applications. Since 2016, he has been a core developer for Wireshark, one of the world's leading network protocol analyzers. Currently working at Profitap, Roland continues to innovate in the field of network analysis and security. With over a decade of teaching experience, he brings a unique blend of deep technical knowledge and educational expertise to his presentations.

  • Panel Discussion
Ross Bagurdes

Ross has had a diverse career in engineering, beginning as a structural engineer, then project engineer for a gas utility, Ross was always quickly assigned the de-facto network administrator, typically after no one else was brave enough to break, and later fix, the network. Ross eventually ended up working as a network engineer designing and implementing enterprise networks for a major university hospital. Here he worked with Extreme Networks, HP, Cisco, Tipping Point, among other network technology, as well as honed his Wireshark and protocol analysis skills. Ross spent 7 years teaching data networking at Madison College, and in 2017 started authoring and producing IT training videos in Wireshark/Protocol Analysis, Cisco, and general networking topics for www.Pluralsight.com. In his free time, you'll find Ross and his dog at the beach swimming and surfing, traveling, hiking, or snowboarding somewhere in the western US.

  • Pre-Conference Class I: Core Wireshark Skills for Network Engineers and Security Pros - 2-day class (4-5 November)
  • Sharksniff 3000 - the Wireless Decrypting Cyberdeck
Sake Blok

Sake has been analyzing packets for over 20 years. During his work, Sake started developing functionality for Wireshark while working with the analyzer in his day-to-day job. He also enhanced multiple protocol dissectors. In 2007, Sake joined the Wireshark Core Development team. In 2009, After working for a reseller of networking equipment for 8 years, he started the company SYN-bit to provide network analysis and training services to enterprises across Europe.

  • Mastering Wireshark Filtering
  • Gotta catch 'em all! A field test of portable gigabit taps
Stephen Donnelly

Stephen has worked on packet capture and time-stamping systems for 20 years, earning his PhD for “High Precision Timing in Passive Measurements of Data Networks” from the University of Waikato, New Zealand.
A founding employee of Endace, Stephen has developed FPGA-based packet capture and timing systems, clock synchronization systems, and high-performance network monitoring virtualization, and collaborated with customers in telcos, finance, test & measurement, enterprise, and government agencies to solve unique problems.
Stephen is a contributor to the Wireshark, libpcap, Zeek, and Suricata open-source projects.

  • Cloud doesn’t have Packets!
Thomas Labarussias

Thomas is Senior Developer Advocate at Sysdig, the company which created and open-sourced Falco, the Security Runtime Engine for Kubernetes and Cloud-Native technologies. Thomas worked for Qonto, a modern banking for SMEs and freelancers, where he managed their Kubernetes clusters and the enthusiastic tools around, like ArgoCD, Traefik, Prometheus. He also assisted for many years pure-players and e-business companies for a large managed service provider, as an AWS expert and FinOps. He's one of the longest tenured members of the Falco community, and creator of Falcosidekick and Falcosidekick-UI, two major components of the Falco ecosystem.

  • Automatically trigger captures via tcpdump when a suspicious event occurs in your Kubernetes cluster
  • Let’s dissect malwares by collecting their syscalls with eBPF
Tom Cordemans

Tom Cordemans is a senior lecturer at the Odisee University of Applied Sciences and a researcher at the DistriNet Research Unit of KU Leuven in Gent, Belgium with a strong focus on IT, IoT and OT networks. He is a daily user of Wireshark and sharing knowledge and expertise is his trigger to give workshops and presentations.

  • Network traffic @ your home
Uli Heilmeier

Uli already used Wireshark when it was still called Ethereal. He has spent many years operating and planning secure networks and has been watching AWS Cloudtrail events very regularly for two years. He also contributes a little to Wireshark as a core developer.

  • Stratoshark: Or how to inspire your DevOps team to use Wireshark
Ville Haapakangas

Ville Haapakangas is a Senior Lecturer at Tampere University of Applied Sciences in Tampere, Finland, with a strong focus on Computer Networks and Cybersecurity. He is especially interested in using Wireshark as a pedagogical and research tool. Ville’s involvement with SharkFest EU extends over several years as both a participant and a speaker.

  • Network traffic @ your home
Walter Hofstetter

Walter is a veteran in network and protocol analysis, having earned his stripes as a "Sniffer University Certified Instructor" from Network General in 1994. Throughout his career, he quickly advanced into the cybersecurity arena, where his expertise in protocols proved invaluable. Walter has held primarily technical roles at notable companies such as Network Associates, McAfee, Symantec, and Palo Alto Networks. Additionally, he was responsible for Managed Security Services for Palo Alto Networks and Akamai (Micro Segmentation / Guardicore) at Telekom Security.

  • Unlocking Security Insights: Wireshark Techniques for Security Analysts
Wireshark Foundation
  • SharkFest'24 EUROPE Welcome Dinner and Sponsor Showcase