Shortly after I was convinced to join Twitter and get engaged with the security community, I started noticing patterns with the people I was meeting. Namely, I noticed that many were also musicians and that the vast majority played the electric bass. As a bass player myself, I understand that the general rule is, if you show up to an open-mic blues jam, you’ll get to play bass all night, and the guitarists will be relieved that none of them have to ‘do bass duty’. I became fascinated with how this pattern seems to reverse in the infosec/hacker community and started to see parallels between security and this particular instrument. I plan to share my research, ideas and theories that I’ve collected on my journey to understand this strange anomaly and look forward to hearing more.
Equally comfortable performing a pentest, designing an infosec program, heading up an incident response team, or discussing market trends, Adrian has covered much of the security spectrum. In his current role as an industry analyst, he writes and researches extensively about the security industry. He also gets to talk to lots of people in the industry on a regular basis, blogs and can be found stirring up trouble on Twitter as @sawaba. Adrian is an expert at failing miserably. He was a terrible wrestler in high school, was never great at math and is mediocre at best with a clarinet. His attempts at web design were so bad thatArchive.org has received several requests urging them to remove entries from the Wayback Machine. He’s never had a cavity, but one of his teeth is made of porcelain. He is still sad about the demise of BeOS and refuses to sell his large collection of vintage game consoles. He once had a ‘volume malfunction’ on-stage in front of 4000 people. The only patent he’s ever applied for was for CAT5 cables with edible shielding. It was not granted. He's double-jointed, but you’ll have to buy him a drink to find out where.