Generated by GPT-5-mini| Matt Suiche | |
|---|---|
| Name | Matt Suiche |
| Occupation | Cybersecurity researcher, entrepreneur, reverse engineer |
| Known for | Memory forensics, cloud security, security tools |
Matt Suiche is a cybersecurity researcher, entrepreneur, and founder known for work in memory forensics, cloud security, and incident response. He founded security companies and authored tools and research that influenced digital forensics and cloud-native security practices. His work spans collaborations with incident response teams, security vendors, academic forums, and international law enforcement.
Suiche was born and raised in the United Arab Emirates and later pursued studies that combined interests in computing and security. He engaged with communities around computer forensics, reverse engineering, and incident response while connecting with researchers from institutions such as École Polytechnique Fédérale de Lausanne, Massachusetts Institute of Technology, Imperial College London, Cornell University, and ETH Zurich. Early mentorship and participation in conferences like Black Hat, DEF CON, BlueHat, RSA Conference, and CanSecWest shaped his practical skills and research orientation.
Suiche founded and led security ventures, collaborating with technology firms, incident response teams, and cloud providers including Microsoft, Amazon Web Services, Google, IBM, and Oracle Corporation. He worked with advisory and forensic groups associated with Europol, Interpol, FBI, NATO, and national Computer Emergency Response Teams such as CERT-EU and US-CERT. He contributed to commercial and open-source projects while engaging with vendors like Symantec, McAfee, Trend Micro, FireEye, CrowdStrike, Palo Alto Networks, Cisco Systems, and VMware.
Suiche developed techniques and tools in volatile memory analysis, live response, and cloud-native forensics, influencing practitioners at organizations such as SANS Institute, ENISA, NIST, and academic groups at Carnegie Mellon University. His work intersected with research on operating system internals for platforms like Microsoft Windows, Linux, macOS, and hypervisors from Xen Project and KVM. He addressed threat actor tactics linked to campaigns investigated by Mandiant, Kaspersky Lab, Proofpoint, Trend Micro, Recorded Future, and Checkpoint Software Technologies, producing methods used in examinations by teams including CERT Polska and Australian Signals Directorate.
Suiche authored memory forensics tools and released analyses on advanced threats, cloud incidents, and virtualization escapes cited by respondents at Black Hat Europe, Virus Bulletin, FIRST Conference, ShmooCon, and SANS DFIR Summit. He published findings on artifact acquisition and timeline reconstruction used by practitioners at Europol-EC3, United Nations Office on Drugs and Crime, Council of Europe, and private firms such as Ernst & Young, Deloitte, KPMG, and PwC. His incident analyses referenced techniques seen in campaigns attributed to groups discussed in reports from Cisco Talos, Microsoft Threat Intelligence Center, NSA, GCHQ, and BIS.
Suiche received recognition from industry forums and was invited to present at major events including Black Hat USA, RSA Conference, DEF CON, Gartner Security & Risk Management Summit, and TEDx. His contributions were acknowledged by professional organizations like ISACA, (ISC)², Association of Information Security Professionals, and research aggregators including Google Scholar and ResearchGate.
Suiche is active in mentoring, community outreach, and initiatives supporting cybersecurity education and capacity building with organizations such as Code.org, Girls Who Code, OpenUK, and regional universities. He collaborates with non-governmental and international bodies on resilience programs involving partners like United Nations Development Programme, World Bank, and regional development agencies.
Category:Cybersecurity researchers Category:Information technology entrepreneurs