Skip to content

WhoisXML API @ RSAC 2026

March 23 - 26, 2026

Discuss threats that matter in a setting that lets you focus

Meet with our team offsite for focused conversations, real-world intelligence, and direct access to our experts. Limited availability, book now.

Main image_Prancheta 1

What to Expect

Expose Hidden Threats

Confidential proprietary intelligence on undisclosed threat actor activity and vulnerability research.

Discover New Capabilities

Live demos and discussions on custom threat intelligence and related applications.

Take a Real Break

A moment to breathe with food, drinks, and a true break from the conference buzz.

Arrive with Ease

A short distance from Moscone. Easy to reach, easier to focus.

Meet with Our Experts

Our team of solution-focused professionals.

Charlie Chen BW-2

Charlie Chen

Technical Account Manager

Erik Olson BW

Erik Olson

Technical Account Manager
David Varela BW-2

David Varela

Technical Account Manager
Tara Coneally BW-2

Tara Conneally

Enterprise Partnerships
LP photos_Prancheta 1

Joshua Ra

Director of Business Development
Brendan Odoherty HS BW

Brendan O'Doherty

Intelligence Partnerships (UK/EU/Nordics/Africa)
Hanna Frank BW

Hanna Frank

Technical Account Executive

Alexandre Francois BW

Alexandre François

Product Marketing Director
Ching BW

Ching Chiao

Head of APAC and Corporate Development

Jonathan Zhang BW

Jonathan Zhang

CEO

On-Demand Briefing Sessions

Speakers_Prancheta 1-1

Talking POOP

🔎 From disclosure to global exploitation in under 20 hours — with Ed Gibbs

A focused walkthrough of the React2Shell (CVE-2025-55182) campaign and the discovery of the previously undocumented ILOVEPOOP toolkit and its exploit infrastructure.

We cover:

  • Early honeypot detection and exploit fingerprinting
  • The nine-node ILOVEPOOP toolkit and shared exploit headers
  • Centralized infrastructure anchored in two Netherlands-hosted servers
  • Multi-protocol expansion (HTTP, Telnet, ICS/DNP3, POP3)
  • What defenders should hunt for now

Ideal for: Threat researchers, SOC leads, CERTs, and detection engineers.

To Cache A Predator 

🦠 Turning global telemetry into actionable detection — with Alex Ronquillo

A methodology session on how WXA IASC connects NetFlow, enrichment datasets, and honeypot activity to surface infrastructure-level campaigns.

We cover:

  • 22M+ flow records tied to exploit infrastructure
  • Identifying centralized operator pivots at scale
  • Asset-level exposure enrichment
  • NetFlow “seen-first” lead time (45+ day median)
  • Translating signals into WAF, TLS, and flow-based detections

Ideal for: Enterprise defenders, ISACs, CSIRTs, and infrastructure providers.

Speakers-02-1
The Marker-04-1

🚋 Hospitality Suite

Step off the show floor and join us for a private meeting or hosted lunch, just minutes from Union Square.

Our hospitality suite offers a comfortable and quieter environment to connect with WhoisXML API experts, explore real-world threat intelligence, and discuss your organization’s exposure and security priorities in depth.

Throughout the event, we will host private lunches and informal meetings with food and refreshments, offering a convenient opportunity to recharge while engaging in meaningful discussions with our team. Limited spots, save your seat.

 

Meet with our team offsite

Whether you're looking to explore specific use cases, see our solutions in action, or discuss your unique challenges, we’re here to talk over coffee, calm, and light refreshments.

Submit your request to schedule a one-on-one meeting, an on-demand briefing session, or both. Let’s connect on what matters most to your mission.