Cybersecurity
The top minds in cyber have joined forces. Meet Coalfire’s DivisionHex.


You probably know Coalfire best for compliance; frameworks, certifications, and reports that keep businesses secure and auditors satisfied.
But we’ve always known that compliance isn’t the finish line. It’s the floor.
At Black Hat 2025, Coalfire is pulling back the curtain on what we’ve been cooking up. We’re bringing the full force of offensive and defensive genius to tackle life beyond compliance.
Meet DivisionHex
Coalfire’s elite team of hackers, defenders, and threat hunters, built to test limits, break systems (before attackers do), challenge assumptions, and redefine what it means to be secure.
This isn’t a marketing rebrand. This is the formation of a legendary squad of field-tested experts who’ve built some of the most respected offensive and defensive capabilities in the industry.
DivisionHex members include:
Charles Henderson, EVP of DivisionHex
Former head of Trustwave SpiderLabs and IBM X-Force, Charles has led global teams specializing in everything from threat intel to red teaming.
He’s a mainstay in the hacker community, serving on the Black Hat review board and appearing at DEF CON, RSA, SXSW, and pretty much every major security conference you can name.
TL;DR: Charles runs teams of hackers. And now he runs DivisionHex.
Grifter (a.ka. Neil Wyler), VP of Defensive Services
A legend in the hacker world. With 20+ years in the trenches of offensive security, Neil’s been behind some of the most iconic operations in the industry.
He’s held senior staff roles at DEF CON and Black Hat for over two decades, helped shape CFP and training review boards, and built spaces — both physical and digital — for the hacker community to grow.
From CTFs to crisis response, books to talks, Grifter has seen every angle of the threat landscape — and now, as part of DivisionHex, he’s helping define how defenders fight back.
John Hendley, VP, Offensive Security
Ex–Naval Officer. Former global strategy lead for IBM X-Force. OSCP-certified and hardwired for attacker logic. He’s described internally as a “tiger in the shadows waiting to strike.”
John doesn’t just understand the threat landscape, he’s helped shape how the industry responds to it. From high-stakes offensive ops to building enterprise-scale defense strategies, he brings precision, clarity, and mission-first focus to every engagement.
With DivisionHex, he’s the architect ensuring our offensive playbooks scale with the speed and complexity of real-world threats.
Bart Stump, Managing Principal, Defensive Services
If you’ve ever been to Black Hat and the network didn’t crash — Bart’s probably why.
For over 17 years, he’s been one of the quiet forces behind the world’s most high-pressure cybersecurity environments. From laying cable at 3 a.m. to orchestrating the defenses of live-fire networks, Bart thrives where uptime matters and failure isn't an option.
Now part of DivisionHex, he leads with that same mindset: precision-built defense, real-world resilience, and a crew that doesn’t blink.
Mandy Pote, Managing Principal
Mandy doesn’t just manage risk — she maps it, translates it, and turns it into strategy.
With a certification stack that includes CISSP, CRISC, CCSK, CIPP/E, CMMC RP, AWS CCP, and OpenFAIR, she brings multi-domain fluency across cybersecurity, privacy, cloud, and enterprise risk. She's led Coalfire’s most complex advisory engagements — and more recently, helped stand up our AI Risk Management services from the ground up.
When organizations need to understand how emerging AI threats collide with existing regulatory pressure, Mandy’s the one drawing the line between innovation and exposure.
If it touches AI, cloud, or governance — she’s the first call.
Michael Raibick, Managing Principal, Adversary Services
Fresh from leading global Red and Purple Team operations at CrowdStrike, Michael brings fire-tested precision to every mission.
He’s run some of the most advanced exercises against the kinds of environments threat actors dream about attacking — and he knows exactly how they think.
Whether it’s APT simulation, ransomware emulation, or testing detection capabilities under pressure, Michael doesn’t just test controls — he exposes blind spots.
At DivisionHex, Michael builds the attacks and playbooks that make defenders stronger and ensures they’re ready when real threats hit.

Black Hat 2025: Where It All Comes Together
If you’re at Black Hat, here’s where to find DivisionHex in the wild:
- The NOC: Bart and Grifter are once again behind the controls of Black Hat’s infamous Network Operations Center. If you know, you know.
- DivisionHex Happy Hour: Hosted by Charles Henderson
ORLA at Mandalay Bay Beach
August 5 | 6–8 PM
Come for the crew. Stay for the conversation. - Limited-Edition DivisionHex Merch
Featuring original artwork by legendary hacker artist Dustrial..
Available only at Black Hat. When it’s gone, it’s gone.
What’s Next
DivisionHex isn’t a moment. It’s a mission.
We’ll be dropping tools, stories, tactics, and research from the field in the months to come. If you care about AI security, adversary emulation, threat hunting, modern defense, or threat-informed architecture, watch this space.
We’re not here to follow frameworks.
We’re here to test them, improve them, and sometimes burn them down to build better.
See how DivisionHex put engineers at Albert Invent to the test with a deepfake of their CEO.
Case Study: Deep Faking Albert Invent