The document introduces several security researchers across different layers of mobile security including infrastructure, hardware/firmware, operating system, and applications. It provides brief biographies for each researcher highlighting their background, employers, notable presentations and research areas. The document concludes by announcing a debate between the researchers on the riskiest mobile security layer.