TRACKS & TUTORIALS
NOVICE TRACK:
SUSAN STEWARTSusan is a Project Manager with BAE SYSTEMS in Bellevue, NE. Having recently retired a Major, with over 21 years of service in the United States Air Force, she held such positions as Branch Chief, NATO & Deliberate Plans; Officer-in-Charge, Network Security; and Commander, Information Systems Flight. Her career spanned the security spectrum, beginning with her first tour as an Airman at the National Security Agency. She took network security to the next level on Offutt Air Force Base by creating a 24x7/365 on-site network response team. She currently works at US Strategic Command as an architectural engineer. She holds a BA in Business Management from the University of Maryland, an MS in Education from USC, and an MS in Information Resources Management from the Air Force Institute of Technology. She serves as Secretary for NEbraskaCERT.
BRIAN SMITH Brian Smith is Senior Software Engineer currently contracted to Solutionary, Inc. Brian did both his graduate and undergraduate work in Computer Science at the University of South Dakota where he received awards for academic performance and outstanding contributions to the Computer Science department. In 1996 Brian was inducted into Upsilon Pi Epsilon the National Honors society for Computing Sciences. Brian has applied cryptography to an Internet voting pilot project as well as to security related projects for Solutionary, Inc.
FRED VILLELLA Executive Director of New Dimensions International (NDI) a Security Services small business located in California. NDI is recognized for its record of leading technology initiatives for government and industry, including development of the original GSA security curriculum, PL 100-235 training program, a DoD Security Engineering and NASA Computer Security Officials certification training programs & Intruder Defenses training delivered nationwide & overseas. The NDI "Security Assurance Manager" represents THE leading technology in Template-based database, software-driven technology that for the first time actually RECORDS security status of systems, uses Asset Management & owner interfaces and incorporates the requirements of OMB A130 and common best practices security planning requirements at the IT levels. Fred is a retired military officer and former presidential appointee having served as the Executive Director of a Federal Agency with sweeping Emergency Powers and as the Executive Secretary to the President's National Security Advisor for Emergency Mobilization.
CHRISTOPHER P. BERLANDIER was responsible for the technical implementation of SSI products and services. He also served as IT Director responsible for the delivery of the Template Security Database software where he had the lead role in programming for the Security Assurance Manager software. His past credentials include 9 years of programming experience. He was VP and then CEO for two IT companies where he developed cutting edge software and delivery systems for recording artists across the nation for all record labels. He designed and managed the application for the Front-end delivery systems, which use Internet capabilities, desktop client/server systems in VB and 4D and back-end RDBMS Oracle and Microsoft technologies. In this program these services are distributed by a nationwide WAN supporting replication and monitoring main facilities located in Los Angeles & New York City. Mr. Berlandier conducted the programming tasks for the security planning and audit database technology applications utilizing cutting edge approaches to provide real time asset management, previously unavailable security accountability and dynamic enterprise management capabilities. His technical proficiencies span the spectrum of software applications and include Oracle, XML and virtually all-programming languages. He demonstrated exceptional acumen in the successful development and implementation of four technology-based companies.
DAVE ELFERING Mr. Elfering began his career as a spacecraft operation specialist for the Air Force and NASA where he began a hobby of finding security flaws in applications and operating systems. Working full-time while earning a B.S in Computer Information Management from the University of Maryland, Dave migrated full-time to information systems. When an opportunity arose to install firewalls, Dave jumped at the chance to take security up as a
full-time role. He is now the network security manager at Werner Enterprises, the third largest trucking company in the U.S., where he planned and implemented enterprise-wide security. Dave has authored VPN and intrusion scanning course materials for SANS where he is member of the GIAC faculty.
RON WOERNER Ron Woerner is currently the Senior Security Administrator for CSG Systems, Inc. After spending five years in the Air Force as an Intelligence Officer, Ron moved to the private sector as an UNIX administrator. In addition to CSG, he has worked in the Omaha area for Sterling Software and the Mutual of Omaha Companies. He recently spoke at the CERT 2000 conference on establishing an organizational security program. Ron is a graduate of Michigan State University with a Bachelors degree in Computer Science and earned a Masters degree from Syracuse University in Information Resources Management.
BRIAN SNOW
Brian Snow is the Technical Director for the Information Assurance Directorate at the United States National Security Agency. He is a mathematician who works on engineering and computer science tasks, designing and analyzing security systems. He has created cryptographic algorithms in use by the military today, found vulnerabilities both in cryptographic and computer systems, and has integrated security mechanisms of various sorts into complex systems. He holds two patents and has received many awards. He created and managed NSA's Secure Systems Design division in the 1980s. He interacts on NSA's behalf with senior technologists throughout government, industry, and academia. He has three daughters, and loves hiking and theater.
STEPHANIE ROGERS Stephanie Rogers graduated from Adams State College with a BA in Pre-law and Government. She started my Paralegal training while still in school. After graduation she applied for a position at CERT Coordination Center in Pittsburgh. Stephanie currently works with the Analysis team running scenarios involving cyber terrorism and other types of cyber crime. In the three months that she has been involved with the Analysis team she contributed to several projects. She is currently compiling data on worldwide trends in cyber crime both with law enforcement and criminals.
KEVIN DOHRMANN
IP Revolution CTO & Vice President of Consulting & Technology, President of IPRevolution.net
Dohrmann has been recognized as a leader in the technology industry for the past 16 years. While he began his career as a systems engineer, his creative approach to technology and problem solving soon earned him top positions at Fortune 500 and start-up technology companies. Dohrmann's experience ranges from planning and implementing data centers to crafting technical solutions that address client business problems. In 1996, soon after developing his own Web Start-up Company, he patented a method for initiating telephone calls from the Web. In his current role, Dohrmann oversees IP Revolution's consulting team and its data center operations and sales. He is also responsible for the company's go-forward technology strategy. Through international speaking engagements, Dohrmann continues to share his expertise and unique techology outlook with colleagues across the globe.
TECHNICAL TRACK
KARL WARE Karl Ware co-founded BioNetrix, an authentication innovator, in 1997 and serves as vice president of operations. In this capacity, he oversees the company's day-to-day operations. He also directed the launch of the Biometrics for Secure Enterprise Computing (BioSEC) alliance. This initiative is delivering multi-vendor authentication solutions to the marketplace.
Over the past 10 years, Ware has worked in various capacities, creating and executing successful marketing initiatives for Dow Jones Telerate and Motorola. He has successfully launched over 18 different products for the two companies into both domestic and international markets.
Before this, Ware was a vice president of information/communications security with JP Morgan. In this role, he defined technical and user security policies for the organization.
Ware started his career in Washington, DC where he obtained a great deal of expertise in the area of information security while employed by the Central Intelligence Agency (CIA). He was subsequently a key product manager that participated in the development and launch of MCI Mail.
Ware has worked extensively in overseas marketing, and brings this international expertise to the BioNetrix team. He has worked in England, Hong Kong, Singapore and Indonesia.
Ware graduated from George Washington University with a bachelor's degree in computer science and received a master's in business administration from Georgetown University. He has taught various business classes at the University of Maryland and the National University of Singapore.
GREG GATJANIS Prior to joining Abacus Technology, Greg Gatjanis was a policy advisor and strategist to the U.S. Drug Enforcement Administration on national security strategy and intelligence policy. He served two White House policy assignments; led an agency-wide review on implementing a cybercrime strategy; and represented the DEA and FBI on a White House task force on intelligence reform.
MATTHEW MARSH Chief Scientist of the NEbraskaCERT, President & Founder of Paktronix Systems LLC, Author of "Policy Routing with Linux", Author of "Managing Secure Networks", Creator of PakSecured Linux. Working with networks since 1983. Obtained admin on my first VAXen in 1976, on Arpa/Bit Net in 1984 (think Internet), working in Network Management since late 1980's on routed IP/IPX/SNA networks. Chief Scientist of the NEbraskaCERT working on IPv4/IPv6/IPSec Integrated Security Networks. Developed the first (and currently still the only) SNMPv3 managed policy routing firewall system for Linux available under GPL at http://www.paksecured.com. Actively researching management and design of Integrated Security Networks.
DAVID GODFREY Senior Information Security Specialist, JANUS Associates
Mr. Godfrey is a Senior Systems Security Specialist for JANUS Associates. He has over 30 years of IT experience, primarily in IT Security & Audit, architectural designs, automated operations, and product integration. As a seasoned veteran of security practices, Dave has been responsible for the protection of a full array of corporate information assets, and the management of IT Audit Responses.
At previous companies his functions included mainframe security, LAN security, disaster recovery / contingency planning, the development of a corporate-wide Business Impact Analysis methodology, and evaluation, cost justification and approval of all security products. He also designed an Enterprise-Wide Single Sign-On / Centralize Administration Architecture, and several other computer software security solutions.
Dave's investigative skills and IT security expertise have been employed during numerous computer fraud investigations and in the detection, definition and processing computer crimes. He has assisted law enforcement and legal council on how to interpret and understand the criminal motivators behind these illegal actions, and helped develop best practices on computer crime prevention techniques. Dave was also a member of the Niagara County Sheriff's Department for over four years.
Mr. Godfrey served as a member of the People-to-People's Delegation to the Soviet Union for Data Security, EDP Auditing, and Quality Assurance. He is also an active member of the Information Systems Security Association and the Computer Security Institute; and a repeat speaker and instructor for various security conferences and seminars.
Speaking Engagements
Computer Security Institute (CSI)
Information Systems Security Association (ISSA)
Information Security, Audit and Control Association (ISACA)
EDP Audit's Association Conferences and Seminars (EDPAA)
Institute of Internal Auditors' Seminars (IIA)
American Federation of Computer Operations Managers (AFCOM)
US Government's Information Processing Integrity Conference (IPIC)
Vanguard Integrity Professional's Enterprise Security Conferences
Connecticut Disaster Recovery Information Exchange
MVS User Group of Southern California
IBM Guide & SHARE Conferences
Gartner Group Security Briefings
Computer Associates' Annual Conferences
MIS Training Institute's:
Information Security Manager's Symposiums
Audit & Security Annual Conferences
InfoSec World Conferences
LAN Security Seminars
Internet Security & Audit Seminars
ACF2 / RACF / TSS User Group in the U.S. and Canada
International Security & Audit User Groups & Organizations:
London, Birmingham, Paris, Brussels, Amsterdam, Dublin, Edinburgh, Copenhagen, Tel Aviv
DAVE ELFERING Mr. Elfering began his career as a spacecraft operation specialist for the Air Force and NASA where he began a hobby of finding security flaws in applications and operating systems. Working full-time while earning a B.S in Computer Information Management from the University of Maryland, Dave migrated full-time to information systems. When an opportunity arose to install firewalls, Dave jumped at the chance to take security up as a
full-time role. He is now the network security manager at Werner Enterprises, the third largest trucking company in the U.S., where he planned and implemented enterprise-wide security. Dave has authored VPN and intrusion scanning course materials for SANS where he is member of the GIAC faculty.
CHRISTOPHER GERG Christopher Gerg is a Network Security Engineer with Berbee in Madison, Wisconsin. In the course of his work he performs Network Security Assessments and penetration tests, as well as general network security consulting ranging from secure network design, implementing enterprise VPNs, to rolling out comprehensive Intrusion Detection Systems. He also spends a great deal of time educating clients about secure network design. This last summer he was part of a small team that had the responsibility of securing the network at the Republican National Convention.
PETE PRIVATEER Pete Privateer has an extensive background in high-tech and Internet/network security and a solid track record in building successful startup companies. At Pelican Security, he is responsible for the overall strategy and operation of the company. Prior to Pelican, Privateer co-founded and held the position of senior vice president of operations at AXENT Technologies (AXNT). While in this position, he led the company's profitable transformation from a VMS utility product company into a $100+ million computer security company. Prior to AXENT, Privateer was one of the original employees of KnowledgeWare where he was responsible for the overall strategy and vision. Through his efforts, KnowledgeWare developed into a $140 million company and was acquired by Sterling Software in 1994. Privateer graduated with a Bachelor of Science in Physics from the University of Florida. He has previously spoken at ComNet and will be speaking at The Internet Security Conference in June on malicious code and sandboxing technology.
STEPHANIE ROGERS Stephanie Rogers graduated from Adams State College with a BA in Pre-law and Government. She started my Paralegal training while still in school. After graduation she applied for a position at CERT Coordination Center in Pittsburgh. Stephanie currently works with the Analysis team running scenarios involving cyber terrorism and other types of cyber crime. In the three months that she has been involved with the Analysis team she contributed to several projects. She is currently compiling data on worldwide trends in cyber crime both with law enforcement and criminals.
MIKE HRABIK Chief Technology Officer, Solutionary.
CHRISTINE ORSHESKY Very early in her information security career, Christine Orshesky, learned through hard experience that it takes more than a [software] tool to solve a security problem. It takes an understanding of the business needs, the people, and the operational environment to manage an incident - anything less is only a bandage. As a result, Ms. Orshesky founded i-secure Corporation to bring her more than 10 years of anti-virus and information security experience to a broader segment of the online community. Christine is a recognized name in the anti-virus industry - publishing and presenting at international virus prevention and information security venues.
MANAGEMENT TRACK
GARY BAHADUR Gary, a co-founder of Foundstone Inc, is responsible for the Foundstone infrastructure and operations that support the consulting and training services. Foundstone's research and development labs are a key part of the security solutions provided to our clients to empower them to secure their own environments. In addition to internal corporate responsibilities, Gary provides security consulting and training services to Foundstone's clients. Areas of expertise include security architecture reviews, and ethical hacking reviews focusing on UNIX and Windows NT systems. Gary has been involved with numerous penetration studies and network reviews covering various firewalls, UNIX, Windows NT, Novell networks, Web servers, Internet connectivity, SAP security in UNIX and Windows NT environments, routers, during the past 6 years. Gary has helped develop the methodologies for network security reviews and was one of the co-developers of the "Extreme Hacking" class at Ernst & Young. Prior to joining Foundstone, Gary held positions of Manager in the Security Profiling Services Group of Ernst & Young and Senior Consultant in Price Waterhouse's Enterprise Security Solutions practice. Gary developed
methodologies for network security at both companies. Gary performs speaking engagements at various industry conferences, several of which include Information Systems Audit and Control Association (ISACA) Conferences, "Securing UNIX Systems"; ISSA Conferences, "Performing Penetration Tests"; Security.Net 99, Toronto CA, 9/99 Co-Keynote Speaker and Illinois CPA Society, "Who's Knocking On Your Door?" 8/00. Gary's articles have appeared in SysAdmin magazine "Security Diagnostic Review of Solaris 2.x", "Securing Your Web Server", "Freeware Web Security Scanners", "Freeware Security Scanners", Login Magazine "Network Policy Enforcement", and Information Security "Apache Security". Gary holds a Bachelor of Science degree in Information Systems / Finance from New York University and is a Certified Information Systems Security Professional (CISSP).
HARRY BOURISCurrently employed by Sumaria Systems Inc., Harry Bouris is the Technical Services Director for the B-1 and B-2 System Program Offices at Wright Patterson AFB. He is charged with the operations of the local and wide area networks to include router and firewall operations. As the Computer Systems Security Officer, he drafted all policies, completed certification and accreditation under AFSSI 5024, DITSCAP, and NISPOM Chapter 8 formats. Mr. Bouris retired from the Air Force as a Lieutenant Colonel where he served in the comm and computer career field. He is a graduate of the University of Pittsburgh and holds a masters degree in Information and Computer Science from the Georgia Institute of Technology.
CHRISTINE ORSHESKY Very early in her information security career, Christine Orshesky, learned through hard experience that it takes more than a [software] tool to solve a security problem. It takes an understanding of the business needs, the people, and the operational environment to manage an incident - anything less is only a bandage. As a result, Ms. Orshesky founded i-secure Corporation to bring her more than 10 years of anti-virus and information security experience to a broader segment of the online community. Christine is a recognized name in the anti-virus industry - publishing and presenting at international virus prevention and information security venues.
SHELLY NUESSLE Shelly Nuessle is an Information Security Specialist for American Century, a financial institution based in Kansas City, MO. She is currently the Information Security Awareness contact, while also providing analysis in privacy issues, Internet usage, use of outside service providers and securing web-based applications. Shelly has a Bachelor of Science in both Mathematics and Psychology from Southwest Missouri State, with additional training in network topologies, risk assessment, and project and systems management. She is involved in both ISSA and the IEEE Computer Society.
MARGIE CASHWELL Margie Cashwell is a Manager of a team of Systems Engineers for RSA Security Inc., the most trusted name in e-security. Based in San Mateo, CA, Margie has extensive experience in public key infrastructure (PKI) and other security technologies. Margie has worked at with PKI leaders like RSA Security Inc. and Xcert International where she has provided educational lectures and training and sales support throughout the United States and across the globe.
STEPHANIE ROGERS Stephanie Rogers graduated from Adams State College with a BA in Pre-law and Government. She started my Paralegal training while still in school. After graduation she applied for a position at CERT Coordination Center in Pittsburgh. Stephanie currently works with the Analysis team running scenarios involving cyber terrorism and other types of cyber crime. In the three months that she has been involved with the Analysis team she contributed to several projects. She is currently compiling data on worldwide trends in cyber crime both with law enforcement and criminals.
AARON GROTHE Aaron Grothe is the President/CEO of Heimdall Linux Incorporated http://www.heimdall-linux.com. Heimdall Linux is developing Linux products, which are being submitted to the National Institute of Standards and Technology's Common Criteria project for independent security evaluation and accreditation. Mr. Grothe is also the current project leader of the Linux Kernel Audit Project (LKAP), which has as one of its goals to perform a source code audit of the Linux Kernel.
STEVE SCHAFER Nebraska's CIO
DAVID GODFREY Senior Information Security Specialist, JANUS Associates
Mr. Godfrey is a Senior Systems Security Specialist for JANUS Associates. He has over 30 years of IT experience, primarily in IT Security & Audit, architectural designs, automated operations, and product integration. As a seasoned veteran of security practices, Dave has been
responsible for the protection of a full array of corporate information assets, and the management of IT Audit Responses.
At previous companies his functions included mainframe security, LAN security, disaster recovery / contingency planning, the development of a corporate-wide Business Impact Analysis methodology, and evaluation, cost justification and approval of all security products. He also designed an Enterprise-Wide Single Sign-On / Centralize Administration Architecture, and several other computer software security solutions.
Dave's investigative skills and IT security expertise have been employed during numerous computer fraud investigations and in the detection, definition and processing computer crimes. He has assisted law enforcement and legal council on how to interpret and understand the criminal motivators behind these illegal actions, and helped develop best practices on computer crime prevention techniques. Dave was also a member of the Niagara County Sheriff's Department for over four years.
Mr. Godfrey served as a member of the People-to-People's Delegation to the Soviet Union for Data Security, EDP Auditing, and Quality Assurance. He is also an active member of the Information Systems Security Association and the Computer Security Institute; and a repeat speaker and instructor for various security conferences and seminars.
Speaking Engagements
Computer Security Institute (CSI)
Information Systems Security Association (ISSA)
Information Security, Audit and Control Association (ISACA)
EDP Audit's Association Conferences and Seminars (EDPAA)
Institute of Internal Auditors' Seminars (IIA)
American Federation of Computer Operations Managers (AFCOM)
US Government's Information Processing Integrity Conference (IPIC)
Vanguard Integrity Professional's Enterprise Security Conferences
Connecticut Disaster Recovery Information Exchange
MVS User Group of Southern California
IBM Guide & SHARE Conferences
Gartner Group Security Briefings
Computer Associates' Annual Conferences
MIS Training Institute's:
Information Security Manager's Symposiums
Audit & Security Annual Conferences
InfoSec World Conferences
LAN Security Seminars
Internet Security & Audit Seminars
ACF2 / RACF / TSS User Group in the U.S. and Canada
International Security & Audit User Groups & Organizations:
London, Birmingham, Paris, Brussels, Amsterdam, Dublin, Edinburgh, Copenhagen, Tel Aviv
KEVIN DOHRMANN
IP Revolution CTO & Vice President of Consulting & Technology, President of IPRevolution.net
Dohrmann has been recognized as a leader in the technology industry for the past 16 years. While he began his career as a systems engineer, his creative approach to technology and problem solving soon earned him top positions at Fortune 500 and start-up technology companies. Dohrmann's experience ranges from planning and implementing data centers to crafting technical solutions that address client business problems. In 1996, soon after developing his own Web Start-up Company, he patented a method for initiating telephone calls from the Web. In his current role, Dohrmann oversees IP Revolution's consulting team and its data center operations and sales. He is also responsible for the company's go-forward technology strategy. Through international speaking engagements, Dohrmann continues to share his expertise and unique techology outlook with colleagues across the globe.
RON WOERNER Ron Woerner is currently the Senior Security Administrator for CSG Systems, Inc. After spending five years in the Air Force as an Intelligence Officer, Ron moved to the private sector as an UNIX administrator. In addition to CSG, he has worked in the Omaha area for Sterling Software and the Mutual of Omaha Companies. He recently spoke at the CERT 2000 conference on establishing an organizational security program. Ron is a graduate of Michigan State University with a Bachelors degree in Computer Science and earned a Masters degree from Syracuse University in Information Resources Management.
STEVE MANZUIK
Steve is a Manager in Ernst & Young's Security & Technology Solutions practice. Over the last ten years Steve has been involved in IT integration, support and security. Steve is a published author on security issues, a sought after speaker and information security panelist and is the moderator of a full disclosure security mailing list ? Win2KsecAdvice and has recently launched VulnWatch a second full disclosure mailing list. Before joining Ernst & Young, Steve was a Security Analyst for a world wide group of White Hat Hackers and Security Researchers ? BindView RAZOR Team.
Steve is also a board member of the Calgary Security Professionals Information Exchange (SPIE) group, which is a group of local security professionals from various private and government sectors. Steve has a strong background in Microsoft technologies and the various security issues surrounding them, and has successfully guided multiple organizations in securing Microsoft Windows NT hosts for use in a hostile environment.
JOE DEVICH Joe Devich is president and CEO of network reliability company Asta Networks. Mr. Devich was most recently the executive vice president of technology and infrastructure for the high-speed Internet provider Covad Communications. While at Covad, he led the deployment of the largest national broadband network. Before Covad, Mr. Devich was responsible for all process and support functions for a 28,000-member team that delivered service to 25 million customers in 14 states at US West. In his executive roles, Mr. Devich has spoken to audiences ranging from hundreds of director-level employees to thousands of attendees at various tradeshows.
ELI DICHTERMAN Chief Technology Officer Eli Dichterman oversees Camelot's product strategy, Network Intelligence technology, and intellectual property. He also managed the research and development of proprietary 'discovery' algorithms that power Camelot's access control solution, Hark! Eli has worked for IBM's research laboratory, Microsoft, and Israel's Armament Development Authority. He was appointed research posts at the London School of Economics and the Royal Holloway University of London, and has taught for more than ten years. Eli earned M.Sc. and Ph.D in Computer Science at the Technion Institute of Technology in Haifa, Israel. He co-authored and contributed to eleven publications in the past decade.
ACADEMIC TRACK
Dr. KIMBERLY S. YOUNG, Ph.D. Dr. Kimberly S. Young has been touted as "the world's foremost Cyberpsychologist" by the media and is considered the leading authority on e-behavior and Internet addiction. Dr. Young has served as an expert witness in state and federal courts regarding her pioneer research and she recently authored Caught in the Net, the first recovery book for Internet Addiction. She is internationally known for her work and is a frequent speaker on how technology impacts human behavior.
Dr. Young works as an Internet consultant for corporations on risk management strategies designed to minimize employee Internet abuse and increase e-productivity in the workplace. Her work has been featured in hundreds of newsprint publications worldwide including major articles in The Wall Street Journal, USA Today, The New York Times, Fortune, Newsweek and Time, and she is a frequent media contributor for radio and television including NPR, the BBC, CNBC News, Fox News, The Leeza Show, Inside Edition, Good Morning America, and ABC's World News Tonight.
Dr. Young, a licensed psychologist, is founder of the Center for On-Line Addiction, the first consultation firm and web-based resource network to specialize in Internet-related conditions such as problem day trading, online infidelity, virtual sexual offenders, and cybersexual addiction.
Dr Young is on the editorial board of CyberPsychology and Behavior, is the editor of the CyberHealth E-Newsletter, and recently served as the National Spokesperson for Reuters International, Inc., regarding their study on Information Addiction Worldwide. She is an Assistant Professor of Psychology at the University of Pittsburgh, Bradford, and a member of the American Psychological Association, the Employee Assistance Professionals Association, the National Council for Sexual Addiction and Compulsivity, and a founding member of the International Society of Mental Health On-line.
WINN SCHWARTAU One of the country's leading experts on information security, infrastructure protection and electronic privacy is often referred to as "the civilian architect of information warfare." He coined the term "Electronic Pearl Harbor" and was the Project Lead of the Manhattan Cyber Project Information Warfare and Electronic Civil Defense Team. Today, he balances his time between writing, lecturing, building corporate and national security awareness programs and consulting.
PETE PRIVATEER Pete Privateer has an extensive background in high-tech and Internet/network security and a solid track record in building successful startup companies. At Pelican Security, he is responsible for the overall strategy and operation of the company. Prior to Pelican, Privateer co-founded and held the position of senior vice president of operations at AXENT Technologies (AXNT). While in this position, he led the company's profitable transformation from a VMS utility product company into a $100+ million computer security company. Prior to AXENT, Privateer was one of the original employees of KnowledgeWare where he was responsible for the overall strategy and vision. Through his efforts, KnowledgeWare developed into a $140 million company and was acquired by Sterling Software in 1994. Privateer graduated with a Bachelor of Science in Physics from the University of Florida. He has previously spoken at ComNet and will be speaking at The Internet Security Conference in June on malicious code and sandboxing technology.
TERRENCE P. MAHER is a partner at the Omaha, Nebraska law firm of Abrahams Kaslow & Cassman LLP. Sara A. Juster and Erin E McCandless are associates of the firm. Their practice focuses on technology development, procurement, licensing and distribution agreements; information technology and buiness process outsourcing and privatization; electronic commerce; Web and Internet transactions; and IT strategic counseling and dispute work-outs.
BRIAN SNOW
Brian Snow is the Technical Director for the Information Assurance Directorate at the United States National Security Agency. He is a mathematician who works on engineering and computer science tasks, designing and analyzing security systems. He has created cryptographic algorithms in use by the military today, found vulnerabilities both in cryptographic and computer systems, and has integrated security mechanisms of various sorts into complex systems. He holds two patents and has received many awards. He created and managed NSA's Secure Systems Design division in the 1980s. He interacts on NSA's behalf with senior technologists throughout government, industry, and academia. He has three daughters, and loves hiking and theater.
MATTHEW MARSH Chief Scientist of the NEbraskaCERT, President & Founder of Paktronix Systems LLC, Author of "Policy Routing with Linux", Author of "Managing Secure Networks", Creator of PakSecured Linux. Working with networks since 1983. Obtained admin on my first VAXen in 1976, on Arpa/Bit Net in 1984 (think Internet), working in Network Management since late 1980's on routed IP/IPX/SNA networks. Chief Scientist of the NEbraskaCERT working on IPv4/IPv6/IPSec Integrated Security Networks. Developed the first (and currently still the only) SNMPv3 managed policy routing firewall system for Linux available under GPL at http://www.paksecured.com. Actively researching management and design of Integrated Security Networks.
STEVE NUGEN Steve Nugen has more than twenty years' experience developing information system technologies in government, academic, and private sectors. Education and credentials include B.S. in Computer Science; M.S. in Computer Engineering; Certified Information Systems Security Professional; and publications in Artificial Intelligence and Information Security. Experience includes Principal Investigator at Iowa State University; Director of Technology at GTE and Raytheon; Founder and Chief Technical Officer of NrGenSoft; and teaching.
AARON STRIEGEL Mr. Striegel is currently a Ph.D. student in Computer Engineering at Iowa State University. His current research interests include Internet QoS, multicasting, real-time systems, and ad-hoc networking. His dissertation is focusing on scalable multicasting in a Differentiated Services environment. He has received a Teaching Excellence award from Iowa State University and has taught several sophomore level classes in embedded systems.
ANDREW KONSTANTARAS Andrew Konstantaras is vice president of marketing for Asta Networks. He brings twelve years of experience in marketing, financial services, and legal and regulatory issues surrounding technology and electronic commerce.
Prior to Asta Networks, Mr. Konstantaras was a principal at X-net Group, advising companies on electronic commerce and online financial services; the chief marketing officer for an Internet-only bank; and vice president at CertCo, leading the product management and development teams. He also spent four years as vice president and legal counsel for VISA International, where he provided legal and regulatory advice concerning implementation of the Secure Electronic Transaction ("SET") protocol for secure electronic commerce worldwide.
Mr. Konstantaras holds a bachelor's degree in physics and chemistry from Grinnell College, and a doctor of jurisprudence degree from Georgetown University Law Center in Washington, D.C. Mr. Konstantaras is a dynamic speaker, who has addressed audiences at conferences around the world including CERT, RSA, Networld+Interop, Internet World, OECD, UNCTAD and ISPCON Spring.
|