TUTORIALS
FT-1A, FT-1B: Check Point NG Firewall Essentials, Parts I &
II
Barry Cooper, Training Director, FishNet Security:Barry
Cooper brings 15 years of experience in information Systems,
auditing, programming, and networking to the classroom - in addition
to 5 years of software training. A skilled instructor and motivator,
Barry holds the following certifications: Certified Information
System Security Professional, Cisco Certified Network Associate,
Check Point Certified Security Administrator, Check Point Certified
Security Expert, Check Point Certified Quality of Service Expert,
Check Point Certified Security Instructor, Nokia Security
Administrator, Nokia Security Administration Certified Instructor,
NetScreen Certified Security Administrator, and NetScreen Certified
Security Instructor.
FT-2A: Secure Wireless Networks
Matthew Marsh, Paktronix Systems and Steve Nugen, NuGenSoft
Matthew Marsh: Chief Scientist of the NEbraskaCERT,
President & Founder of Paktronix Systems LLC, Author of "Policy
Routing with Linux", Author of "Managing Secure Networks", Creator
of PakSecured Linux. Working with networks since 1983. Obtained
admin on my first VAXen in 1976, on Arpa/Bit Net in 1984 (think
Internet), working in Network Management since late 1980's on routed
IP/IPX/SNA networks. Chief Scientist of the NEbraskaCERT working on
IPv4/IPv6/IPSec Integrated Security Networks. Developed the first
(and currently still the only) SNMPv3 managed policy routing
firewall system for Linux available under GPL at http://www.paksecured.com/
Actively researching management and design of Integrated Security
Networks.
Stephen Nugen: Steve Nugen has more than twenty years'
experience developing information system technologies in government,
academic, and private sectors. Education and credentials include
B.S. in Computer Science; M.S. in Computer Engineering; Certified
Information Systems Security Professional; and publications in
Artificial Intelligence and Information Security. Experience
includes Principal Investigator at Iowa State University; Director
of Technology at GTE and Raytheon; Founder and Chief Technical
Officer of NuGenSoft; and teaching.
FT-2B: StateFull Firewalling in Linux
Oskar Andreasson: Oskar Andreasson is currently occupied
as an open source documentation writer, and as the Support Manager
at Multisoft Education AB. Started with a VIC-64 in 1987 and learnt
to code Basic in the late 1980's. He got interested in system and
network security in the beginning of the 1990's. He has since
continued in those tracks. Mr. Andreasson has been a vivid Linux
user and administrator since 1994.
He is the author of "Linux/Unix" as well as "Windows 2000"
courses, and books, available through Multisoft Education. Also
author of the Iptables-tutorial available on the Internet, and
currently working on two new documents, describing ipsysctl and
advanced routing with Linux, that will be available over the
Internet in a few months time.
Mr. Andreasson is currently located and settled down in
Stockholm, Sweden.
FT-3A: Disaster Preparedness
Harry Bouris, CISSP: Mr. Bouris has over 30 years
experience in information and communications security with the
Federal Government. For the past eight years, he has served as the
Technical Services Director for the B-2 Stealth Bomber System
Program Office. In this capacity, he also served as the Information
System Security Officer, responsible for the entire Information
Assurance Program for two major Air Force weapons systems. He was
certified through the International Security Certification
Consortium (ISC2) as a Certified Information Systems Security
Professional and as a Certified Information Systems Security Officer
for Special Compartmentalized Information (SCI) and Special Access
Programs (SAP) by the Secretary of the Air Force for Acquisition
Security.
FT-3B: Incident Response Teams
Marty Gillespie, CISSP: Marty Gillespie is a Certified
Information Systems Security Professional (CISSP) and a Check Point
Certified Systems Engineer (CCSE), and is currently working as an
independent consultant. Marty has over sixteen years computer
security and networking experience for such companies as Lucent
Technologies, Cabletron Systems, U. S. Force and a number of
government contractors
FT-4A: Viewing Cyber Survivability from Expanded Perspective
Casey J. Dunlevy is a Senior Member of the Technical Staff
at the Software Engineering Institute (SEI), and is also the Team
Lead for the CERT(r) Analysis Center, which works in close
cooperation with the CERT(r) Coordination Center. Mr. Dunlevy is
currently coordinating the effort to develop methodologies for
predictive analysis of Internet threats. He specializes in strategic
analysis of threats to computer networks; and a significant part of
his work involves analysis of cyber-terrorism, computer network
warfare, and transnational organized crime as well as other
potential threat groups.
Prior to joining the SEI, Mr. Dunlevy was the Chief, Computer
Network Warfare Analysis Branch for U.S. Space Command and the North
American Aerospace Defense Command in Colorado Springs. He has also
worked for the Office of Naval Intelligence, the National Security
Agency, and other intelligence agencies. During his long
intelligence career, Mr. Dunlevy was recognized for work in the
areas of computer network warfare, strategic military analysis,
ballistic missile defense, Indications and Warnings, terrorism, and
crisis response.
Mr. Dunlevy received a BS in political science from the
University of the State of New York and received certifications as a
Russian and German linguist from the Defense Language Institute in
Monterey, California. He was an adjunct professor in international
security affairs at the University of Pittsburgh Graduate School for
Public and International Affairs and is a frequent guest lecturer at
the Heinz School at Carnegie Mellon University. Mr. Dunlevy belongs
to the Society of Competitive Intelligence Professionals (SCIP).
FT-4B: Wireless Lab and Demonstration
Eric Holstein, CISCO
TECHNICAL TRACK
TT-1: Security Realities - Interface Between the Cyber and
Physical Worlds
Casey J. Dunlevy is a Senior Member of the Technical Staff
at the Software Engineering Institute (SEI), and is also the Team
Lead for the CERT(r) Analysis Center, which works in close
cooperation with the CERT(r) Coordination Center. Mr. Dunlevy is
currently coordinating the effort to develop methodologies for
predictive analysis of Internet threats. He specializes in strategic
analysis of threats to computer networks; and a significant part of
his work involves analysis of cyber-terrorism, computer network
warfare, and transnational organized crime as well as other
potential threat groups.
Prior to joining the SEI, Mr. Dunlevy was the Chief, Computer
Network Warfare Analysis Branch for U.S. Space Command and the North
American Aerospace Defense Command in Colorado Springs. He has also
worked for the Office of Naval Intelligence, the National Security
Agency, and other intelligence agencies. During his long
intelligence career, Mr. Dunlevy was recognized for work in the
areas of computer network warfare, strategic military analysis,
ballistic missile defense, Indications and Warnings, terrorism, and
crisis response.
Mr. Dunlevy received a BS in political science from the
University of the State of New York and received certifications as a
Russian and German linguist from the Defense Language Institute in
Monterey, California. He was an adjunct professor in international
security affairs at the University of Pittsburgh Graduate School for
Public and International Affairs and is a frequent guest lecturer at
the Heinz School at Carnegie Mellon University. Mr. Dunlevy belongs
to the Society of Competitive Intelligence Professionals (SCIP).
TT-2: Script Kiddees - Windows
Erik Hjelmstad, PoliVec, Inc: Erik Hjelmstad has over
eight years of network engineering, security engineering, and system
administration experience. He has a vast knowledge of NT and UNIX
security issues and has led several remote penetration and security
assessment engagements. Erik also has extensive experience with
Checkpoint Firewall-1 and has assisted with the installation,
configuration, and monitoring of several different Firewall-1
systems. He is a Checkpoint Certified Systems Administrator (CCSA)
and a Checkpoint Certified Systems Engineer (CCSE). Erik is one of
the authors of the open source pwdump3 and pwdump3e products and he
has been published in numerous security-oriented publications, such
as Business Security Advisor. Erik holds a Bachelor of Science
degree in Electrical Engineering from the Colorado School of Mines
in Golden, Colorado and a Master of Science degree in Computer
Science from Colorado Technical University. Erik has been certified
by the ISC2 as a Certified Information System Security Professional
(CISSP).
TT-3: Secure Linux
Chris Shutters, PoliVec, Inc: Chris Shutters has over 11
years of experience in the IT field, with comprehensive expertise in
the area of information security. Prior to joining PoliVec, he was
the Director of Security Tools Development for DMW Worldwide
Information Protection Products. Chris has worked as an information
security researcher for the United States Government, performing
research in both distributed security and intrusion detection. He
has also been Director of Operations for a government Computer
Emergency Response Team (CERT).
Chris holds a Bachelor of Electrical Engineering degree from the
Georgia Institute of Technology in Atlanta, Georgia and has been
certified by the ISC2 as a Certified Information System Security
Professional (CISSP).
TT-4: Internal Security
Dr. Guy Helmer, Palisade: Guy Helmer is a Senior Software
Engineer at Palisade Systems, Inc., where he is building network
security and applications protocol management appliances. He
received his Ph.D. in Computer Science from Iowa State University in
2000, his M.S. in Computer Science from Iowa State University in
1998, and his B.S. in Computer Science from the South Dakota School
of Mines and Technology in 1989. Dr. Helmer spent seven years as a
system programmer, network engineer, and system administrator at
Dakota State University in Madison, S.D. (one of Yahoo!'s Most Wired
Universities in 1998, 1999, and 2000), where accomplishments
included networking multiple campuses, establishing the first
connection for the state government of South Dakota to the Internet,
and engineering one of the first dorm networks in the region that
connected every dorm room. His research interests include operating
system and network security, intrusion detection, high-performance
computation, and software safety.
WT-1: Protecting Apache
Dave Burgess, UNO, MITRE Corp, Nebraska On-Ramp:
WT-2: ADSL Security for Business
Dave Burgess, UNO, MITRE Corp, Nebraska On-Ramp:
WT-3: ISO 17799
Chet Uber, SecurityPosture:
WT-4: The Mathematics of Anomaly Detection
HighTower Software Inc:
HT-1: Critical Infrastructure Protection
Casey J. Dunlevy is a Senior Member of the Technical Staff
at the Software Engineering Institute (SEI), and is also the Team
Lead for the CERT(r) Analysis Center, which works in close
cooperation with the CERT(r) Coordination Center. Mr. Dunlevy is
currently coordinating the effort to develop methodologies for
predictive analysis of Internet threats. He specializes in strategic
analysis of threats to computer networks; and a significant part of
his work involves analysis of cyber-terrorism, computer network
warfare, and transnational organized crime as well as other
potential threat groups.
Prior to joining the SEI, Mr. Dunlevy was the Chief, Computer
Network Warfare Analysis Branch for U.S. Space Command and the North
American Aerospace Defense Command in Colorado Springs. He has also
worked for the Office of Naval Intelligence, the National Security
Agency, and other intelligence agencies. During his long
intelligence career, Mr. Dunlevy was recognized for work in the
areas of computer network warfare, strategic military analysis,
ballistic missile defense, Indications and Warnings, terrorism, and
crisis response.
Mr. Dunlevy received a BS in political science from the
University of the State of New York and received certifications as a
Russian and German linguist from the Defense Language Institute in
Monterey, California. He was an adjunct professor in international
security affairs at the University of Pittsburgh Graduate School for
Public and International Affairs and is a frequent guest lecturer at
the Heinz School at Carnegie Mellon University. Mr. Dunlevy belongs
to the Society of Competitive Intelligence Professionals (SCIP).
HT-2: Cyberspace Autopsy
Douglas G. Conorich, IBM Global Services: Mr. Conorich is
the Global Solutions Manager for IBM Global Service's Managed
Security Services. In this capacity, he has responsibility for
developing new security offerings, insuring that the current
offerings are standardized globally, and all training of new members
of the MSS team worldwide in how to do "Ethical Hacking" and service
delivery. Mr. Conorich teaches people how to use the latest
vulnerability testing tools to monitor Internet and Internet
connections and develop vulnerably assessments suggesting security
related improvements. Mr. Conorich is also actively engaged in the
research of bugs and vulnerabilities in computer operating systems
and Internet protocols and is involved in the development of
customized alerts notifying clients of new potential risks to
security. Mr. Conorich has over 30 years of experience with computer
security holding a variety of management positions. He joined IBM in
1997. He has held Associate Professor positions at the University of
Wisconsin-Milwaukee, the University of Maryland, Chapman College,
City College of Chicago, and Hartford Community College. He taught
physics, mathematics, solid-state circuit design, and other
computer-related courses. Mr. Conorich has undergraduate degrees in
Physics, Computer Science, and Meteorology and a Masters Degree in
Physics from the University of New Mexico.
HT-3: Directory Security
Alan Mark, Novell, Inc: Alan Mark, Chief Security
Strategist, is celebrating 12 years at Novell, and over 20 years in
the networking industry. During that time, he has worked on many key
projects involving large organizations around the world. Mr. Mark
joined Novell New York in 1990 as a Senior Systems Engineer. He
later moved to Hong Kong to work with Novell's largest customers in
the Pacific Rim. Today he is based at Novell's headquarters in Utah,
and travels around the globe as a Security Strategist. Mr. Mark
addresses thousands of people every year on a wide-variety of
technical and strategic topics, including Internet security
technologies and Internet/intranet design.
HT-4: General UNIX Security
T. Steven Barker, Raytheon Company: Mr. T. Steven Barker,
Raytheon Company: Mr. T. Steven Barker is a senior systems engineer
with Raytheon Company, Command, Control, Communications and
Information Systems in Falls Church, Virginia. Present assignment
includes system security engineering for computer systems developed
for the US Government. Prior to relocating to Falls Church, Mr.
Barker was the lead system engineer for a series of satellite
communications systems that Raytheon developed for the US Air Force
in Omaha, Nebraska. Prior to joining Raytheon (then Hughes Aircraft)
in 1995, He was a systems and software engineer for Lockheed
Missiles and Space Company in Austin, Texas. Here, he worked on
weather imagery ground stations for the Air Force and the Navy. Mr.
Barker's extensive professional history also include technical tasks
with The Analytic Sciences Corporation (TASC) in Reading,
Massachusetts and service in the US Air Force as a meteorologist,
technical instructor, and scientific programmer. Mr. Barker has also
taught college level classes in meteorology, computer programming,
and data communications. Mr. Barker is a Certified Information
Systems Security Professional (CISSP). He also belongs to the
International Electrical and Electronics Engineers (IEEE) and the
IEEE Computer Society.
EXPERT TRACK
TE-1, TE-2: IPTables Connection State Firewall Tutorial
Oskar Andreasson: Oskar Andreasson is currently occupied
as an open source documentation writer, and as the Support Manager
at Multisoft Education AB. Started with a VIC-64 in 1987 and learnt
to code Basic in the late 1980's. He got interested in system and
network security in the beginning of the 1990's. He has since
continued in those tracks. Mr. Andreasson has been a vivid Linux
user and administrator since 1994.
He is the author of "Linux/Unix" as well as "Windows 2000"
courses, and books, available through Multisoft Education. Also
author of the Iptables-tutorial available on the Internet, and
currently working on two new documents, describing ipsysctl and
advanced routing with Linux, that will be available over the
Internet in a few months time.
Mr. Andreasson is currently located and settled down in
Stockholm, Sweden.
TE-3: SNMPv3
Wes Hardaker: Wes Hardaker is a research scientist with
the Labs division of Network Associates where he conducts research
relating to various aspects of Internet security. Currently his work
is focused on the development of a standards based IPsec policy
management system for use in managing complex heterogeneous IPsec
deployments. This project makes heavy use of SNMPv3 security
features and the resulting work will likely be open-sourced.
Wes Hardaker is also the lead developer of the freely available
Net-SNMP package (previously known as the ucd-snmp package), which
is a highly configurable and extensible SNMP toolkit. He actively
participates in the continuing development of the SNMP standard
through his participation at IETF meetings and by developing early
prototypes of new SNMP technologies within the net-snmp toolkit.
TE-4: CISCO SNMPv3 & Security
Matthew G. Marsh, Paktronix: Matthew has worked in network
management and architecture since 1983 specializing in routed
IP/IPX/SNA networks. As President of Paktronix Systems LLC he is
responsible for all research, design, and implementation of the
award winning PakSecured family of Security Products. As Chief
Scientist of the NEbraskaCERT he is very active in researching
IPv4/IPv6/IPSec Integrated Security Networks and giving seminars and
talks on the state of Network Security.
Matthew developed the first (and currently still the only) SNMPv3
managed Policy Routing firewall system for Linux available under GPL
at http://www.paksecured.com His certifications include CISSP, MCNE,
PSRE, and numerous specific technical specializations.
WE-1, WE-2: WWW Hacking, Parts I & II
Amit Klein, Sanctum Inc:
Amit Klein, Director of Security and Audit Practices for Sanctum
Inc. is responsible for defining the security content and audit
service practice for Sanctum's application security product
portfolio. Prior to Sanctum, Mr Klein served in the Israeli army
within the elite R&D unit specializing in mathematical research
and software development. Klein has published several papers
including most recently, Hacker Repellent, SC Magazine May 2002;
Cross Site Scripting Explained; and Combining Model Checking with
Deductive Analysis to Verify Real-Life Software. Mr Klein graduated
Cum Laude with a B.Sc. in Mathematics and Physics from the Hebrew
University of Jerusalem Israel.
WE-3, WE-4: Secure Programming, Parts I & II
Brian Smith, Solutionary, Inc: Brian Smith is Senior
Software Engineer currently contracted to Solutionary, Inc. Brian
did both his graduate and undergraduate work in Computer Science at
the University of South Dakota where he received awards for academic
performance and outstanding contributions to the Computer Science
department. In 1996 Brian was inducted into Upsilon Pi Epsilon the
National Honors society for Computing Sciences. Brian has applied
cryptography to an Internet voting pilot project as well as to
security related projects for Solutionary, Inc.
HE-1, HE-2: HoneyNets & Pots, Parts I & II
Marcus J. Ranum:
HE-3: AI IDS Techniques
Stephen Nugen: Steve Nugen has more than twenty years'
experience developing information system technologies in government,
academic, and private sectors. Education and credentials include
B.S. in Computer Science; M.S. in Computer Engineering; Certified
Information Systems Security Professional; and publications in
Artificial Intelligence and Information Security. Experience
includes Principal Investigator at Iowa State University; Director
of Technology at GTE and Raytheon; Founder and Chief Technical
Officer of NuGenSoft; and teaching.
HE-4: IDS for ISPs
IP Revolution:
MANAGEMENT TRACK
TM-1: RSK-RSK Management
Andrew T. Robinson, NMI Information Security: Andrew T.
Robinson has over seventeen years of experience in information
security, software engineering, and multiplatform integration. Mr.
Robinson developed Internet and BITNET applications at the
University of Maine between 1984 and 1989. Between 1989 and 1990,
Mr. Robinson worked as a network analyst for the Corporation for
Research and Educational Networking (CREN), migrating BITNET nodes
from IBM's NJE networking protocols to a TCP/IP-based
infrastructure. In August 1990, Mr. Robinson returned to Maine and
founded NMI Information Security with CREN as his first customer.
Over the next twelve years, NMI has extended its information
security services to international customers in the banking, nuclear
power, public utility, and insurance industries. NMI specializes in
secure infrastructure design, security planning, and security
testing.
Mr. Robinson has developed a process for developing and
maintaining information security policies called RAPID (rapid
adaptation process for infosecurity deployment), and in conjunction
with other investigators at NMI has developed a process for
measuring information security risk called RSK
(Robinson/Slobodzian/Krikken).
TM-2: Internet Anonymity
Aaron Grothe: Aaron Grothe is the President/CEO of
Heimdall Linux Incorporated http://www.heimdall-linux.com/.
Heimdall Linux is developing Linux products, which are being
submitted to the National Institute of Standards and Technology's
Common Criteria project for independent security evaluation and
accreditation. Mr. Grothe is also the current project leader of the
Linux Kernel Audit Project (LKAP), which has as one of its goals to
perform a source code audit of the Linux Kernel.
TM-3: HIPAA Overview
Jim Bridges,
TM-4: Security Policies
Dr. Bruce V. Hartley, Privisec Inc. Dr. Bruce Hartley has
more than 20 years of technical and managerial experience in
systems, software and security engineering. He serves as the chair
of the technical advisory board at Noochee Solutions, formerly DMW
Worldwide, Inc. He was previously the executive vice president and
chief operating officer at DMW Worldwide, as well as senior vice
president and chief technology officer at Trident Data Systems prior
to DMW. His experience includes managing rapid-growth technology
companies and creating leading-edge software products. In addition,
Dr. Hartley's expertise includes security risk analyses, technical
vulnerability assessments, and security tests and evaluations, as
well as managing large-scale system integration efforts and
supporting government/industry system security initiatives. He is
recognized as an industry expert, frequently serving as a panel
speaker and roundtable representative at conferences and seminars.
In addition, Dr. Hartley is recognized by the National Computer
Security Center as a Vendor Security Analyst and has been certified
by the ISC2 as a Certified Information System Security Professional
(CISSP).
Dr. Hartley's teaching experience includes graduate-level
university instruction, and training for commercial employers and
government agencies. He has supported the development of several
specialized training courses in both the private and government
sectors.
Bruce Hartley holds a doctorate degree in computer science from
Colorado Technical University in Colorado Springs, Colorado, and a
master's degree in computer data management from Webster University
in St. Louis, Missouri. In addition, Dr. Hartley holds a bachelor's
degree in technical management and computer science and an associate
degree in business administration from Regis College in Denver,
Colorado. He also holds an associate degree in electronic computer
technology from the Community College of the Air Force.
WM-1: Incident Management
Douglas G. Conorich, IBM Global Services: Douglas G.
Conorich, IBM Global Services: Mr. Conorich is the Global
Solutions Manager for IBM Global Service's Managed Security
Services. In this capacity, he has responsibility for developing new
security offerings, insuring that the current offerings are
standardized globally, and all training of new members of the MSS
team worldwide in how to do "Ethical Hacking" and service delivery.
Mr. Conorich teaches people how to use the latest vulnerability
testing tools to monitor Internet and Internet connections and
develop vulnerably assessments suggesting security related
improvements. Mr. Conorich is also actively engaged in the research
of bugs and vulnerabilities in computer operating systems and
Internet protocols and is involved in the development of customized
alerts notifying clients of new potential risks to security. Mr.
Conorich has over 30 years of experience with computer security
holding a variety of management positions. He joined IBM in 1997. He
has held Associate Professor positions at the University of
Wisconsin-Milwaukee, the University of Maryland, Chapman College,
City College of Chicago, and Hartford Community College. He taught
physics, mathematics, solid-state circuit design, and other
computer-related courses. Mr. Conorich has undergraduate degrees in
Physics, Computer Science, and Meteorology and a Masters Degree in
Physics from the University of New Mexico.
WM-2:
WM-3: Vulnerability Disclosure
Elias Levy: Elias Levy is chief technology officer and a
co-founder of SecurityFocus, responsible for overall site
operations. He is a well-respected and sought after computer
security spokesperson and visionary. Elias learned security working
for several large US corporations and also has insider experience
from his working with the security community as the former moderator
and keeper of the Bugtraq vulnerability database and mailing list.
His seven years of experience with Bugtraq gave him a daily pulse on
the strengths and weaknesses in security. Last year Elias Levy was
chosen as one of Network Computing's "10 Most Important People of
the Decade."
WM-4: Ethical Hacking
Dr. Bruce V. Hartley Dr. Bruce Hartley has more than 20
years of technical and managerial experience in systems, software
and security engineering. He serves as the chair of the technical
advisory board at Noochee Solutions, formerly DMW Worldwide, Inc. He
was previously the executive vice president and chief operating
officer at DMW Worldwide, as well as senior vice president and chief
technology officer at Trident Data Systems prior to DMW. His
experience includes managing rapid-growth technology companies and
creating leading-edge software products. In addition, Dr. Hartley's
expertise includes security risk analyses, technical vulnerability
assessments, and security tests and evaluations, as well as managing
large-scale system integration efforts and supporting
government/industry system security initiatives. He is recognized as
an industry expert, frequently serving as a panel speaker and
roundtable representative at conferences and seminars. In addition,
Dr. Hartley is recognized by the National Computer Security Center
as a Vendor Security Analyst and has been certified by the ISC2 as a
Certified Information System Security Professional (CISSP). Dr.
Hartley's teaching experience includes graduate-level university
instruction, and training for commercial employers and government
agencies. He has supported the development of several specialized
training courses in both the private and government sectors. Bruce
Hartley holds a doctorate degree in computer science from Colorado
Technical University in Colorado Springs, Colorado, and a master's
degree in computer data management from Webster University in St.
Louis, Missouri. In addition, Dr. Hartley holds a bachelor's degree
in technical management and computer science and an associate degree
in business administration from Regis College in Denver, Colorado.
He also holds an associate degree in electronic computer technology
from the Community College of the Air Force.
HM-1: Writing Security Policies
Douglas G. Conorich, IBM Global Services: Douglas G.
Conorich, IBM Global Services: Mr. Conorich is the Global
Solutions Manager for IBM Global Service's Managed Security
Services. In this capacity, he has responsibility for developing new
security offerings, insuring that the current offerings are
standardized globally, and all training of new members of the MSS
team worldwide in how to do "Ethical Hacking" and service delivery.
Mr. Conorich teaches people how to use the latest vulnerability
testing tools to monitor Internet and Internet connections and
develop vulnerably assessments suggesting security related
improvements. Mr. Conorich is also actively engaged in the research
of bugs and vulnerabilities in computer operating systems and
Internet protocols and is involved in the development of customized
alerts notifying clients of new potential risks to security. Mr.
Conorich has over 30 years of experience with computer security
holding a variety of management positions. He joined IBM in 1997. He
has held Associate Professor positions at the University of
Wisconsin-Milwaukee, the University of Maryland, Chapman College,
City College of Chicago, and Hartford Community College. He taught
physics, mathematics, solid-state circuit design, and other
computer-related courses. Mr. Conorich has undergraduate degrees in
Physics, Computer Science, and Meteorology and a Masters Degree in
Physics from the University of New Mexico.
HM-2: Security in Local & State Goverments
Ron Woerner, CISSP
HM-3: Passwords Weak Link
Erik Hjelmstad, PoliVec, Inc. Erik Hjelmstad, PoliVec,
Inc: Erik Hjelmstad has over eight years of network engineering,
security engineering, and system administration experience. He has a
vast knowledge of NT and UNIX security issues and has led several
remote penetration and security assessment engagements. Erik also
has extensive experience with Checkpoint Firewall-1 and has assisted
with the installation, configuration, and monitoring of several
different Firewall-1 systems. He is a Checkpoint Certified Systems
Administrator (CCSA) and a Checkpoint Certified Systems Engineer
(CCSE). Erik is one of the authors of the open source pwdump3 and
pwdump3e products and he has been published in numerous
security-oriented publications, such as Business Security Advisor.
Erik holds a Bachelor of Science degree in Electrical Engineering
from the Colorado School of Mines in Golden, Colorado and a Master
of Science degree in Computer Science from Colorado Technical
University. Erik has been certified by the ISC2 as a Certified
Information System Security Professional (CISSP).
HM-4: Incident Response Teams
Marty Gillespie, CISSP: Marty Gillespie is a Certified
Information Systems Security Professional (CISSP) and a Check Point
Certified Systems Engineer (CCSE), and is currently working as an
independent consultant. Marty has over sixteen years computer
security and networking experience for such companies as Lucent
Technologies, Cabletron Systems, U. S. Force and a number of
government contractors
WIRELESS TRACK
TW-1, TW-2: Wireless Security Architecture
Doug De Yong, Enterasys
Doug De Yong, CISSP: Doug is a Senior Sales Engineering
Consultant with Enterasys Networks. He is a Certified Information
Systems Security Professional (CISSP), a Check Point Certified
Systems Engineer (CCSE), the first Enterasys Secure Harbour Systems
Engineer (ESSE), and a Spectrum Solutions Engineer (SSE). Doug has
been working with Enterasys for over 5 years helping to design and
secure some of the largest corporate and educational networks in the
Midwest. He has over two decades of computer security, networking
and information technology experience for such organizations as
USAF, Kentucky Department of Education, Jewish Hospital, and most of
the Kentucky State Universities.
TW-3, TW-4: Hands-On Wireless Lab, Parts I & II
Brian Roberson, OLUG President/Founder: Brian Roberson is
the President and Founder of the Omaha area Linux User Group where
he actively participates in bi-weekly meeting's performing
demonstrations and instruction on various UNIX and Open Source
topics. Brian's formal career is at West Interactive where he is the
Sr. Network Engineer. His primary responsibility is engineering,
designing and implementing data networks for the largest IVR
platform in the US, and soon to be the World. He single handedly
developed a network based intrusion detection system integrating
Open Source and commercial products that truly complement every
aspect of NIDS. Brian is active in various GNU projects such as
SAMBA, an SMB server for UNIX.
WW-1: Wireless & IPSec
Matthew Marsh: Chief Scientist of the NEbraskaCERT,
President & Founder of Paktronix Systems LLC, Author of "Policy
Routing with Linux", Author of "Managing Secure Networks", Creator
of PakSecured Linux. Working with networks since 1983. Obtained
admin on my first VAXen in 1976, on Arpa/Bit Net in 1984 (think
Internet), working in Network Management since late 1980's on routed
IP/IPX/SNA networks. Chief Scientist of the NEbraskaCERT working on
IPv4/IPv6/IPSec Integrated Security Networks. Developed the first
(and currently still the only) SNMPv3 managed policy routing
firewall system for Linux available under GPL at http://www.paksecured.com/.
Actively researching management and design of Integrated Security
Networks.
WW-2: Wireless Snooping
Brian Roberson, OLUG President/Founder: Brian Roberson is
the President and Founder of the Omaha area Linux User Group where
he actively participates in bi-weekly meeting's performing
demonstrations and instruction on various UNIX and Open Source
topics. Brian's formal career is at West Interactive where he is the
Sr. Network Engineer. His primary responsibility is engineering,
designing and implementing data networks for the largest IVR
platform in the US, and soon to be the World. He single handedly
developed a network based intrusion detection system integrating
Open Source and commercial products that truly complement every
aspect of NIDS. Brian is active in various GNU projects such as
SAMBA, an SMB server for UNIX.
WW-3: Wireless Internet Threats
TBD
WW-4: Wireless Security
Ashok Fichadia, Union Pacific Railroad: Ashok Fichadia
currently manages the information systems audits for a Fortune 500
company. He has conducts and supervises technical audits for several
platforms and networks and is frequently consulted on various
security issues. He is an IIA certified instructor and has taught
"Auditing Information Systems" for the Institute of Internal
Auditors. He is currently teaching a course on "Information
Security" to graduate students at the University of Kansas. In
addition, he has demonstrated several hacking techniques and
countermeasures to students and faculty members at various
universities. Ashok has an MBA and an MS from University of Kansas
and is CISA certified.
HW-1, HW-2: Wireless Security Demo, Parts I & II
James Nelson
HW-3: Joan Ross, enCircle Corp Joan Ross, CISSP is the
President/Founder of enCircle Corporation.
HW-4 Jeff Guilfoyle, VP e-Security, Solutionary, Inc:
Jeffrey Guilfoyle is a founding partner and Vice President of
e-Security for Solutionary, Inc. Jeff, a Certified Information
Systems Security Professional (CISSP), is responsible for research
and development of products, networks, systems, policies and
procedures as they relate to security. Jeff has experience with a
wide range of physical and logical security components, and is
active in the implementation of new technologies into Solutionary's
Security Operations Center, including a voice over IP phone system,
smart cards and biometric authentication. He also has over 10 years
of experience in data communications, technical sales, customer
support and management, through his employment at EMC Corporation,
Bay Networks (now Nortel Networks) and ITI Marketing Services. Jeff
is a Cisco Certified Network Associate and Nortel Networks Certified
Support and Design Specialist. He is also a member of the FBI Omaha
Chapter of InfraGard. |