
| Jesse Burn | |
|
Jesse Burn |
Jesse Burns is a Managing Security Architect with @stake, the premier digital security company. Jesse is a member of @stake's Wireless and Application Centers of Excellence, a software developer, and a security consultant. Jesse's recent work focuses on application security, cryptography, and network infrastructure. Prior to working for @stake Jesse was a developer working on the backend business applications and trading systems of a major financial services corporation. |
| Yann Berthier | |
|
Yann Berthier |
Yann is a network security consultant working for HSC <http://www.hsc.fr/>, a french consulting agency. The need to dig through big amounts of network traces during forensic analysis led him to look at the tools used for years by the network community. His interest for NetFlow applications has not diminished since then. He his a member of the French Honeynet Project <http://honeynet.rstack.org/> where he has also the opportunity to do network forensics. |
| Philippe Biondi | |
|
Philippe Biondi |
Philippe Biondi is a security expert and a security consultant working for Arche Omnetica Group in France. He is member of the French Honeynet Project. He was co-author of LIDS (http://www.lids.org). He is the author of Scapy (http://www.secdev.org/projects/scapy) and Shellforge (http://www.secdev.org/projects/shellforge) and a lot of other tools (http://www.secdev.org/). He wrote several article for MISC, a french security magazine. |
| Matthew "shok" Conover | |
|
Matthew "shok" Conover |
Matthew is a senior security researcher at Symantec and a student of mathematics and computer science at the University of California. He is well respected as a long-time security researcher, and a pre-eminent authority in the field. He has previously presented at CanSecWest, SANS, and the University of Utah. |
| Himanshu Dwivedi | |
|
Himanshu Dwivedi |
Himanshu Dwivedi is the Regional Technical Director in the San Francisco office of @stake, Inc. At @stake, Himanshu leads the Storage Center of Excellence (CoE), which focuses research and training around storage technology, including Network Attached Storage (NAS) and Storage Area Networks (SAN). Himanshu is considered an industry expert in the area of SAN security, specifically Fibre Channel Security. Himanshu has given numerous presentations and workshops regarding the security in SANs, including the SNIA Security Summit, BlackHat Security Conference, Storage Networking World, TechTarget, the Fibre Channel Conference, SAN-West, SAN-East, etc. Himanshu currently has a patent pending on a storage design architecture that he co-developed with other @stake professionals (U.S. Patent Serial No. 10/198,728). Additionally, Himanshu has written two published books and has written a storage security chapter on a third. The book titles include The Complete Storage Reference - Chapter 25 (McGraw-Hill/Osborne), Storage Security Handbook (Neoscale Publishing), and Implementing SSH: Strategies for Optimizing the Secure Shell (Wiley Publishing). Furthermore, Himanshu has also published two white papers. The first white paper Himanshu wrote is titled "Storage Security" (http://www.atstake.com/research/reports/index.html) and "Securing Intellectual Property" (http://www.vsi.org/cgiscripts/ippwp3request.htm). |
| Nicolas Fischbach | |
|
Nicolas Fischbach |
Nicolas Fischbach is a Senior Manager, in charge of the European Network Security Engineering team at COLT Telecom, a leading pan-European provider of end-to-end business communications services. He holds an Engineer degree in Networking and Distributed Computing and is a recognized authority on Service Provider infrastructure security and denial-of-service attacks mitigation. Nicolas is co-founder of http://www.securite.org/, a French-speaking portal on computer and network security, of, an informal security research group and of the http://www.frenchhoneynet.org/ of http://www.honeynet.org/. He has presented at numerous technical and security conferences, teaches networking and security courses at various universities and engineering schools, and is a regular contributor to the French security magazine http://www.miscmag.com/. |
| The Grugq | |
|
The Grugq |
The Grugq has been researching anti-forensics for almost 5 years. Grugq has worked to secure the networks and hosts of global corporations, and he's also worked for security consulting companies. His work as a security consultant was cut short by the publication of an article on anti-forensics. Currently, he slaves for a start-up, designing and writing IPS software. Grugq has presented to the UK's largest forensic practitioner group where he scared the police. In his spare time, Grugq likes to drink and rant. |
| Jake Kouns | |
|
Jake Kouns |
Jake Kouns is the leader of the Open Source Vulnerability Database project. In this role Jake focuses on the strategic direction the project, works to streamline many processes, and is also acting as lead backend moderator. In addition, Jake is co-founder and President of the Open Security Foundation. Jake is a business-focused network security and information risk management specialist with an extensive knowledge base and international experience. Mr. Kouns is currently a Senior Network Security Manager for a Fortune 200 financial institution, where he provides technical management, consulting, architecture and design implementation for a wide array of security mitigating strategies. He holds both a Bachelor of Business Administration with a concentration in Computer Information Systems and a Master of Business Administration with a concentration in Information Security from James Madison University. He also holds numerous certifications including ISC2's CISSP, ISACA's CISM, Cisco's CCNA, Check Point's CCSPA/CCSA/CCSE and Planet3's CWNA. |
| Theo de Raadt | |
|
Theo de Raadt |
Theo de Raadt has been involved with free Unix operating systems since 1990 (Minix!) and then became one of the founders and prime developers of NetBSD. In 1995 Theo created the OpenBSD project, creating a free Unix that focuses primarily on security technologies. A few years later he also started the OpenSSH project (the most deployed Open Source software). Theo works full time on advancing OpenBSD, OpenSSH, and any technology, which enhances free Unix security. |
| Dug Song | |
|
Dug Song |
Dug Song is Principal Security Architect at Arbor Networks, where he is responsible for the research and development of Arbor's network security products deployed at Tier 1 service provider, Fortune 100 enterprise, and government and defense networks around the world. Before joining Arbor, Dug was a Research Scientist at the University of Michigan's Center for Information Technology Integration, where his work focused on distributed file systems, security middleware, and network auditing and penetration techniques. Previously, he was Senior Security Engineer at Anzen Computing, where he led the development of a network anomaly detection system, and consulted for various Fortune 100, government, and defense clients. Dug is the author of several popular network penetration-testing tools, and a contributor to other open-source security software projects. He is also a founding member of monkey.org, an international online monkey cult. |
| Greg Taleck | |
|
Greg Taleck |
Greg has worked in a number of network/security-related positions, most currently, has been with NFR Security since 2001 as the primary developer of the network stack for its intrusion detection sensors product line. He has a B.S. Computer Engineering, University of Washington, 1998 and a M.S. Computer Science, University of Washington, 2001. He is a instructor for Networking Technologies Class at U of W, and has presented at RAID 2003. |
| Paul (Tony) Watson | |
|
Paul (Tony) Watson |
Paul made headlines not too long ago when he discovered and published a critical vulnerability in TCP which allows remote attackers to terminate network sessions. Paul has been involved in Information Security for more than a decade, performing Infosec work for a variety of employers including the US Air Force, Iridium LLC, CapitalOne Financial, VeriSign, and Rockwell Automation. ISACA - CISSP, ISC2 - CISM, MCSE+Security, CCSP, CCSA/CCSE, CCNA, etc. |
| Anthony Zboralski | |
|
Anthony Zboralski |
Anthony Zboralski leads Bellua Asia Pacific, an Information Security consulting company based In Jakarta, Indonesia. He has more than 9 years of experience performing penetration tests, assessments, forensics and related services for some of the largest banks in Asia and a dozen Fortune 500 companies including Aerospatiale, Air France, Allianz, AXA, Electricite de France, Lagardere-Matra... Also known as "gaius", cofounder of the Hacker Emergency Response Team (hert.org); Anthony got involved into security & hacking back in 1989 (x25, social eng., etc.) |
| Emmanuel Gadaix | |
|
Emmanuel Gadaix |
Emmanuel has been involved in the information security and telecommunications fields for over 12 years. Originally from western Europe, Emmanuel has been living in Southeast-Asia since 1993. After few years spent at Nokia commissioning mobile networks' NMS and IN systems, he started his own security consulting company in 1997, which eventually got acquired by TruSucker^H^H^H^H^Hecure in 2001. Emmanuel now runs the Telecom Security Task Force, a specialized research firm focusing on GSM, GPRS and 3G/UMTS security. Personal interests included SS7 signalling, VoIP protocols and legacy X.25 networks." |
| SK Chong | |
|
SK Chong |
SK is the Co-Founder and (a) Security Consultant of SCAN Associates. Hacking into banks, ISP, military and government sectors is part of his job. He wrote a few security whitepapers on how to break network with SQL Injection, Buffer Overflow, Shellcode and stuff, including one of which published in Phrack E-zine #62. His presentation was heard in Blackhat (Singapore) 2003, RuxC0n2004 (Australia) and XCon2004 (China). He enjoy playing Capture the Flag game, and was in a team that won several CtF games from HITB2002 and Blackhat Asia 2003. |











