PROGRAM
Speakers – IT-DEFENSE 2012 |
Further information to the speakers will follow after release.
Chris Gates | |
Chris joined LARES in 2011 as a Partner & Principal Security Consultant. Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (regular pentesting teams too). Chris holds a BS in Computer Science and Geospatial Information Science from the United States Military Academy at West Point and holds his... redacted...no one cares anyway. In the past, he has spoken at the United States Military Academy, BlackHat, DefCon, Derbycon, Toorcon, Brucon, Troopers, SOURCE Boston, OWASP AppSec DC, ChicagoCon, NotaCon, and CSI. He is a Co-Founder of NoVA Hackers and he is a regular blogger carnal0wnage.attackresearch.com. Twitter: @carnal0wnage |
Felix 'FX' Lindner | |
Felix 'FX' Lindner is the founder as well as the technical and research lead of Recurity Labs GmbH, a high-end security consulting and research team, specializing in code analysis and design of secure systems and protocols. Well known within the computer security community, he has presented his research for over a decade at conferences worldwide. Felix holds a title as German State-Certified Technical Assistant for Informatics and Information Technology as well as Certified Information Systems Security Professional, is highly specialized in digital attack technologies, but recently changed the direction of his research to defense, since the later seems to be a lot less fun. |
Jayson E. Street | |
Jayson E. Street in the author of the book “Dissecting the hack: The F0rb1dd3n Network” plus creator of the site http://dissectingthehack.com. He's also spoken at DEFCON, BRUCON, UCON & at several other ‘CONs & colleges on a variety of Information Security subjects. His life story can be found on Google under “Jayson E. Street”.He's a highly carbonated speaker who has partaken of Pizza from Beijing to Brazil. He does not expect anybody to still be reading this far but if they are please note he was chosen as one of Time’s persons of the year for 2006. |
Andreas Wiegenstein | |
Andreas Wiegenstein has been working as a professional SAP security consultant since 2003 years. He performed countless SAP code audits and has been researching security defects specific to SAP / ABAP applications. He leads the CodeProfiler Research Labs at Virtual Forge, a team focusing on SAP/ABAP specific vulnerabilities and countermeasures. At the CodeProfiler Labs, he works on ABAP security guidelines, ABAP security trainings, an ABAP security scanner as well as white papers and publications. Andreas has trained large companies and defense organizations on ABAP security and has spoken at SAP TechEd on several occasions as well as at security conferences such as BlackHat, HITB, Troopers and RSA. He is co-author of the first book on ABAP security (SAP Press 2009). He is also a founding member of BIZEC.org, the Business Security community. |
Volker Kozok | |
Lieutenant-Colonel Volker Kozok works in the German Federal Ministry of Defence as an official for the Commissioner for Data Protection in the German Armed Forces. For many years he held various positions as an IT Security Officer and oversaw the 11-month training of the Computer Emergency Response Team of the German Armed Forces as a training manager in 2001. As an IT Forensic Investigator and Security Analyst he focuses on reviewing and evaluating complex IT systems, on network analysis and on auditing. Based on his work for national and international teams on cyber security and his close ties toU.S.authorities, he dealt extensively with the issues of cyber security and cyber crime, focusing on risk management and analysis of network-based attacks. In addition to his work, he is a frequent speaker at specialist conferences and conducts awareness training courses in the German Armed Forces and external organizations. |
Charlie Miller | |
Charlie Miller is currently on the Product Security Team at Twitter. Previously he had been a consultant at Accuvant Labs and Independent Security Evaluators. He was the first with a public remote exploit for both the iPhone and the G1 Android phone. He is a four time winner of the CanSecWest Pwn2Own competition. He has hacked batteries, Second Life, and iOS codesigning. He has authored three information security books and holds a PhD from the University of Notre Dame |
Dawn Cappelli | |
Dawn Cappelli, CISSP, is Technical Manager of CERT’s Enterprise Threat and Vulnerability Management Team and the CERT Insider Threat Center at Carnegie Mellon University's Software Engineering Institute. Her team’s mission is to assist organizations in improving their security posture and incident response capability by researching technical threat areas; developing and conducting information security assessments; and providing information, solutions and training for preventing, detecting, and responding to illicit activity. Team members are domain experts in insider threat and incident response. Team capabilities include threat analysis and modeling; development of insider threat controls, workshops, and exercises. Dawn has over 30 years experience in software engineering, technical project management, information security, and research. She is often an invited speaker at national and international venues, is adjunct professor in Carnegie Mellon’s Heinz College of Public Policy and Management and Vice-Chair for the CERT Computer Security Incident Handler Certification Advisory Board. She is on the program committee for the RSA and HICSS conferences, and was recently awarded the Software Engineering Institute Director's Office Award of Excellence. Before joining CMU in 1988 she worked for Westinghouse as a software engineer developing nuclear power systems. |
Stephan Gerhager is Information Security Officer at Allianz. Before he has served as E.ON Energie’s Information Security Officer he spent six years in the IT security group at Audi where he specialized in web application security and hacking technologies. Since 2010 he focuses his research on Security in Smart Grids. He has worked in software development and security since 1995. |
Nico Golde | |
Nico Golde is currently a Ph.D. student in the Department of Telecommunications Security at Berlin's Technical University. During the last few years he has mainly dealt with mobile security. Here, he has mainly been interested in SMS client implementations of various telephone manufacturers and in the security of the increasingly popular femtocell technology. In the past, he spoke, among others, at the HITB, Blackhat, CanSecWest and CCC conferences. |
Ira Winkler | |
Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. Ira is also author of the riveting, entertaining, and educational books, Spies Among Us and Zen and the Art of Information Security. He is also a columnist for ComputerWorld and writes for several other industry publications. Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved onto support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland. Mr. Winkler has also written the book Corporate Espionage, which has been described as the bible of the Information Security field, and the bestselling Through the Eyes of the Enemy. Both books address the threats that companies face protecting their information. He has also written hundreds of professional and trade articles. He has been featured and frequently appears on TV on every continent. He has also been featured in magazines and newspapers including Forbes, USA Today, Wall Street Journal, San Francisco Chronicle, Washington Post, Planet Internet, and Business 2.0. |
Tim Burrell | |
Tim Burrell joined the Microsoft Security Engineering Center within the Trustworthy Computing group in 2006. He is one of the original members of the security science team there, whose aims include developing scalable and innovative ways of improving software security. His main areas of interest are:
|
Han Fey | |
Han Fey works at the R&D department of Assa Abloy in Berlin. He is also active as an external advisor and lock-distributer for HFL (Han Fey Lock-technologies). |
Barry Wels earned his nickname “The Key” when he started picking locks around 1985. As cofounder of the infamous hacker magazine Hack-Tic, he had a logical place to publish articles on lockpicking in the early 1990s. He is one of the founders and president of Toool, a pioneering lockpick sportgroup in the Netherlands. Toool stands for The Open Organization Of Lockpickers. As of October 2012 Barry devotes all his time to WSS (Wels Security Solutions BV). WSS trainings, seminars, R&D, pentesting, forensic lock research and more. |
Daniele Bianco | |
Daniele Bianco began his professional career as a system administrator in scientific organizations. His interest in centralized management and software integration in Open Source environments has focused his work on design and development of suitable R&D infrastructures. One of his passions has always been exploring hardware and electronic devices. Currently he is Inverse Path's resident Hardware Hacker. His primary activities focus on hardware customization, embedded system integration and the design of remote monitoring networks for M2M infrastructures. He is an active contributor to the Open Source community and an invited speaker at many international IT security events. |
Andrea Barisani | |
Andrea Barisani is an internationally known security researcher. Since owning his first Commodore-64 he has never stopped studying new technologies, developing unconventional attack vectors and exploring what makes things tick...and break. His experiences focus on large-scale infrastructure administration and defense, forensic analysis, penetration testing and software development, with more than 10 years of professional experience in security consulting. Being an active member of the international Open Source and security community he contributed to several projects, books and open standards. He is now the founder and coordinator of the oCERT effort, the Open Source Computer Emergency Response Team. He has been a speaker and trainer at BlackHat, CanSecWest, DEFCON, Hack In The Box, PacSec conferences among many others, speaking about TEMPEST attacks, SatNav hacking, 0-days, OS hardening and many other topics. |