BRUCE
SCHNEIER
Internationally renowned security technologist and author
Bruce Schneier is the Founder and the Chief Technical Officer
of Counterpane Internet Security, Inc., the world leader in
Managed Security Monitoring. Counterpane provides security
monitoring services to Fortune 2000 companies world-wide.
He is the author of six books on security and cryptography,
including the security best seller, "Secrets & Lies:
Digital Security in a Networked World." His first book,
"Applied Cryptography," has sold over 150,000 copies
world-wide, and is the definitive work in the field. Schneier
designed the Blowfish and Twofish encryption algorithms, and
writes the influential "Crypto-Gram" monthly newsletter.
He is a frequent lecturer on computer security and cryptography. |
|
JAYA
BALOO
Jaya Baloo (CCNP, CISSP) has been working
in InfoSec for 5 years, starting at Unisource in The Netherlands.
After moving to KPN Telecom, she has worked internationally
for the Dutch Telecom Operator in Namibia, Egypt, Germany,
and Costa Rica designing secure IP infrastructures for national
operators. More recently she has worked in Prague for Czech
Telecom on Lawful Interception. |
|
JAMES
BAMFORD
James Bamford, leading authority on the
Intelligence Services here and around the world, is the author
of Body of Secrets: Anatomy of the Ultra-Secret National Security
Agency from the Cold War Through the Dawn of a New Century,
(Doubleday 4/01), a national bestseller. Bamford discusses
the NSA, it's 37,000 employees and it's $30 billion budget
in light of the recent terrorist attacks, which he calls "the
biggest intelligence disaster since Pearl Harbor". Telling
the tale of the tragedy from an intelligence perspective,
his insights on what went wrong and how to go forward with
a successful intelligence program are timely, thought provoking
and unique.
He was until recently Washington Investigative
Producer for ABC's "World News Tonight" with Peter
Jennings and has written investigative cover stories for the
New York Times Magazine, the Washington Post Magazine, and
the Los Angeles Times Magazine. He also authored, The Puzzle
Palace: A Report on the NSA, America's Most Secret Agency
(Viking 1983), also a national bestseller |
|
JOHN
T. DRAPER – CAPTAIN CRUNCH
An original member of the now famous
"Homebrew Computer Club", Mr. Draper (AKA Captain
Crunch), has over 30 years of programming and security expertise.
Widely known as the first security pioneer,
Mr. Draper became interested while learning how to penetrate
phone networks. He now uses his penetration skills to test
the vulnerabilities in computer networks, and make sure our
firewall is as un-crackable as possible.
While serving in the USAF, he worked
on long range radar and radio equipment used for encryption.
After a stint with American Astrionics, designing high speed
Operation Amplifiers for precision missile guidance, he worked
as an Engineering Technician at National Semiconductor.
Mr. Draper then worked for Cartravision,
designing the first Cartridge Video Recorders, predating VCR's
by 10 years. After forming a small company making and selling
audio distortion test equipment, he worked as Chief Engineer
for KPER Radio until hired by Hugle International in 1972
to design the first cordless phone. This led to another small
company formed by Mr. Draper, in which he developed the first
encryption phone.
He has been an innovator, writing high-speed
analog encryption programs, specialized chebychev and butterworth
filter circuit programs, and some of the first CAD programs.
He then wrote the first cross-assemblers used in writing Assembly
Language for the 8080, 6502, 1802, and 6800 chips.
At the Homebrew Computer Club, Mr. Draper
designed his own computers and helped create the "Blue
Box" tone generator. Introducing, among others, Steve
Wozniak and Steve Jobs to the computing world, and a generation
of hackers to the glorious concept of "phone phreaking",
spawning the worldwide "2600" clubs. His work with
Jobs and Wozniak led him to become the 13th employee of Apple
computers, designing telephone interface boards, and developing
both hardware and software for the Apple II.
Mr. Draper implemented the first FORTH
language on the Apple II, utilizing it to write a word processor.
After modifying it for commercial sale, Easy Writer, the world's
first word processor was born. It took him only 20 minutes
to port FORTH to the PC, and 48 hours later, Easy Writer was
delivered to IBM, beating out Bill Gates and the early Microsoft
team on the project. While working for IBM, Mr. Draper created
the "Virtual Machine Interface", a screen and keyboard
driver.
All the while, he was refining and honing
his security skills, penetrating systems at a time when it
was considered more exploratory and helpful, rather than harmful
to the industry. He then continued his work with Computer
Aided Design, porting AutoCAD to the Apollo DN-3000, Sun,
and Macintosh. While working with the "Future Group",
an elite group of programmers, Mr. Draper developed 3D GUI's
(Graphic User Interfaces), which led him to designing visual
user interfaces for the Macintosh used to write "Screenplay",
a story boarding and scripting program utilized by movie producers
in Hollywood.
He is now a sought after Security consultant
and Conference speaker, and has been touring the security
conference circuit for years. His security expertise has led
him to appearances on Nightline, Good Morning America and
various radio shows nationwide, most recently on CNET radio
in San Francisco, and The Learning Channel (The secret life
of hackers).
Draper has appeared on A&E, and recently
did a documentary for Channel Four in England. You can find
him on the Discovery Channel Hall of Fame, further entrenching
him as one of the true innovators of the industry. A co-founder
of ShopIP, Mr. Draper performs security audits and is an architect
of the CrunchBox firewall/IPS system. He also does database,
Python, and secure GUI programming for SpamCruncher and CrunchBox.
|
|
FYODOR
Fyodor authored the popular Nmap Security
Scanner, which was named security tool of the year by Linux
Journal, Info World, and the Codetalker Digest. He also maintains
the Insecure.Org security resource site and has authored seminal
papers detailing techniques for stealth portscanning, remote
operating system detection via TCP/IP stack fingerprinting,
and the IPID Idle Scan. He is a member of the Honeynet project
and a co-author of "Know Your Enemy: Honeynets". |
|
VOLKER
KOZOK
Lieutenant colonel Volker Kozok works as IT security expert
in the department of military base in the troops office in
Bonn. In his field he is responsible for the supervision and
control of IT security in 200 national and international offices
and IT security of the troops contingents.
As network specialist and security analyst the main aspect
of his tasks is in network security and in the field of computer
network operations. In 2001 he was chief instructor of the
11 months training period of the new computer emergeny response
team and he was involved in planning and organizing the office.
He is a member of national and international workgroups on
IT security. Since 1980 he has been lieutenant colonel in
the German army. |
|
Dr.
RUDOLF KREUTZER
After studying material science at the
University of Erlangen-Nürnberg, Dr. Kreutzer began work
at the Allianz Zentrum für Technik GmbH in Ismaning in
1977. He first worked in the field of scientific investigation
into the causes and prevention of damage and later focused
on the analysis and continued development of risk management
in large companies and the analysis of future risks.
Since 1996 he has been the head of the
Center of Competence for Risk Management and has been responsible
for his own consulting on such subjects as risk management,
security, future risks, strategy, success and issues of meaning. |
|
AARON
C. NEWMAN
Widely regarded as one of the world's
foremost database security experts, Aaron is the co-author
of the Oracle Security Handbook, printed by Oracle press.
Aaron has delivered presentations on application security
to organizations around the country and has written several
white papers on the subject.
Aaron C. Newman is Co-Founder and the
Chief Technology Officer of Application Security, Inc. (AppSecInc).
In his current role, Aaron is responsible for defining the
overall AppSecInc product vision.
Prior to AppSecInc, Aaron pioneered the
database vulnerability assessment market by co-founding DbSecure,
Inc. At DbSecure, Aaron played the role of both CEO and CTO.
Aaron led the acquisition of DbSecure by the publicly-traded
company Internet Security Systems (ISS) in 1998. After the
acquisition of DbSecure, Aaron assumed the role of managing
development of database security solutions at ISS.
Aaron also founded the consulting firm
ACN Software Systems, Inc. ACN Software Systems provided development
services specializing in security software. ACN Software Systems
developed both intrusion detection and security assessment
solutions for Windows NT.
Aaron has held several other positions
in the technology market including managing the development
of applications for Banker's Trust and as an IT consultant
with Price Waterhouse. |
|
MARTIN
RÖSCH
Martin Rösch has 14 years industry experience in network
security and embedded systems engineering, is also the author
and lead developer of the Snort™ Intrusion Detection
System (www.snort.org) that forms the foundation for the Sourcefire
product suite.
Over the past seven years, Martin has developed various network
security tools and technologies, including intrusion detection
systems, honeypots, network scanners, and policy enforcement
systems for organizations such as GTE Internetworking, Stanford
Telecommunications, Inc., and the Department of Defense. He
has applied his knowledge of network security to penetration
testing and network forensics for numerous government and
large corporate customers. Martin has been interviewed as
an industry expert in multiple technology publications, as
well as print and online news services such as MSNBC, Wall
Street Journal, CNET, ZDNet, and numerous books. SnortTM has
been featured in Scientific American, on A&E's Secret
Places: Inside the FBI, and in several books, such as Network
Intrusion Detection: An Analysts Handbook, Intrusion Signatures
and Analysis, Maximum Security, Hacking Exposed, and others.
He founded Sourcefire in 2001 and serves as CTO. A respected
authority on intrusion detection technology and forensics,
he is responsible for the technical direction and product
development efforts.
Martin holds a B.S. in Electrical and Computer Engineering
from Clarkson University |
|
LANCE
SPITZNER
Lance Spitzner, is a geek who constantly
plays with computers, especially network security. He loves
security because it is a constantly changing environment,
your job is to do battle with the bad guys. This love for
tactics first began in the Army, where he served for seven
years. He served three years as an enlisted Infantryman in
the National Guard and then four years as an Armor officer
in the Army's Rapid Deployment Force. Following the Army he
received his M.B.A and became involved in the world of information
security. Now he fights the bad guys with IPv4 packets as
opposed to 120mm SABOT rounds. His passion is researching
honeypot technologies and using them to learn more about the
enemy.
He is founder of the Honeynet Project,
moderator of the honeypot maillist, author of Honeypots: Tracking
Hacker, co-author of Know Your Enemy and author of several
whitepapers.
He has also spoken at various conferences
and organizations, including Blackhat, SANS, CanSecWest, the
Pentagon, NSA, the FBI Academy, JTF-CNO, the President's Advisory
Board, the Army War College, and Navy War College. |
|
STEFAN
STROBEL
Stefan was one of the founders of Centaur
in 1995 where he built up the security department which was
sold to Integralis in 1998.
He did consulting for many multinational
industrial clients in IT Security and later moved to the European
Strategic Development Team of Articon-Integralis where he
was responsible for finding and evaluating new technologies.
He is the author of several books which
have been translated in more than 5 languages. His book on
Firewalls is now in the 3rd edition. He regularly speaks at
security congresses and teaches IT-Security and Cryptography
at University of Applied Sciences at Heilbronn.
He is now co-founder and managing director
of cirosec. |
|
RÜDIGER
WEIS
He studied mathematics (Abschluss: Sehr
Gut) with a minor in computer science (Abschluss: 1.0) at
the University of Mannheim. Master's thesis An algorithm for
spline approximation via Gauss-Transformation. He did his
Ph.D. thesis at Lehrstuhl Praktische Informatik IV (Practical
Computer Science IV). Since then he’s the Chief Cryptographer
of the Cryptolabs Amsterdam. In May 2002 I have joined the
research group of Prof. Andrew S. Tanenbaum at the Vrije Universiteit
Amsterdam. He’s also a long-time member of the Chaos
Computer Club. |
|