Marcus
Ranum – Chairman
und weltweit renommierter IT-Security Experte
Marcus J. Ranum, Senior Scientist at Trusecure Corporation,
is a world-renowned expert on security system design and
implementation. Since the late 1980's, he has designed a
number of groundbreaking security products including the
DEC SEAL, the TIS firewall toolkit, the Gauntlet firewall,
and NFR's Network Flight Recorder intrusion detection system.
He has been involved in every level of operations of a security
product business, from developer, to founder and CEO of NFR.
Marcus has served as a consultant to many FORTUNE 500 firms
and national governments, as well as serving as a guest lecturer
and instructor at numerous high-tech conferences. In 2001,
he was awarded the TISC "Clue" award for service
to the security community, and also holds the ISSA lifetime
achievement award.
|
|
Brian Carrier
Brian Carrier is a digital forensics researcher and author
of several forensic analysis tools, including The Sleuth
Kit and the Autopsy Forensic Browser. His research
at CERIAS (Purdue University) involves digital forensic analysis
tools and procedures. Previously, he was a Research
Scientist at @stake, where he led the @stake Response Team
and Digital Forensic Labs.
Brian has taught forensics and incident response at SANS,
FIRST, and the @stake Academy and has given talks at many
conferences on his tools and computer forensics. As
a member of the Honeynet Project, he has presented at the
FBI Academy and other U.S. military and intelligence agencies. He
is also a co-author of the 2nd edition of the Know Your Enemy
book. |
|
Fred Cohen
Fred Cohen is best known as the inventor of computer virus
defense techniques, the principal investigator who’s
team defined the information assurance problem as it relates
to critical infrastructure protection today, and a seminal
researcher in the use of deception for information protection.
But his work on information protection extends far beyond
these areas.
In the 1970s he designed network protocols for secure
digital networks carrying voice, video, and data; and he
helped develop and prototype the electronic cashwatch for
implementing personal digital money systems. In the 1980s,
he developed integrity mechanisms for secure operating
systems, consulted for many major corporations, taught
short courses in information protection to over 10,000
students worldwide, and in 1989, he won the prestigious
international Information Technology Award for
his work on integrity protection. In the 1990s, he developed
protection testing and audit techniques and systems, secure
Internet servers and systems, defensive information warfare
techniques and systems, and early systems using deception
for information protection. All told, the protection techniques
he pioneered now help to defend more than three quarters
of all the computers in the world.
Fred has authored almost 200 invited, refereed, and other
scientific and management research articles, writes a monthly
column for Network Security magazine on managing
network security, and has written several widely read books
on information protection. His series of "Infosec
Baseline" studies have been widely used by the research
community as stepping off points for further research,
his "50 Ways" series is very popular among practitioners
looking for issues to be addressed, and his most recent "Protection
for Deception" series of papers is widely cited.
As a corporate consultant Fred has helped secure some
of the world's largest companies in the fields of information
technology, microelectronics, pharmaceuticals, manufacturing,
telecommunications, and the financial and information industries.
As a consultant to and researcher for the U.S. government
he was the principal investigator on seminal studies in
defensive information operations , he was the principal
investigator on the national information security technical
baseline series of reports, founded the College Cyber Defenders
program at Sandia National Laboratories that ultimately
led to the formation of the CyberCorps program, and led
projects ranging from 'Resiliance' to 'The Invisible Router'.
He has also worked in critical infrastructure protection,
with law enforcement, and with the intelligence community
to help improve their ability to deal with computer related
crime and emerging threats to national security. He has
worked on issues of digital forensics, including work for
many large corporations and pro bono and state-funded work
for indigent defendants, and in 2002, won the "Techno-Security
Industry Professional of the Year" Award.
Fred has participated in and created numerous strategic
scenario games. He devised and ran the first Internet-based
strategic information warfare wargame and held several
initial trial Internet-based games involving national defense
and corporate personnel. In 1998, he introduced the Internet
Game for information security policy development,
training, and awareness in corporate, educational, and
government environments, and followed this up with the Sexual
Harassment Game which helps train employees on sexual
harassment policies and processes. His recent introduction
of several security games and simulations to the Internet
are excellent examples of the work he has done in this
area. He has also developed several strategic scenarios
for government and private use. |
|
Renaud Deraison
Founder and the primary author of
the open-source Nessus vulnerability scanner project. He
has worked for SolSoft, and founded his own computing security
consulting company, "Nessus Consulting S.A.R.L." Nessus
has won numerous awards, most notably, is the 2002 Network
Computing 'Well Connected' award. Mr. Deraison also is
an editorial board member of Common Vulnerabilities and
Exposures Organization. He has presented at a variety of
security conferences including Blackhat and CanSecWest. |
|
Prof. Dr. Gunter Dueck
|
|
|
Professor Dr. Gunter Dueck, Jahrgang
1951, lebt mit seiner Frau Monika und seinen Kindern Anne
und Johannes in Waldhilsbach bei Heidelberg. Er studierte
von 1971-75 Mathematik und Betriebswirtschaft, promovierte
1977 an der Universität Bielefeld in Mathematik. Er
forschte 10 Jahre mit seinem wissenschaftlichen Vater Rudolf
Ahlswede zusammen, mit dem er 1990 den Prize Paper Award
der IEEE Information Theory Society für eine neue Theorie
der Nachrichtenidentifikation gewann. Nach der Habilitation
1981 war er fünf Jahre Professor für Mathematik
an der Universität Bielefeld und wechselte 1987 an das
Wissenschaftliche Zentrum der IBM in Heidelberg. Dort gründete
er eine große Arbeitsgruppe zur Lösung von industriellen
Optimierungsproblemen und war maßgeblich am Aufbau
des Data-Warehouse-Service-Geschäftes der IBM Deutschland
beteiligt. Gunter Dueck ist einer der IBM Distinguished Engineers,
IEEE Fellow, Mitglied der IBM Academy of Technology, Mitglied
im Präsidium der GI und der DMV. Er arbeitet an der
technologischen Ausrichtung der IBM mit, an Strategiefragen,
an Cultural Change.
|
|
Dr. Burt
Kaliski
Dr. Burt Kaliski is chief scientist
and director of RSA Laboratories, the research center of
RSA Security, where he works to transform promising technologies
into competitive advantages for the company and its customers.
Burt joined RSA Data Security in 1989 when it was a startup,
and in 1991 helped launch RSA Laboratories as an academic
environment within RSA Data Security. (RSA Data Security
was acquired by Security Dynamics in 1996; the merged companies
were renamed RSA Security.) Since 1996 he has been director
and chief scientist of RSA Laboratories, leading a group
of applied researchers and standards developers that has
produced a range of new concepts and technologies.
Burt has also been involved extensively in the development
of cryptographic standards. During the early days of RSA
Laboratories, he coordinated the development of the Public-Key
Cryptography Standards (PKCS), working with major early
adopters of public-key cryptography. From 1993-99, he served
as chair of the IEEE P1363 working group, which developed
a standard, IEEE Std 1363-2000, covering the three main families
of public-key cryptography. Since 1999 he has been the editor
of the IEEE P1363a amendment and he is currently the editor
of ANSI X9.44, the emerging banking standard for key establishment
based on the RSA cryptosystem. He is also an author of several
Internet RFCs.
Burt’s research interests
over the years have included public-key cryptography, efficient
implementation of cryptographic algorithms, block cipher
cryptanalysis, elliptic curve cryptography, user authentication,
and privacy protection. He is an inventor on eight patents
with several others pending.
Burt has served as general chair
of CRYPTO ’91 and
program chair of CRYPTO ’97 and CHES 2002. He has participated
on program committees for several major conferences, and
on the editorial board of ACM TISSEC. He is currently on
the advisory board for the forthcoming Encyclopedia of Information
Security to be published by Kluwer. He has been a frequent
speaker at industry conferences and was an invited speaker
at ASIACRYPT ’98, and has more than 20 conference and
journal publications.
Burt was one of 11 winners of the 2003
New England Business and Technology Award.
Burt received his bachelor’s, master’s
and Ph.D. degrees in computer science from MIT, where his research
focused on cryptography. Prior to joining RSA Data Security,
he was a visiting assistant professor of computer engineering
at Rochester Institute of Technology. He is a member of the
IEEE Computer Society and the International Association for
Cryptologic Research. |
|
Tobias
Klein
Nach Abschluss seines Studiums arbeitet
Tobias Klein seit Juli 2002 als IT-Sicherheitsberater bei
der Firma cirosec GmbH.
Er ist Autor des 2001 beim dpunkt
Verlag erschienenen Fachbuches „Linux-Sicherheit – Security
mit Open-Source-Software – Grundlagen und Praxis“ und
des Buches „Buffer-Overflow- und Format-String-Attacken-Problematik“. |
|
David Litchfield
David Litchfield leads the world in the discovery and publication
of computer security vulnerabilities. This outstanding research
was recognised by Information Security Magazine who voted
him as 'The World's Best Bug Hunter' for 2003. To date, David
has found over 150 vulnerabilities in many of today's popular
products from the major software companies (the majority
in Microsoft, Oracle).
David is also the original author for the entire suite of
security assessment tools available from NGSSoftware. This
includes the flagship vulnerability scanner Typhon III, the
range of database auditing tools NGSSquirrel for SQL Server,
NGSSquirrel for Oracle, OraScan and Domino Scan II.
In addition to his world leading vulnerability research
and the continued development of cutting edge security assessment
software, David has also written or co-authored on a number
of security related titles including, "SQL Server Security", "Shellcoder's
handbook" and "Special Ops: Host and Network Security
for Microsoft, UNIX and Oracle" |
|
Gregoire
Ribordy - Fachmann im Bereich Quanten-Kryptographie
Gregoire Ribordy is the CEO and founder of id Quantique,
a company based in Geneva, Switzerland. id Quantique was
founded in 2001 and develops innovative cryptographic equipment
exploiting quantum physics to enhance the security of communications.
The company was the first to commercially offer quantum cryptography
systems and quantum random number generators. Id Quantique
closed its first round of financing in December 2003 and
raised 1 mio Euros. Prior to founding id Quantique, Gregoire
Ribordy obtained a PhD in quantum physics from the University
of Geneva. Having lived in the United States and Japan, he
has extensive international experience. |
|
Dr. Eugene Schultz
Eugene Schultz, Ph.D., CISM, CISSP, is a Principal Engineer
at Lawrence Berkeley National Laboratory of the University
of California.
He is the author/co-author of five
books, one on Unix security, another on Internet security,
a third on Windows NT/2000 security, a fourth on incident
response, and the latest on intrusion detection and prevention.
He has also written over 100 published papers. Gene is
the Editor-in-Chief of "Computers and Security" and is
an associate editor of "Network Security" and "Information
Security Bulletin". He is also a member of the editorial
board for the SANS NewsBites, a weekly information security-related
news update and is on the technical advisory board of three
companies.
He has been an adjunct professor of computer science at
Purdue University, where he taught courses and participated
in research in the CERIAS (Center for Education and Research
in Information Assurance and Security) program.
He has received the NASA Technical Excellence Award, the
Department of Energy Excellence Award, the Information
Systems Security Association (ISSA) Professional Achievement
and Honor Roll Awards, the ISACA John Kuyers Best Speaker/Best
Conference Contributor Award, the National Information
Systems Security Conference Best Paper Award, and has been
elected to the ISSA Hall of Fame.
While at Lawrence Livermore National Laboratory he founded
and managed of the U.S. Department of Energy's Computer
Incident Advisory Capability (CIAC).
He is also a co-founder of FIRST, the Forum of Incident
Response and Security Teams.
Dr. Schultz has provided expert testimony before committees
within the U.S. Senate and House of Representatives on
various security-related issues, and has served as an expert
witness in legal cases.
|
|
Clifford Stoll
Involved with computer networks since their inception, Clifford
Stoll is widely known -- both on-line and off -- as an astronomer,
computer security expert and network maven.
Despite this, Stoll admits to
being deeply ambivalent about computers, and is having
second thoughts about the role of networks in our culture.
Stoll’s newest book, High
Tech Heretic: Why Computers Don’t Belong in the Classroom
and Other Reflections by a Computer Contrarian, looks
at how computers have encroached on our lives. As one who
loves computers as much as he disdains the inflated promises
made on their behalf, Stoll has become a P. J. O’Rourke
of the computer age, focusing his droll wit and penetrating
views on everything from why computers have to be so darned ‘ugly’ to
the cultural aftershocks of living in a high-tech society.
In his book, Silicon Snake Oil, he questions our
infatuation with the Internet and the overselling of the
information highway; he worries about the over promotion
of computers in education and the negative impact on libraries.
Stoll became a computer security
expert somewhat by accident. He was an astrophysicist turned
systems manager at Lawrence Berkeley Lab when he discovered
an accounting error that alerted him to the presence of
an unauthorized user on his system. Stoll spent a year
stalking an elusive, methodical hacker who was using numerous
techniques -- from simply guessing passwords, to exploiting
software bugs, to setting up bogus "Cuckoo’s
Egg" programs -- to access unauthorized American computer
files.
The trail led Stoll and a half-dozen national agencies through
computer networks all over the world, ending up in Hanover,
West Germany, where he discovered a hacker linked to a mysterious
agent in Pittsburgh. The spy ring he single-handedly uncovered
sold computer secrets to the KGB for cocaine and tens of
thousands of dollars. It was finally broken in March 1989,
when Stoll again found himself on the cover of The New
York Times. Newspapers across the country followed suit,
calling Stoll a genuine, if somewhat unlikely, American hero.
He related this story in his book, The
Cuckoo’s
Egg: Tracking a Spy Through the Maze of Computer Espionage. With
all the suspense of a classic spy novel, this amazing and
unprecedented book is the first true story of international
computer espionage. Told as only Stoll could describe the
events, it is the first and only book to lead readers into,
through and back out of the esoteric, shadowy world of
computer espionage, which is without question the single
most important security issue of the 1990s.
Since catching the 'Hanover Hacker,'
Stoll has become a leading authority on computer security,
delivering more lectures on the subject than he cares to admit.
He has given talks for both the CIA and NSA and has appeared
before the U.S. Senate. |
|
STEFAN
STROBEL
Stefan Strobel ist Geschäftsführer
der Firma cirosec GmbH. Er verfügt über langjährige
Erfahrungen in der Beratung großer Firmen mit sehr hohem
Sicherheitsbedarf und in der Erstellung von Konzepten und
Policies. Er war einer der Gründer der Centaur Communication
GmbH in Heilbronn, die später in der IntegralisCentaur
und der Articon-Integralis AG aufging.
Neben seiner Tätigkeit ist er Dozent
an Berufsakademien und an der Fachhochschule Heilbronn, hält
Vorträge auf Fachkongressen und ist Autor verschiedener
Fachbücher, die in mehreren Sprachen erschienen sind. |
|