Adam Laurie
|
|
|
Adam Laurie is a freelance security consultant working the in the field of electronic communications. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos and CP/M based micro computers as they emerged in the Eighties. He quickly became interested in the underlying network and data protocols, and moved his attention to those areas and away from programming, starting a data conversion company which rapidly grew to become Europe's largest specialist in that field (A.L. downloading Services). During this period, he successfully disproved the industry lie that music CDs could not be read by computers, and, with help from his brother Ben, wrote the world's first CD ripper, 'CDGRAB'. At this point, he and Ben became interested in the newly emerging concept of 'The Internet', and were involved in various early open source projects, the most well known of which is probably their own—'Apache-SSL'—which went on to become the de-facto standard secure web server. Since the late Nineties they have focused their attention on security, and have been the authors of various papers exposing flaws in Internet services and/or software, as well as pioneering the concept of re-using military data centres (housed in underground nuclear bunkers - http://www.thebunker.net) as secure hosting facilities.
Adam has been a senior member of staff at DEFCON since 1997, and also acted as a member of staff during the early years of the Black Hat Briefings, and is a member of the Bluetooth SIG Security Experts Group and speaks regularly on the international conference circuit on matters concerning Bluetooth security. He has also given presentations on forensics, magnetic stripe technology, InfraRed and RFID. He is the author and maintainer of the open source python RFID exploration library 'RFIDIOt', which can be found at http://rfidiot.org. |
|
Andrea Barisani
Andrea Barisani is a system administrator and security consultant. His professional career began 8 years ago but all really started when a Commodore-64 first arrived in his home when he was 10. Now, 16 years later, Andrea is having fun with large-scale IDS/Firewalls deployment and administration, forensic analysis, vulnerability assessment, penetration testing, security training and his Open Source projects. He eventually found that system and security administration are the only effective way to express his need for paranoia.
He's currently involved with the Gentoo project managing infrastructure server security being a member of the Gentoo Security and Infrastructure Teams along with distribution development.
Being an active member of the international Open Source and security community he's maintainer/author of the tenshi, ftester and openssh-lpk projects and he's been involved in the Open Source Security Testing Methodology Manual, becoming a ISECOM Core Team member. Outside the community he has been a security consultant for Italian firms and he's now the co-founder and Chief Security Engineer of Inverse Path Ltd. When outside his text-based world he joins real life and among many hobbies he studies for a bachelor's degree in Physics. |
|
Andy Müller-Maguhn
Andy Müller-Maguhn (36) has been a member of the Chaos Computer Club since 1986 and studies in this context the development of technologies and their effects on social, cultural, economic as well as political aspects and the so-called real life.
After working for many years as project manager and speaker, among others on security and data protection projects, he globalized himself in the international IT community between 2000 and 2003 as an elected representative of European Internet users, as Director on the Board of the ICANN network management and as a founding member of European Digital Rights (EDRI) NGO.
Mr. Müller-Maguhn operates an office building under the name Data Travel Office which houses infrastructure and space in addition to the Berlin branch of the Chaos Computer Club and provides for IT projects, including GSMK, the company for secure mobile communication. In this context he establishes projects and contacts and studies the depth of the data ocean. |
|
Annie Machon
For 6 years in the 1990s she was an Intelligence Officer (IO) for MI5.
In 1997 she blew the whistle on the crimes and incompetence of the British intelligence agencies along with her ex-partner and fellow spy, David Shayler. By doing this they had to give up their careers, go on the run across Europe, live in hiding for a year, and then spend the next two years in exile in Paris. They, and many of their friends, family, supporters and journalists, were intimidated, arrested, and put on trial for trying to expose the crimes of the spies.
She is now a writer and political activist. In 2005 her book about our experiences, “Spies, Lies and Whistleblowers”, was published despite the UK government’s best efforts to suppress it |
|
Barnaby Jack
Barnaby Jack is a Staff Security Researcher at Juniper Networks. His main areas of interest include reverse engineering, operating system internals, and embedded systems security. He has been credited with the discovery of numerous security vulnerabilities, and has published multiple papers on new exploitation methods and techniques. He has been a frequent speaker at conferences in both the government and private sector, including Black Hat, CanSecWest, EUSecWest, and SysScan. |
|
Brian Chess, Ph.D.
His book, “Secure Programming with Static Analysis”, shows how static source code analysis is an indispensable tool for getting security right. Brian holds a Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Before settling on security, Brian spent a decade in Silicon Valley working at huge companies and small startups. He has done research on a broad set of topics, ranging from integrated circuit design all the way to delivering software as a service.
Brian Chess is a founder of Fortify Software and serves as Fortify’s Chief Scientist, where his work focuses on practical methods for creating secure systems. |
|
Daniele Bianco
Daniele Bianco is a system administrator and IT consultant. He began his professional career as a system administrator during his early years at university. His interest for centralized management and software integration in Open Source environments has focused his work on design and development of suitable R&D infrastructure.
For the time being Daniele is working as a consultant for Italian astrophysics research institutes, involving support for the design, development and the administration of IT infrastructure. One of his hobbies has always been playing with hardware and recently he has been pointing his attention on in-car wireless and navigation systems. He's the resident Hardware Hacker for international consultancy Inverse Path Ltd. Daniele holds a Bachelor's degree in physics from University of Trieste. |
|
Eldon Sprickerhoff
Eldon Sprickerhoff has over 15 years of experience in the GTA and NYC IT communities working on security vulnerability analysis, architecture, and countermeasures. In 2001 he co-founded eSentire, Inc., which has grown to be the leading Managed Security Services Provider for alternative investment firms including hedge funds with sensors deployed across North America, the UK, and Asia. He is best known for a talk he gave at ShmooCon, where after several months of inaction from Cisco, he spurred them into action by disclosing opaque details of a critical vulnerability in their VPN Concentrator appliance by engaging the audience of 300 in a game of charades. He holds a B.Math. in Computer Science from the University of Waterloo and is both CISSP and CISA certified. Currently, his free-time activities seem to revolve around family, epicurean adventures and aikido. |
|
Mikko H. Hypponen
|
|
|
Mikko Hypponen is the Chief Research Officer for F-Secure. He has worked with F-Secure since 1991. Mr. Hypponen led the team that took down the world-wide network used by the Sobig.F worm in 2003, was the first to warn the world about the Sasser outbreak in 2004 and the first to stop the Zotob worm in 2005. Mr. Hypponen has assisted law enforcment in USA, Europe and Asia on cybercrime cases. He has written for magazines such as Scientific American, Foreign Policy and Virus Bulletin. Mr. Hypponen has addressed the most important security-related conferences worldwide. He is also an inventor for several patents, including US patent 6,577,920 "Computer virus screening". He has been the subject of dozens of interviews in global TV and print media, including a 9-page profile in Vanity Fair. Mr. Hypponen, born in 1969, was selected among the 50 most important people on the web in March 2007 by the PC World magazine. Apart from computer security issues, Mr. Hypponen enjoys collecting and restoring classic arcade video games and pinball machines from past decades. He lives with his family, and a small deer community, in an island near Helsinki. |
|
Richard Gowman
Richard Gowman is deeply involved with analyzing security systems, providing security incident response, and programming to address security concerns. He holds a Bachelor's degree in Computer Science from the University of Waterloo and has obtained the CISSP certification. His current research interests include reverse engineering network protocols, with a focus on IP Telephony. He is the author of UNIStimpy, a bespoke code suite used to assess the security stance of Nortel IP Telephony equipment. |
|
Ryan Russell
Ryan Russell, aka Blue Boar, has been employed in the IT field for nearly 20 years, specializing in information security for the last 10. He has contributed to over a dozen books on the topics of networking and security, both fiction and non-fiction. He founded the vuln-dev mailing list, was in charge of information security at Sybase for several years, and was a Senior Threat Analyst at SecurityFocus. He is currently the QA Manager for BigFix, Inc. Ryan is a frequent mailing list contributor and conference speaker. His pet projects include robotics, embedded device hacking, disassembly, and HTPCs. |
|
Stephan Schlentrich
Stephan Schlentrich, born in 1959, has worked as a TV journalist for the German South West Radio Station and German TV for 25 years after an apprenticeship as a photographer and an editorial traineeship.
As an anchor, reporter and foreign correspondent he has been both in front of and behind the camera. He presented the business magazine "INFOMARKT" on German South West Television for 10 years and was a member of the editorial team of the German political TV Magazine „REPORT Mainz“ for eight years. During this time he specialized in internal security and terrorism issues and is a much sought-after guest in discussions and a competent anchor for various events and conferences in this field.
Stephan Schlentrich has also gained a reputation as a filmmaker. He is the author of several documentations for German TV: (ARD Exclusive: "Hunting the convertible murder ", "Attack on fire fronts - firefighters in the USA", "Welcome to no-man's land", "Trip to Chernobyl", "Stephen Rambam - murderer wanted!").
Since summer 2003 Stephan Schlentrich has been a member of the German TV reporter team working in crisis areas and has reported several times as a correspondent from Baghdad, Northern Iraq as well as from Thailand after the tsunami. Mr. Schlentrich holds a lectureship for media management at the University of Applied Sciences in Wiesbaden and has taught at the University of Applied Police Sciences in Villingen-Schwenningen and at schools of journalism.
Since 2007 Stephan Schlentrich has been Head of the Steinbeis Transfer Center CSS „Communication, Safety & Security“ based in Berlin and Wiesbaden.
The CSS provides consultation services to German and international companies in the field of "crisis management and crisis communication", develops up-to-date crisis strategies together with customers, creates risk analysis in companies and provides training to executive management, senior management and employees in identifying, preventing and managing corporate crises.
With the “Hostile Environments Training“ for managers, technicians, journalists and NGO employees the CSS transfer center provides high-value seminars for employees of German companies who work in high-risk areas of the world. |
|
Tavis Ormandy
Tavis Ormandy is a UNIX security researcher and an active participant in open source security. As an information security engineer on Google's Security Team, he is responsible for identifying and analyzing vulnerabilities and exploits in a wide range of software. As co-lead of the Gentoo Security Team he is responsible for helping to maintain the security of the Gentoo Linux distribution. Recent publications include the co-authored "Exposing Application Internals", and "Hostile Virtualised Environments". |
|
Tobias Klein
Tobias Klein is known as the author of several books and for his presentations at various congresses. His main emphases are security audits, secure application environments, secure programming and software vulnerabilities. The concept and implementation of the Extreme Hacking series of training courses is also largely his work. His publications are “Linux-Sicherheit [Linux Security], 2001, dpunkt Verlag“ and „Buffer Overflows und Format-String-Schwachstellen [Buffer Overflows and Format String Vulnerabilities], 2003, dpunkt Verlag”. Tobias Klein has been an IT security consultant at cirosec GmbH since July 2002. |
|
Will Drewry
Will Drewry has been an engineer in Google's Security team for over 3 years. He was co-author of the "Flayer: Exposing Application Internals" paper and spends much of his time researching vulnerabilities and developing tools to aid his work. He has reported vulnerabilities in high profile software and is an active contributor to open source projects. |
|