Check out the new USENIX Web site.
Security '08 Banner

TRAINING PROGRAM

Overview | Monday | Tuesday | By Instructor

  Tutorial Instructors

 
Phil Cox (M3) is a Principal Consultant of SystemExperts Corporation, a consulting firmCox that specializes in system security and management. He is a well-known authority in the areas of system integration and security. His experience includes Windows, UNIX, and IP-based networks integration, firewall design and implementation, and ISO 17799 and PCI compliance. Phil frequently writes and lectures on issues dealing with heterogeneous system integration and compliance with PCI-DSS. He is the lead author of Windows 2000 Security Handbook 2nd edition (Osborne McGraw-Hill) and contributing author for Windows NT/2000 Network Security (Macmillan Technical Publishing). Philip holds a BS in Computer Science from the College of Charleston.

 
Simson L. Garfinkel (M2, T2) is an Associate Professor at the Naval Postgraduate School in Monterey, CA, and a fellow at Garfinkelthe Center for Research on Computation and Society at Harvard University. He is also the founder of Sandstorm Enterprises, a computer security firm that develops advanced computer forensic tools used by businesses and governments to audit their systems. Garfinkel has research interests in computer forensics, the emerging field of usability and security, information policy, and terrorism. He has actively researched and published in these areas for more than two decades. He writes a monthly column for CSO Magazine, for which he has been awarded four national journalism awards, and is the author or co-author of fourteen books on computing. He is perhaps best known for Database Nation: The Death of Privacy in the 21st Century and for Practical UNIX and Internet Security.

 
Gunnar Peterson (T3) is a Managing Principal at Arctec Group. He is focused on distributed systems security for large, mission-critical financial, financial exchange, healthcare, manufacturer, and insurance systems, as well as start-ups. Gunnar is an internationally recognized software security expert, an Associate Editor for IEEE Security & Privacy Journal on "Building Security In," an Associate Editor for Information Security Bulletin, a contributor to the SEI and DHS Build Security In portal on software security, and an in-demand speaker at security conferences.

 
Bruce Potter (M1, T1) is the founder of The Shmoo Group of security, crypto, and privacy professionals. Potter He helps organize the yearly ShmooCon security conference held each winter in Washington, D.C. Mr. Potter has co-authored several books, including 802.11 Security and Mastering FreeBSD and OpenBSD Security, both published by O'Reilly, and Mac OS X Security, published by New Riders. Mr. Potter is also the co-founder of Ponte Technologies, a company specializing in wireless security, IT security operations, and advanced network defense techniques.

Can't make it to Bruce's classes in San Jose? Sign up for the live video stream, powered by Linux Pro Magazine.

 
Radu Sion (T4) is an assistant professor of computer sciences at Stony Brook University, heading the Network Security and Applied Cryptography Laboratory.Sion His research focuses on data security and information assurance. He has been applying practical cryptography and strong assurance mechanisms to achieve practical data privacy solutions and develop efficient regulatory-compliant systems, cellular DRM solutions, and conditional micro-payment schemes. Sion also directs the Stony Brook Trusted Hardware Laboratory, a central expertise and research knowledge repository on secure hardware. Collaborators and funding partners include Motorola Labs, IBM Research, the IBM Cryptography Group, the Center of Excellence in Wireless and Information Technology CEWIT, the Stony Brook Office for the Vice-President for Research, and the National Science Foundation. Dr. Sion serves on the organizing committee of numerous data management and information security conferences.

 
Sean Smith (T4) has been working in information security—attacks and defenses, for industry and government—since before there was a Web. Smith In graduate school, he worked with the U.S. Postal Inspection Service on postal meter fraud; as a post-doc and staff member at Los Alamos National Laboratory, he performed security reviews, designs, analyses, and briefings for a wide variety of public-sector clients; at IBM T.J. Watson Research Center, he designed the security architecture for (and helped code and test) the IBM 4758 secure coprocessor, and then he led the formal modeling and verification work that earned it the world's first FIPS 140-1 Level 4 security validation. Dr. Smith has published numerous refereed papers; given numerous invited talks; and been granted over ten patents. His security architecture is used in thousands of financial, e-commerce, and rights managements installations worldwide. In July 2000, Sean left IBM for Dartmouth, since he was convinced that the academic education and research environment is a better venue for changing the world. His current work, as PI of the Dartmouth PKI/Trust Lab, investigates how to build trustworthy systems in the real world. His book Trusted Computing Platforms: Design and Applications (Springer, 2005) provides a deeper presentation of this research journey. At Dartmouth, his courses—on Operating Systems, Security, and Theory—have all been named "favorite classes" by graduating seniors. Dr. Smith was educated at Princeton and CMU.

?Need help? Use our Contacts page.

Last changed: 21 July 2008 ch