Frank Adelstein (T4) is the technical director of computer security at
ATC-NY in Ithaca, NY. He is the principal designer of a live forensic
investigation product (marketed as Online Digital Forensic Suite™ and
LiveWire Investigator™) and has worked in the area of live investigation
for the last 5 years. He has also been the principal investigator on
numerous research and development projects including security, wireless
networking, intrusion detection, and training.
Richard and Adelstein are the chair and vice-chair of the Digital
Forensic Research Workshop, the premier workshop on research advances
in the area of digital forensics. They have co-authored the book
Fundamentals of Mobile and Pervasive Computing (for McGraw-Hill).
Richard Bejtlich (M1, T1) is founder of TaoSecurity LLC (https://www.taosecurity.com). He was
previously a principal consultant at Foundstone. Richard created network
security monitoring operations for ManTech and Ball Corporations. From 1998 to
2001 then-Captain Bejtlich defended global American information assets in the
Air Force Computer Emergency Response Team (AFCERT). Formally trained as an
intelligence officer, Richard is a graduate of Harvard University and the
United States Air Force Academy. He wrote The Tao of Network Security
Monitoring and Extrusion Detection, and co-authored Real Digital
Forensics. He also writes for his Web log (taosecurity.blogspot.com).
Dan Geer (M2)Milestones: The X Window System and Kerberos (1988), the first information security consulting firm on Wall Street (1992), convenor
of the first academic conference on electronic commerce (1995), the
"Risk Management Is Where the Money Is" speech that changed the
focus of security (1998), the presidency of the USENIX Association
(2000), the first call for the eclipse of authentication by
accountability (2002), principal author of and spokesman for
Cyberinsecurity: The Cost of Monopoly (2003), and co-founder of
SecurityMetrics.Org (2004).
Steve Pinkham (M3) is a security researcher for Maven Security Consulting Inc.
(https://www.mavensecurity.com). Steve knows things, and would like to know
more. He has spent time in systems administration, programming, security
research, and consulting. He dabbles in electronics and philosophy, and enjoys
cheese and fine tea. If you're unlucky you might run into him wearing a
backpack in some remote corner of the world. He can be contacted at
steve.pinkham@mavensecurity.com.
Marcus Ranum (T2) has been building and designing security and security
systems since 1989. He is the author of several books on security,
and has been, variously: network manager, C programmer, development
team leader, VP of engineering, CSO, CEO, and consultant. He is
currently the CSO of Tenable Network Security.
David Rhoades (M3, T3) is a principal consultant with Maven Security
Consulting, Inc. Since 1996, David has provided information protection services for various FORTUNE 500 customers. His work has taken him across the U.S. and abroad to Europe and Asia, where he has lectured and consulted in various areas of information security. David has a B.S. in computer engineering from the Pennsylvania State University and has taught for the SANS Institute, the MIS Training Institute, and ISACA.
Golden G. Richard III (T4) is an Associate Professor at the University
of New Orleans, where he developed the Information Assurance curriculum and
coordinated the effort to have the University of New Orleans certified by
the National Science Foundation as a Center of Academic Excellence. He
teaches courses in digital forensics, computer security, and operating
systems internals. He is a co-founder of Digital Forensic Solutions,
LLC and is the author of the digital forensics tool "Scalpel."
Richard and Adelstein are the chair and vice-chair of the Digital
Forensic Research Workshop, the premier workshop on research advances
in the area of digital forensics. They have co-authored the book
Fundamentals of Mobile and Pervasive Computing (for McGraw-Hill).
Abe Singer (M4) is a Computer Security Researcher in the Security Technologies Group at the San Diego Supercomputer Center. In his operational security responsibilities, he participates in incident response and forensics and in improving the SDSC logging infrastructure. His research is in pattern analysis of syslog data for data mining. He is co-author of of the SAGE booklet Building a Logging Infrastructure and author of a forthcoming O'Reilly book on log analysis.
|