Check out the new USENIX Web site.
TRAINING PROGRAM

Overview | Monday | Tuesday | By Instructor

  Tutorial Instructors

 
Frank Adelstein (T4) is the technical director of computer security at ATC-NY in Ithaca, NY. Frank Adelstein He is the principal designer of a live forensic investigation product (marketed as Online Digital Forensic Suite™ and LiveWire Investigator™) and has worked in the area of live investigation for the last 5 years. He has also been the principal investigator on numerous research and development projects including security, wireless networking, intrusion detection, and training.

Richard and Adelstein are the chair and vice-chair of the Digital Forensic Research Workshop, the premier workshop on research advances in the area of digital forensics. They have co-authored the book Fundamentals of Mobile and Pervasive Computing (for McGraw-Hill).

Richard Bejtlich (M1, T1) is founder of TaoSecurity LLC (https://www.taosecurity.com). Richard Bejtlich He was previously a principal consultant at Foundstone. Richard created network security monitoring operations for ManTech and Ball Corporations. From 1998 to 2001 then-Captain Bejtlich defended global American information assets in the Air Force Computer Emergency Response Team (AFCERT). Formally trained as an intelligence officer, Richard is a graduate of Harvard University and the United States Air Force Academy. He wrote The Tao of Network Security Monitoring and Extrusion Detection, and co-authored Real Digital Forensics. He also writes for his Web log (taosecurity.blogspot.com).

Dan Geer (M2)—Milestones: The X Window System and Kerberos (1988), the first information Dan Geer security consulting firm on Wall Street (1992), convenor of the first academic conference on electronic commerce (1995), the "Risk Management Is Where the Money Is" speech that changed the focus of security (1998), the presidency of the USENIX Association (2000), the first call for the eclipse of authentication by accountability (2002), principal author of and spokesman for Cyberinsecurity: The Cost of Monopoly (2003), and co-founder of SecurityMetrics.Org (2004).

Steve Pinkham (M3) is a security researcher for Maven Security Consulting Inc. (https://www.mavensecurity.com). Steve knows things, and would like to know more. He has spent time in systems administration, programming, security research, and consulting. He dabbles in electronics and philosophy, and enjoys cheese and fine tea. If you're unlucky you might run into him wearing a backpack in some remote corner of the world. He can be contacted at steve.pinkham@mavensecurity.com.

Marcus Ranum (T2) has been building and designing security and security systems since 1989. Abe SingerHe is the author of several books on security, and has been, variously: network manager, C programmer, development team leader, VP of engineering, CSO, CEO, and consultant. He is currently the CSO of Tenable Network Security.

 

David Rhoades (M3, T3) is a principal consultant with Maven Security Consulting, Inc. Since 1996, David has providedDavid Rhoades information protection services for various FORTUNE 500 customers. His work has taken him across the U.S. and abroad to Europe and Asia, where he has lectured and consulted in various areas of information security. David has a B.S. in computer engineering from the Pennsylvania State University and has taught for the SANS Institute, the MIS Training Institute, and ISACA.

Golden G. Richard III (T4) is an Associate Professor at the University of New Orleans, Golden G. Richardwhere he developed the Information Assurance curriculum and coordinated the effort to have the University of New Orleans certified by the National Science Foundation as a Center of Academic Excellence. He teaches courses in digital forensics, computer security, and operating systems internals. He is a co-founder of Digital Forensic Solutions, LLC and is the author of the digital forensics tool "Scalpel."

Richard and Adelstein are the chair and vice-chair of the Digital Forensic Research Workshop, the premier workshop on research advances in the area of digital forensics. They have co-authored the book Fundamentals of Mobile and Pervasive Computing (for McGraw-Hill).

Abe Singer (M4) is a Computer Security Researcher in the Security Technologies Group Abe Singerat the San Diego Supercomputer Center. In his operational security responsibilities, he participates in incident response and forensics and in improving the SDSC logging infrastructure. His research is in pattern analysis of syslog data for data mining. He is co-author of of the SAGE booklet Building a Logging Infrastructure and author of a forthcoming O'Reilly book on log analysis.

?Need help? Use our Contacts page.

Last changed: 27 July 2007 ch