Ron is a recognized leader in cybersecurity. He began at the National Security Agency conducting penetration tests of government networks and doing vulnerability research. He authored the Dragon Intrusion Detection System, was CTO of Network Security Wizards, and Director of Risk Mitigation for USinternetworking. While at BBN Technologies and GTE Internetworking, he developed security policies for large carrier-class networks. Ron serves on the UMD Cybersecurity Center Advisory Board and the National Cybersecurity STEM Education Advisory Board.
With a career spanning 20 years, Liam is a passionate supporter and contributor to many open source communities. An early supporter of the Bro project, he has trained 1000’s of students in the principles of Network Security Monitoring and large scale network monitoring. As a serial entrepreneur he has founded multiple network security related startups, including Critical Stack, which was recently acquired by Capital One Bank. While still leading Critical Stack he is serving as a board member at the security startup accelerator Hack Secure advising seed stage startups where he continues to support open source security with investments in companies such as Kolide, the OS Query company. Find him online at www.LiamRandall.com.
Doug started Security Onion in 2008 to provide a comprehensive platform for intrusion detection, network security monitoring, and log management. Today, Security Onion has over 200,000 downloads and is being used by organizations around the world to help monitor and defend their networks. In 2014, Doug started Security Onion Solutions LLC to help those organizations by providing commercial support and training. Doug is a CEO, public speaker, teacher, former president of the Greater Augusta ISSA, and co-founder of BSides Augusta, but what he really likes the most is catching bad guys.
Andras has been the main developer of the Malware Information Sharing Platform since the beginning of 2013. He is a firm believer that there are no problems that cannot be tackled by building the right tool.
Victor has been active as a software developer in the infosec community for many years. He is the creator of the Vuurmuur firewall project, has been one of the developers at the Snort_inline IPS project. Victor has spent the last years doing contract development on Open Source security software including significant additions to Snort. At the end of 2007 he started development on the OISF codebase on which he now leads the development effort. Victor maintains a blog at http://www.inliniac.net/blog/ and uses twitter at http://twitter.com/inliniac.
Geoff received a PhD from Carnegie Mellon in 2003 and subsequently at CMU, the University of Sydney and Sensory Networks. He was Chief Technology Officer of Sensory Networks and designed the Hyperscan pattern matching engine, leading to several design wins with Tier 1 security vendors and Sensory Networks’ acquisition by Intel Corporation in 2013. He has worked in automata theory, compiler technology and low-level optimization across a range of architectures. Geoff continues to lead development of Hyperscan at Intel. Geoff’s Abstract
Eric has been a security and open source professional since the end of the 20th century. He has created and has been lead on the NuFW project aimed at creating an identity-based enterprise firewall. A long-term contributor of Netfilter, the packet filtering framework inside Linux, he has made major contribution to ulogd2, the userspace logging daemon. A frequent speaker at French free software and security conferences, he also writes articles. He is co-founder of the INL/EdenWall company where, as CTO, he succeeded in building enterprise-grade network appliances based on NuFW.
Peter has 15 years experience in the IT industry, including enterprise level IT security practice. An adamant admirer and explorer of innovative open source security software, Peter is currently a Security Solution Architect. He maintains some additional info points of interest about Suricata: www.pevma.blogspot.com, https://github.com/pevma, and https://twitter.com/pevma.
Will comes from the government and law enforcement IT Security sector with over nine years experience. In addition Will has had involvement with various open source projects over the years including snort_inline and maintains a blog at http://node5.blogspot.com. In 2012 Will joined the Emerging Threats Pro team as well.
Kelley combines over 15 years in business with a passion for facilitating conversations around responsible digital citizenship, digital safety, and free speech online. Kelley combines her skill in strategic business development with a unique perspective as a survivor of cyberstalking. Drawing on current trends and conversations in digital security with local and federal law enforcement, information security experts and national resources she creates strategies incorporating the human side of information security. Kelley holds a BS in Marketing, an MBA and a PhD in Information Security from Purdue.
Cooper has twenty years experience in IT and InfoSec, including stints at Bell Labs, AT&T Research, CerfNet, start-ups and grant-funded research projects. He has spent the last 12 years attempting to manage the unmanageable, providing penetration testing, intrusion detection and incident response services for the largest network in San Diego, UC San Diego.
James focuses his efforts on improving customers’ lives by taking an outside-in approach to security. Part of this effort is ensuring that ad networks and exchanges are able to combat malware and other sources of malicious activities. Additionally, his team focuses on bringing new technologies and detection methodologies to help ensure that they are keeping up with the evolving threat landscape.
Michal is part of the Enterprise Information Security team at Mozilla. He protects the Fox. The Firefox. From bad actors. He has designed and deployed the NSM stack in Mozilla datacenters, offices, and cloud. He is one of a two-person team who watches the alerts and reacts, helps with the DFIR, and works closely with the Network Operations team, helping them to review the network architecture (which is changing all the time) from a security point of view.
Zach develops a wide variety of custom tools and capabilities to support a large team of analysts. Zach has an ME in Electrical/Computer Engineering from the University of Colorado Boulder, and a BS in Electrical Engineering from the University of Washington.
Jon is the author of ISLET and other tools as well as a contributor to many Free and Open Source Projects including The Netsniff-NG Toolkit, SecurityOnion, and the Bro Project. He has been fortunate enough to have audiences at various conferences including DerbyCon, AIDE, Hack3rCon, BroCon, XSEDE, MOSSCon, and more. He spends his leisure time dabbling in ideas from the social sciences, playing music, building large guitar rigs, and is always down for a game of recreational volleyball.
Darren leads threat response and analysis efforts with the help of RiskIQ’s expansive data set. He has held positions in various industries, leading threat intelligence and incident response initiatives for internal security operations groups and collaborating with external partners and communities. His most recent focus has been in the web threat space, tracking tooling and activity of actors in the malicious traffic distribution space and browser exploit kits.
Gene is also co-founder of ProtectWise, a startup in the security industry that is disrupting the space with an integrated solution with complete detection and visibility of enterprise threats and accelerated incident response. He has more than 20 years’ experience in software development, cloud computing, security-as-a-service and distributed systems. Prior to founding ProtectWise, he was founder and CTO at TagLabs, a mobile tagging company, and served in senior engineering roles at McAfee, MX Logic and GDX.
Anthony helps customers leverage Splunk to gain operational intelligence. He has a background in cyber security and international relations. His interests include IoTs, machine learning, cyber warfare, and pen-testing. His previous roles include cloud strategy, data governance, product development, and geospatial analysis. Anthony developed the Splunk TA for Suricata, which integrates Suricata with Splunk for realtime analysis and correlation.
Seth is a senior research scientist at the Georgia Tech Research Institute with a professional focus on cryptography and cybersecurity. He holds an MS in computer science from Johns Hopkins University and a BA in mathematics from Cornell University.
David’s past experience includes penetration testing and intrusion detection and prevention for a top US bank. Now he researches the latest vulnerabilities and threats, and crafts, tests, and deploys Suricata and Snort rules for client devices, protecting them across diverse industries. With more than 15 years’ experience in IT, David is a big supporter of Suricata from its inception, excited by its past success, current community, and bright future. He holds a BS in Computer Science and an MS in Information Security from Georgia Tech.
There is a $150 attendance fee for the 3-day conference.Register Now!
The Hamilton Crowne Plaza, Washington, DC
14th and K Street, NW
Washington, DC 20005
t: 1 800 227 6963
The Hamilton is providing a block of discounted rooms. Space is limited.BOOK NOW!
For more information
send us an email:
Add to your conference experience by joining us two days early for a 2-day Suricata training event. Developers and security professionals will have 1:1 time with Suricata’s development team and will walk away with a greater proficiency in Suricata’s core technology. Registered conference attendees will receive a 20% discount on the training event.
The Open Information Security Foundation (OISF) is a non-profit foundation organized to build a next generation IDS/IPS engine. The OISF has formed a multi-national group of the leading software developers in the security industry. In addition to developers and a consortium consisting of leading cyber security companies, OISF has engaged the open source security community to identify current and future IDS/IPS needs and desires.
OISF’s primary goal is to remain on the leading edge of open source IDS/IPS development, community needs and objectives. This is only attainable if you, the community, get involved. We welcome participation large and small and have built working groups and mailing lists to engage and educate all interested people and organizations. Find out more about us at oisf.net.