After 21 years of classified intelligence work for the US Air Force, Brad transitioned to cyber security in 2010, specializing in network traffic analysis at Palo Alto Networks. He is also a handler for the Internet Storm Center (ISC) and has posted more than 100 diaries at isc.sans.edu. Brad routinely blogs technical details and analysis of infection traffic at www.malware-traffic-analysis.net, where he provides traffic analysis exercises and over 1,000 malware and pcap samples to information security professionals.
I am a data nerd. I have been working in the financial industry for the last 10 years focusing on cyber security and data analytics. I hold a masters degree in Business Analytics from NYU Stern School of Business. In my spare time, I enjoy volunteering with DataKind to work on data science projects for non-profits. I am also an avid swimmer and water polo player. Twitter: @blodge8
Giuseppe is an open source software developer involved in the development of network security software. He started his contribution in the open source world with Netfilter organization, which he is still a member of, then he joined OISF. He is involved in Suricata development at Stamus Networks.
Peter has 15 years experience in the IT industry, including enterprise level IT security practice. An adamant admirer and explorer of innovative open source security software, Peter is currently a Security Solution Architect. He maintains some additional info points of interest about Suricata: www.pevma.blogspot.com, https://github.com/pevma, and https://twitter.com/pevma.
Kelley combines over 15 years in business with a passion for facilitating conversations around responsible digital citizenship, digital safety, and free speech online. Kelley combines her skill in strategic business development with a unique perspective as a survivor of cyberstalking. Drawing on current trends and conversations in digital security with local and federal law enforcement, information security experts and national resources she creates strategies incorporating the human side of information security. Kelley holds a BS in Marketing, an MBA and a PhD in Information Security from Purdue.
Jack is a security researcher who focuses on open source solutions to detect, track and hunt malware and malicious activity. He has been a signature writer for the Emerging Threats team for several years, producing community / premium Suricata signatures to help protect networks worldwide. Jack is a strong believer in the open source mission as well as helping people and organizations solve security issues with open source solutions. He can be reached on Twitter: @malwareforme and resides in the USA.
Michal is part of the Enterprise Information Security team at Mozilla. He protects the Fox. The Firefox. From bad actors. He has designed and deployed the NSM stack in Mozilla datacenters, offices, and cloud. He is one of a two-person team who watches the alerts and reacts, helps with the DFIR, and works closely with the Network Operations team, helping them to review the network architecture (which is changing all the time) from a security point of view.
Anthony supports customers in EMEA, APAC, Americas, and Public Sector with internet of things and machine learning use cases. Anthony works closely with the product team to implement new premium Business Analytics & IoT solutions for Splunk’s customers. His previous roles include cloud strategy, data governance, product development, and geospatial analysis. Anthony is the developer of the Splunk TA for Suricata, which integrates Suricata with Splunk for real-time analysis and correlation.
Jason is a security researcher with global enterprise experience in detecting, hunting and remediating threats with open source technologies. Primarily focusing on network communications, Jason has written thousands of commercial and community Suricata rules for Emerging Threats to help defenders protect their networks. Jason participates as a Signature Development and User Training instructor for the OISF.
He is a four-time published author of network security books through O’Reilly and Syngress. Prior to his current role at Proofpoint, he spent six years at Juniper Networks as a layer 7 security product manager and product line engineer. He started his endeavors in the network security industry working for a security consulting company in Ann Arbor Michigan for four years delivering a variety of network security technologies and services.
Join us 2 days early (November 13-14) for a 2-day Suricata training led by Suricata’s lead developers. The training is being held the same week and the same location as SuriCon 2017. Attend both and receive a 20% discount your registration for the training!