As CEO, Randy leads the company vision and innovation. He is a widely-respected authority in network security monitoring and forensics technology. A military veteran, engineer, and serial entrepreneur, Randy has over 25 years of technology leadership experience. He has launched, led, and sold two IT security companies, including nPulse Technologies, which was acquired by FireEye, Inc. He has a long association with Suricata, both as a user and contributor, and served on the Technical Advisory Board for OISF.
Pierre is interested in various security topics such as Operating Systems, boot sequence, compilers and languages, and new intrusion detection methods. He’s also trying to link all these topics by improving detection tools, writing safe parsers and deploying tools in a secure architecture. He is also a Debian Developer and has been involved in Free Software for many years.
I am first of all a software engineer, forever. I have more than 20 years of experience of software development in telecommunications. I have mainly designed real time software targeted for real time boards. I work at present as software team leader engineer for Thales Communications & Security in France. Since 2010, I am specialized in the field of the IT software security. In particular, I realize and test new equipment made for the IP network flow analysis field.
After 21 years of classified intelligence work for the US Air Force, Brad transitioned to cyber security in 2010, specializing in network traffic analysis at Palo Alto Networks. He is also a handler for the Internet Storm Center (ISC) and has posted more than 100 diaries at isc.sans.edu. Brad routinely blogs technical details and analysis of infection traffic at www.malware-traffic-analysis.net, where he provides traffic analysis exercises and over 1,000 malware and pcap samples to information security professionals.
Travis has deep roots in the IT world, but transitioned to security in 2007. He now spends his days detecting, hunting, and remediating threats using open source technologies. Travis has written over 3000 rules for the Emerging Threats rulesets both as a open source contributor and professional rule writer. As an avid outdoorsman, Travis can be found wandering the wilderness of Montana when not glued to a terminal window.
Victor has been active as a software developer in the infosec community for many years. He is the creator of the Vuurmuur firewall project, has been one of the developers at the Snort_inline IPS project. Victor has spent the last years doing contract development on Open Source security software including significant additions to Snort. At the end of 2007 he started development on the OISF codebase on which he now leads the development effort. Victor maintains a blog at http://www.inliniac.net/blog/ and uses twitter at http://twitter.com/inliniac.
Eric is an active member of the security and open source communities. He is a Netfilter Core Team member working mainly on communications between kernel and userland. He works on the development of Suricata, the open source IDS/IPS since 2009 and he is currently one of the Suricata core developers. He is also one of the founders of Stamus Networks, a company providing security solutions based on Suricata.
I am a data nerd. I have been working in the financial industry for the last 10 years focusing on cyber security and data analytics. I hold a masters degree in Business Analytics from NYU Stern School of Business. In my spare time, I enjoy volunteering with DataKind to work on data science projects for non-profits. I am also an avid swimmer and water polo player. Twitter: @blodge8
Giuseppe is an open source software developer involved in the development of network security software. He started his contribution in the open source world with Netfilter organization, which he is still a member of, then he joined OISF. He is involved in Suricata development at Stamus Networks.
Peter has 15 years experience in the IT industry, including enterprise level IT security practice. An adamant admirer and explorer of innovative open source security software, Peter is currently a Security Solution Architect. He maintains some additional info points of interest about Suricata: www.pevma.blogspot.com, https://github.com/pevma, and https://twitter.com/pevma.
Kelley combines over 15 years in business with a passion for facilitating conversations around responsible digital citizenship, digital safety, and free speech online. Kelley combines her skill in strategic business development with a unique perspective as a survivor of cyberstalking. Drawing on current trends and conversations in digital security with local and federal law enforcement, information security experts and national resources she creates strategies incorporating the human side of information security. Kelley holds a BS in Marketing, an MBA and a PhD in Information Security from Purdue.
Jack is a security researcher who focuses on open source solutions to detect, track and hunt malware and malicious activity. He has been a signature writer for the Emerging Threats team for several years, producing community / premium Suricata signatures to help protect networks worldwide. Jack is a strong believer in the open source mission as well as helping people and organizations solve security issues with open source solutions. He can be reached on Twitter: @malwareforme and resides in the USA.
Michal is part of the Enterprise Information Security team at Mozilla. He protects the Fox. The Firefox. From bad actors. He has designed and deployed the NSM stack in Mozilla datacenters, offices, and cloud. He is one of a two-person team who watches the alerts and reacts, helps with the DFIR, and works closely with the Network Operations team, helping them to review the network architecture (which is changing all the time) from a security point of view.
Gene drives the technology vision and architecture for ProtectWise. He has more than 20 years experience in software development, cloud computing, security-as-a-service, and distributed systems. Prior to founding ProtectWise he was Founder and CTO at TagLabs (a mobile tagging company), was a Principal Software Engineer at McAfee, and held engineering roles at MX Logic and GDX. Early in his career, Gene developed financial forecasting, market analysis, and service capacity planning software for Hewitt Associates.
Anthony supports customers in EMEA, APAC, Americas, and Public Sector with internet of things and machine learning use cases. Anthony works closely with the product team to implement new premium Business Analytics & IoT solutions for Splunk’s customers. His previous roles include cloud strategy, data governance, product development, and geospatial analysis. Anthony is the developer of the Splunk TA for Suricata, which integrates Suricata with Splunk for real-time analysis and correlation.
Will builds solutions for the next generation of security problems. Previously he worked in SecureWorks’ Counter Threat Unit, where he lead the design and development of a threat intelligence exchange, tracked vulnerability and malware trends, and developed countermeasures for the iSensor, the company’s managed intrusion prevention service. He worked in research and security operations at Virginia Polytechnic Institute and at the University of Georgia. He holds a BS in Computer Science from UGA.
Rich is a senior software engineer at ProtectWise, where he focuses on realtime processing. His background is high performance computing and machine learning. He holds MS degrees in Electrical Engineering and Computer Engineering and a BS in Computer Science from Missouri University of Science & Technology.
David currently researches the latest vulnerabilities and threats, and crafts, tests, refines, and deploys Suricata and Snort rules for over six thousand managed and monitored devices to protect myriad clients across diverse industries. With more than 15 years’ experience in IT, David is a big supporter of Suricata from its inception, excited by its past success, current community, and bright future. He holds a BS in Computer Science and an MS in Information Security from Georgia Tech.
Jason is a security researcher with global enterprise experience in detecting, hunting and remediating threats with open source technologies. Primarily focusing on network communications, Jason has written thousands of commercial and community Suricata rules for Emerging Threats to help defenders protect their networks. Jason participates as a Signature Development and User Training instructor for the OISF.
He is a four-time published author of network security books through O’Reilly and Syngress. Prior to his current role at Proofpoint, he spent six years at Juniper Networks as a layer 7 security product manager and product line engineer. He started his endeavors in the network security industry working for a security consulting company in Ann Arbor Michigan for four years delivering a variety of network security technologies and services.
Robert Haist, DCSO
Phillip Schildein, DCSO
Join us 2 days early (November 13-14) for a 2-day Suricata training led by Suricata’s lead developers. The training is being held the same week and the same location as SuriCon 2017. Attend both and receive a 20% discount your registration for the training!
Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. It is open source and owned by a community-run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.
SuriCon is dedicated to providing a community-centric, safe and harassment-free conference experience for everyone, regardless and not limited to, of gender, sexual orientation, disability, physical appearance, body size, race or religion.
We do not tolerate harassment of conference participants in any form. We also expect all attendees and sponsors to help create a pleasant experience for all conference participants. Unacceptable behavior can result in participants being asked to leave or sponsors being asked to remove their booth and personnel from the exhibit floor without refund.