After 21 years of classified intelligence work for the US Air Force, Brad transitioned to cyber security in 2010, specializing in network traffic analysis at Palo Alto Networks. He is also a handler for the Internet Storm Center (ISC) and has posted more than 100 diaries at isc.sans.edu. Brad routinely blogs technical details and analysis of infection traffic at www.malware-traffic-analysis.net, where he provides traffic analysis exercises and over 1,000 malware and pcap samples to information security professionals.
Victor has been active as a software developer in the infosec community for many years. He is the creator of the Vuurmuur firewall project, has been one of the developers at the Snort_inline IPS project. Victor has spent the last years doing contract development on Open Source security software including significant additions to Snort. At the end of 2007 he started development on the OISF codebase on which he now leads the development effort. Victor maintains a blog at http://www.inliniac.net/blog/ and uses twitter at http://twitter.com/inliniac.
Eric is an active member of the security and open source communities. He is a Netfilter Core Team member working mainly on communications between kernel and userland. He works on the development of Suricata, the open source IDS/IPS since 2009 and he is currently one of the Suricata core developers. He is also one of the founders of Stamus Networks, a company providing security solutions based on Suricata.
I am a data nerd. I have been working in the financial industry for the last 10 years focusing on cyber security and data analytics. I hold a masters degree in Business Analytics from NYU Stern School of Business. In my spare time, I enjoy volunteering with DataKind to work on data science projects for non-profits. I am also an avid swimmer and water polo player. Twitter: @blodge8
Giuseppe is an open source software developer involved in the development of network security software. He started his contribution in the open source world with Netfilter organization, which he is still a member of, then he joined OISF. He is involved in Suricata development at Stamus Networks.
Peter has 15 years experience in the IT industry, including enterprise level IT security practice. An adamant admirer and explorer of innovative open source security software, Peter is currently a Security Solution Architect. He maintains some additional info points of interest about Suricata: www.pevma.blogspot.com, https://github.com/pevma, and https://twitter.com/pevma.
Kelley combines over 15 years in business with a passion for facilitating conversations around responsible digital citizenship, digital safety, and free speech online. Kelley combines her skill in strategic business development with a unique perspective as a survivor of cyberstalking. Drawing on current trends and conversations in digital security with local and federal law enforcement, information security experts and national resources she creates strategies incorporating the human side of information security. Kelley holds a BS in Marketing, an MBA and a PhD in Information Security from Purdue.
Jack is a security researcher who focuses on open source solutions to detect, track and hunt malware and malicious activity. He has been a signature writer for the Emerging Threats team for several years, producing community / premium Suricata signatures to help protect networks worldwide. Jack is a strong believer in the open source mission as well as helping people and organizations solve security issues with open source solutions. He can be reached on Twitter: @malwareforme and resides in the USA.
Michal is part of the Enterprise Information Security team at Mozilla. He protects the Fox. The Firefox. From bad actors. He has designed and deployed the NSM stack in Mozilla datacenters, offices, and cloud. He is one of a two-person team who watches the alerts and reacts, helps with the DFIR, and works closely with the Network Operations team, helping them to review the network architecture (which is changing all the time) from a security point of view.
Anthony supports customers in EMEA, APAC, Americas, and Public Sector with internet of things and machine learning use cases. Anthony works closely with the product team to implement new premium Business Analytics & IoT solutions for Splunk’s customers. His previous roles include cloud strategy, data governance, product development, and geospatial analysis. Anthony is the developer of the Splunk TA for Suricata, which integrates Suricata with Splunk for real-time analysis and correlation.
Jason is a security researcher with global enterprise experience in detecting, hunting and remediating threats with open source technologies. Primarily focusing on network communications, Jason has written thousands of commercial and community Suricata rules for Emerging Threats to help defenders protect their networks. Jason participates as a Signature Development and User Training instructor for the OISF.
He is a four-time published author of network security books through O’Reilly and Syngress. Prior to his current role at Proofpoint, he spent six years at Juniper Networks as a layer 7 security product manager and product line engineer. He started his endeavors in the network security industry working for a security consulting company in Ann Arbor Michigan for four years delivering a variety of network security technologies and services.
Join us 2 days early (November 13-14) for a 2-day Suricata training led by Suricata’s lead developers. The training is being held the same week and the same location as SuriCon 2017. Attend both and receive a 20% discount your registration for the training!
Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. It is open source and owned by a community-run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.
SuriCon is dedicated to providing a community-centric, safe and harassment-free conference experience for everyone, regardless and not limited to, of gender, sexual orientation, disability, physical appearance, body size, race or religion.
We do not tolerate harassment of conference participants in any form. We also expect all attendees and sponsors to help create a pleasant experience for all conference participants. Unacceptable behavior can result in participants being asked to leave or sponsors being asked to remove their booth and personnel from the exhibit floor without refund.