whitehat

Stefano Zanero

IRL Name: 
Stefano Zanero
Biography: 

Stefano Zanero holds a M.Sc. and a Ph.D. degree in Computer Engineering from the Politecnico of Milano university. His doctoral thesis deals with the application of unsupervised learning algorithms to Intrusion Detection Systems. His current research interests include, besides learning IDSs, the security of web applications and computer virology. He has been a speaker at international scientific and technical conferences such as CanSecWest, Black Hat and IT Underground, and he is the author and co-author of books and articles published in international, peer reviewed journals and conferences. Since 2004 he is a partner and CTO of Secure Network, a firm specializing in information security training and consulting, based in Milan, Italy.

Pictures: 
References

Philippe Biondi

IRL Name: 
Philippe Biondi
Biography: 

Philippe Biondi works as a research engineer at EADS Corporate Research Center in the system information security lab. He has given many talks in security or open source conferences.

References

Tom Olzak

IRL Name: 
Tom Olzak
Biography: 

Tom Olzak is a security researcher and contributor for the InfoSec Institute and an IT professional with over 27 years of experience in programming, network engineering and security. He has an MBA as well as CISSP and MCSE certifications. He is currently an online instructor for the University of Phoenix. He has held positions as an IS director, director of infrastructure engineering, director of information security, and programming manager at a variety of manufacturing, health care, and distribution companies.

Pictures: 
References

Chong Rong Hwa

IRL Name: 
Chong Rong Hwa
Biography: 

Chong Rong Hwa is a Singaporean Malware Analyst who works for Infocomm Development Authority (IDA) of Singapore, leading an anti-malware team to support the SingCERT and Singapore Government IT Security Incident Response teams. Aside from that, he teaches Malware Analysis course (for Diploma in Information Security) in Nanyang Polytechinic (Singapore) as a part-time lecturer. He is also engaged as a penetration tester to work on the following areas: penetrate systems and web applications using manual analysis techniques and automated scanning tools; perform source code review (targeting at important application modules); identify cryptographic flaws of custom protocol formats; write Metasploit encoding modules to evade IDS/IPS or Anti-virus software; and develop custom scripts to exploit a targeted system or service.

Pictures: 
References

Kyriakos Economou

IRL Name: 
Kyriakos Economou
Biography: 

Kyriakos Economou is a Threat Researcher at Sophos who is interested in the analysis and the reverse engineering of commercial/custom packers and software protections for the last 6 years, he was a speaker in Athcon 2011 and also the author of the Reversing Challenges for 2011 and 2012 for Athcon conference. Except from taking them apart, he also has a deep interest in studying anti-reversing tricks and creating his own custom tricks that go from simple debugger detection to custom obfuscation and other anti-analysis mechanisms for the sake of imagination and creativity.

Pictures: 
References

Matthew Dempsky

IRL Name: 
Matthew Dempsky
Biography: 

Known for finding the first public vulnerability in DJB DNS thus winning the 1,000 dollar prize after 8 years of no one else finding anything.

References

jkouns

IRL Name: 
Jake Kouns
Biography: 

Jake Kouns is a business-focused technology and information security executive from Richmond, Virginia Area. He holds a number of certifications including ISC2’s CISSP, and ISACA’s CISM, CISA and CGEIT. He is currently the Director of Cyber Security and Technology Risks Underwriting for Markel Corporation. He has presented at security conferences including the RSA Conference, CISO Executive Summit, EntNet IEEE GlobeCom, CanSecWest and SyScan.He has also participated in Google's Summer of Code and volunteered time to mentor students during the 2006, 2007 and 2008 programs.

Pictures: 
References

Altais, J Street, Jayson E. Street

IRL Name: 
Jayson E. Street
Biography: 

Jayson E. Street is an American IT security consultant and infosec personnel who has been involved in the consultation with the FBI on network breaches which resulted in the capture and prosecution of the criminals involved. In 2007, he consulted with the Secret Service on the WI-FI security posture at the White House. He is on the SANS GIAC Advisory Board as well as a mentor for SANS.

Pictures: 
References

Sergei Golubchik

IRL Name: 
Sergei Golubchik
Biography: 

Sergei Golubchik started on modifying MySQL source code in 1998, and has continued doing it as a MySQL AB employee since 2000. He is currently the VP Architecture at Monty Program Ab on MariaDB and he is responsible for code reviews, replies to bug reports, security reports, and the FULLTEXT search implementation. He works and lives in Germany, near Cologne, with his wife and two kids.

Pictures: 
References

Joel Langill

IRL Name: 
Joel Langill
Biography: 

Joel Langill is a security researcher and instructor for InfoSec Institute and has over 25 years of control systems experience. His employers have included major companies such as General Electric, Shell Oil Company, Honeywell Process Solutions, and ENGlobal Automation. He has played a central role in the analysis and implications of the Stuxnet worm, including new methods of mitigating current and future attacks on critical infrastructure. Joel blogs on evaluation and security of SCADA and other industrial control systems, and is also a guest blogger with Byres Security. Joel served as the lead boot-camp instructor for InfoSec Institute's SCADA Security course. He is the Director of Critical Infrastructure and SCADA representative for the Cyber Security Forum Initiative, where he was a lead contributor to a report on the use of could in cyber warfare. He is a Certified Ethical Hacker, Certified Penetration Test, Cisco Certified Network Associate, and TÜV Functional Safety Engineer.

Pictures: 
References
Syndicate content