Conference: August 6 - 9, 2002
The Peter Kiewit Institute
Scott Conference Center
Omaha, NE USA
Home Page

CONFERENCE

Conference Proceedings

Welcome Slide Show

Keynotes / Speakers

Conference Schedule

Brochure

SPONSORS

Sponsors

CONTACT INFO

Contact Information

TUTORIALS

FT-1A, FT-1B: Check Point NG Firewall Essentials, Parts I & II

Barry Cooper, Training Director, FishNet Security:Barry Cooper brings 15 years of experience in information Systems, auditing, programming, and networking to the classroom - in addition to 5 years of software training. A skilled instructor and motivator, Barry holds the following certifications: Certified Information System Security Professional, Cisco Certified Network Associate, Check Point Certified Security Administrator, Check Point Certified Security Expert, Check Point Certified Quality of Service Expert, Check Point Certified Security Instructor, Nokia Security Administrator, Nokia Security Administration Certified Instructor, NetScreen Certified Security Administrator, and NetScreen Certified Security Instructor.

FT-2A: Secure Wireless Networks

Matthew Marsh, Paktronix Systems and Steve Nugen, NuGenSoft

Matthew Marsh: Chief Scientist of the NEbraskaCERT, President & Founder of Paktronix Systems LLC, Author of "Policy Routing with Linux", Author of "Managing Secure Networks", Creator of PakSecured Linux. Working with networks since 1983. Obtained admin on my first VAXen in 1976, on Arpa/Bit Net in 1984 (think Internet), working in Network Management since late 1980's on routed IP/IPX/SNA networks. Chief Scientist of the NEbraskaCERT working on IPv4/IPv6/IPSec Integrated Security Networks. Developed the first (and currently still the only) SNMPv3 managed policy routing firewall system for Linux available under GPL at http://www.paksecured.com/ Actively researching management and design of Integrated Security Networks.

Stephen Nugen: Steve Nugen has more than twenty years' experience developing information system technologies in government, academic, and private sectors. Education and credentials include B.S. in Computer Science; M.S. in Computer Engineering; Certified Information Systems Security Professional; and publications in Artificial Intelligence and Information Security. Experience includes Principal Investigator at Iowa State University; Director of Technology at GTE and Raytheon; Founder and Chief Technical Officer of NuGenSoft; and teaching.

FT-2B: StateFull Firewalling in Linux

Oskar Andreasson: Oskar Andreasson is currently occupied as an open source documentation writer, and as the Support Manager at Multisoft Education AB. Started with a VIC-64 in 1987 and learnt to code Basic in the late 1980's. He got interested in system and network security in the beginning of the 1990's. He has since continued in those tracks. Mr. Andreasson has been a vivid Linux user and administrator since 1994.

He is the author of "Linux/Unix" as well as "Windows 2000" courses, and books, available through Multisoft Education. Also author of the Iptables-tutorial available on the Internet, and currently working on two new documents, describing ipsysctl and advanced routing with Linux, that will be available over the Internet in a few months time.

Mr. Andreasson is currently located and settled down in Stockholm, Sweden.

FT-3A: Disaster Preparedness

Harry Bouris, CISSP: Mr. Bouris has over 30 years experience in information and communications security with the Federal Government. For the past eight years, he has served as the Technical Services Director for the B-2 Stealth Bomber System Program Office. In this capacity, he also served as the Information System Security Officer, responsible for the entire Information Assurance Program for two major Air Force weapons systems. He was certified through the International Security Certification Consortium (ISC2) as a Certified Information Systems Security Professional and as a Certified Information Systems Security Officer for Special Compartmentalized Information (SCI) and Special Access Programs (SAP) by the Secretary of the Air Force for Acquisition Security.

FT-3B: Incident Response Teams

Marty Gillespie, CISSP: Marty Gillespie is a Certified Information Systems Security Professional (CISSP) and a Check Point Certified Systems Engineer (CCSE), and is currently working as an independent consultant. Marty has over sixteen years computer security and networking experience for such companies as Lucent Technologies, Cabletron Systems, U. S. Force and a number of government contractors

FT-4A: Viewing Cyber Survivability from Expanded Perspective

Casey J. Dunlevy is a Senior Member of the Technical Staff at the Software Engineering Institute (SEI), and is also the Team Lead for the CERT(r) Analysis Center, which works in close cooperation with the CERT(r) Coordination Center. Mr. Dunlevy is currently coordinating the effort to develop methodologies for predictive analysis of Internet threats. He specializes in strategic analysis of threats to computer networks; and a significant part of his work involves analysis of cyber-terrorism, computer network warfare, and transnational organized crime as well as other potential threat groups.

Prior to joining the SEI, Mr. Dunlevy was the Chief, Computer Network Warfare Analysis Branch for U.S. Space Command and the North American Aerospace Defense Command in Colorado Springs. He has also worked for the Office of Naval Intelligence, the National Security Agency, and other intelligence agencies. During his long intelligence career, Mr. Dunlevy was recognized for work in the areas of computer network warfare, strategic military analysis, ballistic missile defense, Indications and Warnings, terrorism, and crisis response.

Mr. Dunlevy received a BS in political science from the University of the State of New York and received certifications as a Russian and German linguist from the Defense Language Institute in Monterey, California. He was an adjunct professor in international security affairs at the University of Pittsburgh Graduate School for Public and International Affairs and is a frequent guest lecturer at the Heinz School at Carnegie Mellon University. Mr. Dunlevy belongs to the Society of Competitive Intelligence Professionals (SCIP).

FT-4B: Wireless Lab and Demonstration

Eric Holstein, CISCO

TECHNICAL TRACK

TT-1: Security Realities - Interface Between the Cyber and Physical Worlds

Casey J. Dunlevy is a Senior Member of the Technical Staff at the Software Engineering Institute (SEI), and is also the Team Lead for the CERT(r) Analysis Center, which works in close cooperation with the CERT(r) Coordination Center. Mr. Dunlevy is currently coordinating the effort to develop methodologies for predictive analysis of Internet threats. He specializes in strategic analysis of threats to computer networks; and a significant part of his work involves analysis of cyber-terrorism, computer network warfare, and transnational organized crime as well as other potential threat groups.

Prior to joining the SEI, Mr. Dunlevy was the Chief, Computer Network Warfare Analysis Branch for U.S. Space Command and the North American Aerospace Defense Command in Colorado Springs. He has also worked for the Office of Naval Intelligence, the National Security Agency, and other intelligence agencies. During his long intelligence career, Mr. Dunlevy was recognized for work in the areas of computer network warfare, strategic military analysis, ballistic missile defense, Indications and Warnings, terrorism, and crisis response.

Mr. Dunlevy received a BS in political science from the University of the State of New York and received certifications as a Russian and German linguist from the Defense Language Institute in Monterey, California. He was an adjunct professor in international security affairs at the University of Pittsburgh Graduate School for Public and International Affairs and is a frequent guest lecturer at the Heinz School at Carnegie Mellon University. Mr. Dunlevy belongs to the Society of Competitive Intelligence Professionals (SCIP).

TT-2: Script Kiddees - Windows

Erik Hjelmstad, PoliVec, Inc: Erik Hjelmstad has over eight years of network engineering, security engineering, and system administration experience. He has a vast knowledge of NT and UNIX security issues and has led several remote penetration and security assessment engagements. Erik also has extensive experience with Checkpoint Firewall-1 and has assisted with the installation, configuration, and monitoring of several different Firewall-1 systems. He is a Checkpoint Certified Systems Administrator (CCSA) and a Checkpoint Certified Systems Engineer (CCSE). Erik is one of the authors of the open source pwdump3 and pwdump3e products and he has been published in numerous security-oriented publications, such as Business Security Advisor. Erik holds a Bachelor of Science degree in Electrical Engineering from the Colorado School of Mines in Golden, Colorado and a Master of Science degree in Computer Science from Colorado Technical University. Erik has been certified by the ISC2 as a Certified Information System Security Professional (CISSP).

TT-3: Secure Linux

Chris Shutters, PoliVec, Inc: Chris Shutters has over 11 years of experience in the IT field, with comprehensive expertise in the area of information security. Prior to joining PoliVec, he was the Director of Security Tools Development for DMW Worldwide Information Protection Products. Chris has worked as an information security researcher for the United States Government, performing research in both distributed security and intrusion detection. He has also been Director of Operations for a government Computer Emergency Response Team (CERT).

Chris holds a Bachelor of Electrical Engineering degree from the Georgia Institute of Technology in Atlanta, Georgia and has been certified by the ISC2 as a Certified Information System Security Professional (CISSP).

TT-4: Internal Security

Dr. Guy Helmer, Palisade: Guy Helmer is a Senior Software Engineer at Palisade Systems, Inc., where he is building network security and applications protocol management appliances. He received his Ph.D. in Computer Science from Iowa State University in 2000, his M.S. in Computer Science from Iowa State University in 1998, and his B.S. in Computer Science from the South Dakota School of Mines and Technology in 1989. Dr. Helmer spent seven years as a system programmer, network engineer, and system administrator at Dakota State University in Madison, S.D. (one of Yahoo!'s Most Wired Universities in 1998, 1999, and 2000), where accomplishments included networking multiple campuses, establishing the first connection for the state government of South Dakota to the Internet, and engineering one of the first dorm networks in the region that connected every dorm room. His research interests include operating system and network security, intrusion detection, high-performance computation, and software safety.

WT-1: Protecting Apache

Dave Burgess, UNO, MITRE Corp, Nebraska On-Ramp:

WT-2: ADSL Security for Business

Dave Burgess, UNO, MITRE Corp, Nebraska On-Ramp:

WT-3: ISO 17799

Chet Uber, SecurityPosture:

WT-4: The Mathematics of Anomaly Detection

HighTower Software Inc:

HT-1: Critical Infrastructure Protection

Casey J. Dunlevy is a Senior Member of the Technical Staff at the Software Engineering Institute (SEI), and is also the Team Lead for the CERT(r) Analysis Center, which works in close cooperation with the CERT(r) Coordination Center. Mr. Dunlevy is currently coordinating the effort to develop methodologies for predictive analysis of Internet threats. He specializes in strategic analysis of threats to computer networks; and a significant part of his work involves analysis of cyber-terrorism, computer network warfare, and transnational organized crime as well as other potential threat groups.

Prior to joining the SEI, Mr. Dunlevy was the Chief, Computer Network Warfare Analysis Branch for U.S. Space Command and the North American Aerospace Defense Command in Colorado Springs. He has also worked for the Office of Naval Intelligence, the National Security Agency, and other intelligence agencies. During his long intelligence career, Mr. Dunlevy was recognized for work in the areas of computer network warfare, strategic military analysis, ballistic missile defense, Indications and Warnings, terrorism, and crisis response.

Mr. Dunlevy received a BS in political science from the University of the State of New York and received certifications as a Russian and German linguist from the Defense Language Institute in Monterey, California. He was an adjunct professor in international security affairs at the University of Pittsburgh Graduate School for Public and International Affairs and is a frequent guest lecturer at the Heinz School at Carnegie Mellon University. Mr. Dunlevy belongs to the Society of Competitive Intelligence Professionals (SCIP).

HT-2: Cyberspace Autopsy

Douglas G. Conorich, IBM Global Services: Mr. Conorich is the Global Solutions Manager for IBM Global Service's Managed Security Services. In this capacity, he has responsibility for developing new security offerings, insuring that the current offerings are standardized globally, and all training of new members of the MSS team worldwide in how to do "Ethical Hacking" and service delivery. Mr. Conorich teaches people how to use the latest vulnerability testing tools to monitor Internet and Internet connections and develop vulnerably assessments suggesting security related improvements. Mr. Conorich is also actively engaged in the research of bugs and vulnerabilities in computer operating systems and Internet protocols and is involved in the development of customized alerts notifying clients of new potential risks to security. Mr. Conorich has over 30 years of experience with computer security holding a variety of management positions. He joined IBM in 1997. He has held Associate Professor positions at the University of Wisconsin-Milwaukee, the University of Maryland, Chapman College, City College of Chicago, and Hartford Community College. He taught physics, mathematics, solid-state circuit design, and other computer-related courses. Mr. Conorich has undergraduate degrees in Physics, Computer Science, and Meteorology and a Masters Degree in Physics from the University of New Mexico.

HT-3: Directory Security

Alan Mark, Novell, Inc: Alan Mark, Chief Security Strategist, is celebrating 12 years at Novell, and over 20 years in the networking industry. During that time, he has worked on many key projects involving large organizations around the world. Mr. Mark joined Novell New York in 1990 as a Senior Systems Engineer. He later moved to Hong Kong to work with Novell's largest customers in the Pacific Rim. Today he is based at Novell's headquarters in Utah, and travels around the globe as a Security Strategist. Mr. Mark addresses thousands of people every year on a wide-variety of technical and strategic topics, including Internet security technologies and Internet/intranet design.

HT-4: General UNIX Security

T. Steven Barker, Raytheon Company: Mr. T. Steven Barker, Raytheon Company: Mr. T. Steven Barker is a senior systems engineer with Raytheon Company, Command, Control, Communications and Information Systems in Falls Church, Virginia. Present assignment includes system security engineering for computer systems developed for the US Government. Prior to relocating to Falls Church, Mr. Barker was the lead system engineer for a series of satellite communications systems that Raytheon developed for the US Air Force in Omaha, Nebraska. Prior to joining Raytheon (then Hughes Aircraft) in 1995, He was a systems and software engineer for Lockheed Missiles and Space Company in Austin, Texas. Here, he worked on weather imagery ground stations for the Air Force and the Navy. Mr. Barker's extensive professional history also include technical tasks with The Analytic Sciences Corporation (TASC) in Reading, Massachusetts and service in the US Air Force as a meteorologist, technical instructor, and scientific programmer. Mr. Barker has also taught college level classes in meteorology, computer programming, and data communications. Mr. Barker is a Certified Information Systems Security Professional (CISSP). He also belongs to the International Electrical and Electronics Engineers (IEEE) and the IEEE Computer Society.

EXPERT TRACK

TE-1, TE-2: IPTables Connection State Firewall Tutorial

Oskar Andreasson: Oskar Andreasson is currently occupied as an open source documentation writer, and as the Support Manager at Multisoft Education AB. Started with a VIC-64 in 1987 and learnt to code Basic in the late 1980's. He got interested in system and network security in the beginning of the 1990's. He has since continued in those tracks. Mr. Andreasson has been a vivid Linux user and administrator since 1994.

He is the author of "Linux/Unix" as well as "Windows 2000" courses, and books, available through Multisoft Education. Also author of the Iptables-tutorial available on the Internet, and currently working on two new documents, describing ipsysctl and advanced routing with Linux, that will be available over the Internet in a few months time.

Mr. Andreasson is currently located and settled down in Stockholm, Sweden.

TE-3: SNMPv3

Wes Hardaker: Wes Hardaker is a research scientist with the Labs division of Network Associates where he conducts research relating to various aspects of Internet security. Currently his work is focused on the development of a standards based IPsec policy management system for use in managing complex heterogeneous IPsec deployments. This project makes heavy use of SNMPv3 security features and the resulting work will likely be open-sourced.

Wes Hardaker is also the lead developer of the freely available Net-SNMP package (previously known as the ucd-snmp package), which is a highly configurable and extensible SNMP toolkit. He actively participates in the continuing development of the SNMP standard through his participation at IETF meetings and by developing early prototypes of new SNMP technologies within the net-snmp toolkit.

TE-4: CISCO SNMPv3 & Security

Matthew G. Marsh, Paktronix: Matthew has worked in network management and architecture since 1983 specializing in routed IP/IPX/SNA networks. As President of Paktronix Systems LLC he is responsible for all research, design, and implementation of the award winning PakSecured family of Security Products. As Chief Scientist of the NEbraskaCERT he is very active in researching IPv4/IPv6/IPSec Integrated Security Networks and giving seminars and talks on the state of Network Security.

Matthew developed the first (and currently still the only) SNMPv3 managed Policy Routing firewall system for Linux available under GPL at http://www.paksecured.com His certifications include CISSP, MCNE, PSRE, and numerous specific technical specializations.

WE-1, WE-2: WWW Hacking, Parts I & II

Amit Klein, Sanctum Inc:

Amit Klein, Director of Security and Audit Practices for Sanctum Inc. is responsible for defining the security content and audit service practice for Sanctum's application security product portfolio. Prior to Sanctum, Mr Klein served in the Israeli army within the elite R&D unit specializing in mathematical research and software development. Klein has published several papers including most recently, Hacker Repellent, SC Magazine May 2002; Cross Site Scripting Explained; and Combining Model Checking with Deductive Analysis to Verify Real-Life Software. Mr Klein graduated Cum Laude with a B.Sc. in Mathematics and Physics from the Hebrew University of Jerusalem Israel.

WE-3, WE-4: Secure Programming, Parts I & II

Brian Smith, Solutionary, Inc: Brian Smith is Senior Software Engineer currently contracted to Solutionary, Inc. Brian did both his graduate and undergraduate work in Computer Science at the University of South Dakota where he received awards for academic performance and outstanding contributions to the Computer Science department. In 1996 Brian was inducted into Upsilon Pi Epsilon the National Honors society for Computing Sciences. Brian has applied cryptography to an Internet voting pilot project as well as to security related projects for Solutionary, Inc.

HE-1, HE-2: HoneyNets & Pots, Parts I & II

Marcus J. Ranum:

HE-3: AI IDS Techniques

Stephen Nugen: Steve Nugen has more than twenty years' experience developing information system technologies in government, academic, and private sectors. Education and credentials include B.S. in Computer Science; M.S. in Computer Engineering; Certified Information Systems Security Professional; and publications in Artificial Intelligence and Information Security. Experience includes Principal Investigator at Iowa State University; Director of Technology at GTE and Raytheon; Founder and Chief Technical Officer of NuGenSoft; and teaching.

HE-4: IDS for ISPs

IP Revolution:

MANAGEMENT TRACK

TM-1: RSK-RSK Management

Andrew T. Robinson, NMI Information Security: Andrew T. Robinson has over seventeen years of experience in information security, software engineering, and multiplatform integration. Mr. Robinson developed Internet and BITNET applications at the University of Maine between 1984 and 1989. Between 1989 and 1990, Mr. Robinson worked as a network analyst for the Corporation for Research and Educational Networking (CREN), migrating BITNET nodes from IBM's NJE networking protocols to a TCP/IP-based infrastructure. In August 1990, Mr. Robinson returned to Maine and founded NMI Information Security with CREN as his first customer. Over the next twelve years, NMI has extended its information security services to international customers in the banking, nuclear power, public utility, and insurance industries. NMI specializes in secure infrastructure design, security planning, and security testing.

Mr. Robinson has developed a process for developing and maintaining information security policies called RAPID (rapid adaptation process for infosecurity deployment), and in conjunction with other investigators at NMI has developed a process for measuring information security risk called RSK (Robinson/Slobodzian/Krikken).

TM-2: Internet Anonymity

Aaron Grothe: Aaron Grothe is the President/CEO of Heimdall Linux Incorporated http://www.heimdall-linux.com/. Heimdall Linux is developing Linux products, which are being submitted to the National Institute of Standards and Technology's Common Criteria project for independent security evaluation and accreditation. Mr. Grothe is also the current project leader of the Linux Kernel Audit Project (LKAP), which has as one of its goals to perform a source code audit of the Linux Kernel.

TM-3: HIPAA Overview

Jim Bridges,

TM-4: Security Policies

Dr. Bruce V. Hartley, Privisec Inc. Dr. Bruce Hartley has more than 20 years of technical and managerial experience in systems, software and security engineering. He serves as the chair of the technical advisory board at Noochee Solutions, formerly DMW Worldwide, Inc. He was previously the executive vice president and chief operating officer at DMW Worldwide, as well as senior vice president and chief technology officer at Trident Data Systems prior to DMW. His experience includes managing rapid-growth technology companies and creating leading-edge software products. In addition, Dr. Hartley's expertise includes security risk analyses, technical vulnerability assessments, and security tests and evaluations, as well as managing large-scale system integration efforts and supporting government/industry system security initiatives. He is recognized as an industry expert, frequently serving as a panel speaker and roundtable representative at conferences and seminars. In addition, Dr. Hartley is recognized by the National Computer Security Center as a Vendor Security Analyst and has been certified by the ISC2 as a Certified Information System Security Professional (CISSP).

Dr. Hartley's teaching experience includes graduate-level university instruction, and training for commercial employers and government agencies. He has supported the development of several specialized training courses in both the private and government sectors.

Bruce Hartley holds a doctorate degree in computer science from Colorado Technical University in Colorado Springs, Colorado, and a master's degree in computer data management from Webster University in St. Louis, Missouri. In addition, Dr. Hartley holds a bachelor's degree in technical management and computer science and an associate degree in business administration from Regis College in Denver, Colorado. He also holds an associate degree in electronic computer technology from the Community College of the Air Force.

WM-1: Incident Management

Douglas G. Conorich, IBM Global Services: Douglas G. Conorich, IBM Global Services: Mr. Conorich is the Global Solutions Manager for IBM Global Service's Managed Security Services. In this capacity, he has responsibility for developing new security offerings, insuring that the current offerings are standardized globally, and all training of new members of the MSS team worldwide in how to do "Ethical Hacking" and service delivery. Mr. Conorich teaches people how to use the latest vulnerability testing tools to monitor Internet and Internet connections and develop vulnerably assessments suggesting security related improvements. Mr. Conorich is also actively engaged in the research of bugs and vulnerabilities in computer operating systems and Internet protocols and is involved in the development of customized alerts notifying clients of new potential risks to security. Mr. Conorich has over 30 years of experience with computer security holding a variety of management positions. He joined IBM in 1997. He has held Associate Professor positions at the University of Wisconsin-Milwaukee, the University of Maryland, Chapman College, City College of Chicago, and Hartford Community College. He taught physics, mathematics, solid-state circuit design, and other computer-related courses. Mr. Conorich has undergraduate degrees in Physics, Computer Science, and Meteorology and a Masters Degree in Physics from the University of New Mexico.

WM-2:

WM-3: Vulnerability Disclosure

Elias Levy: Elias Levy is chief technology officer and a co-founder of SecurityFocus, responsible for overall site operations. He is a well-respected and sought after computer security spokesperson and visionary. Elias learned security working for several large US corporations and also has insider experience from his working with the security community as the former moderator and keeper of the Bugtraq vulnerability database and mailing list. His seven years of experience with Bugtraq gave him a daily pulse on the strengths and weaknesses in security. Last year Elias Levy was chosen as one of Network Computing's "10 Most Important People of the Decade."

WM-4: Ethical Hacking

Dr. Bruce V. Hartley Dr. Bruce Hartley has more than 20 years of technical and managerial experience in systems, software and security engineering. He serves as the chair of the technical advisory board at Noochee Solutions, formerly DMW Worldwide, Inc. He was previously the executive vice president and chief operating officer at DMW Worldwide, as well as senior vice president and chief technology officer at Trident Data Systems prior to DMW. His experience includes managing rapid-growth technology companies and creating leading-edge software products. In addition, Dr. Hartley's expertise includes security risk analyses, technical vulnerability assessments, and security tests and evaluations, as well as managing large-scale system integration efforts and supporting government/industry system security initiatives. He is recognized as an industry expert, frequently serving as a panel speaker and roundtable representative at conferences and seminars. In addition, Dr. Hartley is recognized by the National Computer Security Center as a Vendor Security Analyst and has been certified by the ISC2 as a Certified Information System Security Professional (CISSP). Dr. Hartley's teaching experience includes graduate-level university instruction, and training for commercial employers and government agencies. He has supported the development of several specialized training courses in both the private and government sectors. Bruce Hartley holds a doctorate degree in computer science from Colorado Technical University in Colorado Springs, Colorado, and a master's degree in computer data management from Webster University in St. Louis, Missouri. In addition, Dr. Hartley holds a bachelor's degree in technical management and computer science and an associate degree in business administration from Regis College in Denver, Colorado. He also holds an associate degree in electronic computer technology from the Community College of the Air Force.

HM-1: Writing Security Policies

Douglas G. Conorich, IBM Global Services: Douglas G. Conorich, IBM Global Services: Mr. Conorich is the Global Solutions Manager for IBM Global Service's Managed Security Services. In this capacity, he has responsibility for developing new security offerings, insuring that the current offerings are standardized globally, and all training of new members of the MSS team worldwide in how to do "Ethical Hacking" and service delivery. Mr. Conorich teaches people how to use the latest vulnerability testing tools to monitor Internet and Internet connections and develop vulnerably assessments suggesting security related improvements. Mr. Conorich is also actively engaged in the research of bugs and vulnerabilities in computer operating systems and Internet protocols and is involved in the development of customized alerts notifying clients of new potential risks to security. Mr. Conorich has over 30 years of experience with computer security holding a variety of management positions. He joined IBM in 1997. He has held Associate Professor positions at the University of Wisconsin-Milwaukee, the University of Maryland, Chapman College, City College of Chicago, and Hartford Community College. He taught physics, mathematics, solid-state circuit design, and other computer-related courses. Mr. Conorich has undergraduate degrees in Physics, Computer Science, and Meteorology and a Masters Degree in Physics from the University of New Mexico.

HM-2: Security in Local & State Goverments

Ron Woerner, CISSP

HM-3: Passwords Weak Link

Erik Hjelmstad, PoliVec, Inc. Erik Hjelmstad, PoliVec, Inc: Erik Hjelmstad has over eight years of network engineering, security engineering, and system administration experience. He has a vast knowledge of NT and UNIX security issues and has led several remote penetration and security assessment engagements. Erik also has extensive experience with Checkpoint Firewall-1 and has assisted with the installation, configuration, and monitoring of several different Firewall-1 systems. He is a Checkpoint Certified Systems Administrator (CCSA) and a Checkpoint Certified Systems Engineer (CCSE). Erik is one of the authors of the open source pwdump3 and pwdump3e products and he has been published in numerous security-oriented publications, such as Business Security Advisor. Erik holds a Bachelor of Science degree in Electrical Engineering from the Colorado School of Mines in Golden, Colorado and a Master of Science degree in Computer Science from Colorado Technical University. Erik has been certified by the ISC2 as a Certified Information System Security Professional (CISSP).

HM-4: Incident Response Teams

Marty Gillespie, CISSP: Marty Gillespie is a Certified Information Systems Security Professional (CISSP) and a Check Point Certified Systems Engineer (CCSE), and is currently working as an independent consultant. Marty has over sixteen years computer security and networking experience for such companies as Lucent Technologies, Cabletron Systems, U. S. Force and a number of government contractors

WIRELESS TRACK

TW-1, TW-2: Wireless Security Architecture

Doug De Yong, Enterasys

Doug De Yong, CISSP: Doug is a Senior Sales Engineering Consultant with Enterasys Networks. He is a Certified Information Systems Security Professional (CISSP), a Check Point Certified Systems Engineer (CCSE), the first Enterasys Secure Harbour Systems Engineer (ESSE), and a Spectrum Solutions Engineer (SSE). Doug has been working with Enterasys for over 5 years helping to design and secure some of the largest corporate and educational networks in the Midwest. He has over two decades of computer security, networking and information technology experience for such organizations as USAF, Kentucky Department of Education, Jewish Hospital, and most of the Kentucky State Universities.

TW-3, TW-4: Hands-On Wireless Lab, Parts I & II

Brian Roberson, OLUG President/Founder: Brian Roberson is the President and Founder of the Omaha area Linux User Group where he actively participates in bi-weekly meeting's performing demonstrations and instruction on various UNIX and Open Source topics. Brian's formal career is at West Interactive where he is the Sr. Network Engineer. His primary responsibility is engineering, designing and implementing data networks for the largest IVR platform in the US, and soon to be the World. He single handedly developed a network based intrusion detection system integrating Open Source and commercial products that truly complement every aspect of NIDS. Brian is active in various GNU projects such as SAMBA, an SMB server for UNIX.

WW-1: Wireless & IPSec

Matthew Marsh: Chief Scientist of the NEbraskaCERT, President & Founder of Paktronix Systems LLC, Author of "Policy Routing with Linux", Author of "Managing Secure Networks", Creator of PakSecured Linux. Working with networks since 1983. Obtained admin on my first VAXen in 1976, on Arpa/Bit Net in 1984 (think Internet), working in Network Management since late 1980's on routed IP/IPX/SNA networks. Chief Scientist of the NEbraskaCERT working on IPv4/IPv6/IPSec Integrated Security Networks. Developed the first (and currently still the only) SNMPv3 managed policy routing firewall system for Linux available under GPL at http://www.paksecured.com/. Actively researching management and design of Integrated Security Networks.

WW-2: Wireless Snooping

Brian Roberson, OLUG President/Founder: Brian Roberson is the President and Founder of the Omaha area Linux User Group where he actively participates in bi-weekly meeting's performing demonstrations and instruction on various UNIX and Open Source topics. Brian's formal career is at West Interactive where he is the Sr. Network Engineer. His primary responsibility is engineering, designing and implementing data networks for the largest IVR platform in the US, and soon to be the World. He single handedly developed a network based intrusion detection system integrating Open Source and commercial products that truly complement every aspect of NIDS. Brian is active in various GNU projects such as SAMBA, an SMB server for UNIX.

WW-3: Wireless Internet Threats

TBD

WW-4: Wireless Security

Ashok Fichadia, Union Pacific Railroad: Ashok Fichadia currently manages the information systems audits for a Fortune 500 company. He has conducts and supervises technical audits for several platforms and networks and is frequently consulted on various security issues. He is an IIA certified instructor and has taught "Auditing Information Systems" for the Institute of Internal Auditors. He is currently teaching a course on "Information Security" to graduate students at the University of Kansas. In addition, he has demonstrated several hacking techniques and countermeasures to students and faculty members at various universities. Ashok has an MBA and an MS from University of Kansas and is CISA certified.

HW-1, HW-2: Wireless Security Demo, Parts I & II

James Nelson

HW-3: Joan Ross, enCircle Corp Joan Ross, CISSP is the President/Founder of enCircle Corporation.

HW-4 Jeff Guilfoyle, VP e-Security, Solutionary, Inc: Jeffrey Guilfoyle is a founding partner and Vice President of e-Security for Solutionary, Inc. Jeff, a Certified Information Systems Security Professional (CISSP), is responsible for research and development of products, networks, systems, policies and procedures as they relate to security. Jeff has experience with a wide range of physical and logical security components, and is active in the implementation of new technologies into Solutionary's Security Operations Center, including a voice over IP phone system, smart cards and biometric authentication. He also has over 10 years of experience in data communications, technical sales, customer support and management, through his employment at EMC Corporation, Bay Networks (now Nortel Networks) and ITI Marketing Services. Jeff is a Cisco Certified Network Associate and Nortel Networks Certified Support and Design Specialist. He is also a member of the FBI Omaha Chapter of InfraGard.

CERT Conference 2002 is brought to you by NEbraskaCERT
*CERT is a servicemark of Carnegie Mellon University. Used with permission.