Elliot Kendall (Brandeis University)
Higher Education Copyright and Bandwidth Practices
While pursuing his B.A. in Computer Science at Brandeis University, Elliot Kendall worked part-time for the school’s systems group. After graduating, he stayed on as a full-time systems administrator before recently shifting focus to security. He has developed several security solutions based on open source software and higher education community resources. He is currently researching trends in attacks on higher education targets with the goal of improving technological defenses and user education.
Joel Rosenblatt (Columbia University)
Automated DMCA Complaint Processing
Joel Rosenblatt has been in IT at Columbia University for the last 31 years. He is currently the head of the Computer and Network security group, part of the Columbia Information Security Office. He is responsible for overseeing the security for the approximately 65,000 nodes that make up the Columbia University network. Additional responsibilities include DMCA compliance and investigations involving law enforcement. Joel is a member of Infraguard, NYECTF and other organizations that he can neither confirm or deny the existence of.
Ron Weikers, Esq. (Weikers & Co. | Software-Law.com)
Security Breach Notification Laws
Ron Weikers, a software attorney in Manchester, New Hampshire, handles software licensing, data security/privacy and litigation matters for clients across the country. Ron has practiced computer law since 1988 in Silicon Valley, Philadelphia, Boston and New Hampshire. Ron is a graduate of Villanova University School of Law and Carnegie Mellon University. Prior to law school, Ron worked for Epson America. He is a co-author of “Data Security and Privacy Law,” and he frequently publishes and lectures on various aspects of computer law. Ron is also an Adjunct Professor of Law at Franklin Pierce Law Center in Concord, NH. He can be reached at (603) 647-2000, RWeikers@Software-Law.com and http://www.Software-Law.com.
James Burrell (Federal Bureau of Investigation)
Computer Intrusion and Cyber Crime Investigations
James Burrell heads the FBI Counterterrorism/Counterintelligence/Criminal Computer Intrusion, Cyber Crime, and Computer Analysis Response Team (CART) Programs for the northeastern region of the United States. He previously served in the Counterterrorism and Cyber Divisions as the Chief of the FBI Computer Intrusion Unit and the International Investigative Operations Unit at FBI Headquarters in Washington, D.C. He is a doctoral candidate and holds a B.S. in electrical engineering and a M.S. degree in telecommunications/networking.
Sherri Davidoff (Intelguardians)
Web Application Attack Vectors
Sherri is a Senior Security Analyst with Intelguardians. She began her security career as a member of MIT’s network security team, where she designed a network flow analysis tool and handled incident response. She then held a post-baccalaureate internship at Los Alamos National Laboratory in the Nonproliferation and International Security division. Sherri was responsible for UNIX/Linux security and managed the incident response team for the Boston Children’s Hospital. She has an S.B. in Computer Science and Electric Engineering from the Massachusetts Institute of Technology.
Phil Rodrigues (NET2S)
DIY Web Application Assessments
Phil Rodrigues is a Senior Security Consultant with NET2S in New York City, where he performs application, network, and architecture security assessments for clients in the financial services industry. He is also a Visiting Scientist at the Software Engineering Institute at Carnegie Mellon University, where he teaches the CERT/CC’s Advanced Information Security class a few weeks per year. Prior to NET2S, Phil worked as an information security analyst at New York University, the University of Connecticut, and the US Army Reserves, where he recently completed a 12-year enlistment.
Randy Marchany (Virginia Tech)
PCI and Departmental Security Review
Randy is the Director of VA Tech’s IT Security Laboratory and the University’s Assistant IT Security Officer. He is a co-author of the original SANS Top 10 Internet Threats, the SANS Top 20 Internet Threats, the SANS Consensus Roadmap for Defeating DDoS Attacks, and the SANS Incident Response: Step-by-Step guides. He is a member of the Center for Internet Security development team that produced and tested the CIS Solaris, HPUX, AIX, Linux and Windows2000/XP security benchmarks and scoring tools. He was a member of the White House Partnership for Critical Infrastructure Security working group that developed a Consensus Roadmap for responding to the DDOS attacks of 2000.