Monthly Archives: April 2015
Jason Scott @textfiles http://textfiles.com Jason Scott is an archivist, historian, documentary filmmaker, information collector, and public speaker. He figured you’d be sick of historical computing by now, but it’s not happening. All Watched Over By Machines of Loving Grace For over a century, the selling of computers as the inevitable tools of liberation, productivity, […]
Elissa “#LADYBOSS” Shevinsky @ElissaShevinsky http://www.businessinsider.com/author/elissa-shevinsky Elissa Shevinsky is CEO of JeKuDo Privacy Company. JeKuDo is building the best easy to use privacy tools, and is funded by the Mach37 cyber-security accelerator in Virginia. Shevinsky is a frequent writer and speaker, and most recently gave talks at ShmooCon, DefCon, Pii2014, SXSW, the Computers Freedom and […]
Adam Crosby Former IDS analyst turned red teamer turned powerpoint jockey née cloud architect. Allergic to alcohol, compensates with Diet Coke. Embracing the Cloud It’s inevitable at this point, so rather than fighting, you may as well embrace it – cloud computing is coming to your organization soon (or more realistically, is already there, […]
Mark Painter http://h30499.www3.hp.com/t5/user/viewprofilepage/user-id/604506 @secpainter Mark Painter currently serves as a Security Evangelist for HP Enterprise Security Products. In this role, he is for responsible for educating security professionals, customers, executives and other groups about the risks of security vulnerabilities and HP ESP security solutions. Mark has played an active role in the security industry […]
Allen Householder @__adh__ https://www.cert.org/blogs/certcc/ Allen Householder is a Senior Vulnerability & Incident Researcher at the CERT Coordination Center (CERT/CC). He has been involved in internet security since his first professional job in 1995, where a few weeks after starting at a Fortune 500 company he was told “You’re the IP & DNS guy” and […]
Bill Weinberg @linuxpundit http://osdelivers.blackducksoftware.com/author/bill-weinberg/ Bill Weinberg helps Fortune 1000 clients create sound approaches to enable, build, and deploy software for intelligent devices, enterprise data centers, and cloud infrastructure. Working with FOSS since 1997, Bill also boasts more than thirty years of experience in embedded and open systems, telecommunications, and enterprise software. As a founding […]
David J Bianco @DavidJBianco http://detect-respond.blogspot.com Before coming to work as a Security Architect and DFIR subject matter expert at Sqrrl, David led the hunt team at Mandiant, helping to develop and prototype innovative approaches to detect and respond to network attacks. Prior to that, he spent five years helping to build an intel-driven detection […]
Pete Herzog www.isecom.org @peteherzog Pete Herzog is the co-founder of ISECOM and the lead security researcher and creator of the OSSTMM. His analysis of security, hacking, trust, fraud, and neuro-hacking have shown up in thousands of research papers, books, and government documents around the world. He’s passionate about hacking and figuring out how things (and […]
Caleb “chill” Crable @dirtywhitehat Caleb is a long-time contributor to the information security scene. A dirty whitehat, Caleb’s career spans various stints at information technology firms where he managed malware response teams, researched web-based security vulnerabilities and tested security products. He is a frequent presenter at technology security events where he shares information and […]
The full schedule for the RV4sec 2015 conference is now published! Registration & breakfast start at 8 AM on Thursday, June 4th and end at 6 PM (followed by the after party). Registration and breakfast start again at 8 AM Friday, June 5th and end at 4 PM, followed immediately by the closing reception at […]