3 Days Left to Save $400 on SANS Security East 2016

Mentor: Bios

Mentors are highly qualified, experienced professionals who make themselves available in your local area to help you learn the course material and get certified. Each Mentor is hand-selected from students that have completed their relevant GIAC certification with scores of 85% or higher.

Ali, Ahmed

Ahmed Ali is currently the Head of Technical Department at Contego Solutions where he consults for clients on Information Security, Incident Response and Digital Forensic requirements. Ahmed is certified in different technical qualifications which include MCP, MCSA, MCSE, CCNA, CCNP, ACE, EnCE, GCIH, GCFE, GCFA . Ahmed has over fourteen years of experience in Information Security, Incident Response and Digital Forensic Solutions Design, and Deployment. With his extensive knowledge in Digital Forensics, he has consulted for enterprises, government and law enforcement agencies on designing secure digital forensic labs with the latest digital forensics solutions. Ahmed is specialized in Digital Forensics Laboratories Design, Digital Investigation Systems, Computer Forensics Systems, Mobile Forensics Systems, Network and Media Forensics Systems, Incident Handling and Response. He has also trained commercial and government agencies on IT Security and digital Forensics acquisitions and analysis. Besides consulting and advising clients across the GCC, Ahmed previously worked at First Information Security and Etisalat.

Arndt, James

James Arndt has been to numerous SANS training events and would like to share his knowledge gained with you. With his passion for security and years of classroom experience, you will gain practical knowledge and skills to take back to your company. James is a Security Engineer at the American Transmission Company based in the Milwaukee area. There he focuses on access management, vulnerability management, and reverse engineering whatever malware or malicious document comes his way. You might also find James hanging out with his family, playing guitar, or tinkering around in his basement lab.

Barone, Joshua

Joshua Barone has over 10 years of experience as a software developer, with a majority of that time specialized in security design and development. Joshua Barone has a core background in Java, .Net, Python, and security design principles. Joshua specializes in .Net and Java Enterprise technologies, Web Services, Agile Methodologies, Open Source, and Test-Driven Development. He is familiar with a variety of platforms (Windows, Mac OS X, Linux, Unix), databases (PostrgreSQL, MySQL, MSSQL, Oracle), J2EE Application Servers, Software Development Methodologies and Tools. Joshua is also experienced in security vulnerability assessment for platforms and applications. Joshua is a Certified Information System Security Professional (CISSP) and holds GIAC Security Essentials (GSEC) and Certified Incident Handler (GCIH) certifications, as well as a Master's in Computer Science from the University of New Orleans. He is currently a Senior Information Security Engineer for Geocent.

Check out Joshua's Blog: http://caveconfessions.com

LinkedIn: https://www.linkedin.com/in/jmbarone/

Borso, Serge

Over the course of Serge's 10+ years as a security professional he has had the opportunity to work for various organizations and clients on all sorts of initiatives, ranging from implementing transparent biometric user authentication in online banking applications to dumpster diving and penetration testing. Serge earned his Bachelor's of Science degree in Electronic Business Management and a Master's of Science degree in Computer Systems Security prior to earning the CISSP and three SANS certifications: GPEN, GCFA and GWAPT. Prior to his current role, Serge was responsible for application security, fraud prevention, audit compliance, vulnerability assessing, security awareness and the like in an electronic banking environment encompassing hundreds of servers, thousands of websites and over one million unique end users.


Bougere, Daniel

Dan Bougere has over 15 years of experience in the information technology field. Currently, he is the Director of Incident Response Services for Soteria, LLC. His prior experience includes being a Global Network Exploitation and Vulnerability Analyst at the NSA and an Intrusion Detection Analyst on contract to the High Performance Computer Modernization Office's DREN/SDREN network. Dan holds a B.S. in Software Engineering Technology from the University of Southern Mississippi, an M.S. in Information Assurance from Capitol College, and an M.S. in Technology Studies from Eastern Michigan University. He also holds the CISSP, GCIH, GCIA, GSEC, GXPN, GNFA and multiple other industry certifications. Dan enjoys being a geek, and loves spending time with fellow like-minded individuals. He has done various informal and formalized training sessions, and takes pride in making sure that he keeps his students/attendees interested and involved in the subject matter. There are aspects of computer security that can be exciting for anyone, and he makes sure that carries over to his training.


Burton, Gene

Gene Kelly Burton is a Senior Network Architect with over 20 years experience in the IT industry working for various companies providing Enterprise Networking and Security solutions for a variety of customers

Kelly began his career with the Federal government after obtaining an Electrical Engineering degree from Old Dominion University in 1989. Kelly was trained by the government as a Nuclear Engineer and then began working in IT in 1994. Kelly started in IT as a Field Service engineer, repairing and troubleshooting desktop PCs and worked his way up to Network Administrator and eventually to the lead of Network Security for one of the four Navy Shipyards. Along the way, Kelly obtained several professional certifications: Certified Novell Engineer (CNE), Microsoft Certified Systems Engineer (MCSE), Cisco Certified Networking Professional (CCNP), GIAC Security Essentials Certification - Gold (GSEC) and the Certified Information Systems Security Professional (CISSP).

Most recently, Kelly obtained the Project Management Professional (PMP) certification. After working for the government for 18 years, Kelly became a private consultant. Kelly is currently working for HP as a project manager overseeing a wide variety of projects that cover networking, storage and data center consulting.

Kelly is excited about becoming a mentor as it allows him to become a part of the SANS community which has helped so many develop and increase their security knowledge. Kelly's first SANS conference was in 2002 and it was the best training conference he has ever attended. Kelly obtained the GSEC - Gold certification in 2003 and has worked diligently to maintain it ever since. Kelly is excited about mentoring the GSEC course as it provides a foundation of security knowledge for IT professionals looking for the latest information on securing systems and organizations.

Caiado, Marcelo

Marcelo has an extensive and diversified experience within the information technology sector. He has been carrying out computer forensics investigations for over 8 years. Worked with incident response / computer emergency response, being responsible for conducting investigations and responding to networking intrusion attempts. He investigated and handled privacy-related incidents and consumer complaint in liaison with Legal and Human Resources departments. Analyzed and documented, including root cause analysis, information security incidents as well as the analysis of the circumstances enabling or permitting these same incidents to take place, including offering remediation strategies. Investigated and immediately stopped leaks and inadvertent disclosures of confidential information. Developed policies and security awareness programs. Worked with highly sensitive information in a team environment.

Marcelo enforced Firewall, Intrusion Prevention System (IPS), Demilitarized Zone (DMZ), anti-virus and anti-spam configuration and maintenance. He assisted with the selection, installation, and adoption of automated tools that enforce or monitor the compliance with information security policies, procedures, standards, and similar information security requirements. He analyzed and documented information security incidents as well as the analysis of the circumstances enabling or permitting these same incidents to take place. Audited, verified network security and gave recommendations to improve the network security. Executed wireless evaluations and security auditings. Advised organizations with current information about information security technologies and issues and researched and recommended solutions. Wrote user manuals on security softwares and computer, email and Internet user policy. Developed and implemented user security awareness programs, with seminars, conferences, folders, newsletters and helpful suggestions. Designed and reviewed Windows 2000/XP/Vista/Windows 7 and Linux security architecture.

Marcelo has assisted task forces in lawsuits as technical assistant, acting as a expert witness in civil trails. He assisted in computer crimes (cybercrime) investigations and was responsible for establishing a chain of custody for evidence. He performed customer data analysis of data requested from banks and telecommunication companies, as requested by Brazilian Attorneys. He wrote, compiled and edited reports of security activities.

Marcelo has also worked as an associate professor on some colleges training on the following subjects: Law, Investigation and Ethics; Physical Security; Systems Security and Auditing; Networking; Cryptography; Software Engineering; Data Processing Center Administration. He worked as instructor for the Security Fundamentals Course (Presidency of Republic) for over than 10 classes. He was lecturer at the most important Information Security conferences in Brazil.

Finally, Marcelo holds a Masters degree in Computer Science and a Bachelor degree in Information Systems. He also has some certifications, which illustrates his passion to learn: GIAC Certified Forensics Analyst (GCFA), GIAC Certified Incident Handler (GCIH), CISSP (Certified Information Systems Security Professional) and EnCase Certified Examiner (EnCE).


Clausing, Jim

Jim Clausing has over 25 years experience in the IT field including systems and database administration and security. Jim has done research in parallel processing and distributed systems. For the past 10+ years, he has concentrated on many aspects of security including system hardening, intrusion detection, firewalls, incident response and forensics. His current focus is in malware analysis and penetration testing. Jim holds the GIAC GCFA and GCIA Gold certifications (serving on the advisory boards for each, the former as chair before they were combined into a single board). He also holds the GIAC GCIH, GCFW, GSIP, and GSOC Silver certifications and the GREM and SSP-MPA certificates, as well as the CISSP. Jim is a Community SANS and SANS Stay Sharp instructor. He was a co-author of the 2003 SANS Press book, Securing Solaris 8 & 9 Using the Center for Internet Security Benchmark, and is a volunteer incident handler at the SANS Internet Storm Center (isc.sans.org). Jim also enjoys cycling and is an instrument-rated private pilot.

Coursey, David

Drews, Melvin

Coming from a long background of designing, implementing and supporting enterprise IT systems, Mel Drews found himself working in information security rather by accident 10 years ago and found a passion there. His security-focused experience includes security curriculum development, penetration testing, vulnerability and risk assessment, program development, audit, and miscellaneous consulting for U.S. and international entities, primarily in government, financial services and energy sectors. Mr. Drews currently works with a global financial services firm with responsibility for software security. He holds the GCFE, CISSP, CISA and Project+ certifications.

LinkedIn: http://www.linkedin.com/in/meldrews

Blog: http://www.redcedarnet.com

Elovitz, Steven

Steve Elovitz is currently a Manager within Mandiant's security consulting team. Mr. Elovitz has a broad range of experience in the industry and has delivered both proactive and reactive services to government and commercial clients. Steve has significant experience in IR, forensics, as well as penetration testing. Steve graduated from Pennsylvania State University with a BS in Information Science and holds multiple certifications including: GREM, EnCE, CEH, and CISSP. Throughout his career, Steve has gained experience as a sysadmin, a developer, and as both a red team and blue team analyst. 

Fitzl, Csaba

Csaba graduated in 2006 as an IT engineer at the Budapest University of Technology. For 2 years he worked with Cisco product support at Getronics then in 2008 he was hired by ExxonMobil where he contributed to designing global networks and provided support for 4 years. In the last 3 years he has focused on detecting and preventing security intrusions, specialising in network forensics and malware analysis. He currently holds OSWP, OSCP, OSCE, OSEE, GREM, CEH, ECSA, CHFI, CCNP, CCDP, CCNP Security certifications. He is a regular workshop presenter at the Hacktivity conference in Hungary. Blog: theevilbit.blogspot.com
Other Achievements: 4th place on the 2013 DC3 Forensics Challenge, won SANS Netwars at SANS Secure Europe 2014, SANS Lethal forensicator coin holder.

Gamble, Timothy

From physical layer and systems integration to network engineering and information security, Tim has gained diverse knowledge by being a constant in the IT industry for over 15 years. Currently employed as a Senior Security Analyst for a global manufacturing company, Tim gets in front of SIEM, NAC, and firewall technologies daily, along with incident response and vulnerability assessments as a SOC team member. His approach to helping others is to provide a strong understanding of the material and show how it applies in the real world. Tim has a degree from Ohio University and his certifications include SANS certified GCIH and GICSP, Cisco CCNP, CCDA, and CCNA-Security, and also ISC2 CISSP.

Gorenflo, Jonathan

Jon has worked in Information Technology for over 10 years, and has focused on Information Security for the last 7 years. He is passionate about security, and loves trying to ignite that passion in other people. Jon was a Warrant Officer in the Army Reserve, where he served for over 11 years. He currently maintains the GCIH, CISSP,MCSE: Security and Security+.

Hadder, Allen

Allen Hadder has been in the IT field for over 20 years. Most of his 20 years of experience has been as a consultant for small to enterprise businesses in the financial, retail, and education industries.

Allen currently holds the GIAC GSEC and GCIH certification. In past years he has also earned his MCSE, Cisco CNA, Citrix CEA, and VMware VCP.

He also has a passion for teaching and educating people about information security.


Harris, Mike

Mike Harris is an Information Technology Cyber Security Professional holding certifications as a Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Information Security Professional (GISP), Cisco Certified Network Associate Security (CCNA-Security), Cisco Certified Network Associate (CCNA), Red Hat Certified Technician (RHCT), and Red Hat Certified Systems Administrator (RHCSA). Mike has additional technical certifications which include Digital Forensics Examiner, Network Protocol Analyst, Project+, Linux+, and A+. Mike will soon graduate with a Bachelor of Science in Information Technology Security. Mike is the founder and former board member of TinkerMill, a non-profit organization dedicated to furthering the knowledge of our kids, adults, businesses, and municipalities in the use of high tech with the incorporation of creativity and art. He is also a Red Team Member of the Rocky Mountain Regional Collegiate Cyber Defense Competition. Mike has built a CSIRT from the ground-up, including a secure infrastructure using Linux systems (Red Hat and Ubuntu). Mike has extensive knowledge as a Technology Security Auditor conducting assessments, measuring vulnerabilities, security posture on internal and external networks, and account activities for insider threats and abuse.

Hubbard, John

With a degree in Electrical Engineering from Purdue University, John began his professional career in 2008 in the Engineering Leadership Development Program at BAE Systems. While working as an engineer, John pursued a graduate education from SUNY Binghamton, finishing in 2013 with a Masters degree in Computer Engineering specializing in Network Security and Information Assurance.

Since earning his master's degree, John works as a Cyber Security Analyst on the Advanced Threat Defense team at GlaxoSmithKline. His responsibilities include defending against targeted attacks, performing incident response, forensics, and malware reverse-engineering. Recently, he attended the SANS FOR610 Reverse-Engineering Malware and SEC560 Network Penetration Testing & Ethical Hacking courses, and earned the corresponding GREM and GPEN certifications. Additionally, John authored a paper published by IEEE on Android and iOS application security, which he presented at the 2014 IEEE Consumer & Networking Conference.

John is a regular attendee of BlackHat and DEFCON, and in his free time studies malware samples, runs a honeypot network, and enjoys slowly turning his home into a data center. He is passionate about information security, loves learning, and is enthusiastic about helping others succeed in their studies. John maintains a web presence with his blog at 909research.com and on twitter @jhub908, where he writes on malware, spam, threat analysis, and his growing virtualization lab.


Krishnan, Ramesh

Lemon, Joshua

Josh Lemon is the Cyber Security Incident Response Team Manager for the Commonwealth Bank of Australia and manages one of the largest dedicated incident response teams in the commercial sector in Australia. Josh has over 10 years of experience in the cyber security industry and has previously worked as a managing consult for BAE Systems Applied Intelligence where he managed all technical cyber security services for the Asia Pacific region and oversaw large and complex incident response engagements.
Josh has provided incident response, digital forensics and penetration testing services to Government, Law Enforcement, and the Commercial sector. He is also one of the co-organisers for SecTalks in Sydney, a monthly information security community event dedicated to presenting and teaching technical information security skills to others.
Josh has a varied background in the cyber security industry ranging from; Project Management, Lead Incident Responder, Forensics Analysis, Reverse Engineer, Penetration Testing, Secure Network Design, and Software Development. He currently holds a GCFA, GNFA, GCHI, GPEN and CCNA certification and also guest lectures on Digital Forensics at Universities in Sydney, Australia.

Twitter: https://twitter.com/joshlemon
LinkedIn: https://au.linkedin.com/in/joshlemon

Martin, Matthew

Matthew is currently the

manager of Infrastructure Vulnerability Identification at a Fortune 100 financial services institution. In his role, his team is responsible for rating and scanning for vulnerabilities. In previous roles, Mr. Martin has been responsible for building and running a security metrics program, leading a standards and policy redesign, served as a liaison to internal audit, and was a data in motion and data in use subject matter expert.

Matthew has an MS in International Economics from Valparaiso University and attended MBA school at UNC-Charlotte; as well as completed a certificate course at Harvard University in Leadership Communications. He currently holds the GSLC certification. Find Matthew on LinkedIn at www.linkedin.com/in/mattmartin and follow him on Twitter @MattMartinGFT and also at www.betterinfosec.com

McKenzie, Timothy

Timothy McKenzie has almost 20 years of IT and Information Security experience working in financial, government, defense contractor, and service related markets. Timothy has been trained in malware research and exploit development, expert penetration, and forensics work. Timothy works for Dell SecureWorks as a red team penetration tester, focused primarily on network and web-based attacks. Timothy loves sharing the vast knowledge he has acquired to give back to the Information Security community.


McNamara, Philip

Philip McNamara is an Information Technology veteran with 20 years experience. He started back when PC networks were new, Token Ring was something special, and PIX Firewalls booted from a floppy disk. Over the years Mr. McNamara has transitioned from Network Engineering, through Enterprise Operations to his current role in Enterprise Network Security. Though his efforts have primarily been in the Health Care market, security and incident response have always been a responsibility. As a SANs mentor, Philip would like to build on that experience and be able to share it with others.

Neely, Lee

Lee Neely is a senior IT and security professional at Lawrence Livermore National Laboratory (LLNL) with over 25 years of experience. He has been involved in many aspects of IT from system integration and quality testing to system and security architecture since 1986. He has had extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. Lee has worked with securing information systems since he installed his first firewall in 1989. As part of his employers Cyber Security Program (CSP) he leads their new technology group, working with programs to develop secure implementations of new technology. Lee was instrumental in developing their secure configurations, risk assessments and policy updates required for iOS, Android, BlackBerry and Windows Mobile Devices. He has worked to evolve solutions for both corporate and BYOD requirements. Lee worked with the SANS SCORE project to develop the iOS Step-by-Step configuration guide as well as the Mobile Device Configuration Checklist which is included in the SEC 575 course. He teaches cyber security courses, including the new manager cyber security training, and Information System Security Officer training. Lee has a Bachelors in Computer Science from Cal State Hayward and holds several security certifications including GMOB, CISSP, CISA, CISM and CRISC. He is also the Technology Director for the ISC2 EastBay Chapter.

You can keep up with Lee @lelandneely


Neise, Patrick

Patrick Neise is currently a Security Systems Engineer at Johns Hopkins Applied Physics Laboratory in Laurel, MD. Recently retired from the U.S. Navy, Patrick brings 20 years of operational experience in submarines and information warfare to the information security community. He holds a Masters Degree in Information Technology Management from Webster University, a B.S for the the University of Texas at Austin in Electrical Engineering and is currently pursuing a M.S. in Information Security Engineering from the SANS Technical Institute. Patrick holds multiple certifications including CISSP, CAP, GPEN, GCIH, GCIA, GCED, GPPW, GSLC, GSEC, GCCC, GWAPT, C|EH, and PMP. He is also a member of the SANS/GIAC and GPWN advisory boards.


Ouellette, Patrick

Patrick Ouellette has been working with computers since 1983. His experience covers a broad spectrum of the industry including sales, training, technical support, quality assurance, systems analysis, network design and installation, and programming. He has worked for small businesses, Fortune 100 companies, public universities, and the federal government.

In his spare time, Patrick enjoys amateur radio (he holds an amateur extra class license), electronics, bowling, sailing, and photography. He is also a Debian Developer with the Debian Project.

Patrick earned a B.S. degree in Physics from the University of Toledo, and has pursued graduate studies in Astronomy and Theology.

Patrick is excited to be mentoring for SANS because mentoring provides an opportunity develop a one on one relationship with the students as they learn the material and how it applies to their environment.

Palmer, Jonathan

Jonathan Palmer has been working in information security since 2011. He graduated from the University of South Florida with a Bachelor's in Computer Engineering and a Master's in Computer Science. He currently holds two certifications: SSCP and GCIH. He is also a principle engineer for the MITRE STEM Capture the Flag (http://mitrecyberacademy.org/competitions/) and is excited to share knowledge with others passionate about information security.

Panico, Agostino

Agostino is an IT SEC enthusiast, always looking to learn more, and putting into practice what he learns. He has been enjoying IT since 1991 when he was 5 years old, with his first love: Commodore 64. Agostino has been pentesting professionally since 2007. He holds a Master Degree in Computer Science, and he is a candidate for a PhD in Incident Handling and Penetration Testing. Agostino is excited to be mentoring for SANS because it provides an opportunity develop a one-on-one relationship with the students as they learn the material and how it applies to their environment.

Petsche, Don

Don has worked in information technology for over 20 years holding certifications including CNE and MCSE. He is GSEC certified and anxious to assist anyone looking to further their knowledge of security essentials. Don has worked in the fInancial industry, followed by a brief period in retail, then spent a little over a year working with the founders of a very well known Independent Consultants Exchange. While independently contracting, Don has worked in multiple states on government identity and health related projects. Don now works as a technology specialist leading a small team of government infrastructure specialists. He holds the title of Chief Information Security Officer at a state health department among other duties as assigned. In addition to his work at the state department, Don works part time with a team of dedicated enterprise security professionals managing SIEM deployment.

Robinson, Christopher

Chris Robinson graduated from the United States Naval Academy with a B.S. in Computer Science and served over 6 years in the United States Navy.  He then began his IT security career as a consultant for Booz Allen Hamilton.  Chris then attended graduate school full time at San Diego State University earning a M.S. in Computer Science.  Following graduation, Chris worked as Computer Scientist for the Navy and was an Adjunct Professor at San Diego?s Mesa Community College.

Chris then transitioned into ICS security and is currently a Senior Security Consultant for Cimation in Houston, TX where he regularly works on ICS cybersecurity projects in the Oil and Gas Industry.  Chris has learned first-hand the unique requirements and operational constraints for securing ICS environments.  Chris has obtained the CISSP and GICSP certifications and attended several SANS and industry conferences, although the SANS conferences are always the best.

LinkedIn Profile: http://www.linkedin.com/in/chrisrobinson98/

Romero, Steven

Steven Romero is a 20-year technical professional with experience in IT operations, ICS engineering, project management, & training. Steven is passionate about information security, and is a strong advocate and beneficiary  of the SANS hands-on approach to learning. Please join Steve and thousands of other InfoSec professionals who have advanced their knowledge and career through the SANS training and certification program.

Samuel, Erich

Erich has worked in the IT industry for 15 years and of those dealt with information security for 11 years. He has worked for companies ranging in size from small to large, and currently works for a global insurance company dealing with information security issues. Having dealt with the spectrum of work from policy to compliance to technical he has earned several certifications including GCWN, GSEC, CISSP, CISA, CEH, Security+ and others.

Erich has been involved in starting and running security user groups, and enjoys the challenges that come from such situations, and see's the SANS courses as a great way for people and learn and is committed to helping with that.

Santos, Valter

Valter Santos is a threat intelligence researcher at AnubisNetworks. He has more than 15 years of experience in forensic analysis, malware analysis, incident response and penetration testing. Valter likes to attack live malware in the morning, kill it and autopsy it by noon. He holds the GCFA, GCIA, GCIH and GSEC certifications.


Scheidel, Greg

Greg Scheidel has over 20 years of hands-on experience in IT including desktop and server support, network design and implementation, application development and programming, IT service management, IT security, and information assurance. He currently leads the security branch of a large program responsible for providing security engineering, Assessment and Authorization (A&A) support and assessment activities, and general information assurance and security advice and recommendations. Greg excels at communicating with technical and non-technical stakeholders, firmly believes IT and security must serve business needs rather than exist for their own sake, and is passionate about teaching others while reinforcing and honing his own knowledge.

Thomas, Sean

Sean Thomas has over 20 years of Information Technology experience in Higher Education during which he has been involved in various aspects of IT including desktop support, networking, academic systems administration, and Windows & Unix/Linux server administration.  For the past several years, Sean has been focused on IT Security and is currently a Senior Information Security Analyst with the world?s largest, fully accredited university specializing in aviation and aerospace. He was an integral part of the development of the Security Services team at the University.  As part of this team, he has led initiatives in support of academic research, student services, and policy development.  He has experience with IDS/IPS, firewalls, packet analysis, vulnerability scanning, forensic analysis, and security assessments.  Sean is also part of the SANS OnDemand QC team.  Sean has a Bachelor of Business Administration in E-Business Technology, has held MCP and RHCT certifications, and currently holds several GIAC certifications including GCED, GCFA, and GCIH.


Tok, Yee Ching

Yee Ching is currently taking a Masters in Information Security from Royal Holloway, University of London and is passionate about Information Security. He is currently an Information Security consultant in the Professional Security Services department of e-Cop and has had several engagements including and not limited to pentesting various systems, SCADA systems and mobile applications, risk assessments, vulnerability assessments, digital forensics and incident response for several private and governmental clients.

Yee Ching is also an Adjunct Lecturer in Singapore Polytechnic where he teaches information security related modules for both the Diploma in Information Security Management and the Specialist Diploma in Cyber Security Management in Singapore Polytechnic.

Twombley, Keith

Vedaa, Charles

Charlie Vedaa has more than a decade of security operations and engineering experience. He holds several GIAC certifications, including the prestigious GSE. Charlie has a background in network engineering and has been a CCIE since 2001. He's also presented at top security conferences, including DEF CON, Summercon, and HOPE.