Table of Contents
- What is a Security Thought Leader - Updated November 18th, 2009
- Framework for Security Thought Leader Interview - August 26th, 2009
- Daniel B. Cid, Sucuri - November 21st, 2013
- Dominique Karg, AlienVault - November 20th, 2013
- Lance Spitzner, Securing The Human, founder - Updated November 29th, 2012
- Bill Pfeifer, Juniper Networks - March 4th, 2011
- Chris Pogue, Senior Security Analyst - July 8th, 2010
- John Kanen Flowers - May 26th, 2010
- Kees Leune, Leune Consultancy, LLC - February 13th, 2010
- Joel Yonts, CISO - February 12th, 2010
- Maury Shenk, TMT Advisor, Steptoe & Johnson - January 31st, 2010
- Chris Wysopal, CTO, Veracode - January 27th, 2010
- Amir Ben-Efraim, CEO, Altor Networks - November 25th, 2009
- Ed Hammersla, COO, Trusted Computer Solutions - Updated November 19th, 2009
- Amit Klein, CTO, Trusteer - September 27th, 2009
- An Interview with Ron Gula from Tenable about the role of a vulnerability scanner in protecting sensitive information - Updated August 13th, 2009
- A. N. Ananth, CEO, Prism Microsystems, Inc. - August 7th, 2009
- Jeremiah Grossman, Founder and CTO of WhiteHat Security - Updated April 24th, 2009
- Mike Yaffe, Director of Product Marketing, Core Security Technologies. - April 15th, 2009
- Chris Petersen, Chief Technology Officer, LogRhythm - March 13th, 2009
- John Pirc, IBM, ISS Product Line & Services Executive: Security and Intelligent Network - February 17th, 2009
- Leigh Purdie, InterSect Alliance, co-founder of Snare: Evolution of log analysis - January 28th, 2009
- Bill Worley, Chief Technology Officer, Secure64 Software Corporation - December 9th, 2008
- Doug Brown, former Manager of Security Resources, University of North Carolina at Chapel Hill - October 30th, 2008
- Amrit Williams, Chief Technology Officer, BigFix - June 30th, 2008
- Andrew Hay, Q1 Labs - May 13th, 2008
- Gene Schultz, CTO of High Tower - April 4th, 2008
- Tomasz Kojm, original author of ClamAV - April 3rd, 2008
- Bill Johnson, CEO TDI - April 2nd, 2008
- Gene Kim, Tripwire - March 14th, 2008
- Kevin Kenan, Managing Director, K2 Digital Defense - March 14th, 2008
- Leigh Purdie, InterSect Alliance, co-founder of Snare - March 7th, 2008
- Marty Roesch, Sourcefire CEO and Snort creator - February 26th, 2008
- Dr. Anton Chuvakin, Chief Logging Evangelist with LogLogic - January 28th, 2008
- Kishore Kumar, CEO of Pari Networks - Updated January 28th, 2008
- Interview with Dr. Robert Arn, CTO of Itiva - November 1st, 2007
- Interview with Charles Edge - September 15th, 2007
- Ivan Arce, CTO of Core Security Technologies - Updated May 6th, 2009
- Mike Weider, CTO for Watchfire - Updated July 23rd, 2007
- Interview with authors of The Art of Software Security Assessment - Updated July 9th, 2007
- Ryan Barnett, Director of Application Security Training at Breach Security, Inc. - June 29th, 2007
- Dinis Cruz, Director of Advanced Technology, Ounce Labs - June 11th, 2007
- Brian Chess, Chief Scientist for Fortify Software - June 9th, 2007
- Caleb Sima, CTO for SPI Dynamics - Updated May 29th, 2007
- An Interview with David Hoelzer, author of DAD, a log aggregator - May 1st, 2007
Framework for Security Thought Leader InterviewStephen Northcutt - August 26th, 2009
Thank you very much for contacting us with a recommendation for the Security Thought Leadership Series. We are trying to find the people who help create the products that we depend on to protect our information resources in order to introduce those people to the community.
Below is a framework that will help provide the basic information we can use to validate the individual as a Security Thought Leader. In general, we need at least a paragraph for each of the questions below. Answers like “yes”, or “firewalls, IPS, and Endpoint Security” will not lead to an interview. We will take that information and then send additional questions that develop from the first framework responses. After we receive the answers to those questions, we will arrange an interview. The Thought Leader program is available for free and also as a paid service. In both cases, the individual must qualify as a thought leader - money does not buy a spot in the series. The paid service includes additional advertising of the interview including a notice in SANS NewsBites, with over 180,000 subscribers. Answering these interview questions constitutes permission for us to publish the interview.
Framework for Security Thought Leadership Interview
--- Please insert an abridged Bio below:
--- Please list URLs of papers or presentations you have written that are available on the web:
--- Please list your top three “must read” papers that are available on the web that you did not write:
How did you become interested in the field of information security?
Have you worked on security products before the product you are working on today? If so, please list them and describe the highlights of some of these products.
What product are you working on today? What are some of its unique characteristics? What differentiates it from the competition?
What do you think the security products in your space will look like in two years, what will they be able to do?
Please share your impression of the defensive information community. Are we making progress against the bad guys? Are we losing ground?
Please share your thoughts concerning the most dangerous threats information security professionals will be facing in the next year to eighteen months.
What is your biggest source of frustration as a member of the defensive information community?
We like to give our interview candidates a bully pulpit, a chance to share what is on their mind, what makes their heart burn, even if it is totally unrelated to the rest of the interview. Please share the core message you want people to know.
Please tell us something about yourself, what do you do when you are not in front of a computer?
Please send your completed framework to email@example.com *************