Hacker Halted USA 2011 Program Advisory Board Minimize

The Program Advisory Board is instrumental in designing the program and approving suitable presentations to be included in the Hacker Halted USA 2011 program agenda. We are proud to have the following to join us on this inaugural board.


Dr. Charles Miller
Charlie Miller spent five years as a Global Network Exploitation Analyst for the National Security Agency. During this time, he identified weaknesses and vulnerabilities in computer networks and executed numerous successful computer network exploitations against foreign targets. He sought and discovered vulnerabilities against security critical network code, including web servers and web applications. He is currently the Principal Analyst at Independent Security Evaluators, a Baltimore based consulting company.  Dr. Miller was the first with a public remote exploit for both the iPhone and the G1 Android phone.  He won the CanSecWest Pwn2Own competition for the last three years. Popular Mechanics listed him as a Top 10 Hacker of 2008 and he is on the list of 2010 Security Superstars by Channel Web.  He has authored two information security books and holds a PhD from the University of Notre Dame, as well as being a CISSP and GCFA.. He has spoken at the Workshop on the Economics of Information Security, Black Hat, and DEFCON.


Gunter Ollmann
Gunter Ollmann has a long-held passion for threat research and currently serves as Vice President of Research at Damballa, where he is focused on inventing new crimeware mitigation technologies and the identification of criminal operators behind botnets and other advanced persistent threats. Prior to joining Damballa, he held the role of Chief Security Strategist at IBM, was responsible for predicting the evolution of future threats and helping guide IBM's overall security research and protection strategy, and was the key IBM spokesperson on evolving threats and mitigation techniques. Ollmann also served as the Director of X-Force at Internet Security Systems where he was responsible for the company's R&D advancements and the development of security technologies in the field of vulnerability scanning, intrusion prevention, web application protection, and malware detection.



Matthew E Luallen
Matthew E. Luallen is a renowned instructor and author, and President of Sph3r3, LLC.  As the President of Sph3r3, LLC. and co-Founder of Encari, he has advised numerous federal agencies, financial institutions, electric utilities, law enforcement and national testing laboratories about best practices on identifying and mitigating operational and cyber security vulnerabilities of business information and industrial control systems.

Mr. Luallen has written, consulted and trained extensively on process control and SCADA security issues. He performed ground-breaking work with electric utilities and regional reliability organizations on compliance with the NERC CIP Reliability Standards.  Prior to founding Sph3r3 and Encari, Mr. Luallen provided strategic guidance for Argonne National Laboratory as member of its Information Architecture and Cyber Security Program Office.  Mr. Luallen is a graduate of National Technological University with a Master's Degree in Computer Science, Mr. Luallen also holds a Bachelor of Science degree in Industrial Engineering from the University of Illinois, Urbana.



Richard Stiennon
Richard Stiennon, is a security industry analyst.  He writes the security blog ThreatChaos.com which is syndicated by InfoSecIsland and Forbes.com. He is the founder of IT-Harvest, an independent analyst firm that researches the 1,200 IT security vendors.  He has held executive positions at Fortinet and Webroot Software. He was VP Research at Gartner, Inc. and Manager of Technical Risk Services at PricewaterhouseCoopers. Mr. Stiennon has presented in 26 countries on six continents his speaking engagements have included:   
 • RSA Conference 2009, 2010
 • FDIC 4th Annual Technology Conference
 • Gartner symposia in Orlando, Denver, San Diego, San Francisco, Washington DC, Cannes, Tokyo, Mexico City, Sao Palo, and Tel Aviv
 • COSAC 2009
 • Recent Advances in IDS, Case Western University

Mr. Stiennon earned a B.S. in Aerospace Engineering from the University of Michigan. He holds two patents, and is the author of Surviving Cyberwar (Government Institutes, 2010)

Hemma Prafullchandra
Hemma Prafullchandra is Hytrust’s Chief Technology Officer. As CTO, she is responsible for helping drive the company's security and compliance product innovations and strategy. As an evangelist for what's possible, she pushes the organization and the eco-system (partners, industry bodies, customers) to enable cost-effective, secure deployment of virtualization. She is an active participant in the PCI SSC Virtualization SIG, and a regular panelist on the Virtualization Security Roundtable podcast. Hemma brings over 20 years of industry experience in the field of security and distributed networking. Her expertise includes Solaris security, IPSec, Firewall, Certificate Authority/PKI, Java 2 Security Model, Secure Messaging, Web Services Security (WSS), Managed Security Services and Strong Authentication.  Hemma holds a BSc (Honors) in Computer Science with Electronic Engineering from UCL, England; and has authored several patents in the field of security.



Robert Rounsavall
Robert Rounsavall joined Terremark Worldwide, Inc. in January 2007 and is currently Director for Secure Information Services. Mr. Rounsavall works on both commercial and federal projects and is recently spending much of his time on cloud computing, virtualization security, malware analysis, and memory forensics specifically on Terremark's UCS based IaaS platform. In his previous role he was responsible for designing the security architecture and building out the Security Operations Center for Terremark’s collocation, hosting, and cloud customers. He also built and deployed the first Portable Security Operations Center which allows for full visibility into extremely large enterprise networks also known as SOC In A Box. He is a published contributing author, has a patent pending for total network visibility, and has presented at a number of conferences including FIRST, Cloud Connect, and SANS. Prior to Terremark, Mr. Rounsavall was a product manager for a Security Information Event Management firm in South Florida and served as a Navy Chief Cryptologic Technician.



Pamela Fusco
Pamela is certificated and accredited as a CISSP, CISM, CHS Level III, National Security Agency INFOSEC Assessment Methodology Auditor (AIM Auditor), National Cryptologic School Adjunct Faculty Certified Instructor (NSA/CSS/NCS), and holds an MS in Information Management. She is an active member of the Council of Advisors, American Health Information Management Association (AHIMA) and the Healthcare Information Management Systems Society (HIMSS), American College of Forensic Examiners Institute, Global, Chief Information Security Officers Executive Forum (CISO Executive), Information Systems Security Association (ISSA), Women in Technology International (WITI), member and consultant for Computer Security Institute (CSI), Information Systems Audit and Control Association (ISACA), resides on the founders board for the Executive Womenís Forum (EWF), BOD Director, International ISSA, Founding Member of RSA's Executive Security Action Forum (ESAF), Chairman of the Executive Advisory Council for Mirage Networks, Securent, Debix, Vincera and, Instructor for CMU and InfoWorldís Monthly Technology Panel as well as several security consortiums, which include major technology vendors. She is well known within the speaking circuit. Her technical and immense security and risk management experience identifies her as an internationally known speaker at industry symposiums and conferences.


Brad Smith
Brad Smith, RN, ASCIE, BS-Psy MCNPS, CISSP, NSA-IAM became fascinated with computers in 1972 and hasn't burned out yet! In 1996 his software "2the BedSide" was a national Microsoft / HIMSS award winner. His company, the Computer Institute of the Rockies was selected as the 2005 Microsoft Small Business Solution Partner of the Year for their innovative and cost effective security solution for small business.
 Brad is also known as “theNURSE” as he was the first Registered Nurse (RN) and Certified Information Systems Security Professional (CISSP) in America.  He is knows for his presentations on Social Engineering, Interview and Interrogation techniques, and network security based on Biomimicy at such diverse venues as CSI, Interop, HIMSS and COSAC. Brad has developed the skill to make complex ideas simple to grasp.  His high-energy style of presenting and the real-world experiences he shares during these sessions makes Brad an entertaining and educational speaker on security.
spacer
dummy