Back to Results
First PageMeta Content
Cyberwarfare / Crime prevention / National security / Global Information Assurance Certification / SANS Institute / Penetration test / Application security / White hat / Network security / Computer network security / Security / Computer security


Security East 2013 January 16-23, 2013 THE MOST TRUSTED SOURCE FOR INFORMATION AND SOFTWARE SECURITY TRAINING Hands-on immersion training programs,
Add to Reading List

Document Date: 2012-11-02 12:55:26


Open Document

File Size: 3,71 MB

Share Result on Facebook

City

Washington D.C. / Jackson / New Orleans / /

Company

Lockheed Martin / National Security Systems / HOSPITAL CORP. / Fortune / SAIC / Counter Hack Challenges / Context Security / Stephen Northcutt President SANS Technology / Chief Scientist / Secure Anchor Consulting / Wall Street Journal / McAfee / IANS / MANDIANT / InGuardians Inc. / Ford / VMware / Sourcefire / Microsoft / SANS OnDemand / International Network Services / /

Continent

Americas / /

Country

United States / /

Currency

USD / /

Facility

SANS Technology Institute / Canal Place / Georgetown University / Pace University / New Orleans campus / SHAW AFB / SANS Institute / Millsaps College / Prentice Hall / /

Holiday

Mardi Gras Day / /

IndustryTerm

adversary systems / Web applications / hacker tools / mobile software threats / intrusion detection systems / Internet infrastructure / cybercrime law enforcement agents / deeper technical skills wireless / Internet connection / media exploitation / target networks / favored personal mobile devices / threat surrounding wireless technology / cloud technologies / real-life applications / technology professionals organizations / Web app holes / deployed technologies / information technology / Web app vulnerabilities / law enforcement / target infrastructure / security software development team / cross-site / technology lawyers / private cloud infrastructure / Web site designers / government networks / course systems / ubiquitous mobile device / Web App Penetration Testing / healthcare / Web application penetration testing / internal shared services / production applications / Web application vulnerabilities / Web application vulnerability process / mobile phone network / cloud infrastructure / web apps / media exploitation methodology / computer forensic tools / security services / storage networks / consistent patch management / penetration testing services / online course delivery arm / wireless security field / Internet Storm Center / /

NaturalFeature

Mississippi River / /

OperatingSystem

Windows 7 / Windows XP / Microsoft Windows / Windows Server / Android / /

Organization

U.S. Air Force / World Health Organization / 609th Information Warfare Squadron / USDA / DEPARTMENT OF NATIONAL DEFENCE / U.S. Department of Defense / Air Force office of Special Investigations / Cloud Security Alliance / STI Graduate School / Georgetown University / U.S. Air Force Academy / SANS Institute / Commission on Cyber Security / Committee on National Security Systems / Center for Internet Security / Web administration / United States Senate / SANS Technology Institute / Pace University / Millsaps College / Department of Defense / /

Person

Dave Shackleford / Seth Misenar / Rob Lee Master / Joshua Wright / Eric Cole It / DIANE MATT / Mike Poor / CHARLES HIGGINS / Bryce Galbraith / SEAN VERITY / LEONARD CRULL / Eric Cole / Rob Lee / Fellow Rob Lee / Ed Skoudis / BOBBY BRYANT / BRIAN HUGHES / STEVEN PARK / /

Position

CTO / mentor and technical director / physical and network security consultant / senior instructor / entrepreneur and consultant / lead consultant / architect / owner and principal consultant / course author / General / founder / senior vice president of research and CTO / author / independent information security analyst and senior instructor / security architect / analyst / and manager / executive advisory boards / frequent speaker / General network traffic analysis Hands-On Snort Usage / founder and senior security consultant / research engineer and / researcher / writer / and speaker / co-author / consultant / contributing author / information security officer for a state government agency / analyst / instructor / and course author / computer forensic investigator / founder and senior security analyst / security consultant / 44th President / Director / valued mobile device security analyst / research engineer / Chief Scientist / certified instructor / member / Instructor / /

Product

iPad / Investigative Forensic Toolkit (SIFT) Essentials / Apple iPhone / /

ProgrammingLanguage

SQL / php / DC / /

ProvinceOrState

Mississippi / /

PublishedMedium

the Wall Street Journal / /

Technology

financial / high technology / information technology / Mobile phones / Virtualization technologies / mobile devices / threat surrounding wireless technology / everchanging technologies / Virtualization technology / Virtual Machine / IPv6 / Android / Mobile Device / TCP/IP / cellular telephone / DNS / cloud technologies / /

URL

http /

SocialTag