Peter Kuper Partner, In-Q-Tel
Peter Kuper is a Partner with In-Q-Tel, the strategic investing firm that identifies, adapts, and delivers innovative technologies to support the missions of the Intelligence Community. Peter actively seeks and works with private companies with a particular focus on security and enterprise software. Previously, Peter was the lead software analyst for Morgan Stanley where he published industry leading investment reports and led over 18 public transactions.
Overall, Peter was a Wall Street analyst for 15 years offering him the opportunity to work with some of the most dynamic and talented public and private companies and the world's leading investment professionals. As a visible voice for the software industry Kuper has given numerous presentations to professional and government groups and has been interviewed on CNBC, Bloomberg Television, and quoted in most leading publications including The Wall Street Journal and The Financial Times. He has also published articles in IEEE Magazine. Peter currently serves as an adviser to the Pacific Northwest National Lab and is a Faculty member for IANS.
Mike Arpaia Security Consultant, iSEC Partners
Mike Arpaia is a security researcher and consultant at iSEC Partners, an information security firm specializing in application, network, and mobile security. Mike's current research interests include mobile device security, cloud infrastructure security, secure protocols and secure coding practices as well as privacy, anonymity and secure coding.
Before working at iSEC Partners, Mike co-founded and developed the Stevens Cyber Defense Team at Stevens Institute of Technology where he is currently a coach/advisor to the group.
Mike also frequents many industry conferences and has previously presented at conferences such as DEFCON, Derbycon and BlackHat Europe.
Dan Guido Co-Founder & CEO, Trail of Bits
Dan Guido leads the strategic vision for Trail of Bits products and services and manages its day-to-day operations. His most recent research applied intelligence-driven defense to mass malware and demonstrated that, contrary to popular belief, only a very small number of vulnerabilities are used in such massive exploitation campaigns. Prior to Trail of Bits, Dan was a Senior Security Consultant at iSEC Partners where he provided application security and incident response services to a wide variety of clients in the technology, finance, and media industries. Previously, Dan has worked for the Federal Reserve System where he proposed and developed a centralized function for threat intelligence; a team that used its expert knowledge of attacks in the wild to develop sophisticated, enterprise strategies to mitigate them. In addition to his professional work, Dan is a Hacker in Residence at NYU:Poly where he oversees student research and teaches classes in Application Security and Vulnerability Analysis, the two capstone courses in the NYU-Poly security program.
Diana Kelley Founder, Security Curve
Diana Kelley is a security expert, strategic advisor, market analyst, writer and speaker with 20 years of IT security experience. Diana founded SecurityCurve, a research and consulting firm, in April of 2003 to provide risk-focused advisory services to enterprises and deliver strategic, competitive knowledge to security software vendors. Diana was Vice President and Service Director for the Security and Risk Management Strategies (SRMS) service at Burton Group and the Executive Security Advisor for CA’s eTrust Business Unit. Previous positions also include Senior Security Analyst for The Hurwitz Group, Manager in KPMG’s Financial Services Consulting practice and Manager of Corporate Systems Administration for Dataware Technologies. She co-authored the book Cryptographic Libraries for Developers and wrote the chapter on “PKI and Directories” for the book PKI: A Wiley Tech Brief. She is a frequent contributor to TechTarget’s SearchSecurity.com website.
Aaron Turner Co-Founder, N4struct
Aaron Turner has been involved in securing control networks and embedded systems for the last decade. While with Microsoft, Aaron pioneered an initiative that supported embedded systems OEM's with programs that facilitated the design and deployment of systems with improved security.
After Microsoft, Aaron joined the Idaho National Laboratory and worked to identify critical areas for improvement in the control system infrastructure - including testifying before Congress to press for adaptive and measurable approaches that could yield faster results to better improve infrastructure. Over the last two years, Aaron has been involved in several control system incidents which resulted in the discovery of some of the first targeted malware found on control systems. Aaron also leads several industry focus groups focused on protecting intellectual property from industrial espionage and works with authorities to provide guidance to public and private sector organizations.
Char Sample Security Engineer for Carnegie Mellon CERT
Char Sample, CERT security solutions engineer, has close to 20 years of experience in Internet security, and she has been involved with integrating various security technologies in both the public and private sectors. She is presently a doctoral candidate at Capitol College, where her dissertation topic deals with the use of soft markers in attack attribution.