Advisory Board

The RSA Conference Advisory Board is designed to assist in driving an impartial, yet informed dialogue on the rapidly evolving information security industry.

The Advisory Board extends the influence of the Conference by providing insight into trends and breaking news in the information security industry on behalf of the Conference, as well as offering guidance into overall program development.

Bio Image

Dmitri Alperovitch Co-Founder and CTO of CrowdStrike Inc.

Dmitri Alperovitch is the Co-Founder and CTO of CrowdStrike Inc., leading its Intelligence, Research and Engineering teams. A renowned computer security researcher, he is a thought-leader on cybersecurity policies and state tradecraft. Prior to founding CrowdStrike, Dmitri was a Vice President of Threat Research at McAfee, where he led company's global Internet threat intelligence analysis.

With more than a decade of experience in the field of information security, Alperovitch is an inventor of ten patented and sixteen patent-pending technologies and has conducted extensive research on reputation systems, spam detection, web security, public-key and identity-based cryptography, malware and intrusion detection and prevention.

As a recognized authority on online organized criminal activity, cyberespionage, cyberwarfare, and cybersecurity, Alperovitch has significant experience working as a subject matter expert with all levels of U.S. and international policy makers, intelligence and law enforcement agencies on analysis, investigations, and profiling of transnational organized criminal activities and cyberthreats from terrorist and nation-state adversaries. He is a well-respected technical and policy thinker on the most difficult global cybersecurity issues, and is a frequent speaker at military, intelligence, law-enforcement, academic and security industry conferences. Alperovitch has published and given numerous talks on the contemporary issues in cybersecurity policy such as cyberdeterrence doctrine, Chinese-sponsored cyberespionage and the use of cyberweapons on the future battlefield. Alperovitch is frequently quoted as a cyberpolicy and cybersecurity expert source in national publications, including The New York Times, USA Today, and The Washington Post, The Associated Press and Reuters.

In 2010 and 2011, Alperovitch led the global team that investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions, and gave those incidents their names. Prior to joining McAfee, Alperovitch led the research team and the Software-as-a- Service business at Secure Computing.

Alperovitch has served on the board of Georgia Tech Information Security Center (GTISC) Industry Advisory Board. In 2011, he was the recipient of the prestigious Federal 100 Award for his contributions to the federal information security.

Alperovitch holds a master's degree in Information Security and a bachelor's degree in Computer Science, both from Georgia Institute of Technology.

Bio Image

Asheem Chandna Partner, Greylock Partners

Asheem Chandra has helped create and grow multiple technology businesses and product lines to market-leading positions - both as a former operating executive and as a venture capitalist at Greylock. As a company board director, he works closely and supportively with founders and management teams to help create and grow "category-leading" companies that provide customers with highly-differentiated product capabilities and superior business value.

Chandra joined Greylock from Check Point Software, where he was vice-president of business development and product management. During his 6+ year tenure, Check Point grew from $10M to $500M+ in annual revenues. Chandra founded the business development and product management organizations, led corporate marketing during high growth years and directed Check Point's product/business strategy, product management and industry partnerships. Chandra is also credited with creating, growing and leading Check Point's OPSEC Alliance into the largest and most successful security partner program in the IT industry. Prior to Check Point, Chandra was vice-president of marketing with CoroNet Systems (a venture-backed startup acquired by Compuware), where he helped create and define a new product category for application-aware network monitoring. Previously, Chandra held strategic marketing and product line positions with SynOptics/Bay Networks and AT&T Bell Laboratories. During his 3+ year tenure at SynOptics/Bay, the company grew from $175M to $900M+ in annual revenues. At AT&T Bell Labs, Asheem represented AT&T at IETF standards committees for TCP/IP management protocols.

Chandra is a charter member of TiE Silicon Valley. He is on the panel of judges for the Wall Street Journal Global Technology Innovation Awards, is on the advisory board and program committee for the RSA Conference and is part of the VC program at DeVenCI (Defense Venture Capital Initiative).

Born and raised in India, Chandra holds B.S. and M.S. degrees in electrical and computer engineering from Case Western Reserve University.

Bio Image

Todd Inskeep Principal Consultant at Incovate Solutions

Todd Inskeep has more than 20 years of experience in information security and Internet customer experience ranging from secure radio and desktop systems to security architecture and eCommerce strategy at Bank of America. He has filed multiple patent applications, and spent time as an Executive-in-Residence at the MIT Media Lab's Center for Future Banking under Bank of America's sponsorship. Before joining Bank of America, Inskeep spent several years on radio and desktop security systems in the Information Security group of the National Security Agency (NSA) in Fort Meade, Maryland.

Active in the information security community, Inskeep taught security and risk management classes at the University of North Carolina at Charlotte's NSA-Designated Center of Excellence in Information Assurance from 2003 to 2009. He is a Certified Information Systems Security Professional from the International Information Systems Security Certification Consortium, Inc. (ISC) and is a member of the Institute of Electronic and Electrical Engineers (IEEE). He has served on the annual RSA Information Security Conference Program Committee since 2002.

Inskeep earned a Bachelor of Science degree in electrical engineering from West Virginia University in Morgantown, WV. He also earned a master's degree in strategic intelligence/signals intelligence from the Joint Military Intelligence College in Washington, D.C.

Bio Image

Benjamin Jun President of Technology, Cryptography Research

Benjamin Jun oversees the technology and services groups at Cryptography Research. He has developed many widely deployed systems for the protection of financial transactions, pay television, and consumer products. Jun specializes in secure commercial systems, concentrating in technologies for tamper resistance, transaction security, content protection, and anti-cloning.

Jun's engineering efforts have enabled recovery from sophisticated piracy and fraud attacks. He has worked on teams that discovered Differential Power Analysis, fielded the DES Keysearch Machine, and developed technologies deployed in billions of devices worldwide. His team bridges the gap between cutting-edge security research and fielded commercial products, and Jun regularly speaks on tamper resistance and other security topics.

Jun currently serves on the Board of Advisors of the RSA Conference. Before joining Cryptography Research, Jun worked at IDEO Product Development, Bain & Company, and the Institute for Defense Analysis. He holds a bachelor's and a master's degree in electrical engineering from Stanford University where he was an NSF Graduate Fellow and a Mayfield Entrepreneurship Fellow.

Bio Image

Wendy Nather Research Director, Retail Cyber Intelligence Sharing Center (R-CISC)

Wendy Nather is Research Director at the Retail Cyber Intelligence Sharing Center (R-CISC), where she is responsible for advancing the state of resources and knowledge to help organizations defend their infrastructure from attackers. She was previously Research Director of the Information Security Practice at independent analyst firm 451 Research, covering the security industry in areas such as application security, threat intelligence, security services, and other emerging technologies.

Wendy has served as a CISO in both the private and public sectors. She led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), as well as for the Texas Education Agency. She speaks regularly in locations around the world on topics ranging from threat intelligence to identity and access management, risk analysis, incident response, data security, and societal and privacy issues. Wendy is co-author of The Cloud Security Rules, and was listed as one of SC Magazine's Women in IT Security "Power Players" in 2014. She is an advisory board member for the RSA Conference, and serves on the board of directors for Securing Change, an organization that helps provide free security services to nonprofit groups. She is based in Austin, Texas, and you can follow her on Twitter as @RCISCwendy.

Bio Image

Ed Skoudis Founder, Counter Hack

Ed Skoudis is the founder of Counter Hack, an innovative organization that designs, builds, and operates popular infosec challenges and simulations including CyberCity, NetWars, Cyber Quests, and Cyber Foundations. As director of the CyberCity project, Ed oversees the development of missions which help train cyberwarriors in how to defend the kinetic assets of a physical, miniaturized city. Ed's expertise includes hacker attacks and defenses, incident response, and malware analysis, with over fifteen years of experience in information security. Ed authored and regularly teaches the SANS courses on network penetration testing (Security 560) and incident response (Security 504), helping over three thousand information security professionals each year improve their skills and abilities to defend their networks. He has performed numerous security assessments; conducted exhaustive anti-virus, anti-spyware, Virtual Machine, and IPS research; and responded to computer attacks for clients in government, military, financial, high technology, healthcare, and other industries. Previously, Ed served as a security consultant with InGuardians, International Network Services (INS), Global Integrity, Predictive Systems, SAIC, and Bell Communications Research (Bellcore). Ed also blogs about command line tips and penetration testing.

Bio Image

Hugh Thompson Program Committee Chair, RSA Conference

In his Program Committee role, Dr. Hugh Thompson is responsible for identifying domestic and global trends within the ever-changing security landscape to help set the agenda for both the Europe and U.S. Conferences. He also plays a direct role in the selection of session topics and speakers while looking at new ways to architect educational programming.

A world-renowned application security expert, Dr. Thompson holds a B.S., M.S. and Ph.D. in applied mathematics from the Florida Institute of Technology. For the past four years he has been an adjunct professor at Columbia University, where he teaches a graduate course that explores cutting edge techniques for secure software development and software vulnerability exploitation. Thompson is also Advisory Board member for the Anti-Malware Testing Standards Organization; on the Editorial Board of IEEE Security and Privacy Magazine, and Senior VP and Chief Security Strategist at Blue Coat Systems, Inc.

Thompson has co-authored four books, more than 80 academic and industry papers and has spoken at more than 50 industry events including the Forrester Security Summit, Usenix Security Conference, SecurIT Conference, Microsoft TechEd, McAfee Worldwide Management Conference and the Gartner IT Security Summit. In 2006, Thompson was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine and has been interviewed by top news organizations including the BBC, CNN, MSNBC, Financial Times, Washington Post and others.

This document was retrieved from on Sun, 29 Nov 2015 10:54:45 -0500.
© 2015 EMC Corporation. All rights reserved.