12th Annual Computer Security Incident Handling Conference
 
CONFERENCE SPEAKERS
Katarina Auer

Katarina Auer is Section Manager of the Data Architecture Section within the Information Operations/ Assurance Business Unit at Litton-TASC. She is currently the Project Lead for the Joint Task Force-Computer Network Defense, Joint CERT Database Oracle 8i Development Project under the Army's Land Information Warfare Activity contract. Ms. Auer, along with co-author Mr. William Rice, designed and published a standard Data Element Dictionary for Computer Network Defense under the JTF-CND DED Project. The Common Information Assurance Model presented during the 12th Annual FIRST conference 2000 has been proposed as an industry standard to be adapted by the IA community.

Previously, Ms. Auer provided support to a government customer as Deputy Program Manager. In addition, Ms. Auer has over fourteen years of experience in publication production and high-end multimedia support including graphic design, illustration, and animation, web page design, and video production for several national level intelligence programs and government agencies.

 
Captain Richard Bejtlich
Chief of Current Operations at the Air Force Computer Emergency Response Team
Kelly Air Force Base, Texas

Captain Richard Bejtlich ("bate-lik") is Chief of Current Operations at the Air Force Computer Emergency Response Team, Kelly Air Force Base, Texas, and is one of two FIRST representatives from the AFCERT.  Capt Bejtlich is a 1994 graduate of the US Air Force Academy and a 1996 graduate of Harvard University.  Capt Bejtlich began working in the AFCERT in September 1998 and assumed a network intrusion detection analyst position in January 1999.  During that year he progressed from analyst, to chief of Real Time Analysis, to Crew Commander, and assumed his present position in March 2000.  His primary interest and expertise involves network intrusion detection, particularly interpreting manipulation of the TCP/IP suite for reconnaissance and exploitation.  His papers and presentations are available at http://bejtlich.home.texas.net and his email address is bejtlich@altavista.net.  Capt Bejtlich made a technical presentation at the SANS 2000 conference in March 2000 and is honored to speak at the 12th annual FIRST conference.

 
Scott Charney
Principal
PricewaterhouseCoopers

Scott Charney served as Chief, Computer Crime and Intellectual Property Section (CCIPS), Criminal Division, Department Of Justice, from 1991 to 1999. In this role, Mr. Charney was responsible for supervising twenty-two federal prosecutors and implementing the Justice Department's computer crime and intellectual property initiatives. Under his direction, CCIPS investigated and prosecuted national and international hacker cases, economic espionage cases, violations of the federal criminal copyright and trademark laws, and supported Internet fraud and child exploitation prosecutions. His section also provided legal advice to U.S. Attorney's Offices and federal investigative agencies; proposed and commented on legislation, represented the United States internationally, and supported the development and implementation of U.S. information technology policy. Mr. Charney also served on the Privacy Working Group of the Information Infrastructure Task Force, and the Justice Department's Privacy Council. He also assisted in the development of several Justice Department databases, including a system to better track requests submitted under the Freedom of Information Act. Prior to serving at CCIPS, Mr. Charney served as an Assistant United States Attorney, Office of the United States Attorney (D. Hawaii), and was responsible for the investigation and prosecution of complex cases involving organized crime (including Yakuza), labor racketeering, narcotics offenses, economic crimes, and public corruption. Prior to joining the federal prosecutive ranks, Mr. Charney was an Assistant District Attorney in the Office of the Bronx District Attorney (New York City), ultimately serving as Deputy Chief of the Investigations Bureau. In that position, he supervised twenty-three Assistant District Attorneys responsible for the prosecution of cases involving arson, racketeering, political corruption and economic crimes. During this time, Mr. Charney developed a prototype computer tracking system, later used throughout the city to manage criminal case tracking. Prior to serving as a Deputy Chief of Investigations, he served as a trial attorney in the Major Offense Bureau with responsibility for the prosecution of persistent violent felony offenders.

 
Ian Cook
Vice President
Citigroup

Ian Cook is a Vice President at Citigroup who works with the Corporate Information Security Office (CISO) and runs the London 'Threat Assessment Unit'. His role within CISO is to research and keep abreast of all the latest security vulnerabilities and threats and to use this knowledge to develop Secure Configuration Guides and evaluate security products for the numerous Operating Systems in use within the bank. He also tests the effectiveness of these configurations by running the London Ethical Hacking Team that tests the banks European Infrastructure.

Prior to specializing in Information Security, which he has done for the last 10 years, Ian has worked as a programmer, systems analyst, written mathematical models, run a Data Center and been a Technology Head for an Arab Bank.

Ian's interest in computing stems from building a ZX81 from a kit whilst studying for a Degree in Marine Biology. After graduating he decided to pursue a career in computing rather than become a Fish Farmer - if for no other reason that he doesn't like cold water.

 
William Cook
Attorney, Partner, Corporate Chicago
Winston & Strawn

Practice Concentration: Intellectual property, technology law, Internet and Web law, e-commerce, litigation, competitive intelligence law Year Joined W&S: 1998, as a Partner

Education and Honors: Creighton University, B.A. in History, 1968; Creighton Law School, J.D., 1973

Admitted to Practice: Illinois, Nebraska; U.S. Court of Appeals, Sixth and Seventh Circuits; United States Supreme Court

Relevant Professional Experience: Technology Practice: Representation of start-up, emerging growth, and mature technology companies in the structuring and negotiation of a broad range of transactions, including information technology licensing and procurement transactions; technology development agreements; electronic commerce transactions, including agreements for the development, hosting, maintenance, and marketing of electronic commerce Web sites; and other Internet-related transactions, including those for the creation and licensing of content for Web sites.

Intellectual Property Practice: Counseling companies regarding ongoing protection and litigation of intellectual property assets, including trade secrets and trademarks, software development agreements, resolution of domain name disputes, and evaluation and due diligence analyses of intellectual property assets.

As a member of the Illinois Attorney General's Commission on Electronic Commerce and Crime Committee, assisted in drafting Illinois' Digital Signature Act; at the request of the House Judiciary Committee, testified as a representative of copyright owners on a panel discussing the liability of online service providers and access providers for online copyright infringement; at the request of the Federal Communications Commission, testified as an expert on telecommunications fraud investigations and prosecutions; assisted with the British Department of Trade and Industry's formation of the British Computer Misuse Act of 1990.

Assistant U.S. Attorney, Chicago, Illinois, 1975-1991

 
Mark E. Fischer, CISSP
Leader of the Secure Architecture Development Practice
Information Risk Management Group
Crowe Chizek and Company

Mark Fischer is the leader of the Secure Architecture Development practice within the Information Risk Management group at Crowe Chizek and Company. Crowe Chizek is the eighth largest accounting/consulting company in the United States with over 1300 professionals in twelve offices.

At Crowe Chizek, Mr. Fischer assists organizations increase the security and reliability of their information systems to support electronic commerce and other business-critical activities. Crowe Chizek designs and implements systems using information security technologies such as firewalls, intrusion detection systems, virtual private networks, and public key infrastructures. As important as deploying technologies, Crowe Chizek advises our clients on processes and procedures to keep their systems secure.

Mr. Fischer has over 10 years of experience designing, installing, operating and securing network systems. He is a graduate of the Rochester Institute of Technology (RIT) in Rochester, New York and is a Certified Information Systems Security Professional (CISSP). He is a member of the Computer Security Institute, Association for Computing Machinery, Institute of Electrical and Electronics Engineers, and Internet Society.

 
Robert Graham
CTO
Network ICE

Robert Graham is a well-known security expert in the areas of firewalls, intrusion detection systems, and anti-hacker countermeasures. He has been developing network and information security products for the past decade, starting in 1988 combating the Morris worm that took down the Internet. He comes from a long line of security specialists -- his grandfather was part of the team cracking German codes in World War II. Robert Graham is currently the CTO of Network ICE Corporation where he monitors daily intrusion events from all over the world.

 
Lance Hayden
Cisco Systems' Security Consulting

Lance Hayden is a manager with Cisco Systems' Security Consulting services. He is responsible for providing proactive network vulnerability assessments as well as reactive incident response services for Cisco's customers.

Lance served for five years with the Central Intelligence Agency as an Operations Officer before leaving government service to pursue a Masters Degree at the University of Texas, where he focused on network security. Upon completion of his degree Lance entered the private sector, working for KPMG and FedEx before accepting a position with Cisco.

Lance is interested in exploring new and innovative ways in which the often complex and technical aspects of network security can be presented to a greater audience, with more diverse expertise and background.

Lance currently lives and works in Austin, Texas.

 
Jake Hill
BT Laboratories

Jake Hill studied MEng. Electronic Systems Engineering at Aston University in Birmingham. He graduated in 1993 and joined the BT Data Security Laboratory in Ipswich, where he worked on cryptography and data security projects.

Since 1995 Jake has worked at BT Laboratories, Martlesham Heath, as a researcher in computer security. He has focused extensively on electronic payment, and on micropayments in particular. His recent research has been on network vulnerabilities. He is currently working on alternative IPSec implementations and applications.

Jake is the inventor of the QuickPay micropayment system and has written several published papers on electronic commerce topics.

 
George Kurtz
CEO
Foundstone, Inc.

George Kurtz is the CEO of Foundstone, Inc. George has performed hundreds of firewall, network, and eCommerce related security assessments through out his security consulting career. He is a regular speaker at many security conferences and is frequently quoted in The Wall Street Journal, InfoWorld, USA Today, and the Associate Press. Additionally, he is the co-author of the widely acclaimed "Hacking Exposed - Network Security Secrets & Solutions".

 
Ron Moritz
Senior Vice President & Chief Technical Officer
Symantec Corp.

Ron Moritz is senior vice president and chief technical officer at Symantec Corporation, where he leads Symantec's Core Technology group, leveraging the company's investment in research and development.

An Internet security expert with 15 years technical experience, Moritz is responsible for building on Symantec's existing research infrastructure to address the growing number of security issues facing the industry. He also will ensure consistent development processes between Symantec's Enterprise Solutions and Consumer Products divisions, maximizing core technologies between the two groups.

Moritz joins Symantec after his tenure with Finjan Software, Inc., where he served as chief technology officer and was responsible for establishing and maintaining the company's technological standards and vision. He also served in a variety of technical positions at companies including PlanSoft Corporation, Invidea Research Group Inc. and Information Access Inc. In addition, Moritz served as associate director for information technology at Case Western Reserve University, one of the nation's leading independent research institutions.

An established expert in Internet security, Moritz currently chairs the Common Content Inspection API interoperability standardization initiative for the security industry. He has published and presented numerous papers on a variety of security topics including mobile code security, web browser security, security and electronic commerce, and computer ethics and privacy. In addition, he is one of a select group of CISSPs, information systems security professionals certified by the International Information Systems Security Certification Consortium.

Moritz attended Case Western Reserve University in Cleveland where he received master's degrees in engineering and business administration and his bachelor's degree in mathematics.

 
Chris Prosise
VP of Consulting
Foundstone

Chris Prosise is the VP of Consulting at Foundstone, a network security firm specializing in security consulting and training. Chris has extensive experience in computer networking ­ specifically attack and penetration testing, incident response, and intrusion detection. A former US Air Force officer and Ernst & Young consultant, Chris has led and performed dozens of security penetrations and incident response engagements on government and Fortune 500 networks. He is an instructor for the highly acclaimed "Ultimate Hacking: Hands On" course from Foundstone. Mr. Prosise holds a BS in Electrical Engineering from Duke University and is a Certified Information Systems Security Professional (CISSP).

 
Paul Ramstedt
AT&T Laboratories Information Security Center

Paul Ramstedt is a member of the AT&T Laboratories Information Security Center (AT&T-ISC, www.isc.att.com). This group was initially called the Secure System Engineering (SSE) department before the AT&T split initiated in 1996.

Paul started at Bell Laboratories in 1984 and became interested in security immediately after the "Morris Worm" attack launched against Internet sites in early 1989. Since then, he has been involved in much security area:

  • UNIXÓ System V/MLS – Multi-Level Security (MLS); a B1 evaluated version of UNIX System V.
  • ComputerWatchâ ATAT – An audit trail analysis tool (ATAT) using expert system rules to parse, dissect and analysis B1 audit trails.
  • ComputerWatch Trusted Gateway (CWTG) – A real-time, packet-filtering, state-full firewall built on a trusted computer base (TCB).
For the past several years he has been leading an R&D effort focusing on Intrusion Detection.

 
Marcus Ranum
CEO
Network Flight Recorder, Inc.

Marcus Ranum has been active in the UNIX networking and security community for the last 14 years, designing, developing, and deploying networking and security applications. As a consultant at Digital Equipment Corporation in 1990-1992 he designed and implemented the DEC SEAL Internet Firewall product, and managed its deployment at customer sites worldwide. At Trusted Information Systems, Inc., as senior scientist and development manager for Internet security products, Marcus designed and implemented the TIS Internet Firewall Toolkit under a grant from ARPA on behalf of the Executive Office of The President of the United States, and configured and managed whitehouse.gov for its first year of operation. The Firewall Toolkit has become the de facto standard Internet firewall software, deployed by over 3,000 sites. Over a dozen products currently on the market are based on the toolkit technology licensed from TIS. Marcus initiated and managed the implementation of the TIS Gauntlet Internet Firewall product, and acted as a senior consultant and trainer for managing reseller relationships and training reseller marketing and technical staff. Marcus is a frequent speaker at conferences, and teaches a number of technical tutorials for USENIX and SANS on diverse topics such as firewalls, UNIX internals, security policies and risk assessment, UNIX system and network performance tuning, and UNIX application design. As a consultant, Marcus has performed security audits and analysis, as well as intrusion response, for several large firms.

Today, Marcus Ranum is CEO of Network Flight Recorder, Inc., one of the leading vendors of intrusion detection and network forensics tools (http://www.nfr.net). As CEO, Marcus is responsible for business decisions as well as technological direction of the company. He still lectures at conferences regularly, and recently co-authored the "Web Site Security Sourcebook" (published by John Wiley and sons) with Avi Rubin and Dan Geer. Marcus lives in Woodbine, Maryland, with 3 cats.

 
William Rice

Mr. Rice has over eight years experience in federal investigations, national level intelligence programs and commercial telecommunications. Currently, Mr. Rice is the Chief Security Officer for an Internet bank.

In addition, Mr. Rice currently serves as a principle consultant to Litton-TASC, providing technical expertise to multiple DOD and Federal Information Operations customers. Mr. Rice, along with co-author Ms. Katarina Auer, designed and published a standard Data Element Dictionary for Computer Network Defense under the JTF-CND DED Project. The Common Information Assurance Model presented during the 12th Annual FIRST conference 2000 has been proposed as an industry standard to be adapted by the IA community. In addition, for Litton-TASC, Mr. Rice supervised the daily operations of the Army Computer Emergency Response Team's (ACERT) incident response section and provided technical support and analysis to the Army's Land Information Warfare Activity.

Previously, Mr. Rice served as a Project Manager, Network Security Systems for Iridium LLC where he managed the proactive development of network security programs and methodologies used in securing the multitude of information systems associated with Iridium, a global satellite wireless communications consortium.

Mr. Rice also served as Chief, Counterespionage Operations for the Air Force Office of Special Investigations where he supervised, planned, directed and conducted compartmented counterespionage operations supporting national security objectives including developing one of the first CI operations designed specifically to protect national information systems.

 
Bruce Schneier
Founder and Chief Technical Officer
Counterpane Internet Security, Inc

Internationally-renown security technologist and author Bruce Schneier is both a Founder and the Chief Technical Officer of Counterpane Internet Security, Inc. He established the Company with Tom Rowley to address the critical need for increased levels of security services. Schneier is responsible for maintaining the Company's technical lead in world-class information security technology and its practical and effective implementation. Schneier's successful tenure leading Counterpane Systems make him uniquely qualified to shape the direction of the company's research endeavors, as well as to act as a spokesperson to the business community on e-commerce issues and solutions.

While president of Counterpane Systems, Schneier designed and analyzed hardware and software cryptographic systems, advised sophisticated clients on products and markets, and taught technical as well as business courses related to the field of cryptography. Concerns as diverse as Microsoft, the National Security Agency, Citibank, and the White House staff have all relied upon Schneier's unique expertise. In addition, Schneier designed the Blowfish algorithm, which remains unbroken after eight years of cryptanalysis. And Schneier's Twofish is among a small number of algorithms currently being considered by the National Institute of Standards and Technology for the advanced encryption standard (AES) to replace the current data encryption standard (DES).

Schneier is the author of five books including Applied Cryptography, the seminal work in its field. Now in its second edition, Applied Cryptography has sold over 110,000 copies worldwide and has been translated into three languages. He has presented papers at many international conferences, and he is a frequent writer, contributing editor, and lecturer on the topics of cryptography, computer security, and privacy. Schneier served on the board of directors of the International Association for Cryptologic Research, is an Advisory Board member for the Electronic Privacy Information Center, and was on the board of directors of the Voter's Telecom Watch.

Schneier holds an MS degree in computer science from American University and a BS degree in physics from the University of Rochester.

 
Lance Spitzner
Sun Microsystems's Global Enterprise Security Services (GESS)

I'm a geek who constantly plays with computers, especially network security. I love security because it is a constantly changing environment, your job is to do battle with the bad guys. However, I haven't always been a geek.

At college, I thought about majoring in Veterinary medicine. I love cats and wanted to study feline medicine. However, I changed my mind and decided to join Army ROTC (Reserve Officer Training Corps). I always loved the toys and thought this would be a great opportunity to play with them. So, I enrolled in the ROTC program and changed my degree to military history. Since I knew I was going to have a job when I graduated, I focused on the finer things in life, like having fun.   Following graduation in 1992, I served for four years as an officer in the Army's Rapid Deployment Force.  However, after years of training in deserts, eating cold MREs, and sleeping in the rain, I needed a break. I left the Army after making Captain and spent 5 months exploring the remote islands of Indonesia. What an adventure that was! After that, I went to graduate school for my MBA. While studying for my degree, I realized that I enjoyed working with computers more then marketing or accounting. I finished my MBA, but have decided network secuity is the career for me. While at graduate school, I also got the bonus of meeting my wife, Ania. We were married in Warsaw, Poland in 1998.

When I'm not being a geek, my favorite things to do are scuba diving and roller-bladeing. Fortunately, Ania is also outgoing and became Open Water certified in 1999. We have been together on several great diving trips since then. We both love doing anything outdoors and try to go roller-bladeing or traveling whenever we can. I also love military history, especially the tools and tactics of medieval warfare. Maybe this is where I get my interest for network security, as there are allot of similarities between securing a network and securing a castle. I currently work for Sun Microsystems's Global Enterprise Security Services (GESS) team. This is a small team of security consultants that do enterprise level security consulting. It is a great team of professionals to work with and learn from.

 
Peter Sommer
Senior Research Fellow
Computer Security Research Centre
London School of Economics & Political Science

Peter Sommer is Visiting Research Fellow and established expert on computer security advising stock exchanges and insurance companies on systems risk. As a trained lawyer he is especially well placed to develop his current research interest in the legal admissibility of computer related evidence, especially in the context of computer crime. In December 1998 he was appointed Special Adviser in Electronic Commerce to the House of Commons Standing Committee of Science and Technology. Peter Sommer read law at Oxford and spent thirteen years as a book publisher with Harrap and Granada where he was responsible for paperback non-fiction. He has always had a subsidiary career as author and journalist. His interest in computing dates from the late 1960s when he was a guinea pig in work carried out by the late Dr Christopher Evans at the National Physical Laboratory. He was among the first generation of writers on micro-computers in the mid-1970s and entered professional computing via electronic publishing.

As an electronic publisher he set up a variety of services on Prestel, the pioneering public access database run by British Telecom, and on TOPIC, the information system of the London Stock Exchange and has also been an external Information provider for Reuters and Extel. In the run-up to the Big Bang changes in the London markets he set up a prototype investment exchange for over-the-counter securities. He has also carried out a wide range of consultancy assignments involving the commercial exploitation of new technologies and system assessment. The projects included a database for doctors on the BT public access service, Prestel, a technical, commercial and regulatory study of private teletext services (such as BBC Data cast), the commercial exploitation of some of the Financial Times's editorial resources and support work on behalf of the International Commodities Clearing House's LondonClear venture in paperless trading and securities confirmation.

The most extended work was devoted to building an electronic securities exchange, outside the London Stock Exchange, for what, prior to 1987 was called the OTC or over-the-counter market. The ambition of the exchange's promoters was to create a share market in venture capital shares. The particular scheme failed when the Stock Exchange decided to open up the Third Market. Mr Sommer's role initially was to set up a price and official news service on Prestel, Reuters and eventually TOPIC. Thereafter he designed a built a full working prototype exchange according to the draft regulations of the Securities and Investment Board. The prototype permitted market makers to enter prices and bargains, provided a price information service in viewdata format with feeds to the Stock Exchange, Reuters and Extel (and from there to newspapers). The prototype generated audit trails for regulatory purposes and, despite its main function as a selling demonstration, had considerable security facilities.

In 1985 he wrote, under the pseudonym, Hugo Cornwall, the best- selling Hacker's Handbook which was in the Sunday Times list for seven weeks and finally went into four editions, of which Mr Sommer wrote the first three. The book was about accessing the online world from personal computers and computer security. From then on Mr Sommer moved into computer security consultancy, initially as a freelance for two leading UK security companies and then as a founder-director of Data Integrity. At Data Integrity he was Technical Director responsible for surveys and to provide the technical input to the development of what has become the Lloyds Systems Perils Policy (SPP). To this end he worked both on the policy wording and the development of the approved survey format. He helped in presentations to and negotiations with underwriters and executed and wrote the sample surveys upon which the line slip was signed.

He left Data Integrity in March 1989 and since then has worked principally for leading loss adjusters and corporate security companies, and under the umbrella of his own company, a specialist London-based computer security consultancy Virtual City Associates which provides services to insurers, lawyers and corporate security companies world-wide. Virtual City Associates now exclusively provides the surveys for the SPP, which is a computer-related consequential loss/business interruption cover, and also carries out surveys for the Bankers Blanket Bond and Computer Crime policies as well as computer- related special covers. Recent survey subjects have included a major international payment system, a major global securities trading system, a large securities settlement service, an Internet-only bank and two fast- growing Stock Exchanges, advising insurers initially on formats for cover as well as later carrying out the risk analysis for the policy selected. More routine assignments have included insurance surveys / loss adjustment support on many large commercial and state-owned financial institutions in Europe, South America and South East Asia.

Non-insurance assignments have included advising a major UK-based international conglomerate operating in nearly sixty countries and about to install a series of complex local and wide areas networks, a large UK retailer with a suspected unwanted intruder on its internal computer networks, and an extended risk management survey for European-based securities settlement service.

The Hackers's Handbook was followed in 1988 by DataTheft and The Industrial Espionage Handbook was published in October 1991.

Mr Sommer regularly appears in television and radio programs and at conferences for the commercial, academic, law enforcement and government communities.

Mr Sommer has been a Member of the British Computer Society since 1988 and has recently been invited to serve on its Legal Affairs Committee. He is on the Editorial Boards of Computer Fraud and Security Bulletin and Secure Computing and on the program committees of the RAID99 Workshop at Purdue University and the FIRST2000 Conference, Chicago.

Peter Sommer has been on the Advisory Board of the LSE's Computer Security Research Centre since its inception and began his PhD in 1994 and teaches a Master's course half-module "Aspects of Information Security." He runs the Centre's well regarded Information Security Public Colloquia series. Together with LSE colleagues he has provided "Best Practice" consultancy to a syndicate of central government departments and UK clearing banks and to APACS. He is at the LSE between one and two days a week during term time.

In December 1998 he was appointed Specialist Advisor to the House of Commons Select Committee on Trade and Industry to support their inquiry into e-commerce. So far this has produced two published Reports. Seventh Report (HC 187); "Building confidence in Electronic Commerce". Tenth Report of Session (HC 648), "Electronic Commerce".

 
Kenneth R. van Wyk
Chief Technical Officer and Co-Founder
Para-Protect, Inc.

Ken van Wyk is an internationally known incident response and anti-virus expert and is an active member of the computer security community. He served on the Steering Committee of the Forum of Incident Response and Security Teams (FIRST), an international organization of incident response teams. He also created and moderated VIRUS-L, the world-renowned Internet discussion group on computer viruses.

Ken was Deputy Division Manager for the Information Protection Operations and Technology Division at Science Applications International Corporation (SAIC). This SAIC division was responsible for penetration testing, open sources monitoring, and information security response. He was also one of the founders of Carnegie Mellon University's Computer Emergency Response Team (CERT).

An engineering graduate of Lehigh University, Ken has done graduate work at both Lehigh and Carnegie Mellon Universities. He is currently writing a book on incident response for O'Reilly and Associates, and is a frequently invited speaker at computer security conferences and symposia.

 
Matthew Warren
Department of Computing & Mathematics
Deakin University

Dr Warren is a information systems senior lecturer at Deakin University (Department of Computing & Mathematics) (1998 +) and before that a lecturer at the Plymouth Business School, UK (1996 - 1998). He obtained his PhD in Computer Security Risk Analysis at Plymouth University, UK (1996).

He has published 50 refereed journal and conference papers. He is a member of Australian Standards Committee IT/12/4 Security Techniques and is the Australian Representative on IFIP 11 WG 11 - Security Management. He has also worked on several European Union Research projects including projects under the ADAPT, HTCA, INFOSEC and AIM schemes.