As co-founder and CEO, Randy leads the company vision, innovation, and execution. He is a widely-respected authority in network security monitoring and an active supporter of the Suricata project since the beginning. In his spare time, Randy enjoys biking, fly fishing, and instrumenting his farm with IoT sensors. He holds a BS in Computer Science from University of Maryland Baltimore County (UMBC) and a MEng in Computer and Systems Engineering from Rensselaer Polytechnic Institute (RPI).
Pierre is interested in various security topics such as Operating Systems, boot sequence, compilers and languages, and new intrusion detection methods. He’s also trying to link all these topics by improving detection tools, writing safe parsers and deploying tools in a secure architecture. He is also a Debian Developer and has been involved in Free Software for a long time.
Champ Clark III (@dabeave666) is the CTO at Quadrant Information Security and is the lead developer of the Sagan log analysis engine (GPLv2).
Peter is an engineer working as evangelist at Balabit, the company that developed syslog-ng. He assists distributions to maintain the syslog-ng package, follows bug trackers, helps users and talks regularly at conferences (SCALE, All Things Open, FOSDEM, Libre Software Meeting, and others). In his limited free time he is interested in non-x86 architectures, and works on one of his PPC or ARM machinesact:
Robert is leading the technical development team for the Threat Detection & Hunting managed security service at DCSO. He has a strong background in incident response consulting to detect and mitigate attacks on corporate and public networks. He believes in the power of Open Source Software for modern IT-security challenges and is a contributor to the Debian project.
Jason is a professional software developer with over a decade of experience developing and integrating open source solutions in the security and networking fields. Jason’s experience covers device drivers right up to user interfaces, including co-founding and acting as a CTO of an IDS integrator which was later acquired. Jason currently resides in Saskatoon, Canada.
Victor has been active as a software developer in the infosec community for many years. He is the creator of the Vuurmuur Firewall project, has been one of the developers at the Snort_inline IPS project. Victor has spent the last years doing contract development on Open Source security software including significant additions to Snort. At the end of 2007, he started development on the OISF codebase on which he now leads the development effort. He maintains a blog at http://www.inliniac.net/blog/ and uses twitter at http://twitter.com/inliniac.
My name is Chris. I have been a software engineer, systems architect, and consultant in the field of telecommunication security for over 15 years. I am based in a small town near Munich in Germany. My playgrounds are large packet switched networks. Finding creative ways to analyse and exploit such networks is my day-to-day job. Regarding Suricata: My first contact was at TROOPERS17 where I attended the 2-day training. Since then I have used Suricata quite frequently for network analysis.
As an engineer at Corelight, Christian helps commercialize one of his first NSM loves: the Bro network monitor. Prior to Corelight he lead the networking team at Lastline. He’s also a researcher in the networking group at the International Computer Science Institute in Berkeley, and misses the days on the OISF advisory board.
Peter has 15 years experience in the IT industry, including enterprise-level IT security practice. An adamant admirer and explorer of innovative open source security software, Peter is currently a Security Solution Architect. Peter maintains some additional info points of interest about Suricata: www.pevma.blogspot.com, https://github.com/pevma, and https://twitter.com/pevma.
Kelley combines over 15 years in business with a passion for facilitating conversations around responsible digital citizenship, digital safety, and free speech online. She combines her skill in strategic business development with her unique peerspective as a survivor of cyberstalking. Drawing on current trends and conversations in digital security with local and federal law enforcement, information security experts and national resources she creates strategies incorporating the human side of information security. Kelley holds a BS in Marketing, an MBA and a PhD in Information Security from Purdue.
Jos Schellevis likes to describe himself as a creative thinker, entrepreneur, and engineer at heart with a passion for open source. As Chief Technology Officer at Deciso B.V. and core member of the OPNsense community project, he is a technology enthusiast and innovator. In his spare time Jos enjoys cooking, a good glass of wine, and watching detectives. He graduated from Rotterdam University of Applied Technology and has over 20 years of experience in networking and telecommunications.
Sascha has a background in bioinformatics and efficient sequence pattern search algorithms. After several years of using his skills to analyze pathogen genomes, he decided in 2016 to focus on other challenging threats instead. As a Senior Security Engineer at DCSO, he now helps build and run the network security monitoring infrastructure that forms the basis of DCSO’s Threat Detection and Hunting service. He is also a Debian Developer and occasional contributor to the Debian packaging effort for Suricata and its ecosystem.
Dr. Josh Stroschein has spent over a decade as a programmer, security researcher, and consultant with a focus on malware analysis, exploits, reverse engineering, and web application security. His other expertise includes penetration testing, incident response and software development. Dr. Stroschein has a PhD from Dakota State University where he is also a full-time professor. In addition, Dr Stroschein is a senior consultant and trainer for VDA labs, Pluralsight course author, and malware analyst for Bromium.
Anton focuses on threat hunting and creating new techniques to detect modern adversaries.
Eugene is a security researcher at Positive Technologies Attack Detection Team. In everyday tasks he meets malware analysis, IDS signatures development, and network forensics.
Have some great information to share? Interested in presenting at SuriCon? The call for speakers is now OPEN! Send us your idea for a talk (include the title, name of speaker(s), and a short abstract) to firstname.lastname@example.org. Call for speakers ends June 1, 2018.
There is a $200 attendance fee for the 3-day conference.REGISTER
For more information
send us an email:
On November 12 and 13, 2018, be sure to join one of two training sessions: The Advanced User Training or the Practical Signature Training led by OISF’s core team. When you attend both the conference and a training, you will receive a 20% discount off the cost of the training.
Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. It is open source and owned by a community-run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.
SuriCon is dedicated to providing a community-centric, safe and harassment-free conference experience for everyone, regardless and not limited to, of gender, sexual orientation, disability, physical appearance, body size, race or religion.
We do not tolerate harassment of conference participants in any form. We also expect all attendees and sponsors to help create a pleasant experience for all conference participants. Unacceptable behavior can result in participants being asked to leave or sponsors being asked to remove their booth and personnel from the exhibit floor without refund.