Please Note:
  • Thursday, October 30, 2014
  • Reception 6 PM to 7 PM
  • Black Tie Optional
  • Four Seasons Hotel - Baltimore
Paul Kocher
Paul Kocher
Designed SSL3 cryptographic elements
Paul Kocher designed the cryptographic elements of SSL3 back in the mid-1990s, while still an undergraduate at Stanford, thereby gaining him an international reputation for allowing secure Internet transactions.

The longevity of SSL3 is a testament to his brilliance, as is the fact that he is entirely self-taught in cryptography.
Vinton G. Cerf
Vinton G. Cerf
VP & Chief Internet Evangelist - Google
Vinton G. Cerf is vice president and Chief Internet Evangelist for Google. He contributes to global policy development and continued spread of the Internet.

Widely known as one of the "Fathers of the Internet," Cerf is the co-designer of the TCP/IP protocols and the architecture of the Internet.
Philip R. Zimmermann
Philip R. Zimmermann
Creator of Pretty Good Privacy (PGP)
Philip R. Zimmermann is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VOIP encryption protocols, notably ZRTP and Zfone.
Steven M. Bellovin
Steven M. Bellovin
Professor of Computer Science - Columbia University
Steven M. Bellovin is a professor of computer science at Columbia University, where he does research on networks, security, and especially why the two don't get along, as well as related public policy issues.

Bellovin is the co-author of Firewalls and Internet Security: Repelling the Wily Hacker, and holds a number of patents on cryptographic and network protocols.
Richard Alan Clarke
Richard Alan Clarke
Served as Special Advisor to the President on cyber security
Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Under President George W. Bush, he served as the Special Advisor to the President on cyber security.

Mr. Clarke developed and found sponsorship for legislation which created the Cyber Corps and lead the development of the first National Plan for Cyber Security.
David E. Bell
David E. Bell
Co-author of the Bell-La La Padula model of computer security
Dr. Bell was the co-author of the Bell-La La Padula model of computer security (with Leonard J. La Padula). The model became the most widely used security model in the development of trusted (secure) computer systems.

His two papers “Lattices, Policies and Implementations” and “Putting Policy Commonalities to Work” showed not only that any Boolean policy could be supported by any Boolean-policy implementation, but also that every “different” security policy in the literature was a Boolean security policy, and hence supportable by any Boolean implementation.
Jim Bidzos
Jim Bidzos
Jim Bidzos is CEO and Chairman of VeriSign, Inc
He served as CEO of RSA Data Security from 1986 through 1999. Along with RSA co-founder and MIT professor Ron Rivest, Bidzos built RSA into the premier cryptography company in the 80s and 90s.

Bidzos formed Verisign in 1995 to provide trusted certificate authority services to a global market after pioneering the concept within RSA beginning in 1986.He also created the RSA Conference in 1991, and was the Chairman of the event until his retirement from that position in 2004.
Eugene H. Spafford
Eugene H. Spafford
Professor of CS @ Purdue University
Eugene H. Spafford is one of the most recognized leaders in the field of computing. Dr. Eugene Spafford is a professor with an appointment in Computer Science at Purdue University, where he has been a member of the faculty since 1987.

He is a senior advisor and consultant on issues of security and intelligence, education, and policy to a number of major companies, academic and government agencies, including Microsoft, Intel, Unisys, the US Air Force, the NSA, the GAO, the FBI, the NSF, the DoJ, the DoE, and two Presidents of the United States.
James Anderson
James Anderson
Started the study of intrusion detection and "THE BRAIN TRUST"
The late James Anderson effectively started the field of intrusion detection, invented the concept of the reference monitor, made some very significant but classified contributions to counterintelligence, and organized some of the first cyber penetration teams, including a well-known group at CIA named "The Brain Trust".

Mr. Anderson originated the idea of contaminated media and loading an altered OS, the "2 card loader" issue, whose intellectual successor is such things as Stuxnet, APTs, and arguably was the first computer virus. In 1990, Mr. Anderson was one of the first recipients of the National Computer Systems Security Award.
Willis H. Ware
Willis H. Ware
Computer Scientist emeritus at RAND Corporation
The late Willis H. Ware (Ph.D., Princeton University, 1951) was a senior computer scientist emeritus with the RAND Corporation. An electrical engineer, he devoted his career to hardware, software, architectures, software development, networks, federal agency and military applications, management of computer-intensive projects, public policy and legislation.

Dr. Ware was a member of the NAE, a Fellow of the IEEE, AAAS,and ACM. He received the U.S. Air Force Exceptional Civilian Service Medal (1979), the IEEE Centennial Medal (1984), the National Computer System Security Award (1989), and the IEEE Computer Pioneer Award (1993).
F. Lynn McNulty
F. Lynn McNulty
An early champion of Information Security in the Government
F. Lynn McNulty, an early champion of information security in the government, passed away on June 4. McNulty, whom Federal Computer Week identified as one of the key thought leaders of the past 25 years in a feature package that will appear in the June 15 issue, spent 30 years in the government.

Over the span of his federal career he served as the State Department’s first director of information systems security; as security program manager at the Federal Aviation Administration; and as associate director for computer security at the National Institute of Standards and Technology.
Martin Hellman
Martin Hellman
Professor Emeritus - Stanford University
Professor Hellman is best known for his invention, with Diffie and Merkle, of public key cryptography. In addition to many other uses, this technology forms the basis for secure transactions on the Internet.

He has also been a long-time contributor to the computer privacy debate, starting with the issue of DES key size in 1975 and culminating with service (1994-96) on the National Research Council's Committee to Study National Cryptographic Policy, whose main recommendations have since been implemented.
Ralph Merkle
Ralph Merkle
Developed earliest public key cryptography system with Diffie and Hellman
Merkle developed the world's earliest public key cryptographic system. Their insight underpins secure transactions on the Internet, enabling e-commerce and a host of other interactions in which secure electronic communications are required.

Since 1988, Merkle has been researching nanotechnology and, in 2003, became a distinguished professor at Georgia Tech before returning to California in 2006.He has been awarded the RSA Award in Mathematics (2000) and the IEEE Richard W. Hamming Medal (2010).
Whitfield Diffie
Whitfield Diffie
Developed the world's earliest public key cryptographic system along with Merkle and Hellman
Diffie and Hellman worked together throughout 1975 and were joined by Ralph Merkle in 1976. The results of their work appeared in Diffie and Hellman's paper, New Directions in Cryptography, in November 1976. The insights in this paper underpin secure transactions on the Internet, enabling e-commerce and a host of other interactions in which secure electronic communications are required.

In 1992, Diffie was awarded an honorary doctorate by the Swiss Federal Institute of Technology in Zurich, and in 2010, shared the IEEE Richard W. Hamming Medal with Ralph Merkle and Martin Hellman.
Dorothy Denning
Dorothy Denning
Dorothy Denning is recognized as one of the world's leading experts in information security.
She is currently a Distinguished Professor in the Department of Defense Analysis at the Naval Postgraduate Schoolin Monterey, CA, and is one of the faculty associated with the Center on Terrorism and Irregular Warfare and with the Center for Information Systems Security Studies and Research.

Dr. Denning has published 150 articles and four books, her most recent being Information Warfare and Security. She has been named to the ISSA Hall of Fame (2003), awarded the CSO COMPASS award (2003), named as both a CISSP and as a CISM honoris causa, and elected as a Fellow of the ACM (1995).
Roger Schell
Roger Schell
President of ESec, providing platforms for secure, reliable e-business on the Internet
Dr. Schell was co-founder and Vice President for Engineering of Gemini Computers, Inc., where he directed development of Gemini's Class A1 network processor commercial product. He was also the founding Deputy Director of the (now) National Computer Security Center. Previously he was an Associate Professor of Computer Science at the Naval Postgraduate School.

He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book"). The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award.
Peter Neumann
Peter Neumann
SRI Computer Science Lab since September 1971
In the Computer Science Laboratory at SRI he led the Provably Secure Operating System (PSOS) project, under which the SRI Hierarchical Development Methodology (HDM) was created.

Dr. Neumann’s main research interests continue to involve security, crypto applications, overall system survivability, reliability, fault tolerance, safety, software-engineering methodology, systems in the large, applications of formal methods, and risk avoidance. He has written numerous papers, given many talks, and has provided testimony before government hearings. He recently published a book Computer Related Risks (ACM Press, 1995).
Carl Landwehr
Carl Landwehr
Lead Research Scientist - CSPRI at George Washington University
Dr. Landwehr is a noted expert in trustworthy computing, including high assurance software development, understanding software flaws and vulnerabilities, token-based authentication, system evaluation and certification methods, multilevel security, and architectures for intrusion tolerant systems

He has been a leader in cybersecurity research, having led cybersecurity programs at the National Science Foundation from 2001-2004 and 2009-2011, overseeing the disbursement of more than $110M of grants, and having served as a division chief at IARPA from 2005-2009.
Ronald L.Rivest
Ron Rivest
Professor of Computer Science at MIT's EECS Department
He is the Andrew and Erna Viterbi Professor of Computer Science at MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL)

Rivest is a member of the National Academy of Engineering, the National Academy of Sciences, and is a Fellow of the Association for Computing Machinery, the International Association for Cryptologic Research, and the American Academy of Arts and Sciences
Adi Shamir
Adi Shamir
Faculty of Mathematics and Computer Science at the Weizmann Institute
. He is a co-inventor of the RSA algorithm (with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification scheme (with Uriel Feige and Amos Fiat), one of the inventors of differential cryptanalysis and has made numerous contributions to the fields of cryptography and computer science

In addition to RSA, Shamir's other numerous inventions and contributions to cryptography include the Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography, and the TWIRL and TWINKLE factoring devices.

Shamir has also made contributions to computer science outside of cryptography, such as finding the first linear time algorithm for 2-satisfiability and showing the equivalence of the complexity classes PSPACE and IP.
Leonard Adleman
Leonard Adleman
Theoretical computer scientist and Prof. of CS and Mol.Biol. at the USC.
He is known for being a co-inventor of the RSA (Rivest-Shamir-Adleman) cryptosystem in 1977, and of DNA computing. RSA is in widespread use in security applications, including https.

For his contribution to the invention of the RSA cryptosystem, Adleman, along with Ron Rivest and Adi Shamir, has been a recipient of the 1996 Paris Kanellakis Theory and Practice Award and the 2002 ACM Turing Award, often called the Nobel Prize of Computer Science. He is one of the original discoverers of the Adleman-Pomerance-Rumely primality test. Fred Cohen, in his 1984 paper, Experiments with Computer Viruses has credited Adleman with coining the term "virus".
John G. Grimes
John G. Grimes
Fmr. Chief Information Officer - Department of Defense
Mr. Grimes was sworn in as the Assistant Secretary of Defense for Networks and Information Integration (ASD NII) / Department of Defense Chief Information Officer (CIO) on November 14, 2005 and served in this capacity until 30 April 2009.
Karl Gumtow
Karl Gumtow
Chief Executive Officer and Founder, CyberPoint International LLC
Karl Gumtow is Chief Executive Officer and founder of CyberPoint International, a cyber security company delivering innovative, leading-edge products, solutions, and services to customers worldwide.

One of CyberPoint’s missions is identifying promising global technologies and bringing them to the US market.

He has worked for more than two decades at all levels of the commercial and US Government security communities.
Mike Jacobs
Mike Jacobs
Chairman - National Cyber Security Hall of Fame
Mr. Jacobs was the first Information Assurance (IA) Director at the National Security Agency (NSA). Under his leadership, NSA began implementing an Information Assurance strategy to protect the Defense Information Infrastructure and as appropriate, the National Information Infrastructure.

He served as the Deputy Associate Director for Operations, Military Support where he was responsible for developing a single and coherent military support strategy for NSA.
Susan Landau
Susan Landau
Susan Landau is a Senior Staff Privacy Analyst at Google
Susan Landau works on cybersecurity, privacy, and public policy. Landau was a Distinguished Engineer at Sun Microsystems and has been a faculty member at the University of Massachusetts at Amherst and at Wesleyan University. She has held visiting positions at Harvard, Cornell, and Yale, and the Mathematical Sciences Research Institute.

Landau was a 2012 Guggenheim fellow, a fellow at the Radcliffe Institute for Advanced Study, and is a fellow of both the American Association for the Advancement of Science and the Association for Computing Machinery. She holds a PhD from MIT, an MS from Cornell, and a BA from Princeton
Francis Landolf
Francis Landolf
Chairman- Cyber Security Timeline Advisory Board
For more than fifteen years Francis Landolf led public sector organizations responsible for delivering time critical services essential for informed military and National level decisions.

Mr. Landolf began his public service career at the National Security Agency in 1975 while working on a PhD in Mathematics at the University of Kentucky.

He was awarded the Exceptional Civilian Service Award by the National Security Agency in 2005 and received the Meritorious Executive Presidential Rank Award in 2004.
Robert F. Lentz
Robert F. Lentz
Fmr. Dep. Asst Secy of Defense for Cyber, Identity & Inf. Assurance (CIIA)
Mr. Lentz is the former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance (CIIA) in the Office of the Assistant Secretary of Defense, Networks and Information Integration/Chief Information Officer.

Since November 2000, he served as the Chief Information Security Officer (CISO) for the Department of Defense (DoD) and in this capacity, oversaw the departments 3 Billion dollar Information Assurance & Cyber Security programs.

He established the first comprehensive IA/Cyber Architecture and played a key role in leading the United States National Cyber Initiative.
William D. Newhouse
William Newhouse
Cyber Security Advisor, Computer Security Division at NIST
William D. Newhouse is a cyber security advisor in the Computer Security Division, part of the Information Technology Lab at the National Institute of Standards and Technology. Mr. Newhouse’s primary role is representing NIST in several collaborative efforts.

Mr. Newhouse is part of the team at NIST leading the National Initiative for Cyber security Education (NICE). He represents NIST in a partnership with DHS and the financial sector to develop and test innovative cyber security technologies and processes.
Robert D. Rodriguez
Robert D. Rodriguez
Chairman and Founder Security Innovation Network (SINET)
Robert D. Rodriguez is the Chairman and Founder of the Security Innovation Network (SINET) www.security-innovation.org whose focus is on the advancement of IT security innovation into the industry and government markets.

Previous to this he spent over twenty-two years as a Special Agent with the United States Secret Service. During this tenure he held a number of leadership roles within Executive Protection, Protective Intelligence and Criminal Investigations. He served as a supervisor on the Presidential Protective Detail, Counter Assault Team, Protective Intelligence and Criminal Investigation operations.
Richard C. Schaeffer
Richard C. Schaeffer
Fmr. Senior Executive with the National Security Agency (NSA)
Mr. Schaeffer has over 40 years total U.S. Government service, including 15 years as a member of the Defense Intelligence Senior Executive Service.

He brings extensive leadership, management and technical experience in the area of Information Security and Intelligence.

During the early phase of his career Mr. Schaeffer led technical programs and organizations from several dozen to several hundred people, with financial responsibility from several million to almost a billion dollars.
Corey Schou
Corey Schou
University Professor of Informatics - Idaho State University
Dr. Schou is the director of the National Information Assurance Training and Education Center (NIATEC) and the Simplot Decision Support Center (SDSC). These are two key components of the Informatics Research Institute.

In 1996, the Simplot Decision Support Center center was cited by the Information Systems Security Association (ISSA) for Outstanding Contributions to the Profession.
Brian Snow
Brian Snow
Independent Security Advisor         
Mathematician/computer scientist, Brian taught mathematics and helped lay the groundwork for a computer science department at Ohio University in the late 1960's. He joined the National Security Agency in 1971 where he became a cryptologic designer and security systems architect.

His later years at NSA were the model for what it means to be a senior Technical Director at NSA; he served in that capacity in three major mission components: 1. The Research Directorate (1994-1995), 2. The Information Assurance Directorate (1996-2002), and 3. The Directorate for Education and Training -- NSA's Corporate University (2003-2006)
Martin Hellman
Martin Hellman
Professor Emeritus - Stanford University
A 2012 inductee into the Hall of Fame, Professor Hellman is best known for his invention, with Diffie and Merkle, of public key cryptography. In addition to many other uses, this technology forms the basis for secure transactions on the Internet.

He has also been a long-time contributor to the computer privacy debate, starting with the issue of DES key size in 1975 and culminating with service (1994-96) on the National Research Council's Committee to Study National Cryptographic Policy, whose main recommendations have since been implemented.
Carl Landwehr
Carl Landwehr
Lead Research Scientist - CSPRI at George Washington University
A 2012 inductee into the Hall of Fame, Dr. Landwehr is a noted expert in trustworthy computing, including high assurance software development, understanding software flaws and vulnerabilities, token-based authentication, system evaluation and certification methods, multilevel security, and architectures for intrusion tolerant systems

He has been a leader in cybersecurity research, having led cybersecurity programs at the National Science Foundation from 2001-2004 and 2009-2011, overseeing the disbursement of more than $110M of grants, and having served as a division chief at IARPA from 2005-2009.