is there still
anyone out there
believes the Ca
model works? it’s
sought after for his expertise in Web
application security. Prior to WhiteHat, he was an information security officer at Yahoo!.
Ben Livshits is a researcher at Microsoft Research and an affiliate professor at the University of Washington.
He has been focusing on improving
Web 2.0 application and browser reliability, performance, and security.
PHOtOGRaPH COuRtEsy OF jEREMIaH GROssMan, tREatMEnt by bRIan GREEnbERG/andRIj bORys assOCIatEs
Security technology expert Rebecca
Gurley Bace is president/CEO of Infidel, a network security consulting
practice, and chief strategist for the
Center for Forensics, Information
Technology, and Security at the University of South Alabama. Her career has
included a decade overseeing security
investments, founding roles in several
IT security communities, and advisory
roles in a number of successful security ventures, both in the public and
private sectors. Previously, Bace was a
senior electronics engineer at National
Security Agency (NSA) and served as a
charter member of NSA’s Information
Security (Infosec) Research and Technology Group. She left NSA to become
the deputy security officer for the computing, information, and communications division of the Los Alamos National Laboratory.
Facilitating the discussion is George
Neville-Neil, a software engineer who
builds high-speed, low-latency systems
for customers in the financial-services
sector. Previously, he was part of the
Yahoo! Paranoids security team. From
2004 to 2008, Neville-Neil worked in Ja-
pan, where he developed a set of cours-
es dubbed “The Paranoid University,”
teaching safe and secure programming
to engineers at Yahoo!. For the past 10
years he has served on the ACM Queue
editorial board and more recently he
joined the ACM Practitioner Board.