Posts by Douglas Brush

#038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5

SANS Senior Instructor Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh…

Listen to Episode

#037 – Johannes Ullrich: Solving That Puzzle In Your Network

Dr. Johannes Ullrich is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. In 2000, he founded, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in…

Listen to Episode

#036 – Jorge Orchilles: Offense Informs Defense

Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads a security team in a large financial institution, and serves on the board of the Information Systems Security Association South Florida Chapter. Jorge has been involved in the Information Technology field since…

Listen to this episode
Listen to Episode

#035 – David Kovar: Where Is the Best Application of Your Skill Set

David Kovar is the President and founder of Kovar & Associates where he leads the development of URSA – Unmanned & Robotics Systems Analysis – a suite of tools designed to collect, integrate, analyze, and present UAV related data for many purposes including fleet management, criminal investigations, failure analysis, and predictive analysis. He also leads…

Listen to Episode

#034 – Harlan Carvey: You Have To Apply the Data To Your Theory

Harlan Carvey is currently the Director of Intelligence Integration at Nuix. Harlan has been involved in information security for 28 years, which began during his military career. After leaving active duty 20 years ago, he started in consulting, performing vulnerability assessments and penetration testing. From there, it was a natural progression to digital forensics and incident…

Listen to Episode