InGuardians was formed to provide complete security solutions, by meeting the ongoing need for holistic security within the ever-growing IT Security market. Our experts specialize in Intrusion Prevention, Detection, and Recovery.
InGuardians, Inc., and our group of leading security professionals include senior security consultants, leading security instructors, authors of many of the top industry bestsellers, and contributors to open source projects including Snort.org, Honeynet Project, and Bastille Linux.
InGuardians provides network peace keeping for agencies and corporations worldwide.
- Jimmy Alderson
- Jimmy Alderson is a web application and data correlation expert. Jimmy conducts network architecture reviews and security audits. He is an author of the Syngress best seller: Nessus Network Auditing.
- Jimmy joins InGuardians after working for ISS, Meta Security Group, and ESecurity Inc.
- Jay Beale
- Jay Beale is a security specialist focused on host lock-down and security audits. He is the Lead Developer of the Bastille project, which creates a hardening program for Linux, HP-UX, and Mac OS X, a member of the Honeynet Project, and the Linux technical lead in the Center for Internet Security. Jay is a columnist for Information Security Magazine, a co-author of seven books, and the series editor of the Syngress Open Source Security series.
- A senior research scientist with the George Washington University Cyber Security Policy and Research Institute, Jay teaches Unix Security at IDG and Black Hat conferences.
- Bob Hillery
- Bob Hillery is an experienced consultant in Information Systems Security Management. He is a founder and Senior Security Analyst with InGuardians, Inc. and has an extensive background in computer networks gained through the Navy and R&D labs.
- Bob has worked in National Institute of Justice projects and been a Senior researcher with the Institute for Security Technology Studies at Dartmouth College. He served as the Vice President of Academic Affairs & Chair of Information Systems Department for NH Community Technical College, and currently teaches National Security and Cyber-terrorism research courses at the Henry C. Lee College of Forensic Sciences at the University of New Haven. He has significant experience with both the management side and technical issues of security incident handling from his consulting practice.
- Bob's professional certifications and affiliations include CISSP, GIAC, MCSE, ISSA and HTCIA.
- Tom Liston
- Tom Liston joined InGuardians as a lead network penetration tester and code auditor. Tom is the developer of the Open Source security application LaBrea, the GDI Scanner, ISC Alert, and is the co-author (with Ed Skoudis) of the second edition of the security classic Counter Hack Reloaded. Tom is a Handler for the SANS Institute's Internet Storm Center where he authors a popular series of diaries titled Follow the Bouncing Malware.
- Tom, as a part of research that InGuardians performed for the U.S. Department of Homeland Security, created the first public proof-of-concept exploit demonstrating the potential for malicious code to escape from a virtual machine - launching arbitrary code on a host machine from exploit code running in a guest.
- Larry Pesce
- Larry Pesce is a Senior Security Analyst with InGuardians. His recent experience includes providing penetration assessment, architecture review, hardware security assessment, wireless/radio analysis, and policy and procedure development for a wide range of industries including those in the financial, retail, and healthcare verticals.
- Larry is an accomplished speaker, having presented numerous times at industry conferences such as DEF CON, Shmoocon, Derbycon and Hack3rcon, as well as the co-host of the long running multi-award winning Security Podcast, PaulDotCom Security Weekly. Larry is a certified instructor with the SANS Institute, where he also holds his GAWN, GCIH and GCFA certifications.
- Larry is a graduate of Roger Williams University, with a bachelor's degree in Computer Information Systems. In his spare time he likes to tinker with all things electronic and wireless. Larry is an amateur radio operator holding his Extra class license and is regularly involved in emergency communications activities.
- Mike Poor
- Mike Poor is a founder and Senior Security Analyst with InGuardians. Mike conducts forensic analysis, penetration tests, vulnerability assessments, security audits and architecture reviews. His primary job focus however is in intrusion detection, response, and mitigation.
- Mike is an author and editor of the international best seller Snort 2.1 book from Syngress, and is a Handler for the Internet Storm Center.
- Mike teaches Intrusion Detection for the SANS Institute and has supported Intrusion Detection and Incident Response teams for the military, and has worked for Sourcefire as a research engineer, and for the SANS Institute leading their Intrusion Analysis Team.
- Chris Sanders
- Chris Sanders is a Senior Security Analyst with InGuardians. Chris has extensive experience supporting multiple government and military agencies, as well as several Fortune 500 companies. Chris has authored several books and articles, including the international best seller "Practical Packet Analysis" from No Starch Press. Chris specializes in network-based intrusion detection and analysis.
- In 2008, Chris founded the Rural Technology Fund. The RTF is a 501(c)(3) non-profit organization designed to provide scholarship opportunities to students from rural areas pursuing careers in computer technology. The organization also promotes technology advocacy in rural areas through various support programs
- Chris currently holds the CISSP, GCIA, GCIH, GREM, GPEN, and GSEC certifications.
- John Sawyer
- John Sawyer is a Senior Security Analyst with InGuardians specializing in network and web application penetration testing. John's experience in enterprise IT security includes penetration testing, system and network hardening, intrusion analysis, and digital forensics.
- John has developed and taught cyber security training for a large university and spoken at events for industry and law enforcement. He has consulted with federal, state, and local law enforcement agencies on malware analysis, hacker attacks, and digital forensics. John is the author of the popular blog, "Evil Bytes", at DarkReading.com, and a member of the winning team from DEF CON 14 and 15's Capture the Flag competition.
- John currently holds the GCFW, GCIH, GCFA, GWAPT, and CISSP certifications.
- Don C. Weber
- Don C. Weber is a Senior Security Analyst with InGuardians. He has devoted himself to the field of information security since 2002. He has most recent experiences includes providing penetration assessment, architecture review, detailed hardware security assessment, wireless and radio implementation analysis, and incident response management for a wide range of industries including those in the financial, retail, and
energy markets. Don's Smart Grid experience includes end-to-end AMI assessments for several energy-related clients and he has provided guidance on several Smart Grid-related standards committees and during Smart Grid conferences.
- Don's previous experiences include large-scale incident response efforts for organizations with international assets and interests, the certification and accreditation o classified federal and military systems, assessment and penetration testing of worldwide commercial assets, and, as a Navy contractor, the management of a team of distributed security professionals responsible for the security of mission critical Navy assets. Don has achieved his master's degree in network security, the Certified Information Systems Security Professional (CISSP) certification, and many GIAC certifications. Don was a founding member of the GIAC Ethics Council of which he was the GIAC EC Chair in 2009. Don regularly contributes to a wide variety of open source projects involving information security and incident response.