News from 2007
December 7, 2007 Interhack founder Matt Curtin addresses the InfraGard Toledo Members Alliance in Toledo, Ohio, on the topic Confessions of a Plaintiffs' Expert on December 7, 2007.
November 28, 2007 Matt Curtin addresses the Columbus Bar Association on the topic Electrons Are the New Paper on November 18, 2007, in Columbus, Ohio.
November 16, 2007 Matt Curtin teaches real-world application of forensic computing and cryptography Computing and Cryptography to students at Edison Community College in Piqua, Ohio on November 16, 2007.
November 15, 2007 Lynn David Newton joins Interhack as a senior analyst.
November 13, 2007 Matt Curtin speaks at Platform Lab about 3X System's new disaster recovery solution.
November 11, 2007 Matt Curtin addresses senior IT and business leaders at CIOhio in Columbus, Ohio on the topic Identifying Management Fraud and Forensics in the Twenty-First Century
November 7, 2007 Matt Curtin presents Intusion Detection and Prevention Technology and Strategy to the CIO Circle at Health Foundation in Norwood, Ohio.
November 2, 2007 Keith Fricke of the Cleveland Clinic Health System and Interhack's Matt Curtin will co-present on incident response drills at the Information Security Summit in Independence, Ohio.
November 2, 2007 Matt Curtin will discuss the role of security in clinical informatics at the fall conference of the Central and Southern Ohio Chapter of HIMSS.
October 30, 2007 Matt Curtin discusses forensic computing as part of the COSI Experts program.
October 26, 2007 Matt Curtin will speak at the Midwest Labor Law Conference in Columbus, Ohio on the topic of information, data, and metadata in litigation.
October 24, 2007 Interhack will be presenting at the University of Findlay Information Assurance Forum.
October 23, 2007 Bob Mathis will discuss the role of data in litigation as part of a luncheon and executive forum on the State of Information Security hosted by Sun Microsystems, Simplesoft, and PricewaterhouseCoopers.
September 24, 2007 Interhack announces the promotion of Abby Park to Marketing Manager.
July 26, 2007 Interhack founder Matt Curtin will discuss breach notification laws as part of a panel discussion with TechColumbus and the Central Ohio ISSA.
July 14–18, 2007 Interhack will exhibit at the American Association for Justice 2007 Annual Convention in Chicago, showcasing its capability in electronic discovery and forensic computing.
June 29, 2007 Matt Curtin will present Computing in Adjudication for the Advanced Science and Technology Adjudication Resource (ASTAR) program.
May 16–18, 2007 Interhack will exhibit at the OSBA Annual Conference; Matt Curtin will deliver a CLE on new Electronic Discovery Rules.
May 10–11, 2007 Interhack will exhibit at the OATL Annual Convention in Columbus.
April 18–19, 2007 Interhack founder Matt Curtin will discuss the education needs for technology students at the 2007 itWORKS.OHIO annual conference in Columbus.
April 4–5, 2007 Interhack continues its sponsorship of the CIO Solutions Gallery at The Ohio State University's Fisher College of Business.
March 26, 2007 Matt Curtin discusses forensic computing as part of the COSI Experts program.
March 14, 2007 Matt Curtin joins Keith Fricke of the Cleveland Clinic Health System to present Beyond Table Top: Role-Playing Drills in Incident Response Training at the Ohio Information Security Conference 2007.
February 6, 2007 Source code to the key-cracking clients that won the $10,000 1997 DES Challenge is now available for download.
February 1, 2007 Interhack presents Protecting Enterprise Data Warehouses with Protegrity and Teradata.
January 2007 Bob Mathis joins Interhack's Forensic Computing practice.
January 1, 2007 Heath Rambo joins Interhack as a project manager.
January 1, 2007 Lee Ayres joins Interhack as a senior analyst.
Interhack Expands Forensic Computing Practice as Lee Ayres Joins
Interhack Corporation announced today that Lee Ayres has joined the firm.
Lee Ayres joins Interhack's forensic computing and information assurance practices as senior analyst. His work focuses on the analysis and use of data in the legal process.
Previously, Ayres was the lead developer at Mercury Markets in Chicago building automated trading systems for the global financial markets using proprietary algorithms.
Lee holds a bachelor's degree in computer science and engineering from The Ohio State University. He resides in central Ohio.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Interhack Expands Forensic Computing Practice as Heath Rambo Joins
Interhack Corporation announced today that Heath Rambo has joined the firm.
Heath Rambo joins Interhack's forensic computing and information assurance practices as a project manager. Using his experience in the legal process, he ensures that processes followed by Interhack adhere to the highest standards of evidence and data management.
Previously, Rambo was a paralegal at the Supreme Court of Ohio's Office of Disciplinary Counsel, supporting the process of handling complaints of ethics violations by attorneys admitted to practice in the state of Ohio.
Heath has a Bachelors degree (with honors) in a personalized major focusing on business administration and human resource management from Franklin University and an Associate in Applied Science degree in Legal Assisting (with honors) from Columbus State Community College. He resides in central Ohio.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Interhack Expands Forensic Computing Practice as Bob Mathis Joins
Interhack Corporation has announced that Bob Mathis has joined the firm.
Bob Mathis joins Interhack's forensic computing practice as a staff scientist, focusing on analysis of data and computer systems in the context of adjudication.
Prior to joining Interhack, Mathis has directed three small businesses in the software technology industry, most recently serving as president and chief consultant at Pithecanthropus Consulting, Inc., a start-up that specializes in Java tools and software development. Mathis has also served as an expert witness on behalf of the US Air Force in a multi-million dollar computer software contract dispute and a private company dispute related to compiler implementation.
Bob's extensive background also includes work to standardize the Lisp, Java, Prolog, Scheme, and ECMAScript programming languages. Bob remains a senior lecturer at The Ohio State University's Department of Computer Science and Engineering.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Ensuring Data Security and Privacy in Teradata EDWs
On February 1, 2007, Teradata will host a Web seminar on the protection of information in Teradata EDWs. Interhack founder Matt Curtin will speak on the topics of attacks against centralized data sources and the use of cryptography as a protection mechanism.
In this web seminar, Curtin and his fellow experts will show you how to:
- Prevent hackers from penetrating your security framework
- Preempt typical hacker attacks on enterprise data security
- Anticipate the implications of broad Active Data Warehouse use on security requirements
- Implement Protegrity Enterprise Data Security in your Teradata Enterprise Data Warehouse (EDW)
Ensuring Data Security and Privacy in Teradata EDWs will illustrate how industry leaders are currently implementing centralized data security policies, including the encryption and auditing of sensitive data with Protegrity solutions to complement the scalability, high performance, and parallel functionality of their Teradata EDWs. Here you'll discover how securing a centralized Teradata EDW is more effective, simpler and far less expensive than securing multiple data marts or multiple applications, thereby reducing the risk from insecure data of customer dissatisfaction, legal penalties and compliance issues.
The increasing amounts of data going into Teradata warehouses are sharpening an already compelling interest in protecting the security and confidentiality of this sensitive data. At the same time, a growing body of legislative and industry standards is aimed at increasing management accountability and data privacy—including SOX, HIPAA, GLBA, U.S. state laws, and Payment Card Industry standards. This web seminar is an excellent way to keep pace with these developments.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
DESCHALL Source Code Released
Implementation of Fast Key-Cracking Open to Review
SAN FRANCISCO, CA (February 6, 2007). Ten years ago, a battle raged over the future of cryptography, the technology that keeps electronic data safe from prying eyes. On one hand, private-sector cryptographers argued that a stronger standard needed to be adopted and that restrictions on the use of cryptography needed to be relaxed. On the other hand, government officials complained to Congress that greater restrictions were needed to help law enforcement police the Internet. Wiretaps, they argued, were a critical component of online law enforcement and a single message encrypted with the sitting government standard would require a $30 million supercomputer one year and eight-seven days to break—time and expense simply unavailable to the authorities.
RSA Data Security, Inc., (now RSA, the Security Division of EMC) launched a contest, offering $10,000 to the first group that could break the message encrypted with the sitting government standard. The team that came to be known as DESCHALL, led by Rocke Verser of Loveland, Colorado, won that contest, breaking the message that said, “Strong Cryptography Makes the World a Safer Place.” The project was one of the largest computations ever performed, using thousands of computers all over the U.S. and Canada; the machine that found it was not a supercomputer, but a regular 90 MHz Pentium-powered desktop computer.
Matt Curtin, a DESCHALL project coordinator supporting Verser, documented the inside story of the project in his book, Brute Force: Cracking the Data Encryption Standard (Copernicus Books, 2005). One critical component of the project, however, has been a secret for ten years: the code that powered the fast key-cracking clients. Today, the code for the classic fast clients for 486, Pentium, and Pentium Pro processors is released, along with code for the client distribution system, joining the code for the firewall-traversing gateways that was previously released.
Source code is available for download from the Interhack Research site that maintains the project history, including mailing list archives. http://www.interhack.net/projects/deschall/. Curtin will be signing copies of Brute Force at the conference.
Beyond Table Top: Role-Playing Drills in Incident Response Training
Interhack founder Matt will join with Keith Fricke of the Cleveland Clinic Health System to conduct incident response drills at the Ohio Information Security Conference 2007 (OISC '07), presented by the Greater Dayton IT Alliance on March 14, 2007.
Abstract
Role-playing drills have become popular in organizations seeking to train staff for the ways they engage workers that plain classroom lectures do not. But organizations endeavoring to bring greater realism and value to their training should consider taking it to the next level.
Curtin and Fricke will demonstrate how to use live drills to help manage information security breaches and how to test the effectiveness of response plans. Critical issues to be covered include: resources necessary to develop a successful drill; the objectives of live drills; how to identify the important take-aways for staff; and how to staff who might be called upon to respond to real-world security incidents to apply their newfound knowledge.
About Interhack
Based in Columbus, Ohio, Interhack Corporation is a professional services firm with clients all over North America. Founded in 1997 by a team of information security researchers, Interhack accepted the mission to make global computing and communications infrastructures worthy of trust. Interhack's two practice areas, Information Assurance and Forensic Computing, support that mission. The company is a supporting member of The Usenix Association. Additional information about Interhack is available at web.interhack.com.
Forensic Computing: The Intersection of Law and Technology
COSI Electronic Education
The nightmare began when local and state police broke through the front door of the suburban home of a doctor and his family in a pre-dawn raid. Police analysis of the computer used by the doctor's seventeen-year-old son, an honors student halfway through his senior year of high school, led to charges against the boy of four felonies and a misdemeanor. Father and son discussed the situation and vowed not to bow to pressure to enter into a plea bargain requiring the boy to admit guilt in a crime he did not commit. This is the story of how forensic computer analysis of the son's machine led the prosecutor to drop the charges and expunge the boy's record.
Forensic computer scientist Matt Curtin performed the analysis and prepared expert testimony for the court.
Presentation Dates
- March 26, 2007
- October 30, 2007
About the Experts Program
Experts is an educational program conducted via videoconference which allows us to connect to classrooms all over the country and offer students an interactive experience with experts in science, math, and technology related fields. The purpose of the program is to expose students to a wide variety of science-related careers, hopefully sparking a desire to further their math and science education while exciting them about the multitude of opportunities which exist in these fields. Last year we connected to over 32,000 students in 39 different states.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
April 2007 CIO Solutions Gallery
Interhack proudly continues its sponsorship of the CIO Solutions Gallery at the Ohio State University's Fisher College of Business. The April 2007 theme is “Industries in Transition: Lessons From Leaders Meeting Exponential Challenges.”
The total U.S. healthcare spending today has reached $2 trillion, or 16 percent of our gross domestic product. Yet in other large countries that percentage is noticeably less; however, these very same nations are also providing healthcare that is seen to be as good as, if not better than, that of the U.S. While clearly there are major opportunities for IT to play a significant role in improving the cost effective delivery of healthcare in this country, there are also potential pitfalls in doing so. What lessons can we all learn from this? In this session, successful leaders will share their stories.
This session is part of the nationally acclaimed CIO Solutions Gallery and this particular event is the first in a series of sessions that will highlight specific industries in transition, while also drawing parallels to other industries undergoing similar change.
This noted program was specifically designed by senior IT leaders to add value to senior IT leaders. Unlike many other offerings available today, this highly acclaimed new program is organized around CIO peer learning; i.e., learning from the experiences of others, and solving real-life problems collaboratively. This provocative series is targeted toward CIOs and/or senior executives in the technology and/or operations leadership community. It will help to build and foster an active and creative network of IT leaders/executives devoted to sharing best practices, renewing their skills on an ongoing basis, and raising the level of technical literacy within their organizations.
More information on the CIO Solutions Gallery Executive Education Program is available online at http://fisher.osu.edu/programs/executive-education/current-programs/cio-solutions-gallery/.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Addressing the Needs of Technology Education
Interhack's Matt Curtin will present on the educational needs for students headed toward careers in information technology at the Ohio Department of Education's itWORKS.OHIO Conference in Columbus, Ohio, on April 18-19, 2007.
Presentations
Curtin will participate in three sessions at this year's conference.
- Why Security Matters: a discussion of architecture and a demonstration of breach through WiFi vulnerability.
- Why Care About Business Process: a panel discussion on the need for technologists to understand how to work with the rest of the business and how teachers need to present such material to students.
- The IT Business Process Discussion: a panel discussion on managing information technology efforts and working with the rest of the business.
About itWORKS.OHIO
itWORKS.OHIO is a broad-based educational response to Ohio's need for a skilled information technology workforce. The Joint Council of the Ohio Board of Regents and the State Board of Education developed the Ohio Information Technology Competency Profile, which provides guidance for IT training in the state, and is the framework supporting itWORKS.OHIO.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Computing in Adjudication
Interhack founder Matt Curtin will present at a seminar for coordinated by the Advanced Science and Technology Adjudication Resource (ASTAR) Program in cooperation with The Ohio State University, where Curtin also holds an academic appointment.
Taking place on June 29, 2007, Curtin will deliver a lectures to attendees, judges from eleven states throughout the U.S. Topics will include understanding electronic information, discussion of how computing and electronic information technology work, and application of analysis in adjudication.
The program is closed, but Bar associations interested in using this program for CLE may contact Interhack for rates and availability.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Data Breach Notification
Interhack founder Matt Curtin will discuss breach notification laws as part of a panel discussion with TechColumbus and the Central Ohio ISSA.
TechTalk - Data Security and Public Breach Notification with the Central Ohio ISSA
TechColumbus is proud to partner with the Central Ohio ISSA and present an exceptionally timely seminar targeted toward C-level and Directors that are ultimately responsible for IT Security. Our expert panel will discuss Data Security and Public Breach Notification.
Since the introduction of State and Federal notification laws, there has been an increase of reported incidents focused on the loss and compromise of private personal information. How can firms of different size and resources find the appropriate blend of technology and human skills to protect their brand name, safe guard their assets, and find a suitable solution that supports the bottom line? No CEO wants this to be the reason their firm is the lead story on the 6 o'clock news.
Post mortem analysis in these cases often leads to findings such as, “It was bound to happen” and “The writing was on the wall.” What type of holistic approach reasonably mitigates the known risk?
The Central Ohio ISSA has assembled a panel of technology, legal, and privacy experts to discuss recent state and federal legislation regarding disclosure of incidents with regards to personal information. The panel will also describe how various organizations and businesses are adapting their processes, procedures, and technology to cope with this legislation.
Attendees will learn from experts in the Information Security industry about ways in which they can mitigate risks associated with handling of personal information and strategies for handling an incident should such a breach occur.
This event will be held at TechColumbus/Platform Lab 1275 Kinnear Rd in Columbus. TechColumbus and ISSA members will be registered at no charge, non-members for $25. For registration please see the TechColumbus website at http://www.techcolumbus.org/en/cev/?41 for further information and registration.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish and understand facts used in adjudication.
Abby Park Promoted to Marketing Manager
We are pleased to announce the Promotion of Abby Park to Marketing Manager. Ms. Park joined Interhack Corporation in 2001, supporting technical and business development functions. Since 2003, she has carried the title of Associate, supporting the development and delivery of our elite professional services.
“Abby has brought unique and valuable insight to the firm,” remarked Interhack founder Matt Curtin. “We continue to look to her wisdom and experience as we work to make Interhack one of the most trusted professional service firms in the business.”
In her new role, Ms. Park will oversee development and execution of marketing activity in both the Forensic Computing and Information Assurance practices.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Confessions of a Plaintiff's Expert
Interhack scientist Bob Mathis will present at the State of Information Security 2007 Executive Forum in Columbus, Ohio at the Blackwell Inn on October 23, 2007.
Abstract
If your company's attorneys had to represent to a court that your organization did not have a particular record, could they do so correctly and with confidence?
Corporate information technology (IT) departments are widely tasked with ensuring that information is always available when needed by the business. Requirements for integrity and confidentiality have driven additional changes in policy for information management and the mechanisms used to implement such policy. To a large degree, these matters have widely been considered “technology” issues and handled exclusively within the domain of IT management.
Risk, however, goes far beyond the matter of hostile actors breaking into systems with sensitive data. With legal, regulatory, and contractual issues binding the organization, a failure of effective information management poses considerable risks to the organization. The possibility of indictment of executives and firms, fines paid to regulators, and settlements paid to plaintiffs weigh on the consciousness of businesses of all types.
To illustrate how technologists and lawyers need to work together to identify and to manage risk in the organization, Matt Curtin will discuss his work as a forensic computer scientist and a case where his analysis led to findings contrary to assertions made by the company sued for violating the privacy of people using the Web. Attendees should understand the need for cooperation among disciplines in the organization and strategies for ensuring success.
About the State of Information Security 2007
The State of Information Security 2007 is a luncheon and executive-level security forum hosted by Sun Microsystems, Simplesoft, and PricewaterhouseCoopers. It will be held in Columbus, Ohio at the Blackwell Inn on Tuesday, October 23, 2007 from 11:30 a.m. until 4:30 p.m.
To RSVP call Sue Hachten at +1 614 448 4050.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Matt Curtin to Speak at University of Findlay
Interhack founder Matt Curtin will present at the third annual information assurance forum at the University of Findlay on October 24, 2007. Curtin will deliver two presentations that day.
The Cost of Misappropriation
After a year of operation, the founders of a new and small company found themselves defending a lawsuit from their former employer alleging trade secret misappropriation. When the founders left their former company, they had some of the company's information on their laptop computers. Attorneys were hired to defend the new company against the suit and forensic computer analysts were retained by both sides to address the issue. In this presentation, we will consider the impact of copying information on the small company and how the problem could have been avoided.
Consultant Residue
When the State of Ohio lost a system backup, a significant effort was undertaken to identify and to review the data for personal information and to alert affected parties. The system backup was part of a state-wide ERP system being implemented by the consulting firm Accenture. As often happens with consultants, information was brought in to the project to reuse software that would be helpful for implementing the system and keeping costs down. Ohio's data assessment determined that some of the data brought in by consultants appeared to be sensitive information belonging to people and entities outside of Ohio. We will discuss how data can be moved inadvertently, the impact, and how data owners and consultants both can avoid the problem.
About the Information Assurance Forum
The Information Assurance Forum brings together University students, faculty, administrators, and outside experts to discuss Information Assurance, discussing how to meet the demand for qualified IA professionals.
About Interhack
Interhack is a forensic computing and information assurance firm based in Columbus, Ohio. With clients all over North America, Interhack offers Information Assurance professional services to many industries, including health care, financial services, and legal services. Interhack can be found on the web at web.interhack.com.
The Role of Security in Clinical Informatics
Interhack founder Matt Curtin will present at the annual conference of the Central and Southern Ohio Chapter of HIMSS with a discussion of the role of information security in clinical informatics.
Abstract
When thinking of security, many people think immediately of technologies like firewalls and cryptography. In fact, security is a property ascribed to information when it is well-managed. We will discuss the fundamental principles of information security and show how these support the objectives of clinical informatics. Going a step further, we will demonstrate how the goals of clinical informatics cannot be met without security.
About Interhack
Interhack is a pioneering professional services firm with practice areas in forensic computing and information assurance. Based in Columbus, Ohio, and with clients all over North America, Interhack's work has been used to establish legal precedent and to set standards for technology.
Handling Electronic Information
Matt Curtin will present on electronic information in litigation with Susan Hastings, labor and employment group leader of the firm Squire, Sanders, and Dempsey, LLP at the OSBA Midwest Labor Law Conference in Columbus on October 26, 2007. The session will be coordinated by Pam Krivda of the Krivda Law Offices in Columbus.
The presentation will include highlights from the recent updates to the Federal Rules of Civil Procedure on the handling of electronic information in discovery. Consideration will be given to information by comparison to data and metadata and how these differences can affect the use of information in litigation.
About Interhack
Interhack is a pioneering professional services firm, active in security and privacy research, with a forensic computing practice that has been involved in cutting-edge litigation on electronic privacy matters.
Established in 2000, Interhack's forensic computing practice helps in-house counsel, incident response teams, law enforcement agencies and law firms establish facts that can be used in litigation or criminal prosecution.
Beyond Table Top: Hands-On Incident Response Training
Interhack founder Matt Curtin will team up with Keith Fricke of the Cleveland Clinic Health System to present a class in conducting incident response drills at the Information Security Summit in Independence on November 2, 2007.
Abstract
Tabletop exercises have become increasingly popular in organizations looking to train staff. These role-playing drills tend to involve people in ways that classroom-style lecture and interaction do not. Organizations looking to bring more realism and greater value to their training, however, should consider moving beyond the tabletop.
This presentation will discuss the management of live drills for information security incidents to augment staff training and to test for the effectiveness of response plans. Critical issues covered will include the resources necessary to develop a successful drill, the objectives of such drills, how to bring out the important take-aways for staff, and how to integrate the newfound knowledge into the experience of staff who might be called upon to respond to real-world incidents.
About Interhack
Based in Columbus, Ohio, Interhack Corporation is a professional services firm with clients all over North America. Founded in 1997 by a team of information security researchers, Interhack accepted the mission to make global computing and communications infrastructures worthy of trust. Interhack's two practice areas, Information Assurance and Forensic Computing, support that mission. The company is a supporting member of The Usenix Association. Additional information about Interhack is available at web.interhack.com.
Intrusion Detection and Prevention at Health Foundation
Matt Curtin presents Intrusion Detection and Prevention Technology and Strategy to the CIO Circle at Health Foundation in Norwood, Ohio, on November 7, 2007.
Abstract
Intrusion detection and prevention systems (IDPS) have come a long way since the security principle of "compromise recording" was introduced into the research literature of computer science by Saltzer and Schroeder in 1975. In this discussion we look at IDPS technology, how it works with other security technology, and what problems are and are not solved by IDPS.
About Interhack
Based in Columbus, Ohio, Interhack Corporation is a professional services firm with clients all over North America. Founded in 1997 by a team of information security researchers, Interhack accepted the mission to make global computing and communications infrastructures worthy of trust. Interhack's two practice areas, Information Assurance and Forensic Computing, support that mission. The company is a supporting member of The Usenix Association. Additional information about Interhack is available at web.interhack.com.
Competent Forensic Computing Practices
On November 11, 2007, Interhack Founder and CEO Matthew Curtin addresses a gathering of senior level IT and business leaders at CIOhio at the Hilton Columbus at Easton in Columbus, Ohio to present Identifying Management Fraud and Forensics in the Twenty-First Century.
Abstract
Following closely the recent surge of interest in computer forensics, vendors now offer a wide variety of tools that claim forensic capability. Gobs of money are spent on training people to make them "forensically qualified." But what do such terms mean, and what should practitioners know about forensic computing in order to be effective collectors and preservers of information critical for investigation?
Matt Curtin's presentation addresses these questions. He shows ways in which competent and experienced forensic computing expertise can support the legal process, and how doing so differs from the slam dunk methods utilized by some practitioners, as presented in the popular media.
About Interhack
Based in Columbus, Ohio, Interhack Corporation is a professional services firm with clients all over North America. Founded in 1997 by a team of information security researchers, Interhack accepted the mission to make global computing and communications infrastructures worthy of trust. Interhack's two practice areas, Information Assurance and Forensic Computing, support that mission. The company is a supporting member of The Usenix Association. Additional information about Interhack is available at web.interhack.com.
A New Disaster Recovery Solution
On November 13, 2007, Matt Curtin speaks at Platform Lab about 3X System's new disaster recovery solution.
Abstract
Matt first reviews the history of disaster recovery technologies to provide perspective on what follows—a discussion about 3X System's recently rolled out data backup appliance.
About Interhack
Based in Columbus, Ohio, Interhack Corporation is a professional services firm with clients all over North America. Founded in 1997 by a team of information security researchers, Interhack accepted the mission to make global computing and communications infrastructures worthy of trust. Interhack's two practice areas, Information Assurance and Forensic Computing, support that mission. The company is a supporting member of The Usenix Association. Additional information about Interhack is available at web.interhack.com.