Simon Pope, Microsoft

Simon Pope is the Director of Incident Response at the Microsoft Security Response Center (MSRC) – responsible for the Security Operations Center and security incident response activities within the Cloud and AI division, as well as Microsoft-wide cybersecurity crisis response, and post-incident response. In his career, he has worked in government, enterprise, and academia and has held science, technology, and business roles across a variety of institutions and enterprises including Australia’s DSTO and IBM T. J. Watson Research. He has degrees in computer science, cognitive science, and management, and his specialization is at the nexus of computing and psychology.

steinmetz-2Marie Steinmetz, Intel – Treasurer

Marie Steinmetz is Director of Cyber Threat Management and Investigations at Intel. Marie has more than 25 years of experience in the high-tech industry, with over 12 years in Information Security and Risk Management. Marie has managed numerous engineering, operations and security teams within Intel’s product, services and information technology groups. Marie is currently responsible for cyber investigations, threat intelligence and analysis, and public/private partnerships for cyber security information sharing and response. Marie also manages Intel’s Privacy Office, driving privacy risk management and compliance for Intel worldwide. Marie is a Certified Information Security Professional (CISSP) and Certified Information Privacy Professional/Information Technology (CIPP/IT).

Barny Sanchez, IBM

Barny Sanchez (JNCIE FW/VPN #1, JNCIE-SEC #2, JNCI, CISSP, CCIE x 2 ) holds a BS of Science in Information Systems Security from Westwood College, has advanced studies in Electronics Engineering from the “Instituto Tecnológico de Costa Rica” in Mathematics and Business from the “Universidad de Costa Rica”, Cybersecurity from the Massachusetts Institute of Technology , and a Master’s degree in Information Assurance and Security from Capella University. He joined IBM’s Security Division early in 2015 as a Chief Technology Officer to support the developments around Threat Intelligence & Cognitive Security. Before joining IBM, he worked at Juniper Networks for 10 years in several positions including Sr. Director of Security for the Cloud Builders Center of Excellence and WW Chief Security Architect. Barny also occupied management positions at different technical support organizations for Intel Corporation and Cisco Systems, as well as spent several years designing and implementing multivendor networks for customers around the globe.

Dave Dugal, Juniper

Dave is currently a Senior Product Security Incident Manager on the Juniper Networks Security Incident Response Team. As a founding member going back to 2001, he has been a distinguished focal point and one of the primary contacts for external product and protocol security reports for over 18 years.

Dave has been an active participant in both the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI) for as long as Juniper has been members of both organizations, handling all aspects of incident response and vulnerability coordination.  Prior to joining Juniper SIRT full time, he was a recognized, knowledgeable, and well-respected Senior Escalation Engineer within the Juniper Networks JTAC, with extensive inside knowledge of the operation of Junos and JUNOSe hardware and software.  Most recently, he co-authored and published RFC 6192 on Protecting The Router Control Plane.

smoakKlee Michaelis, Cisco

Klee Michaelis has held numerous roles in developing and supporting network security products for the last 20 years. He is currently serving as the Director of Cisco’s Product Security Incident Response Team, a dedicated, global response organization that manages the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Cisco products and networks. He has overseen the evolution of Cisco’s security vulnerabilities practices focused on proprietary hardware products to also address vulnerabilities in Software, Cloud, and Service offerings, and increasingly utilize automated distribution of machine readable content. In addition to PSIRT, Klee is also responsible for an internal Penetration Testing team, which evaluates the security of Cisco products and offers internal Security Testing training and consulting.