Simon Pope, Microsoft

Simon Pope is the Director of Incident Response at the Microsoft Security Response Center (MSRC) – responsible for the Security Operations Center and security incident response activities within the Cloud and AI division, as well as Microsoft-wide cybersecurity crisis response, and post-incident response. In his career, he has worked in government, enterprise, and academia and has held science, technology, and business roles across a variety of institutions and enterprises including Australia’s DSTO and IBM T. J. Watson Research. He has degrees in computer science, cognitive science, and management, and his specialization is at the nexus of computing and psychology.

Dave Dugal, Juniper

Dave is currently a Senior Product Security Incident Manager on the Juniper Networks Security Incident Response Team. As a founding member going back to 2001, he has been a distinguished focal point and one of the primary contacts for external product and protocol security reports for over 18 years.

Dave has been an active participant in both the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI) for as long as Juniper has been members of both organizations, handling all aspects of incident response and vulnerability coordination.  Prior to joining Juniper SIRT full time, he was a recognized, knowledgeable, and well-respected Senior Escalation Engineer within the Juniper Networks JTAC, with extensive inside knowledge of the operation of Junos and JUNOSe hardware and software.  Most recently, he co-authored and published RFC 6192 on Protecting The Router Control Plane.

smoakKlee Michaelis, Cisco

Klee Michaelis has held numerous roles in developing and supporting network security products for the last 20 years. He is currently serving as the Director of Cisco’s Product Security Incident Response Team, a dedicated, global response organization that manages the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Cisco products and networks. He has overseen the evolution of Cisco’s security vulnerabilities practices focused on proprietary hardware products to also address vulnerabilities in Software, Cloud, and Service offerings, and increasingly utilize automated distribution of machine readable content. In addition to PSIRT, Klee is also responsible for an internal Penetration Testing team, which evaluates the security of Cisco products and offers internal Security Testing training and consulting.