HITBSECCONF2010 - DUBAI IS OVER!
THANK YOU TO ALL THE SPEAKERS AND ATTENDEES WHO MADE IT OVER TO JOIN US!

CONFERENCE MATERIALS
CONFEENCE PHOTOS

KEYNOTE 2: Lurene Grenier (Team Leader, VRT, Sourcefire) & Matt Olney (Research Engineer, VRT, Sourcefire)

Presentation Title Near Real Time Dectection
Presentation Abstract

The Snort engine is the most flexible and powerful Network Intrusion Detection System available today. By leveraging the extensibility of the engine, end users can build advanced, customized detection that precisely targets the needs of their environment. Lurene Grenier and Matthew Olney will demonstrate the power and flexibility of the engine by unveiling a new multi-faceted, scalable detection methodology targeted at addressing the most difficult detection problems facing security professionals today.

About Lurene Grenier

Lurene Grenier is the analyst team lead for Sourcefire’s VRT. She is currently a developer on the Metasploit 3 framework team, primarily in the areas of shellcode encoding and exploit development. She is published on a variety of topics including reverse engineering, automated exploit development, and zero-day attacks. Day-to-day she works heavily with Windows software, reverse engineering userland and kernel space binaries for the purpose of vulnerability research and development. Her current research revolves around uniting fuzzers and debuggers to automate the process of exploit development.

About Matt Olney

Matthew Olney is a Research Engineer on the Vulnerability Research Team at Sourcefire. In addition to his day-to-day duties, which include vulnerability research and development, Snort rule writing and the QA of outgoing Snort rule sets, Matt assists the Sourcefire training group in course development and gives talks to Snort user groups and Sourcefire customers on Snort internals, rule development and other broad security issues. Matt brings to the VRT a strong operations background, having worked in network and security engineering roles with such organizations as Verisign, Network Solutions, Nortel and the Department of Defense.