G. Mark Hardy, Guardent
Inc. Jeff Moss, DEF CON Communications Winn Schwartau, Interpact
Associates Peter Shipley, KPMG Peat
Marwick LLC Ira Winkler, Information
Security Advisors Group
Elaine Barker, National
Institute of Standards and Technology Jim Foti, National Institute
of Standards and Technology Bill Burr,
National Institute
of Standards and Technology
Mark Loepker, National
Security Agency Curtis Dukes, National
Security Agency Charles Schreiner, National
Security Agency Willard Unkenholz, National
Security Agency Corky Parks, National
Security Agency Dallas Pearson, National
Security Agency Warner Brake, Defense
Information Systems Agency
Jon David, Lehman Brothers Sarah Gordon, IBM Tim Polk, National Institute
of Standards and Technology Dan Woolley, Global Integrity
Corporation Fred Kolbrener, Xacta
Corporation
James F. Craft, U.S.
Agency for International Development Marianne Swanson, National
Institute of Standards and Technology Mary Schanken, National
Security Agency Marty Poch, Environmental
Protection Agency Michael T. Hovey, Computer
Sciences Corporation
Jon David, Lehman Brothers Padgett Peterson, Lockheed-Martin Tim Polk,
National Institute
of Standards and Technology Fred Cohen, Sandia National
Laboratories
50 Ways to Defeat your PKI and Other Cryptosystems
James P. Craft, CISSP, United
States Agency for International Development Tom Burke, General Services
Administration Jack L. Brock, Jr., General
Accounting Office Guy L. Copeland, Computer
Sciences Corporation Robert E. Giovagnoni, lnfrastructure
Defense, Inc.
Lewis Lorton, DDS, MSD,
Forum
on Privacy and Security in Healthcare Lisa Gallagher, Exodus
Security Services Paul Zatychec, EWA-Canada,
Ltd. Leslie J. Spiece, Medical
College of Wisconsin Alan C. Brown, Partner,
McKenna and Cuneo
Robert J. Ellison, CERT
Coordination Center, Software Engineering Institute Richard C. Linger, CER
T Coordination Center, Software Engineering Institute
Dr. Susan M. Bridges,
Mississippi
State University Dr. Blaine W. Burnham,
Georgia
Tech University Dr. Dipankar Dasgupta, The
University of Memphis Dr. James A. Davis, Iowa
State University Dr. Cynthia Irvine, Naval
Postgraduate School
David Jarrell, Federal
Computer Incident Response Capability (FedCIRC) Steve Lipner, Microsoft
Security Response Center Shawn Heman, Vulnerability
Handling, CERT Coordination Center (CERT/CC) Kenneth Ammon, Network
Security Technologies, Inc.
Miles Smid, CygnaCom
Solutions Jean Petty, CygnaCom
Solutions Shari Galitzer, CygnaCom
Solutions Ray Snouffer, National
Institute of Standards and Technology
G. Mark Hardy, Guardent,
Inc. Mark Fabro, Guardent,
Inc. Ray Kaplan, Guardent,
Inc. Black Hat One, (name
and organization withheld) Black Hat Two, (name
and organization withheld)
Richard Shullaw, Department
of Health and Human Services Danny Markley, Department
of Health and Human Services Robyn Large, The Centerfor
Support of Families Marianne Swanson, National
Institute of Standards and Technology
Nelson Hastings, National
Institute of Standards and Technology Annabelle Lee, National
Institute of Standards and Technology Ray Snouffer, National
Institute of Standards and Technology
Annabelle Lee, National
Institute of Standards and Technology Ray Snouffer, National
Institute of Standards and Technology Tom Casar, Communications
Security Establishment, Canada