Page 38 - index
P. 38
About the Author
Phil Burdette
Highlights
• Team lead of Special Ops Intelligence Cell responsible for creating strategic and tactical
threat intelligence of nation state actors
• Conducts intrusion analysis to study threat actors modus operandi, which leads to the
clustering of TTPs into threat groups
• Leads high profile incident response engagements at Fortune 500 companies as well as
Small and Medium Businesses
• Contributor in private security communities related to targeted threats
• Experience reverse engineering malware, coding network traffic decoders and
configuration dumpers, conducting memory and host based forensics
• Presented at RSAC 2015, US Cyber Crime 2014, DHS CISSP ATTE 2014
• Former member of the Malicious Code team at CERT supporting DoD and USG
Education
• B.S. Applied Computing, Allegheny College
• M.S. Information Systems Management, Carnegie Mellon University
Recent Research:
• Model-based behavior analysis
• Adversary response to stimuli
• Threat group disruption tactics
38 Cyber Warnings E-Magazine – August 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide