Page 38 - index
P. 38







About the Author

Phil Burdette







Highlights

• Team lead of Special Ops Intelligence Cell responsible for creating strategic and tactical
threat intelligence of nation state actors

• Conducts intrusion analysis to study threat actors modus operandi, which leads to the
clustering of TTPs into threat groups

• Leads high profile incident response engagements at Fortune 500 companies as well as
Small and Medium Businesses

• Contributor in private security communities related to targeted threats

• Experience reverse engineering malware, coding network traffic decoders and
configuration dumpers, conducting memory and host based forensics

• Presented at RSAC 2015, US Cyber Crime 2014, DHS CISSP ATTE 2014

• Former member of the Malicious Code team at CERT supporting DoD and USG

Education

• B.S. Applied Computing, Allegheny College

• M.S. Information Systems Management, Carnegie Mellon University

Recent Research:

• Model-based behavior analysis

• Adversary response to stimuli

• Threat group disruption tactics











38 Cyber Warnings E-Magazine – August 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   33   34   35   36   37   38   39   40   41   42   43