Last Chance for iPad Pro w/ Smart Keyboard or ASUS Chromebook w/ Online Training!

Mentor: Bios


Mentors are highly qualified, experienced professionals who make themselves available in your local area to help you learn the course material and get certified. Each Mentor is hand-selected from students that have completed their relevant GIAC certification with scores of 85% or higher.

Duncan is a Senior Manager within PwC Australia's Cyber Security and Forensics practice. He has over 17 years experience in Offensive and Defensive Cyber Security roles and is the lead for the National Operational Technology Cyber Security capability and Perth Cyber Security team. He has worked in United Kingdom, Indonesia, Abu Dhabi, Singapore and Australia.

Duncan can truly provide the holistic view of Cyber Security as he has been on both red and blue teams and is the proud holder of the GXPN Exploit Researcher and Advanced Penetration Tester and the GMON Continuous Monitoring and Security Operations.

James Arndt is a Cybersecurity Engineer for American Transmission Company in Milwaukee, Wisconsin. He focuses on dissecting whatever malicious email, documents, URLs, and executables come across his way. Besides incident response, he has his hands in endpoint security, vulnerability management, and access management.

James has spoken at various local and national conferences on topics such as incident response and reverse engineering. He has sucessfully taught SEC401 Security Essentials and SEC504 Hacker Tools, Techniques, Exploits, and Incident Handling. You might also find James running after his four kids, playing guitar, or tinkering around in his basement lab.

Mohammed Asfar serves as a Senior Cybersecurity Consultant at Cyber division of Leidos. Asfar's background includes electronic discovery, forensic investigation, incident response, vulnerability assessment and penetration testing across multiple industries. Asfar holds M.S. degree in Forensic Science from Marshall University, as well as CISSP, GCFA, GCIH, GCIA, GMON, GREM, GPEN and ENCE certifications. Asfar live in Houston, Texas with his wife and two-year old daughter.
Greg has been in the industry for over 17 years, and has been working with computers since he was a kid (remember the Commodore 64?). He has worn a dozen different hats in the IT world, from sysadmin to help desk, and from development to upper management. For the last ten years, he has focused exclusively on information security. First, as a consultant performing penetration testing, web application assessments and more strategic engagements with various consulting firms, before moving to the client-side, where he has worked with global financial institutions, as well as media startups to help secure their processes and technologies. Greg has a passion for technology, as well as mentorship, and believes it is imperative to pass this on to others.
Brad is a consultant with SecureWorks doing full time web application penetration testing. He has a masters degree in Information Assurance from Dakota State University. Certifications include GWAPT, GPEN, GCIH, GCED, and CISSP. He is an active member of the local information security community. When not on a computer, Brad is usually tormenting his wife, playing with his two kids, or playing guitar.
Raluca is an experienced Information Security and Privacy specialist, holding a Master Degree in IT Security, and several industry recognized certifications: GSEC, CISSP, CRISC, CISM, CISA, CIPT and PMP. With her employer, Raluca is heavily involved in various cyber security initiatives, leading information risk assessments, supporting the application security program, participating in the development of security architecture patterns for new platforms and technologies. Raluca is also a former Computer Science teacher, with 10+ teaching experience. Raluca is a believer in continuing education, so when she is not studying for a new certification or a new skill, she loves helping others learn and having again the opportunity to teach!
Mr. Bluml has been performing computer related investigations for over twenty years. His investigations have ranged from simple data theft to more sophisticated hacking efforts involving multiple computers, to intellectual property theft with attempts to hide the activity or manipulate the data via date and time changes to the computer. He has also been involved in employee fraud cases involving expense report falsifications, credit card fraud, and identity theft. He has spoken at numerous national and international trade conferences on the subject of computer forensics and related investigations. www.computerforensicsconsultingllc.com Love sharing knowledge and teaching people that are really interested in the material.
Bryan is the co-host of the Brakeing Down Security podcast. Bryan's a Navy veteran, with 20 years of experience in IT and infosec. In addition to the GCIH, he also holds the GWAPT, and a CISSP in good standing. Bryan sees incident response as something vital to any business, and he is eager to share knowledge and experience with you. You can learn more on his podcast "Brakeing Down Security" by visiting http://www.brakeingsecurity.com

Marcelo has an extensive and diversified experience within the information technology sector. He has been carrying out computer forensics investigations for over 8 years. Worked with incident response / computer emergency response, being responsible for conducting investigations and responding to networking intrusion attempts. He investigated and handled privacy-related incidents and consumer complaint in liaison with Legal and Human Resources departments. Analyzed and documented, including root cause analysis, information security incidents as well as the analysis of the circumstances enabling or permitting these same incidents to take place, including offering remediation strategies. Investigated and immediately stopped leaks and inadvertent disclosures of confidential information. Developed policies and security awareness programs. Worked with highly sensitive information in a team environment.

Marcelo enforced Firewall, Intrusion Prevention System (IPS), Demilitarized Zone (DMZ), anti-virus and anti-spam configuration and maintenance. He assisted with the selection, installation, and adoption of automated tools that enforce or monitor the compliance with information security policies, procedures, standards, and similar information security requirements. He analyzed and documented information security incidents as well as the analysis of the circumstances enabling or permitting these same incidents to take place. Audited, verified network security and gave recommendations to improve the network security. Executed wireless evaluations and security auditings. Advised organizations with current information about information security technologies and issues and researched and recommended solutions. Wrote user manuals on security softwares and computer, email and Internet user policy. Developed and implemented user security awareness programs, with seminars, conferences, folders, newsletters and helpful suggestions. Designed and reviewed Windows 2000/XP/Vista/Windows 7 and Linux security architecture.

Marcelo has assisted task forces in lawsuits as technical assistant, acting as a expert witness in civil trails. He assisted in computer crimes (cybercrime) investigations and was responsible for establishing a chain of custody for evidence. He performed customer data analysis of data requested from banks and telecommunication companies, as requested by Brazilian Attorneys. He wrote, compiled and edited reports of security activities.

Marcelo has also worked as an associate professor on some colleges training on the following subjects: Law, Investigation and Ethics; Physical Security; Systems Security and Auditing; Networking; Cryptography; Software Engineering; Data Processing Center Administration. He worked as instructor for the Security Fundamentals Course (Presidency of Republic) for over than 10 classes. He was lecturer at the most important Information Security conferences in Brazil.

Finally, Marcelo holds a Masters degree in Computer Science and a Bachelor degree in Information Systems. He also has some certifications, which illustrates his passion to learn: GIAC Certified Forensics Analyst (GCFA), GIAC Certified Incident Handler (GCIH), CISSP (Certified Information Systems Security Professional) and EnCase Certified Examiner (EnCE).

http://ca.linkedin.com/in/caiado

Michael A. Curtis (Mike) has over 20 years of experience in the security field and has held several key leadership positions at Rollins, Virtual IT Experts, this.com and BellSouth.net. Additionally, Mike is active in the security community having served as a past member of the Symantec Customer Advisory Board, and is an officer in the Atlanta (ISC)2 Chapter. Mike holds a BSEE, cum laude, from Northeastern University, an MBA from Bentley College and a CISSP.

Richard Davis has over 22 years of Information Technology experience, more than 10 of which in cybersecurity/information security. He received his first computer in 1984 at the age of seven, and became immediately enamored with technology.

After graduating high school, Richard enrolled in college and opened his own computer company, providing high-performance custom-built PCs, service, networking, consulting, and training services for businesses and individuals throughout the North Georgia area. He sold the company after 10 successful years, and then spent nine years at a state college within the University System of Georgia. While there, he served as Network Support Specialist, Information Security Officer (ISO), and later Chief Information Security Officer (CISO).

Richard currently serves as Executive Director of IT Security for Embry-Riddle Aeronautical University. Richard has a Bachelor of Science in Cybersecurity from the University of Maryland University College, and holds 22 industry certifications, including CISSP, CCNP Security, CCNP Routing and Switching, GCFA, GCFE, and GPEN.

Richard also creates YouTube videos on a variety of security topics, including digital forensics and incident response, writes software for macOS and iOS, and is very involved in the information security community.

GitHub: https://github.com/13Cubed

Website: https://www.13cubed.com

YouTube: https://www.youtube.com/user/davisrichardg

Cuong Dinh is the Incident Response Lead at CH2M Hill, Inc. His expertise ranges from Vulnerability Management, Intrusion Detection and Analysis, Incident Response, Digital Forensic Analysis and Investigation, Malware Analysis, to Web Application and Network Penetration Testing. Cuong holds multiple GIAC certifications including: GSEC, GCIA, GCIH, GCFA, and GWAPT, along with a Bachelor's degree in Computer Information System from Metro State University of Denver and a Master's degree in Management Information System from University of Colorado Denver. Throughout his career Cuong has had the opportunity to implement many security programs and technologies including Encryption, User Awareness program, Vulnerability Management, IPS/IDS systems, Incident Response program, Malware Sandbox and Analysis, etc. Cuong enjoys sharing knowledge and giving back to the community.

Jeremy works as a security penetration tester, application security consultant, and defect remediation expert for UPS. Jeremy is also the owner of Ellipsis Information Security and teaches courses for SANS Institute. As a Director of Education for the Kentucky ISSA chapter, Jeremy presents on application security, penetration testing and defense along with operating the "webpwnized" YouTube video channel. Additionally, Jeremy develops the open-source OWASP Mutillidae II training environment. Jeremy has a Bachelors in Computer Science from Indiana University, a Graduate Certificate in Cybersecurity from the University of Louisville and is a GIAC-certified Web Application, Mobile and Network Security Penetration Tester.

With a bachelor's degree in computer science and an MBA, Chris performs penetration tests to help businesses understand and manage their online risk. He also holds a commission in the Army National Guard and has worked roles from international partnership management to red team on large-scale cyber exercises. 

Passionate about information security education, Chris has spoken to thousands of students in dozens of Maine high schools and contributes to (ISC)2's Safe and Secure Online materials. He holds CISSP, OSCP, GSEC, GCIH, and GWAPT certifications. 

Outside of work, he enjoys spending time with his wife and four kids and volunteering at his church.

Jose Fernandez is a Cyber Engineer for iNovex Information Systems. He has over 18 years of experience in the IT field. Jose specializes in InfoSec research by applying offensive methodologies towards practical defensive measures. Jose's background in CNO, CND and engineering has allowed him to work in some of the most technically demanding environments throughout his career in both private and public sector.

Mr. Fernandez is also a Veteran and PhD student pursuing his dissertation in application whitelisting. Jose holds a Masters degree in Science specializing in Information Security as well as over 20+ industry certifications. He has held positions from IT Specialist, Journeyman to CNO SME during his career.

Mr. Fernandez is an avid developer and spends his research time automating system processes and implementing new technologies in networking and virtualization. Jose has led specialized teams as both a mentor and tech lead within different areas of federal government. He has also been successful in defending hostile and restricted spaces within the federal government as a CND OCO by performing rogue malicious user emulation and incorporating CNE into hunting operations abroad.

Craig Galley is an Information Technology Professional with accomplished work experience in the Security industry since 2001.  He earned a Bachelor of Science degree in Information Science from the University of North Florida.  Early in his career, he was responsible for deployment and management of network prevention controls for a private sector organization.

Craig's career focus shifted exclusively to application development with a desire to lead secure coding best practices while chaired on Information Security Steering committees and managing large development projects and teams.  

Craig's certifications include GSEC, GISP, CISSP and CSSLP.  In his current role as an Information Security Officer, Craig manages and directs an Information Security Program in the public sector.  He is also active in Information Security groups, with volunteer experience as a Vice President.

Jai is a cyber security analyst for a Fortune 5 Enterprise, with a focus on Event Triage, Threat Hunting and Incident Analysis. He has over 17 years of information technology experience.  The roles Jai has had in his years of experience include, tech support engineer, system and security administrator, systems engineer, application service delivery, analyst and security analyst.

Jai is passionate about emerging technology,and is constantly learning and exploring avenues to practice those learned skills.

He is also interested in giving back to the community and aspires to 'teach forward' so others can benefit from this knowledge.

Jason has been working in IT since 2002 when he joined the Air Force. 
Jason was a systems administrator for 10 years, then became a contractor working in incident response for DoD. 
After about 2 years of doing that Jason took a civilian DoD job working in information security. 
Jason has Sec+, CEH, OSWP, GCIH, and is presently taking PWK and hope to get OSCP.  

Charles Gifford (Chazz) is a recognized expert within cybersecurity and has been working in the information technology and security field since 1997. Over the course of his career, Chazz has held various technical and leadership positions within the Aerospace and Manufacturing Industry. Chazz currently manages a Global Security and Risk Team for a fortune 500 company that spans everything region. Chazz?s latest scholastic achievement is graduating with honors from the University of Maryland University College in the Masters of Science in Information Technology focused in Information Assurance. Chazz has specialized in mentoring, metrics and measuring effectiveness of security teams throughout the last 7 years of experience.

Shane Harsch is an information security professional with over 25 years of experience ranging from military to manufacturing to security consulting and professional services. He has managed and architected SOCs for the military and managed service providers. Shane is a commissioned officer in the US Army with a Masters in Business (MBA), and maintains the following certifications: intrusion analyst (GCIA), incident handling (GCIH), enterprise defense (GCED), and information security (CISSP). Shane is currently with RSA as a Senior Solution Success Manager.

Some additional background:

His soft skills are founded in theater, music, and foreign languages, all cultivated while living in Germany. Additionally, Shane spent 12 years in the US Army, receiving a commission and attaining the rank of Chief Warrant Officer, experience which has served him well as a leader, mentor, and team member. Shane enjoys skiing, fiction of all kinds, and is an active designer and writer in the tabletop gaming industry.

Matt Helin has over 10 years experience in the IT and data communications field. He is a former network and systems engineer who has shifted his primary focus to all things information security for the past few years. He holds the CISSP and GCIH certifications and currently works in the information security department for a high profile e-commerce company. Matt is excited to mentor SEC 504 because it is generally a person's first exposure to common hacking tools. Witnessing first hand how systems are breached can be amazing, alarming, and eye opening.
Bob is the CIO for a Software as a Service provider that provides services to foundations and financial institutions. He began his career as a Network Engineer in the United States Air Force where was also a Systems Administrator and Lead Information Technology Instructor. Upon leaving the Air Force he developed and instructed technical courses and has been working in Technical and Security Operations for the past 15 years. Bob holds professional certifications, including CISSP, GIAC GSEC, and GIAC GCIH.

Brian Hooper holds dual B.S. degrees from Northwestern University in Computer Engineering and Computer Science. Brian has always had a passion for solving problems and figuring out how things work.

As a child that passion equated to fixing broken fax machines and constantly taking apart computers and putting them back together.

In his professional life that passion has led to a career in technology. From developing and deploying large systems in all stages of design through installation, to writing custom software exploits and penetration tests, his 14+ years of experience after college have been defined by three things: an inquisitive mind, a drive to push the boundaries of what is possible, and a thirst to learn new things.

He has focused that passion on Information Security for the past 10 years working in a variety of roles from R&D to consulting to training to figuring out how to secure the cloud. Brian is currently a cloud security architect at Microsoft and holds several certifications including GCFA, GCIH, GCIA, CISSP, and OSCP. He is excited to share his experience and perspective and passion with others as a SANS mentor instructor!

A central California native, Brian has spent his career supporting the technology goals of organizations throughout the U.S., and around the world.
Having worked for multinational VAR's, Fortune 100 companies, government agencies and owning a successful IT engineering firm for nearly a decade, Brian possess the depth and experience that organizations require in today's technology-forward business climate. He has advised owners and senior management within legal, healthcare, agriculture, engineering, education, retail, development, and distribution/supply chain. He has also consulted with and advised numerous non-profit and government entities in matters of public policy and legislative initiatives.
Serving as CEO of IT Strategy, Inc., a central California cybersecurity firm,  Brian oversees all cybersecurity engagements, including: regulatory compliance, HIPAA assessments, industrial control assessments, penetration testing, threat hunting, and technical team training.
Brian's passion for technology doesn't stop in the U.S. Since 2001, Brian has partnered with global agencies to bring technology and internet services to impoverished areas of Africa, specifically the Democratic Republic of Congo. He considers this the most fulfilling project he has ever undertaken, observing that, 'Whenever you can pair your passion with helping those in need, there are few things in life that are more rewarding.'
Brian currently holds the CISSP, GPEN and the GCED.

Mark has been in IT for almost 20 years. He started in Security in 2000 when a UNIX box cost $250 grand. He currently manages a team of Security Analysts as he builds a SOC at a Financial Services company. He is excited to bring his energetic teaching style to SANS students. Check out his 2016 BSides Cincinnati talk on You Tube! He's worked for a CPU manufacturer where he helped launch a motherboard, a physical security company, and a Fortune 50. He helped a bank achieve their first PCI compliance. He's helped secure a research foundation. Hal gets embarrassed every time Mark reminds him that his first SANS class was Track 6 at Network Security in New Orleans before Katrina moved it to Las Vegas. He holds 3 SANS challenge coins. SANS history: Track 6 & 8, Business Law & Computer Security, SEC503, SEC504, SEC505, SEC508, SEC558, FOR508. He's held GMON, GCIH, and GCFA certifications.
Allen Jenkins is the Director of Strategic Services and Chief Information Security Officer for SyCom Technologies, based in Richmond, Virginia. Allen has over 25 years of experience in the Information Technology field. He has worked in varying capacities (including systems administration, systems engineering, management, and consulting). Allens primary focus over the years has been on Information Technology Infrastructure solutions. Allen works with customers in varying capacities, helping to assess, plan, design, deploy and support their IT needs. Most recently, that focus has been on helping customers reduce risks to their environments through assessment methodologies that focus on a top down approach - working with executives and business leaders on policy and procedure, then evaluating the technology in place to support those business initiatives. Allen holds the ISACA CISA certification and the GIAC GSLC certification. When not focused on technology and security, Allen can be found either with family, a good book or on a trail hiking or cycling.
Shawn has over 17 years in the field of IT and 10 specifically in an Information Security role. Currently Shawn has taken a position as the Information Security Officer at the University of California School of Medicine. In this role Shawn is responsible for building a robust security program to meet the needs of both educational and healthcare requirements. His responsibility is to implement the policies, standards and procedures to build the framework for this security program. Once the framework is in place his responsibilities also deal with building a security team and implementing technologies and best practices to support this security program. Throughout his career Shawn has had the opportunity to implement many security programs and technologies including encryption, next generation firewalls, IPS/IDS systems, vulnerability management and data loss prevention. Shawn holds many industry certifications including the well known CISSP, GSEC and GCCC. Shawn is always continuing his education and will be taking many more SANS and other security courses. Shawn is excited to have the opportunity to get more in touch with the individuals that are in the security industry near him. He looks forward to being able to pass along some of his experiences and lend a helping hand to the next generation of security professionals.

As an information security professional, Azeem has accrued years of experience in security engineering, incident response, digital forensics and vulnerability management. A firm believer in ongoing education, he works hard to keep his base of knowledge current and up to date. Although he holds accreditations from such industry leaders as GIAC, ISC2 and Access Data already, he is constantly looking for ways to learn more and to gain a better understanding of his field, attending and volunteering at conferences such as Shmoocon and Blackhat.

Azeem is a natural people person who connects easily with people from all backgrounds. He enjoys working with and mentoring people who are motivated to the same extent that he is, and he takes real pleasure in discussing the security field. A strong advocate for continued progress in the security field, he speaks eloquently and listens closely, knowing that there is always something for him to learn and share.

Azeem looks forward to serving as a mentor as a way to provide value to the community that has become so much like home to him over the years.

Garret has been working in the information security realm for over 10 years and is currently a Cyber Investigations Instructor for the DoD in the DC area.
Garret holds an undergraduate degree in IT and a Master's degree in Cybersecurity with a concentration in Digital Forensics.
Additionally, Garret is pursuing a Graduate Certificate in Penetration Testing and Ethical Hacking from the SANS Technology Institute (STI).
Garret plans on applying for STI's MSISE at the completion of the certificate program. Garret holds the following GIAC Certifications: GPEN, GCIH, GPYC and GWAPT as well as the CompTIA Security+ and Network+ certifications.

Ken May is the CEO and co-owner of Swift Chip, a full service IT firm servicing all of Southern California. Hes been a resident of Ventura since 1999, is married to his wife Debbie, and has 3 daughters and a son.

Ken has a Masters Degree from SBCOM, a Bachelors in Liberal Arts from Thomas Aquinas College and has written 3 books and numerous articles. He has been Voted Top Channel Influencer of the SMBnation 150, and carries numerous certifications from HP, Microsoft, Cisco, Symantec, Dell and more.

Recently, Ken was chosen by his peers to be elected to the CompTIA Managed IT Services Community Executive Council, where he will directly influence the education and guidance of their international IT community.

Ken is also a Commissioner for the City of Ventura, CA, where he works to help promote the Arts in his community. He enjoys music, martial arts, movies and SCUBA diving. Mr. May strongly believes that it is important to be actively involved in the community, and that one should always try to keep the Big Picture and long term goals in mind when solving immediate-need issues, whether it be in business, community or ones personal life.

Bryan McAninch is an information security professional with over twenty years experience in various disciplines including digital forensics, penetration testing, and security architecture. He holds a Bachelor of Science in Business Administration from the University of Texas at Dallas and a Master of Science in Information Assurance from the University of Dallas. Bryan is passionate about information security and giving back to the community. He is an organizer of the North Texas Cyber Security Group and owner of Prevade Cybersecurity.

Victor Monga is a Security Engineer working for a company located in Studio City, California.

His words "Learning about security is my passion and implementing security is my job". He is in the field for more than a decade and enjoys learning about InfoSec. He has an core networking background which helps him in InfoSec world.

He has achieved couple of certifications such as GSEC, VCP-DC, CCNA, ITIL etc. He is woking on getting GCIH, CISSP and VCP-NV. He is a certificated paralegal.  He is hands-on with networking and VMware. He is an active member of community groups such as OWASP, ISSA, CSA and Cisco. He loves explaining / training / providing workshops. 

He is a fan of IronMan and calls his home network lab "Jarvis".

He belevies that there ain't enough trained security professionals and he wants to help people learn abour security. During his teaching he is expecting to learn from students or at least see the thins from different angle.

Jason is passionate about security and is thrilled to have the opportunity to enable others with a similar passion. A thorough techno-nerd with experience as a developer, sales engineer, and security professional, Jason has a wide-ranging skill set which enables creative approaches to red-team challenges. Jason holds Security+, Network+, Certified Ethical Hacker, and GPEN certifications.

Lisa Peterson CISA, CRISC, CISSP has worked in Information Security for 20 years, and is a Security Analyst for Progressive Insurance. Her current focus is in governance, risk and compliance. She is a part-time instructor at Cleveland State University and also speaks on security topics. She serves on the board for the Information Security Summit, the Northeast Ohio chapter of ISACA, and the Northeast Ohio chapter of CSA.

Brandon C. Poole is SOC analyst for an electric & gas utility company in the southeastern US. He brings with him 10 years of IT experience in system administration, network administration, disaster recovery, and information security. During this time Brandon has helped various employers setup & run vulnerability assessment/management, business continuity, security assessments, and change management programs across nonprofit, government & private sector organizations.
In addition to the above experience he also maintains numerous professional creditable such as GSEC, GCWN, GCIH, GCCC, CEH, CompTIA Security +, CompTIA Network + and IBM QRadar SIEM Analyst as well as being a member of ISSA, InfraGard, and the GIAC Advisory Board. 
When Brandon isn't at work he can be found further sharpening his skills in his homelab, writing Python or PowerShell scripts to automate security workflows, tweeting on Twitter (@bcpoole_sc), working on his new blog bitsbybrandon.com, or mentoring others in their IT and/or Infosec career.

Kip Schroeder has been in the IT industry for the past 27 years. Currently he works as a Network Architect for Solar Turbines where he designs and secures the co-habitation of Industrial Control Systems (ICS) along with traditional IT solutions. Prior to joining Solar in 2016 he spent 15 years with Cisco Systems supporting customers throughout the Midwest in their efforts to secure their voice, video and data communication infrastructures. Kip is a regular presenter to industry trade groups including ISSA where he shares broadly from his engagements and perception of industry directions. Kip has lived and worked in Chicago, Kansas City, Toronto, Detroit, Boston, Wichita, Minneapolis and now San Diego. He is passionate about security and welcomes the opportunity to educate others in their quest to develop the skills necessary to flourish in the 21st century.

John Sicklick has over 30 years of experience in the aerospace industry as a software developer, systems administrator, systems integrator, and systems security engineer. John is a retired U.S. Navy Commander where he served as an Information Corps Warfare Qualified officer. John currently serves as an adjunct faculty member at a local community college, teaching courses in ethical hacking, Linux operating system, and computer forensics. A graduate of New York Maritime College, he holds a BS in computer science and an MS in applied computer science and technical programming. He holds the GSLC, GXPN, GWAPT, GCIH, GCFE, GPEN, and CISSP certifications and the Penetration Testing & Ethical Hacking certificate from the SANS Technology Institute. John is excited and honored to help others further their careers in cyber security. www.sicklick.com

Bob Simpson is the creator of GhostSentry, an access control and compliance firewall and CIO for Finley & Cook, PLLC, a private accounting firm where he has served for 11 years. Before that, he was Security Architect for the Oklahoma Department of Human Services.  Mr. Simpson holds the CISSP, GCIH, GCIA, and GPEN, as well as MCSE and CCNA Security certifications. He is a member of the SANS Advisory board and InfraGard.

Bob is passionate about spreading the knowledge and skills necessary to face today's security landscape with confidence. Bob has spoken at DEF CON Wall of Sheep, BSides, the Oklahoma Cyber Terrorism Summit, several times at Information Warfare Summit, and at dozens of regional events. He has background in large complex infrastructure such as telecom service providers, but has dedicated the past fifteen years to information security. 

Jerry has over 20 years in the Information Technology Field, he is currently a Cyber Security Engineer for a sporting goods retailer in Birmingham, AL. He holds a Masters Degree in Information Engineering and Management and is passionate about Technology and helping people succeed.

Scott has been in the IT industry since 1970 and a has been a member of  the IEEE since 1984

He has multiple College degrees, including:
Masters of Science in Computer Engineering, University of South Florida
Masters in Business Administration, University of Tampa

Many vendor certifications, including:
MCSE, Master CNE, CISSP and GSEC certifications.

A Veteran of the USAF, 56th Security Police Squadron in Tampa Florida.

Scott is excited to mentor the GSEC class once again because it was a lot of fun last time.  All of the people who took the class passed and were certified, he wants to see that happen again.

Charter member of the ISC2 Twin Cities Chapter, Board of Directors, Treasurer.
Participate in UMSA, and putting on Secure 360 conference.

Scott is a Scouter (BSA) with two sons and a daughter who are Scouts. And a long term volunteer in scouting (12 years) currently the Metro Lakes District, District Commissioner in the Northern Star Council.

Austin Taylor has an extensive background in Defensive and Offensive Cyber Operations and has performed incident response for some of the world's top Fortune companies. His expertise includes penetration testing, data science, threat hunting and User and Entity Behavioral Analytics (UEBA). He is the co-author to "Crash Course in Data Science for Hackers" which is taught annually at Blackhat and author of "How to Build a World Class Monitoring System for Home, Small Office, or Enterprise Networks". In his off time, he teaches programming and conducts training at conferences. He currently serves as a Cyber Warfare Operator for the United States Air Force and works at IronNet Cybersecurity as a Senior Security Researcher. Austin holds multiple industry certifications including CISSP, GMON, GCCC, GCIA, GCIH, GCPM, GSEC, GPEN, CEH, VCP, CCNA:Security

Eric is an accomplished governance, risk and compliance specialist and author set to publish his first book titled: Building a HIPAA Compliant Cybersecurity Program in late 2017 or early 2018.

In his GRC role as the Director of Compliance at Blue Health Intelligence (BHI), Eric leads efforts to increase cyber security maturity in several domains including governance, policy and controls, risk management, cyber security strategy and business alignment. He established the risk management function which includes assessment, analysis and treatment of risks, threat and vulnerability management strategy and due diligence requirements for assessing third-party risk.  Eric also assesses cybersecurity technology capabilities recommending enhancements to current solutions and new capabilities required to meet risk reduction requirements.  

Prior to BHI, Eric spent seven years at Ernst & Young (EY) in the Advisory practice where he specialized in helping healthcare organizations (providers, payers and business associates) solve problems related to information security, risk management and compliance.  Eric lead HITRUST Common Security Framework (CSF), cybersecurity program management and third-party risk management assessments. 

Tom Webb has 16 years of experience in IT and 12 years dedicated to security. Tom has worked for state law enforcement and in the education sector.  He is currently employed by the University of South Carolina as the director of security operations. His role includes leading a team that performs: incident response and forensics investigations.

Tom has a B.S. in Information Management from the University of South Carolina. He holds various certifications including the GSE. Tom also volunteers for the SANS Internet Storm Center. You can follow him on twitter @twsecblog, irhowto.wordpress.com or https://isc.sans.edu/handler_list.html#tom-webb.

Brian Willis is a cyber-security expert for CSRA based in the DC area. He has been providing Unix/Linux administration and cyber roles to private industry and government for 18 years. Currently his role is running cyber systems that protect the federal government. Before that he managed systems at NOAA's National Weather Service in various operational roles. Through his years of experience he helped draft security guidance for interagency communication via disparate application stacks using application layer security proxy devices. Other projects include NIST/FISMA security, security scanning, PKI key creation, network packet dumps, etc. He enjoys understanding how things interconnected and then evaluating how they are vulnerable or prone to failure. All this interest started with Amateur Radio and has led to a passion for all thing technical and mechanical. He holds the CISSP, GCUX, and CCSK.

Asmerom Yakob has over 10 years of experience in Information Technology as well as Information Security and He is member of Incident Response team in his current role . He earned his MSc of Computer Science with concentration in Information Security and Assurance from George Mason University , Fairfax ,VA and holds GCFA , GCIA and CISSP. He is passionate what SANS training has to offer to students to sharpen skills in order to cope with modern cyber threats and decided to join mentor program to share the knowledge and experience in cyber security. Asmerom is an active member of the infosec community and looks for every opportunity to both learn and encourage others to gain a deeper understanding of the challenging field of Cyber Space.