Neil de Guzman
CEO - Chief Executive Officer
Neil is a globally recognized developer and pioneer in the provision of Intelligent Agents for the Energy Industry. His experience includes CEO of IAC-Forensics, Intelligent Avatar Corporation; Triias Corporation which is developing Intelligent Agents for the cyber security, aviation, financial, and legal industry. He is CEO of Intelligent Agent Corporation which is developing Intelligent Agents for use in upstream technology.
COO - Chief Operating Officer
Mary is a published domestic and international marketing and sales expert with a background in compliance, insurance and litigation. She also has outstanding corporate marketing and sales achievements in highly technical legal, medical, pharmaceutical and energy industries. As an entrepreneur, she has owned and/or been a major principal in a variety of commercial endeavors with expertise in directing sales and marketing, management, strategic alliances & partnerships, and brand/new product innovation.
Education: Vermont College of Norwich University; Barton College, Wilson, North Carolina, B.S, Business Administration concentration in marketing and management: University of Salamanca, Spain; York College England
Bill SpernowBill is a nationally recognized authority on all aspects of high-tech crime and the methodologies required to identify, acquire and analyze the forensic evidence found in stand-alone, networked and enterprise infrastructures. His experience includes: Security Mentors, LLC – Owner; Coca-Cola Enterprises – Sox Security Strategist / Consultant; Experian – Director of Information Security, Investigations and Incident Response; Georgia Student Finance Commission – Chief Information Security Officer; Gartner Group, Inc.– Research Director / Information Security Strategies; University of New Haven – Distinguished Special Lecturer / Computer Forensics ; Fidelity Investments – Principal Security Consultant / Cyber Investigations; National White Collar Crime Center – Assistant Director / Computer Crimes; Federal Law Enforcement Training Center – Lecturer / Internet Investigations; SEARCH Group – Computer Crime Specialist; Sacramento County Sheriff’s Department – Sworn Peace Officer; Data General Corporation – Senior Field Engineer.
Certifications: CISSP – Certified Information System Security Professional, CISM – Certified Information System Security Manager*, CEH – Certified Ethical Hacker, PMP – Project Management Professional*, CompTIA Network+ & Security+ Certifications, ACE – Access Data Certified Examiner and DFCP – Digital Forensic Certified Practitioner.
Education: California State University: MBA, BS Computer Science, Criminal Justice, Psychology.
CTO - Chief Technology OfficerGreg is a pioneer in the provision of IT investigations, Computer Network Forensic Consulting and E-Discovery services, since 2003. In this role he has focused on electronic discovery, the preservation of evidence, spoliation (both avoidance and detection), and the analysis of computer network servers including database servers. In 2009 he led his first major intrusion response as a computer forensic expert and since then has acted as a key member of several ad hoc Cyber Security teams in numerous major intrusions. He has been developing computer models that integrate cyber security maturity of corporations, costs of security tools, and costs of risk mitigation/insurance to determine the GAPs and trade-offs to direct and defend corporate cyber security strategy.
His experience includes investigations for legal firms King & Spalding, Beck Reed, Fisher & Phillips, Carlock Copeland, Kilpatrick Townsen, McGuire Woods, Krevolin & Horst; Corporate IBM,Ford Motor Company, Kellog Corp., BGlock, Sothern Company, Home Depot, Staples; Finance: Chase Manhattan, Invesco, Sun Trust.
Certifications: Certified eDiscovery Professional, Cellebrite UFED Certified, Cellebrite Physical Certified, PRO HP Master ASE SAN Architect, HP ASE (Accredited System Engineer) Tru64 V4 & V5, Red Hat Certified Engineer, Microsoft Certified Professional (Internet TCP/IP Working with Windows NT Server 4.0.), Applied Voice Technology
Education: Georgia Institute of Technology
Greg DejnoGreg has great technical knowledge in numerous areas of IT including security testing methodologies and technologies with focus in the following areas :Information Security Program Development, Internal and External of systems and networks, Penetration Testing, Security Service Monitoring, Security policy, architecture, and roadmap development, Security implementation including system lockdown, network traffic analysis, remote access authentication, secure wireless deployment, firewall and IDS monitoring, log aggregation, and system configuration, Commercial and open source security technology investigation and implementation, ISO 27001 Control Gap analysis and program development.
Jim SoenskenJim has a vision and passion for bringing effective and easy to use security solutions to corporations. He can convey the knowledge, conviction, and training it takes to fight cyber crime He offers a realistic view of today's security issues and remedies for the business community. He blends business goals with technology, training, policies, and improved processes to provide the appropriate security program and regulatory compliance for each individual company.
His experience includes development of software, building a security company, and he has spent 20 years in the information security, software, and consulting industries. Jim, as a CPA, was an internal auditor for a fortune 100 company for 7 years.
Jim is a regular speaker and expert witness on Information Security. He is also currently a member of the Board of Advisors for the Metro Atlanta Chamber of Commerce. In the past, Jim has held executive positions at D&B Software, SAP, and Primitive Root, an internet security company.
Matt CaldwellMatt has spent a career developing new technology to protect against cyber criminals and has carried out numerous engagements in the USA and abroad implementing advanced technology solutions in cyber warfare including a SIEM bought by IBM and Software for monitoring TTP of antagonists. His business experience includes Borderhawk CTO large scale projects for state and federal government agencies; Digital Stakeout CTO for security projects, InfoWeapons CTO forBRAS/Wireless/Cellular Security; IBM TIVOLI CTO FOR SIEM, Atlanta, Georgia, MICROMUSE, Atlanta CTO, GUARDEDNET, INC CEO/CTO.
Certifications/Technical Expertise in Operating Systems Linux (Centos,Ubuntu,Redhat, Debian, SUSE); SunOS 4.x-5.x (2.x-10); HP-UX 9.x-x; SGI IRIX 5.x; AIX 3.x-5.x; MP-RAS System V (AT&T Unix); OpenBSD/FreeBSD; SCO Unix; DomainOS (Mentor); AmigaOS (Workbench); MacOS X; Novell, Windows: 7, Vista, NT Server and Workstation 3.51-5.0, 2000 Professional/Server/Advanced, 2003 Server,XP, 95-98 Networking Internet: IPv4/IPv6; Internet TCP/IP: TCP, UDP, ICMP, RIP, DHCP, OSFP, PPP, (C) SLIP, ARP, PPTP, DNS and DNSSEC PKI; ISDN: Protocol and Routing; Frame Relay: CSU/DSU Configuration; Physical Layer Devices