(Content not available)
Writings, case studies, pioneer profiles, and technical guides from four decades on the wire.
Case studies, technical guides, Wireshark tutorials, pioneer profiles, and cybersecurity insights from four decades on the wire.
40 years of security expertise meets AI-powered vulnerability scanning. Security Institute is helping enterprises rapidly deploy Claude Code Security.
In the dynamic realm of cybersecurity education and testing, having a secure environment to explore vulnerabilities is c...
In the dynamic realm of network analysis and cybersecurity, interpreting packet captures (PCAPs) can often feel like nav...
In today's rapidly evolving cybersecurity landscape, the ability to trace the origins of network traffic isn't just adva...
Introduction In an era of increasing cyber threats, organizations are under constant pressure to safeguard their network...
Introduction Purpose: This case study focuses on the implementation of ERSPAN technology, a remote network monitoring so...
Introduction Purpose: The case study highlights a Wireshark Wednesday event, focused on exploring the ERSPAN (Encapsulat...
Introduction In the wake of the 9/11 Pentagon disaster, organizations faced unprecedented challenges in restoring vital ...
At SecurityInstitute.com, we are more than just a cybersecurity platform; we are a vibrant think tank where innovation, ...
Few tools in cybersecurity and network management match Wireshark's prowess and depth. This open-source network protocol...
In the realm of network analysis and cybersecurity, Wireshark stands tall as a vital tool for dissecting the complexitie...
In the world of network analysis, understanding packet captures is crucial for diagnosing issues, optimizing performance...
Welcome back to the Wireshark Master Class! In the intricate world of network analysis and cybersecurity, the ability to...
Welcome to another insightful lesson in our Wireshark tutorial series! Today, we're delving deep into a critical aspect ...
In cybersecurity and network diagnostics, efficiency and precision are everything. Whether you're a seasoned network adm...
In today's interconnected digital landscape, comprehending network traffic is not just advantageous—it's essential. From...
Bill Alderson's Proactive Approach to Cybersecurity: Thwarting Zero-Day Attacks In today's digital age, cybersecurity is...
Bill Alderson's Insights: Transforming Cybersecurity from Reaction to Prevention In the vast and intricate landscape of ...
Introduction In the ever-evolving landscape of internet protocols, the introduction of TCP-QUIC stands as a significant ...
In the digital age, cybersecurity is not just a necessity but a critical component of any organization's IT infrastructu...
Gus Stein's career represents a rare convergence of deep technical understanding and executive-level sales leadership in n...
Colonel David Wills Colonel (COL) David Wills, retired from the U.S. Army in 2021 after serving as the Deputy Director f...
Gary Hayslip: An Experienced Global CISO and proven Cybersecurity Professional Gary Hayslip's professional journey affir...
Jon DiMaggio is a highly accomplished cybersecurity professional and published author. He currently holds the position o...
Paul Barret: NetScout Pioneering Network Assurance and Cybersecurity - A Journey of Innovation and LeadershipPaul Barret...
Betty Dubois: Chief Detective at Packet Detectives Betty DuBois, the Chief Detective at Packet Detectives, a network per...
Brian Clinkenbeard: Virtual CISO and Inventor of new and innovative approaches and methods for Cybersecurity Pioneering ...
Radia Joy Perlman: Pioneering the Future of Technology with Vision and Expertise. Few names resonate with as much influe...
Dr. Harry J. Saal Biography Dr. Harry J. Saal, a distinguished American technology entrepreneur, executive, and philanth...
Computer science has its fair share of extraordinary individuals who have left an indelible mark on the industry. Leonar...
Vinton G. Cerf: Father of the Internet and a Tech Visionary. Vinton “Vint” G. Cerf is vice president and Chief Internet ...
In the ever-evolving digital landscape, where the boundaries between the virtual and the real are increasingly blurred, ...
In a time where digital threats loom larger than ever, the need for cutting-edge cybersecurity strategies is critical. T...
In the world we live in today, every individual and organization hinges on technology. At the same time, cybersecurity h...
This TCP sequence graph uncovers a network anomaly where high-stakes file transfers are prematurely terminated due to un...
Firewalls that drop state after 5 minutes kill database connections. Hold state for an hour and latency spikes. The fix: change TCP keepalive on your servers.
Watch Full Session Video Watch 2 Minute Clip Nick Leghorn, Director of Application Security, The New York Times Nick's S...
Watch Video: Watch Charlene's Session Video Session by Charlene Deaver-Vazquez of FISMACS.com Title: New Mathematical Mo...
Watch Video: Watch Jon's Session Video Austin Cyber Show Session: The Art of Cyberwarfare Author Jon DiMaggio Session Ti...
Watch Gary's Session Videoo Austin Cyber Show Session by Gary Hayslip Author CISO Executive Primer Title: Cliff notes fr...
Watch Col Wills Session Video Colonel (COL) David Wills, U.S. Army, retired 2021,as the Deputy Director for Command, Con...
The Austin Cyber Show is excited to showcase authors who bring their expertise to the Cybersecurity industry through the...
Full 37 Minute Video Most cyber professionals don't have the opportunity to see an actual cyberattack play out. They und...
Full 38 Minutes Session Video Unleash the Full Potential of Network Detection and Response Consider the anatomy of a cyb...
Short Highlight Video Full Session Video Visit ExtraHop.com for more information. Defend the “When” with Network Intelli...
As your lovely mother walks out the door on this mother’s day, she backs out of the driveway to leave, only for you to f...
CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk about their...
CISO: Day in the Life of CISO's Sameer Sait & Mustapha Kebbeh In this session, two seasoned CISO's will talk about their...
Data versus Measurement: Why Your Current Metrics Aren’t Enough It’s time to get away from just tracking click rates and...
The Big Disruption in Cybersecurity Security awareness & training programs and content has improved dramatically in rece...
Social Engineering Attacks: Why do we fall for them and what we can do about it. By Dr. Ian Wilkinson Would you believe ...
Networked medical device connectivity. What does this mean and why does it matter? Life sustaining devices such as patie...
Assigning Cost to Security Risk. The importance of communicating cyber risk in financial terms to the board is growing d...
Reclaiming Your Identity Learn how to claim your identity before criminals do, or reclaim your identity after criminals ...
One Minute Highlight Clip Full 36 Minute Session Five Ways Attackers Leave Ransomware Vulnerable to Detection Ransomware...
Protecting customer's data privacy has become a new source of stress for any company with a web presence. Compounding th...
The nature of cybercrime is constantly changing and becoming more difficult to defend. This session will evaluate some o...
Mystery Solved: Deep Packet Security Analysis TLS version and cipher suite are the two most critical parameters negotiat...
In this session Brian Clinkenbeard, one of the prolific and beloved security gurus of the industry, will look at exposin...
We welcome attendees to examine in an interactive session the latest cybersecurity trends and their implications for org...
Remaining Ransom Aware Ransomware, among the most intimidating threats on today’s security horizon, is an issue best app...
This session will report on some observations about how the degree of convergence of physical and cyber security is evol...
Sam Harris, Stratascale Building a Modern SOC Requires Continuous Attack Surface Validation: The Modern SOC requires con...
Building a Security Team that Never Says “No” One of the most prevalent perceptions of any security team is that they ju...
Would you board a plane if you knew the pilot got all As in flight school? Probably yes, but what if you learned that th...
May 10-11 2022 Session by James Azar CyberHub Podcast Title: Double Espresso Morning Cyber Brief to Start the Day Join u...
A new digital border wall for your network, datacenter or device? Compromise of the wrong database can be catastrophic t...
The Pentagon was locked down; our team was escorted by heavily armed forces outside the emergency perimeter, through sec...
Datacenter consolidation creates performance problems for slow Oracle 11g Client queries. An application's server infras...
How Close To Maximum Theoretical Performance Are Your Applications? What Would It Cost To Improve? If Key Applications R...
Pentagon 911 Lessons Learned - IT Disaster Recovery Plan Bill Alderson discusses the technical and IT Best Practice less...
Enterprise Architecture IT Disaster Recovery Plan Steps to APM Under Pressure This session takes ideas from many IT disa...
APM Application Performance Monitoring Tools in the Theatre of War tells the story of how application performance manage...
Complexity of WAN Optimization, Application Acceleration devices makes analysis of problems and root cause analysis more...
IT Network Redundancy - Just Another Single Point of Failure (SPOF)? Trace by reverse engineering the Network logical pa...
TCP Selective Ack TCP Dup Ack TCP Previous Segment Lost TCP Selective Acknowledgment creates performance complexities. B...
MTU defines Maximum Transmission Unit. Firewalls blocking ICMP disables IP's dynamic Path MTU Discovery causing fragment...
Oracle performance tuning -SQL and for that matter MS SQL tuning or any SQL server performance tuning can be analyzed by...
Watch Bill Alderson's video on Oracle performance optimization ROI justification based on detailed packet analysis findi...
Slow Domain Logon Analysis - Root Cause Identified - Solved! Root Cause Identified - Application Performance Optimized a...
Every organization has a unique technical architecture “fingerprint,” characterized not only by the products it has chos...
Packet-level detail. Operational results. Real engagements where truth was disputed.
Restoring communications at the Pentagon within days of 9/11. Reverse-engineering undocumented networks, cross-silo collaboration, and the creation of the Rapid Network Rendering Database.
Read Article
TCP sequence graph analysis exposes an internal MITM device killing high-stakes file transfers. Linux IPTABLES firewall unmasked through incongruent hop counts and IP Fragment IDs.
Read Article
Setting up DVWA for hands-on security testing. Command injection, SQL injection, XSS, and more in a safe virtualized environment.
Read Article
How ERSPAN enables remote network traffic capture through GRE tunnels. Real-time packet monitoring across Cisco, VMware, and Linux platforms.
Read Article
ERSPAN implementation on Cisco 9K switches during a live Wireshark Wednesday session. GRE tunnel setup and real-time packet capture for incident response.
Read Article
Retrospective network analysis identifies 655 compromised SSL certificates within minutes — saving 120 hours and reducing breach risk by 90%.
Read Article
Recurring help desk tickets traced to root cause through on-the-wire analysis.
Read Article
[F]ortune 100 Company has serious Citrix issues affecting over 22,000 users regularly. Our Remote Diagnosis service was exactly what they needed to uncover the technical causes of
Read Article
[A]fter spending $600,000.00 on server CPU upgrade that did not improve response time, this company found the real problem they were trying to resolve. [W]e helped them diagnose th
Read Article
[G]lobal 2000 Company receives 10x Application Throughput after diagnosing problem with Onsite Analysis. This organization received great reward for not one dollar of new equipment
Read Article
[L]ooking at a Packet Trace File is often the first step in uncovering the problem. Like the TV Show "Yankee Workshop" just buying or having the same tools doesn't mean you can tur
Read Article
Datacenter consolidation creates performance problems for slow Oracle 11g Client queries. An application's server infrastructure was moved from an international location into a cen
Read Article
Pentagon 911 Lessons Learned - IT Disaster Recovery Plan Bill Alderson discusses the technical and IT Best Practice lessons learned from the events subsequent to the Pentagon 911 d
Read Article
Enterprise Architecture IT Disaster Recovery Plan Steps to APM Under Pressure This session takes ideas from many IT disaster critical problem resolution IT consulting engagements a
Read Article
APM Application Performance Monitoring Tools in the Theatre of War tells the story of how application performance management tools were deployed to analyze and report on key inteli
Read Article
Complexity of WAN Optimization, Application Acceleration devices makes analysis of problems and root cause analysis more complex. Yes, they are beneficial, but if you have an issue
Read Article
IT Network Redundancy - Just Another Single Point of Failure (SPOF)? Trace by reverse engineering the Network logical packet flow to find out! What is redundancy? Network redundanc
Read Article
MTU defines Maximum Transmission Unit. Firewalls blocking ICMP disables IP's dynamic Path MTU Discovery causing fragmentation at VPN, L2TP tunnels impacting performance. Gateways a
Read Article
Oracle performance tuning -SQL and for that matter MS SQL tuning or any SQL server performance tuning can be analyzed by capturing TCP database transactions at the packet level. Th
Read Article
Oracle performance optimization ROI justification based on detailed packet analysis findings. This case study helps CIO's justify portfolio spending on database improvements.
Read Article
Slow Domain Logon Analysis - Root Cause Identified - Solved! Root Cause Identified - Application Performance Optimized are the words CIO's and End Users enjoy hearing. Network Slow
Read Article
DLP protects individual records from leaking, but what secures an entire database from bulk exfiltration? Hop starvation methodology limits DataTravel distance at the packet level, keeping
Read Article
Why does leadership fail to act on cybersecurity threats until disaster strikes? A review of frameworks for security performance, CISO evolution, insider threat psychology, and building
Read Article
What does your iPhone do all night? Using a Belkin Ethernet adapter, a network TAP, and Wireshark, 500,000 packets were captured overnight to map exactly where iPhone data travels.
Read Article
An advertising firm's mission-critical file transfers kept aborting mid-stream. TCP Reset analysis, TTL hop count forensics, and IP Fragment ID tracking exposed a Linux IPTABLES firewall
Read Article
Caring for vulnerable servers that can't yet be replaced presents challenges. When Cisco announced all their firewalls were exploitable by the NSA's EXTRABACON exploit, hop sphere
Read ArticleIn the wake of the 9/11 Pentagon disaster, organizations faced unprecedented challenges in restoring vital IT systems and re-establishing secure communication infrastructures. This case study delves into the efforts of Bill Alderson and his team, who were tasked with rebuilding the Pentagon's communication infrastructure.
Bill Alderson was called upon shortly after the 9/11 attacks to lead the effort in restoring communication systems at the Pentagon. Upon arrival, the team encountered severe damage to communication circuits, network management systems, and security infrastructure. Comprehensive network documentation had been lost on compromised servers. The team had to start from scratch — creating new diagrams, strategies, and documentation. The Pentagon's reliance on legacy systems and compartmentalized operational silos made collaboration between different teams challenging.
The team adopted a holistic approach with a core focus on Technical Systemization — not just addressing immediate problems, but creating long-term solutions. Key elements included cross-silo collaboration (bringing security, desktop, network, and application teams together) and the creation of the Rapid Network Rendering (RNR) Database to centralize data and visualize the entire network infrastructure in real time. Detailed Visio diagrams mapped out the Pentagon's communication systems.
The Pentagon improved overall network resilience by 90%. Detailed system documentation and the RNR Database saved hundreds of hours in troubleshooting time. Communication failures were reduced by over 80%.
This TCP sequence graph uncovers a network anomaly where high-stakes file transfers are prematurely terminated due to unexpected TCP Resets. Despite initial smooth progression, akin to the creative workflows in a Mad Men era, our modern-day digital transfer is disrupted — not by cigarettes and old-fashioned vices, but by a digital hiccup that could spawn a plot twist worthy of Don Draper's most challenging ad campaigns.
In a network mystery with high visibility akin to an ad firm's peak season rush, the issue at hand is not a lack of creative direction but a technological misfire where each aborted transfer is a missed deadline. The clue? A TCP Reset, a digital “no” in a world that demands “yes.” The twist? Packets captured at strategic test points reveal an internal MITM — our own security device in disguise, issuing Resets from both ends. The culprit exposed not by a smoking gun, but by incongruent Hop Counts and IP Fragment IDs, unmasking a Linux IPTABLES Firewall as the unexpected interloper in this tale of digital intrigue.
Some file transfers were pulling a Houdini, vanishing mid-way. Not all, mind you, just a select few that enjoyed the thrill of the incomplete journey. This wasn't just a network problem; it was a digital whodunit.
The first clue lay in the mysterious TCP Resets, like unexpected plot twists in a Hitchcock thriller. These resets were cutting off file transfers like a bad movie edit. The question was: who was yelling “cut!”? In the style of any good detective story, we looked for suspects. Was it a rogue firewall playing vigilante? Or perhaps a mischievous man-in-the-middle, a digital Moriarty of sorts?
After some digital sleuthing worthy of Sherlock Holmes himself, we pinpointed the culprit: a Linux IPTABLES Firewall with a penchant for drama. It was like discovering the butler did it, but in this case, the butler was a bunch of code on a mission to disrupt.
Just as Don Draper would pivot to meet a market challenge, the network team, with forensic precision and a touch of digital sleuthing, navigated away from open-source firewalls towards a more stable solution. The stakes were high, the data critical, and the solution — a change in the network's very infrastructure — mirrors the transformative steps an ad agency might take to evolve with the times.
↑ Back to Case StudiesIn the dynamic realm of cybersecurity education and testing, having a secure environment to explore vulnerabilities is crucial. DVWA (Damn Vulnerable Web Application) is a purpose-built platform designed for hands-on learning and testing of web-based security weaknesses. Developed using PHP and MySQL, DVWA allows users to work with command injection, SQL injection, cross-site scripting (XSS), and more.
DVWA provides a controlled environment where security professionals and students can safely practice identifying and exploiting common web vulnerabilities. Each challenge level progressively increases in difficulty, building practical skills that translate directly to real-world security assessments and penetration testing engagements.
↑ Back to Case StudiesERSPAN (Encapsulated Remote Switched Port Analyzer) enables remote network monitoring by encapsulating traffic within GRE tunnels. The session demonstrated configuration on Cisco 9K switches with source ports, destination addresses, and ACLs. It works across VMware, Linux, and Cisco platforms.
ERSPAN provides real-time packet capture without physical access, making it non-intrusive and highly scalable. Unlike traditional SPAN ports that require local access to the switch, ERSPAN routes mirrored traffic across the network through GRE encapsulation — enabling analysts to capture packets from remote locations as if they were directly connected to the monitored segment.
As businesses adopt cloud and distributed networks, ERSPAN becomes critical for automated monitoring and cybersecurity. The ability to remotely mirror traffic from any ERSPAN-capable device in the infrastructure means security teams can respond to incidents faster, with full packet-level visibility, regardless of physical location.
↑ Back to Case StudiesThis case study focuses on an ERSPAN implementation demonstrated during a Wireshark Wednesday event. The implementation involved setting up ERSPAN source ports, configuring loopback capabilities, and specifying packet destinations on a Cisco 9K switch.
The configuration included defining ERSPAN source sessions with specific monitor ports, establishing GRE tunnel endpoints, and routing mirrored traffic to the analysis workstation running Wireshark. The Cisco 9K switch served as the ERSPAN source, encapsulating selected port traffic and forwarding it to the designated destination IP.
Challenges included outdated firmware supporting only ERSPAN Type 1 frames (lacking timestamping). Type 1 frames provide the basic mirrored traffic encapsulation but do not include the high-precision timestamp headers available in later ERSPAN versions — a limitation when sub-millisecond timing accuracy is required for forensic analysis.
Future improvements include upgrading to ERSPAN Type 2 frames for nanosecond-resolution timestamps, enabling more precise correlation of events across distributed network segments.
↑ Back to Case StudiesThe DigiCert incident led to unexpected revocation of numerous SSL certificates, posing significant threats to organizations. Using the WireX Systems Ne2ition Platform for retrospective network analysis, a client needed to quickly identify affected certificates across their entire infrastructure.
The team segmented the client's network starting with the marketing department, using advanced data dimensions to filter and analyze traffic. Retrospective analysis allowed the team to examine historical network data — looking back through previously captured traffic to identify every SSL/TLS handshake involving DigiCert-issued certificates.
Within minutes, the team identified 655 compromised certificates, some dating back nearly a decade. The speed of identification was made possible by the platform's ability to index and query network metadata at scale, without requiring real-time capture during the incident window.
The rapid response improved customer trust and demonstrated the operational value of maintaining retrospective network analysis capabilities. Organizations that invest in historical traffic indexing gain a decisive advantage when unexpected certificate revocations, breaches, or compliance events demand immediate answers.
DigiCert Certificate Revocation Incident Reference
↑ Back to Case StudiesAI-Driven Cyber, Quantum, Robotics and Crypto Convergence. Weekly analysis of the forces reshaping cybersecurity. Moderated by Bill Alderson, with Jim Rounsville and Gus Stein. Real expertise, no hype. Complemented by the TechFuturesIndex.com live data dashboard.
Disaster.Stream — Disaster Recovery Responder Stories & Lessons Learned
The people who built the protocols, invented the tools, and shaped the discipline. Colleagues, mentors, and fellow practitioners.
Co-designer of TCP/IP. Google Chief Internet Evangelist. Known as the “Father of the Internet.”
Read Bio
Inventor of the Spanning Tree Protocol. “Mother of the Internet.” Pioneer of secure network protocols and TRILL.
Read Bio
Co-founder of Network General Corporation. Creator of the Sniffer protocol analyzer. DOJ Microsoft antitrust Technical Committee lead.
Read Bio
Founder and Chairman of the Computer History Museum. Princeton and Stanford education. Computing history preservation leader.
Read Bio
Chief Detective at Packet Detectives. SharkFest presenter. 20+ years solving network mysteries through packet analysis.
Read Bio
Virtual CISO and cybersecurity inventor at Secutor Consulting. Data science advanced analyst. InfraGard contributor.
Read Bio
USSTRATCOM C4 Systems Deputy Director. Pentagon J6 IT Services. 30-year U.S. Army career spanning nuclear, space, and cyberspace operations.
Read Bio
Global CISO at SoftBank Investment Advisers. U.S. Navy veteran. Zero-trust architecture pioneer. CISO Desk Reference Guide author.
Read Bio
Chief Security Strategist at Analyst1. 15+ years in threat intelligence. SANS Book of the Year. Featured on 60 Minutes.
Read BioVinton “Vint” G. Cerf is Vice President and Chief Internet Evangelist for Google. He is considered one of the “Fathers of the Internet” for his pioneering work as a co-designer of the TCP/IP protocol in the 1970s and beyond. Cerf is an influential voice on Internet policy and technology issues like privacy and security.
With the rise of more interactive and speed-sensitive Internet applications, Cerf has supported new protocols to optimize TCP/IP performance. He wrote in Communications of the ACM in 2015: “The ‘quickness’ of QUIC derives from four key design decisions, including reduced connection establishment time, encrypted packet headers, integration of congestion control with loss recovery, and a new transport layer security protocol.”
Privacy and security issues emerged alongside Internet evolution. Cerf has observed: “I think forevermore we have lost anonymity and privacy in the digital world. It's the case that anything you do electronically can be monitored.” He sees protecting privacy as an ongoing challenge that requires continuous vigilance, not just technical solutions.
Cerf believes security vulnerabilities are unavoidable aspects of complex, interconnected systems. In the earlier days of finalizing the internet protocols, Cerf thought that building security into the internet at launch was not a good idea as it would have lowered usage. He views that we are moving back towards the end-to-end principle, and by adopting the philosophy of not communicating with devices we do not recognize, we are headed towards improved security on the network.
Cerf stresses pragmatic mitigation efforts focused on specific threats rather than seeking any final “fix.” He notes that the big challenge is to continue being open to innovation while limiting vulnerabilities and dealing with threats by designing specific solutions for specific problems. Still, no one solution will do it all.
In 1997, President Bill Clinton presented the U.S. National Medal of Technology to Vint Cerf and Bob Kahn for their work on TCP/IP.
↑ Back to PioneersFew names resonate with as much influence in computer networking as Radia Joy Perlman. Often hailed as the “Mother of the Internet,” Perlman's groundbreaking contributions have helped sculpt the foundational structure of today's digital connectivity.
Born in Portsmouth, Virginia, on January 1, 1951, Perlman grew up in Loch Arbour, New Jersey. Her parents were engineers for the US government — her mother a computer programmer and trained mathematician, her father a radar specialist. She attended MIT, studying Mathematics, and developed TORTIS, a child-friendly programming language for educational robotics, establishing her as a pioneer in teaching programming to young children.
Perlman's invention of the Spanning Tree Protocol (STP) prevented data loops in Ethernet networks, ensuring reliable and predictable communication and reducing network vulnerabilities. Her creation of TRILL (Transparent Interconnection of Lots of Links) integrated security considerations to simplify network configurations while enhancing performance.
Perlman's work extended beyond connectivity to developing secure networking protocols. Her emphasis on mastering and mitigating vulnerabilities in network infrastructure centered on designing protocols and mechanisms to prevent unauthorized access and exploitation of sensitive data. Her advocacy for simplicity in network design — developing straightforward and robust protocols — contributed to creating less vulnerable systems. She was inducted into the Internet Hall of Fame in 2014.
Her influential books include Interconnections: Bridges, Routers, Switches and Interworking Protocols and Network Security: Private Communication in a Public World, widely used in higher learning institutions.
↑ Back to PioneersDr. Harry J. Saal, a distinguished American technology entrepreneur, executive, and philanthropist, has left an indelible mark on Silicon Valley and beyond through visionary leadership and impactful contributions to the tech industry and community welfare.
A Westinghouse Science Talent Search finalist in 1960, Dr. Saal earned his B.A., M.A., and Ph.D. in High Energy Physics from Columbia University, graduating magna cum laude in 1969. He joined the Stanford University Linear Accelerator Center and lectured in Stanford's computer science department.
Dr. Saal's corporate trajectory began with IBM, contributing to the scientific center in Israel and the IBM General Products division in San Jose. His entrepreneurial spirit led to founding Nestar Systems in 1979, which pioneered local area network systems for personal computers in collaboration with Len Shustek. In 1986, he co-founded Network General Corporation — a groundbreaking venture in network diagnostics. The creation of the Sniffer protocol analyzer solidified his role as a technological pioneer.
In 2002, Dr. Saal was appointed by the United States Department of Justice to lead the Technical Committee overseeing the Microsoft anti-trust case. Between 1989 and 1996, he dedicated over 20% of his net worth to philanthropy, including medical research, education, and helping Jewish refugees from Russia. He served as director and chairman of the Silicon Valley Community Foundation and the San Jose Museum of Art.
↑ Back to PioneersLeonard J. Shustek is a luminary figure whose influence transcends the boundaries of academia, setting him apart from the typical tech entrepreneur. With a legacy marked by a great zeal for computer education and a relentless drive for innovation, Len Shustek is a pillar in computing and technology.
Born December 29, 1947, Shustek earned his B.S. in Electrical Engineering from Princeton University in 1969, then a Master's degree and Ph.D. in Computer Science from Stanford University. During his tenure as a faculty member at Carnegie Mellon University, he made substantial contributions to computer graphics and computer-aided design.
As Chairman of the Board at the Computer History Museum, Shustek profoundly impacted the preservation of computing history. Under his leadership, the museum substantially expanded its collection of computing-related artifacts, documents, and oral histories, transforming it into a comprehensive repository of computing history. His advocacy for technology education extends to students, educators, and enthusiasts through the museum's programs and initiatives.
Shustek's collaborations with industry leaders, tech companies, and innovators facilitated the acquisition of significant artifacts and initiated valuable dialogues between the computing community and the public. He champions STEM disciplines, advocating for their importance in preparing future generations for an increasingly tech-driven world.
↑ Back to PioneersBetty DuBois, the Chief Detective at Packet Detectives, a network performance consulting and training firm based in Atlanta, GA, has been solving mysteries since 1997. Experienced with a range of hardware and software packet capture solutions, Betty captures the right data, in the right place, and at the right time to find the real culprit. She shares her passion for packets as a presenter each year at SharkFest.
Betty has a rich background in network assessments, fault isolations, and deploying network analysis equipment. Specializing in rapid on-site diagnoses, her expertise ensures organizations receive swift and definitive solutions to network infrastructure challenges, minimizing downtime and optimizing performance.
Her instructional capabilities shine through roles as a Course Developer at ISS, Senior Instructor at Network Associates and Network General. Known for making complex subjects engaging, she brings real-life examples into the classroom. Her accomplishments include creating courses for CloudShark Academy, presenting at SharkFest, and contributing to publications such as “Using Wireshark Command Line Tools” and “Protocol Deep Dive: DNS” on Pluralsight.
Betty's commitment is further exemplified through her Austin Cyber Show session “Mystery Solved: Deep Packet Security Analysis,” utilizing Wireshark to demonstrate critical parameters negotiated during the TLS Handshake.
↑ Back to PioneersBrian Clinkenbeard is a dedicated cybersecurity expert with over nine years of experience, serving as a Data Science Advanced Analyst and Virtual CISO at Secutor Consulting since January 2015. He brings expertise in cybersecurity and infrastructure security planning.
Brian holds certifications from Microsoft and has undergone extensive training in security and resilience from Texas A&M Engineering Extension Service. His core competencies span network monitoring tools, information security, incident response, and vulnerability management and assessment. He has a proven track record of transforming, modeling, and visualizing data to improve clients' security postures.
One of Brian's notable accomplishments includes creating a web-based support intranet that significantly reduced call times and increased issue resolution for a third-party contract provider, earning him an award for his innovative solution. He actively contributes to the community through volunteer work, including serving as Deputy Sector Chief for InfraGard National Members Alliance and President of the MSDN Dallas Chapter.
↑ Back to PioneersColonel (COL) David Wills retired from the U.S. Army in 2021 after serving as the Deputy Director for C4 Systems at USSTRATCOM since 2015. His distinguished career emphasized military excellence and strategic leadership, overseeing global-integrated C4 systems for missions ranging from strategic decision-making to nuclear, global strike, space, and cyberspace operations.
From 2013 to 2015, Colonel Wills served as the J6 Deputy Director for Information Technology Services at the Pentagon, leading over 200 personnel. He managed a $50M IT infrastructure, directed a $61M annual budget, and coordinated JS IT service delivery with OSD, DISA, and NSA.
Wills demonstrated his commitment to service in both peace and war, deploying in support of Operation Sea Signal in Guantanamo Bay (1994), Operation Southern Watch in Dhahran, Saudi Arabia (1996), and Operation Iraqi Freedom (2003 and 2007). He graduated from USMA in 1991 and earned a Master's degree in Strategic Studies from USAWC. Accolades include the Defense Superior Service Medal, Bronze Star, and Parachutist Badge.
↑ Back to PioneersGary Hayslip's professional journey affirms his commitment to cybersecurity excellence and information technology leadership. He started his career in the U.S. Navy, serving in various executive roles on Active Duty and as a Federal Government employee.
As Chief Security Officer at SoftBank Investment Advisers (SBIA) — a globally recognized firm with over $200 billion in capital and 460+ portfolio companies — Gary serves as the principal executive and architect of cybersecurity initiatives. He leads a geographically dispersed security team overseeing security operations across 16 global offices, planning and deploying zero-trust architecture to support cloud-first enterprise infrastructure.
Gary's expertise extends to providing cybersecurity and business continuity due diligence on potential investments, having reviewed over 600 companies. He holds an MBA from San Diego State University and a Professional Certificate in Managing Risk in the Information Age from Harvard University.
As a keynote speaker and author, he co-authored the influential CISO Desk Reference Guide series and authored The Essential Guide to Cybersecurity for SMBs and Developing Your Cybersecurity Career Path. These publications are widely regarded as leading resources for CISOs.
↑ Back to PioneersJon DiMaggio is a highly accomplished cybersecurity professional and published author, currently holding the position of Chief Security Strategist at Analyst1. With over 15 years of dedicated experience, he has become a recognized authority in threat intelligence.
Before his current position, DiMaggio served as a Senior Threat Intelligence Analyst at Symantec from 2014 to 2020, leading complex threat investigations. He also contributed as a Senior Fusion Analyst at General Dynamics Information Technology, focusing on identifying state-sponsored cyber threats and attributing TTPs of Advanced Persistent Threats.
DiMaggio holds a patent titled “System and Method to Detect Covert Channels Structured in IPv6 DNS Transactions” (US 9692771, 2018). He authored The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime (No Starch Press, 2022), which earned the SANS Difference Maker Award for Book of the Year. His “Ransomware Diaries” series — including “Unlocking LockBit” — has been featured on 60 Minutes, The New York Times, Bloomberg, CNN, Reuters, and Wired.
↑ Back to PioneersPaul Barrett holds the position of Chief Technology Officer (CTO), Enterprise, at NETSCOUT. With a tenure spanning over eight years, he has been instrumental in steering technological advancements at the organization. Before this role, he served as Chief Architect at NETSCOUT from 2011 to 2015.
Paul's journey with NETSCOUT began in 2011 with the acquisition of Psytechnics Ltd, where he served as Head of Engineering. Before Psytechnics, he contributed to BT Labs, focusing on voice transmission for GSM and 3GPP. His current role oversees enterprise service assurance, cybersecurity, and DDOS products, encompassing real-time network analysis, unified communications, digital signal processing, encryption, and intellectual property.
Between 2005 and 2016, Paul assumed pivotal roles as vice chair and working party chair at the United Nations' International Telecommunication Union (ITU), simultaneously leading the United Kingdom's delegation for ITU-T study groups. He is a named inventor on 20 patent applications and is recognized as a Senior Member of the IEEE and a Chartered Engineer and Member of the IET in the United Kingdom.
Paul earned a Master of Engineering in Electronic Systems Engineering from the University of York. He actively engages in community work, including serving as Board Member, Treasurer, and President of Habitat for Humanity of Greater Lowell from 2013 to 2019.
↑ Back to PioneersWireshark tutorials, protocol analysis, and network forensics methodology. 13 in-depth technical guides covering packet capture, filtering, forensics, GeoIP mapping, and more. Available exclusively to Security Institute members.
Sessions, speakers, and technical presentations from the inaugural Austin Cyber Show at Concordia University Texas. CISO perspectives, threat intelligence, cyberwarfare analysis, and 20+ recorded sessions. Available exclusively to Security Institute members.
Four decades of packet-level diagnostics, incident response, and forensic analysis. If your organization is facing a complex technical challenge, get in touch.
Work with Bill