[nsp-sec] Vetting: Wes Young
Scott Fendley
scottf at uark.edu
Wed Mar 24 17:24:22 EDT 2010
I also vouch for Wes. I have worked with him on a number of items at his
previous position at the University of Buffalo. And I continue to work
with him at his new position at the REN-ISAC. His new role does seem to
fit the scope of membership of nsp-sec. In general, I trust him as much as
I do anyone on this mailing list. So consider this a wholehearted VOUCH!
Scott Fendley
>
> On Wed, Mar 24, 2010 at 3:43 PM, Rob Thomas <robt at cymru.com> wrote:
>> ----------- nsp-security Confidential --------
>>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Hi, team.
>>
>> For your consideration:
>>
>>
>> Name: Wes Young
>> E-mail: wes at ren-isac.net
>> DayPhone: 716-462-5583
>> 24hrPhone: 317 278-6630
>> INOC-DBA Phone: NA
>> Company/Employer: REN-ISAC
>> ASNs Responsible for: 11537
>>
>> JobDesc:
>> Principal Security Engineer for the REN-ISAC (Research and Education
>> Networking Information Sharing and Analysis Center). The REN-ISAC
>> supports U.S. higher education and research communities by providing
>> advanced network security services and supports efforts to protect the
>> national cyber infrastructure by participating in the U.S. ISAC
>> infrastructure. The REN-ISAC is an integral component of the EDUCAUSE
>> and Internet2 strategy to improve network security by providing timely
>> warning and response to cyber threat and vulnerabilities, improving
>> awareness, and improving communications.
>>
>> The REN-ISAC receives, analyzes, and disseminates network security
>> operational, threat, warning, and attack information within higher
>> education. Information is derived from network instrumentation, network
>> constituents, network engineers, other sector ISACs, DHS, other network
>> security organizations and vendors. In partnership with Internet2 the
>> REN-ISAC receives a live feed of NetFlow data from Internet2 routers,
>> and monitors the network for active threats. Custom-built analysis tools
>> and Arbor PeakFlow DoS are utilized in that analysis. Observed threat
>> activity is communicated back to the source institutions which averages
>> thousands per month. The REN-ISAC is "actively involved in mitigation of
>> NSP Security incidents."
>>
>> Although an aspect of the REN-ISAC's work is information sharing, we're
>> fully cognizant of the importance of privacy and the confidentiality of
>> information related to network security. Our handling of Internet2
>> NetFlow data is controlled by strict policy that prevents the public
>> disclosure information that would identify an institution or individual.
>> The REN-ISAC strictly abides the NSP-SECURITY policy that "No
>> information presented in [the] list should be forwarded or shared
>> outside the nsp-security community without specific permission from the
>> poster."
>>
>> Internet security references (names & emails):
>> Doug Pearson dodpears at ren-isac.net
>> Gabe Iovino giovino at ren-isac.net
>> Phil Deneault deneault at WPI.EDU
>>
>> http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x29ECE965DDB6E946
>>
>> - --
>> Wes
>> http://claimid.com/wesyoung
>>
>>
>> Thanks!
>> Rob, for the nsp-sec moderators.
>> - --
>> Rob Thomas
>> Team Cymru
>> http://www.team-cymru.org/
>> cmn_err(CEO_PANIC, "Out of coffee!");
>>
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.9 (Darwin)
>>
>> iQCVAwUBS6p5alkX3QAo5sgJAQKvkwQAgh/b+qV3ar3lghFs85NpFO2VgJ9U7e9G
>> 3eJ+lIuwJTjMWKTPbVZds/SRyx2oNmNlsGL6ERieC0hfoQ4oy7zwck6Xz7LWRFh0
>> DT2aTaXiJ7vCEt/Blfra1gD9YFsRZlCkMvyVuB9dCTWsHX6JI+E6JTCNSXRebZdw
>> uHhD3FuPRag=
>> =kqEV
>> -----END PGP SIGNATURE-----
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>> community. Confidentiality is essential for effective Internet security counter-measures.
>> _______________________________________________
>>
>
>
>
> --
> Brian Eckman, Security Analyst
> University of Minnesota
> Office of Information Technology
> Security & Assurance
>
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>
More information about the nsp-security
mailing list