[nsp-sec] Vetting: Wes Young
Smith, Donald
Donald.Smith at qwest.com
Wed Mar 24 17:36:52 EDT 2010
I know Wes and have worked with him in the past.
So Vouch:)
(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com<mailto:Donald.Smith at qwest.com>
________________________________
From: nsp-security-bounces at puck.nether.net [nsp-security-bounces at puck.nether.net] On Behalf Of Brian Eckman [eckman at umn.edu]
Sent: Wednesday, March 24, 2010 2:58 PM
To: NSP-Sec
Subject: Re: [nsp-sec] Vetting: Wes Young
----------- nsp-security Confidential --------
I know Wes, have met him, and have worked with him on several
security-related projects. I've had beer with him, laughed at pictures
of him, follow him on Twitter, and give him (a hard time) whenever I
can.
Oh yeah - I trust him as much as anyone on the list, and believe that
his role within REN-ISAC fits well with NSP-SEC's mission.
Vouch.
Brian
On Wed, Mar 24, 2010 at 3:43 PM, Rob Thomas <robt at cymru.com> wrote:
> ----------- nsp-security Confidential --------
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi, team.
>
> For your consideration:
>
>
> Name: Wes Young
> E-mail: wes at ren-isac.net
> DayPhone: 716-462-5583
> 24hrPhone: 317 278-6630
> INOC-DBA Phone: NA
> Company/Employer: REN-ISAC
> ASNs Responsible for: 11537
>
> JobDesc:
> Principal Security Engineer for the REN-ISAC (Research and Education
> Networking Information Sharing and Analysis Center). The REN-ISAC
> supports U.S. higher education and research communities by providing
> advanced network security services and supports efforts to protect the
> national cyber infrastructure by participating in the U.S. ISAC
> infrastructure. The REN-ISAC is an integral component of the EDUCAUSE
> and Internet2 strategy to improve network security by providing timely
> warning and response to cyber threat and vulnerabilities, improving
> awareness, and improving communications.
>
> The REN-ISAC receives, analyzes, and disseminates network security
> operational, threat, warning, and attack information within higher
> education. Information is derived from network instrumentation, network
> constituents, network engineers, other sector ISACs, DHS, other network
> security organizations and vendors. In partnership with Internet2 the
> REN-ISAC receives a live feed of NetFlow data from Internet2 routers,
> and monitors the network for active threats. Custom-built analysis tools
> and Arbor PeakFlow DoS are utilized in that analysis. Observed threat
> activity is communicated back to the source institutions which averages
> thousands per month. The REN-ISAC is "actively involved in mitigation of
> NSP Security incidents."
>
> Although an aspect of the REN-ISAC's work is information sharing, we're
> fully cognizant of the importance of privacy and the confidentiality of
> information related to network security. Our handling of Internet2
> NetFlow data is controlled by strict policy that prevents the public
> disclosure information that would identify an institution or individual.
> The REN-ISAC strictly abides the NSP-SECURITY policy that "No
> information presented in [the] list should be forwarded or shared
> outside the nsp-security community without specific permission from the
> poster."
>
> Internet security references (names & emails):
> Doug Pearson dodpears at ren-isac.net
> Gabe Iovino giovino at ren-isac.net
> Phil Deneault deneault at WPI.EDU
>
> http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x29ECE965DDB6E946
>
> - --
> Wes
> http://claimid.com/wesyoung
>
>
> Thanks!
> Rob, for the nsp-sec moderators.
> - --
> Rob Thomas
> Team Cymru
> http://www.team-cymru.org/
> cmn_err(CEO_PANIC, "Out of coffee!");
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (Darwin)
>
> iQCVAwUBS6p5alkX3QAo5sgJAQKvkwQAgh/b+qV3ar3lghFs85NpFO2VgJ9U7e9G
> 3eJ+lIuwJTjMWKTPbVZds/SRyx2oNmNlsGL6ERieC0hfoQ4oy7zwck6Xz7LWRFh0
> DT2aTaXiJ7vCEt/Blfra1gD9YFsRZlCkMvyVuB9dCTWsHX6JI+E6JTCNSXRebZdw
> uHhD3FuPRag=
> =kqEV
> -----END PGP SIGNATURE-----
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
>
--
Brian Eckman, Security Analyst
University of Minnesota
Office of Information Technology
Security & Assurance
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security counter-measures.
_______________________________________________
________________________________
This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful. If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.
More information about the nsp-security
mailing list