|Mr John Austen B.A. FBCS NEBSS is a director of QCC InfoSec Training Ltd and Course Director for the Royal Holloway Diploma in Information Security. He was the Head of the Computer Crime Unit, New Scotland Yard, until September 1996. He was a career detective for 30 years, investigating the first major UK computer crime in 1976 and founding the Computer Crime Unit in 1984 - the first of its type in the world. He was responsible for the first successful arrests and prosecutions against hackers, organised crime groups, and information brokers. He trained all of his own staff, officers from each of the UK Police Forces, and latterly police from Eastern Europe on courses held at the National Police Staff College (in Bramshill, Hampshire). He was the first Chairman of the Interpol Computer Crime Committee, serving from 1991 to 1996 and was responsible for the worldwide standardisation of Police procedure. He is a Fellow of the British Computer Society and a member of its Security Committee. He is a consultant to the Government on Computer Security, the Computer Misuse Act, and British Standard 7799. He is a scientific expert to the Legal Affairs Committee, Council of Europe, Strasbourg, and a contributor to its Recommendation for Criminal Procedural Law on Computer Related Crime published in 1995. He has been an official adviser to the Governments of the Czech Republic, Poland, and Croatia. During the last 10 years he has presented lectures to Government committees and international conferences throughout the world.|
Tel: 01784 443974
|Prof Henry Beker B.Sc. Ph.D. (London) B.A. (O.U.) C.Eng. MIEE FIMAi FREng founded Zergo Limited (which later became Baltimore Technologies plc) in 1988 and, as Chairman and Chief Executive, steered the company through listings on both sides of the Atlantic and presided over its phenomenal growth. Prior to this, Henry Beker was Managing Director of Racal-Guardata Ltd, having previously held positions of Head of Mathematics Department, Racal Comsec Ltd., and Technical Director at Racal Research Ltd. |
In addition to providing security systems to a number of financial institutions world- wide, Henry Beker has also been very actively involved within various Standards bodies. This includes the American National Standards Institute's work on wholesale and retail banking and the Standards Association of Australia formulating their EFTPOS Standards. He is joint author of Cipher Systems (1982), one of the first books to be published on the subject of protection of communications, and Secure Speech Communications (1985). From 1987-89 he was Vice-President of the IMA, and was appointed President in 1998.
Having relinquished his roles at Baltimore Technologies plc of Chief Executive (in 1999) and Chairman (in 2000), Henry is now devoting more time to his academic, educational and business interests.. Henry is currently leading the e-Learning Foundation initiative to provide portable computers for every schoolchild in the UK and has been instrumental in engaging governmental interest. Henry is Chairman of OverNet Data, an interactive wireless data solutions provider. Henry is also a Non-Executive Director of i-net Venture Capital Trust plc, and of Close Finsbury Eurotech Trust plc.
|Mr Francisco Alberto Campos Fernandez obtained his Degree in Maths in 1999 with the branch in Operations Research at the Complutense University of Madrid, and his PhD in Industrial and Informatic Engineering at the Universidad Pontificia Comillas in Madrid. He has participated in several national and international research projects for different firms and regulatory organisations in the energy industry. He is associate professor of the Industrial Organization Department, teaching 'Systems Optimization Techniques' and 'Mathematical Methods' in the 4th year of the Industrial Engineering Degree. The research themes tackled in his thesis include the application of possible Nash games to represent electricity markets. His other research interests are the risk analysis techniques and the operating/planning problems of electric energy systems. Another research interest is the cryptanalysis of encrypted processes.|
Room: McCrea 255
|Mr Robert Carolina B.A. (Dayton) J.D. (Georgetown) LL.M. (London) Attorney-at-Law (Illinois, USA) Solicitor (England & Wales) is a Solicitor of the Supreme Court of England & Wales, and a member of both the American and Illinois Bar Associations. He holds degrees from the University of Dayton (B.A.) Georgetown University (Juris Doctor) and the London School of Economics and Political Science (LL.M in International Business Law). Following a period as an in-house with an Internet software development company, he moved to London in 1992.|
Robert is a principal with Origin, a law firm based in London that specialises in intellectual property and information technology. His practice focuses entirely upon commercial transactions and projects involving telecommunications and information technology. Robert routinely represents users, purchasers, developers, and vendors of IT and telecommunications products and services, and regularly advises on electronic commerce transactions and projects. His clients include major multinational financial institutions, as well as technology and e-commerce venture companies located in Europe and the US.
Recognised as a leading UK expert on IT law and e-commerce law, he regularly presents academic and commercial courses and workshops on legal aspects of technology procurement and e-commerce. He also serves as the co-editor of Sweet & Maxwell's Encyclopedia of E-Commerce Law.
|Prof Andrew Clark BSc. C.Eng. CITP FIET FBCS Andrew's career in the information security industry started in 1984 when he joined Open Computer Security as Research & Development Manager for the company's range of commercial encryption products aimed at the banking and finance sector. He remained with the company during its acquisition by new owners and relaunch as Computer Security Limited. Subsequently he joined Logica's Secure Systems Division where he was responsible for the business and technical success of a range of secure programmes in the government sector.
Since the mid 1990's he has been involved in five new business start-ups in secure systems development and analysis and computer and cryptographic forensics.
In 2010 he left Detica, where he was Head of Forensics, to found his latest venture, Primary Key Associates Limited, a multidisciplinary team that specialises in addressing a wide range of information security and forensics challenges from physical to cyber security. His current research interests include the challenges of successfully acquiring and forensically analysing increasing levels of data stored in mobile and cloud based systems.
He is an experienced expert witness and has prepared and given evidence in chief in a wide range of civil and criminal cases in the UK courts.
He maintains a particular interest in cryptographic research and served on the Board of Directors of the International Association for Cryptologic Research (I.A.C.R.) for seventeen years. The membership elected him Vice President between 1995 and 2001 and subsequently elected him President of the Association between 2002 and 2007. In 2010 he was awarded Fellowship of I.A.C.R.
He is a co-author of the book 'Enterprise Security Architecture: A Business Driven Approach' published in 2005. The SABSA methodology detailed in the book is now used in both commercial and government sectors for designing secure business systems.
He is a Director and Trustee of The National Museum of Computing at Bletchley Park.
|Dr Iain Crinson is Senior Lecturer in the Sociology of Health and Health Policy at St Georges, University of London, and is the author of Health Policy: A Critical Perspective (2009) Sage. London. Iain is the holder of a EPSRC 'Discipline-hop' grant which has provided the opportunity to collaborate with Dr Lizzie Coles-Kemp of the ISG to develop cross-disciplinary research and a seminar programme exploring the socio-technical aspects of information security.
|Prof Whitfield Diffie BSc (MIT) Dr. sc. techn. (hc, ETH Zurich) Whitfield Diffie began his career in security as the inventor of the concept of public key cryptography, which underlies the security of Internet commerce. He has made fundamental contributions to many aspects of secure communications and was instrumental in the rise of a public cryptographic research community. In the 1990s he turned his attention to public policy and played a key role in opposing government key-escrow proposals and restrictive regulations on the export of products incorporating cryptography. Diffie recently retired from his position as Chief Security Officer at Sun Microsystems and is now studying the impact of web services and grid computing on security and intelligence.
Prior to assuming his position at Sun, Diffie was Manager of Secure Systems Research at Northern Telecom throughout the 1980s.
Diffie's is a fellow of the Marconi Foundation. He is the recipient of the National Computer Systems Security Award given jointly by the National Institute of Standards and Technology and the National Security Agency, the Levy Prize of the Franklin institute, and other awards. His work and career are treated at length in the book Crypto by Steven Levy.|
|Prof Paul Dorey BSc. PhD. (Southampton) CISM M.Inst.ISP M.I.Biol has over 25 years management experience in information security gained as a senior security and risk executive at Morgan Grenfell/Deutsche Bank, Barclays Bank and BP. His work has encompassed information security management, operational risk management, business continuity planning and crisis management, privacy and the security of process control systems. Paul has consulted to several governments in protecting critical national infrastructure, was a founder of the Jericho Forum, and was the founder Chairman of the Institute of Information Security Professionals (IISP) and now carries the title Chairman Emeritus. He has sat as an independent expert on the Permanent Stakeholders Group of the European Network Information Security Agency (ENISA). His industry recognition includes being awarded Chief Security Officer of the Year (2006), IT Security Executive of the Year (2008) and his induction into the IT Security Hall of Fame (2009). His interests include the problem of establishing and communicating trust in IT systems, risk convergence (integrating IT Security with physical security and other risk disciplines) and demonstrating the value of security investment through alignment with management risk frameworks and business strategy. In addition to his academic interests, he currently runs two consultancy firms specialising in developing commercial security strategies and building programmes to improve security team capability and knowledge sharing in the industry.
|Prof Dieter Gollmann Dipl.-Ing. Dr.techn. (Linz) Dr.habil. (Karlsruhe) received his Dipl.-Ing. in Engineering Mathematics (1979) and Dr.tech. (1984) from the University of Linz, Austria, where he was a research assistant in the Department for System Science. He was a Lecturer in Computer Science at Royal Holloway, University of London, and later a scientific assistant at the University of Karlsruhe, Germany, where he was awarded the 'venia legendi' for Computer Science in 1991. He rejoined Royal Holloway in 1990, where he was the first Course Director of the MSc in Information Security. He joined Microsoft Research in Cambridge in 1998. In 2003, he took the chair for Security in Distributed Applications at Hamburg University of Technology, Germany. Dieter Gollmann is an editor-in-chief of the International Journal of Information Security and an associate editor of the IEEE Security & Privacy Magazine. His textbook on 'Computer Security' has appeared in its third edition.
|Prof David Naccache VP Research & Innovation, Gemplus, received his Ph.D. in 1995 from the Ecole Nationale Supérieure des Télécommunications, Paris. David managed for several years Gemplus' Applied Research & Security Centre (70 researchers), published 60 papers in information security and cryptography, filed 60 patents and served in nearly 40 program committees. Amongst David's most noteworthy results are attacks against the signature standards ISO 9796-1 (the attack led to the withdrawal of this standard) and ISO 9796-2 (the attack led to an amendment of this standard) and PKCS#1 v1.5. David is an information security lecturer at the University of Paris II (Panthéon-Assas) since 1996 and is an advisory professor at the Beijing Jiaotong University, China. His current areas of interest are number theory, public key cryptography and side channel attacks.
|Prof Fred Piper BSc PhD (London) CEng CMath FIEE ARCS DIC FIMA M.InstIISP obtained a First Class Honours degree in Mathematics at Imperial College (University of London) in 1962 followed by a PhD in 1964. He began an academic career as an Assistant Lecturer in Mathematics at Royal Holloway College (University of London) and after one year was promoted to Lecturer. He transferred to Westfield College (University of London) in 1969, was promoted to Reader in 1971 and to Professor in 1975. He was the founding Director of the Royal Holloway Information Security Group that was awarded the Queen's Anniversary Prize for Higher and Further Education in 1998. He has held a number of visiting positions at other universities, including Illinois (Chicago Campus), Florence, Perugia, New York State (Albany), Michigan State, Western Ontario, Natal and Beijing.
Fred has published over 100 research papers, 6 books (4 on cryptography), and is on the editorial boards of two international journals. He has also supervised over 60 PhD students. He has lectured world-wide on a wide range of topics in information security, both academically and commercially.
In 1985 he formed a company, Codes & Ciphers Ltd, which offers consultancy advice in all aspects of information security. He has acted as a consultant for a number of financial institutions and major industrial companies in the UK, Europe, USA, Canada, Asia and South Africa. This consultancy has covered a wide range of subjects including design and analysis of cryptographic algorithms, and work on a number of ATM and EFTPOS systems. In the last few years he has served on a number of committees offering security advice to a number of UK Government departments and agencies.
Fred played a leading role in the establishment of the Institute of Information Security Professionals (IISP) and has been on the board of directors since its launch in 2005.
- He has been a member of the Board of Trustees, Bletchley Park since 1999.
- In 2002 he was awarded an IMA Gold Medal for 'Services to Mathematics'.
- In 2002 he was also awarded the first honorary CISSP for a European. This was for 'leadership in Information Security'.
- In 2003 Fred received an honorary CISM for 'globally recognised leadership' and 'contribution to the Information Security Profession'.
- In 2005 he was elected to the ISSA Hall of Fame.
- In 2008 he was elected to be a Fellow of (ISC)2.
- In 2008 he was the first person to be elected to the InfoSecurity Europe Hall of Fame.
- In 2008 he was elected to the International Advisory Board of IMPACT (the International Multilateral Programme Against Cyber Threats).
- In 2011 he was awarded an Honorary Fellowship by Royal Holloway, University of London.
Room: McCrea 233
Tel: 01784 443098
|Prof Richard Walton B.Sc. Ph.D (Nottingham) B.A. (Open University) CMath FIMA Professor Richard Walton CB B.Sc. Ph.D. (Nottingham) B.A. (O.U.) C.Math. C.Eng. FIMA MBCS FIET MInstISP received his B.Sc. (Hons) and Ph.D. in Mathematics from the University of Nottingham in 1968 and 1971 respectively. He studied with the Open University during the 1980's taking mainly Electronics courses and received his B.A. (Hons) in 1987. From 1971-1973 he was a lecturer in Mathematics at the North Staffordshire Polytechnic before joining GCHQ as a Mathematician at the end on 1973. He was appointed Companion of the order of the Bath (CB) in the 2003 New Year Honours.
His GCHQ career culminated in his appointment in January 1999 to the GCHQ Board as Director CESG, the National Technical Authority for Information Assurance. He held this post until October 2002 when he was seconded to the Cabinet Office to initiate work on the production of a National Strategy on Information Assurance.
His earlier posts included Head of the Division employing most of the GCHQ Mathematicians (1996-1999) and Head of the Mathematical Services Group in CESG (1985-1991). In the 1980s he initiated many of the changes in CESG's public profile as they started to engage in open fora, both national and international, during the early stages of the development of open standards for computer security. He was the first member of GCHQ to attend open cryptographic conferences (Eurocrypt in 1982, Crypto in 1985). His actions were instrumental in achieving the change of GCHQ policy to publish the early CESG work on Public Key Cryptography.
He retired from the Civil Service in May 2003 and undertakes occasional consultancy through his own company, Walton-Mackenzie Ltd. Since retirment, he has published several papers on topics concerned with information security and serves on the IT policy panel of the IET. He was appointed as an independent member of the Defence Scientific Advisory Council in April 2004.
Tel: 01784 443079
|Miss Zhang Zhi is a lecturer at Zhongnan University of Economic and Law, PR China. She graduated from Huazhong University of Science and Technology and got her PhD degree in 2009. Since that time, she has been working for information security. Her current research focuses on network security and reliability, with emphasis on Elliptic Curve Cryptosystems and applications of cryptography in wireless network security.|
Room: McCrea 356b
|Prof Alf Zugenmaeier received his Dipl. phys. (1997) from University of Freiburg and Dr. rer. nat. (2003) from the same University, where he was a research assistant in the Department for Telematics at the Institute of Computer Science and Social Studies. He joined Microsoft Research in Cambridge, UK in 2003 as a postdoc working on privacy, and network and systems security. In 2005, he moved to DoCoMo EuroLabs where he researched secure mobility and later joined standardization to transfer some results into practice in the LTE standard. In 2010 he was appointed professor for mobile networks and security at Munich University of Applied Sciences. |
Room: McCrea 356b