|Mrs Sameera Abdulrahman Almulla earned her B. Sc. degree in 2006, from University of Sharjah as a Computer Engineer. In 2006, she joined Dubai Health Authority as a Database Developer and System Administrator and later as a Deputy of Health Informatics Unit in Rashid Hospital. Also she was awarded as best employee for accomplishing four databases projects that serve both the administration and health providers sectors. In 2009, Mrs Almulla earned her M. Sc. degree in Digital forensics with distinction. Since 2010, Mrs Almulla is perusing her Ph. D. thesis in the field of Digital Forensics of Cloud Computing and her scientific achievements were recognized and presented nationally and internationally.
Room: McCrea 356
|Mr John Austen B.A. FBCS NEBSS is a consultant lecturer for Master of Science Degree Courses in Information Security at Royal Holloway University of London. He was the 2003/4 President of the U.K. Chapter of I.S.S.A. (Information Security Specialists Association). He is a specialist in cyber crime and investigation techniques, international law, and organisational security. After studying at the FBI National Academy in Quantico, Virginia he became the founder and Head of The Computer Crime Unit New Scotland Yard from 1984 - 1996, an operational specialist unit and the forerunner of the National Hi-Tec Crime Unit and the e-Crime Unit.
He was the first Chairman of the Interpol Computer Crime Committee, from 1990 to 1996, which was responsible for the worldwide standardisation of Police procedure and international training in the area of cyber crime investigation and digital forensics. He organised and ran national and international training courses in these subjects at The UK National Police Staff College at Bramshill in Hampshire and in Berlin, Wolfsberg, Helsinki, Rome and Copenhagen in these topics, the latter of which were primarily aimed at detective officers from the developing world. His Police service spanned 30 years, 20 years as a Scotland Yard detective, and the last 12 in this specialist post. He investigated the first UK computer crime in 1976 and in 1984 founded the Computer Crime Unit – one of the first in the world, which at that time was responsible for the Police response to cyber crime for the UK as a whole. He was responsible for the first successful arrests and prosecutions against hackers, organised computer crime groups and information brokers. He was responsible for the first use of digital forensics in any Court in the world in the case of R v Popp (1991) at extradition hearings in the US Federal Court in Cleveland Ohio and at trial at Southwark Crown Court, London. He trained all his staff as well as those from other European countries and his unit was a model for national police units worldwide. As a result of the case of R v Schifreen and Gold (Court of Appeal and House of Lords 1987) he advised the DTI working group and parliamentary committee on revision of the criminal law which culminated in the implementation of the Computer Misuse Act 1990.
John is a Fellow of The British Computer Society and was a member of its Security Committee from 1984 to 2004. In this capacity he advised on the ITSEC standard and was an advisor and sat on the Working Group to the Department of Trade & Industry that developed BS 17799 (later to become 27001) the Standard for Information Security. John was a scientific expert to The Council of Europe Legal Affairs Committee, Strasbourg, which produced recommendations for legislation and legal procedures to member States in the area of computer criminality and resulted in Recommendation (1985) of Mutual Assistance on Intercepting Communications; Recommendation (1989) of the European harmonisation of computer crime laws; Recommendation (1995) of changes to criminal procedural law on the recovery of evidence in cross-border incidents; and the Cyber Crime Convention of 2001 for the application of substantive criminal law on a worldwide basis.
In the last ten years, in addition to lecturing on the Royal Holloway MSc, John was the Course Director of the Certificate & Diploma programme in Information Security, which were off-campus courses and provided 2-day lectures in all aspects of information security, leading to these academic qualification. These courses were run in many locations including Edinburgh, London, Lisbon and Abu Dhabi.
Room: International Building 152
Tel: 01784 443974
|Prof Henry Beker B.Sc. Ph.D. (London) B.A. (O.U.) C.Eng. MIEE FIMAi FREng founded Zergo Limited (which later became Baltimore Technologies plc) in 1988 and, as Chairman and Chief Executive, steered the company through listings on both sides of the Atlantic and presided over its phenomenal growth. Prior to this, Henry Beker was Managing Director of Racal-Guardata Ltd, having previously held positions of Head of Mathematics Department, Racal Comsec Ltd., and Technical Director at Racal Research Ltd. |
In addition to providing security systems to a number of financial institutions world- wide, Henry Beker has also been very actively involved within various Standards bodies. This includes the American National Standards Institute's work on wholesale and retail banking and the Standards Association of Australia formulating their EFTPOS Standards. He is joint author of Cipher Systems (1982), one of the first books to be published on the subject of protection of communications, and Secure Speech Communications (1985). From 1987-89 he was Vice-President of the IMA, and was appointed President in 1998.
Having relinquished his roles at Baltimore Technologies plc of Chief Executive (in 1999) and Chairman (in 2000), Henry is now devoting more time to his academic, educational and business interests.. Henry is currently leading the e-Learning Foundation initiative to provide portable computers for every schoolchild in the UK and has been instrumental in engaging governmental interest. Henry is Chairman of OverNet Data, an interactive wireless data solutions provider. Henry is also a Non-Executive Director of i-net Venture Capital Trust plc, and of Close Finsbury Eurotech Trust plc.
|Mr Robert Carolina B.A. (Dayton) J.D. (Georgetown) LL.M. (London) Attorney-at-Law (Illinois, USA) Solicitor (England & Wales) is a Solicitor of the Supreme Court of England & Wales, and a member of both the American and Illinois Bar Associations. He holds degrees from the University of Dayton (B.A.) Georgetown University (Juris Doctor) and the London School of Economics and Political Science (LL.M in International Business Law). Following a period as an in-house with an Internet software development company, he moved to London in 1992.|
Robert is a principal with Origin, a law firm based in London that specialises in intellectual property and information technology. His practice focuses entirely upon commercial transactions and projects involving telecommunications and information technology. Robert routinely represents users, purchasers, developers, and vendors of IT and telecommunications products and services, and regularly advises on electronic commerce transactions and projects. His clients include major multinational financial institutions, as well as technology and e-commerce venture companies located in Europe and the US.
Recognised as a leading UK expert on IT law and e-commerce law, he regularly presents academic and commercial courses and workshops on legal aspects of technology procurement and e-commerce. He also serves as the co-editor of Sweet & Maxwell's Encyclopedia of E-Commerce Law.
|Prof Andrew Clark BSc. C.Eng. CITP FIET FBCS Andrew's career in the information security industry started in 1984 when he joined Open Computer Security as Research & Development Manager for the company's range of commercial encryption products aimed at the banking and finance sector. He remained with the company during its acquisition by new owners and relaunch as Computer Security Limited. Subsequently he joined Logica's Secure Systems Division where he was responsible for the business and technical success of a range of secure programmes in the government sector.
Since the mid 1990's he has been involved in five new business start-ups in secure systems development and analysis and computer and cryptographic forensics.
In 2010 he left Detica, where he was Head of Forensics, to found his latest venture, Primary Key Associates Limited, a multidisciplinary team that specialises in addressing a wide range of information security and forensics challenges from physical to cyber security. His current research interests include the challenges of successfully acquiring and forensically analysing increasing levels of data stored in mobile and cloud based systems.
He is an experienced expert witness and has prepared and given evidence in chief in a wide range of civil and criminal cases in the UK courts.
He maintains a particular interest in cryptographic research and served on the Board of Directors of the International Association for Cryptologic Research (I.A.C.R.) for seventeen years. The membership elected him Vice President between 1995 and 2001 and subsequently elected him President of the Association between 2002 and 2007. In 2010 he was awarded Fellowship of I.A.C.R.
He is a co-author of the book 'Enterprise Security Architecture: A Business Driven Approach' published in 2005. The SABSA methodology detailed in the book is now used in both commercial and government sectors for designing secure business systems.
He is a Director and Trustee of The National Museum of Computing at Bletchley Park.
|Prof Whitfield Diffie BSc (MIT) Dr. sc. techn. (hc, ETH Zurich) Whitfield Diffie began his career in security as the inventor of the concept of public key cryptography, which underlies the security of Internet commerce. He has made fundamental contributions to many aspects of secure communications and was instrumental in the rise of a public cryptographic research community. In the 1990s he turned his attention to public policy and played a key role in opposing government key-escrow proposals and restrictive regulations on the export of products incorporating cryptography. Diffie recently retired from his position as Chief Security Officer at Sun Microsystems and is now studying the impact of web services and grid computing on security and intelligence.
Prior to assuming his position at Sun, Diffie was Manager of Secure Systems Research at Northern Telecom throughout the 1980s.
Diffie's is a fellow of the Marconi Foundation. He is the recipient of the National Computer Systems Security Award given jointly by the National Institute of Standards and Technology and the National Security Agency, the Levy Prize of the Franklin institute, and other awards. His work and career are treated at length in the book Crypto by Steven Levy.|
|Prof Paul Dorey BSc. PhD. (Southampton) CISM M.Inst.ISP M.I.Biol has over 25 years management experience in information security gained as a senior security and risk executive at Morgan Grenfell/Deutsche Bank, Barclays Bank and BP. His work has encompassed information security management, operational risk management, business continuity planning and crisis management, privacy and the security of process control systems. Paul has consulted to several governments in protecting critical national infrastructure, was a founder of the Jericho Forum, and was the founder Chairman of the Institute of Information Security Professionals (IISP) and now carries the title Chairman Emeritus. He has sat as an independent expert on the Permanent Stakeholders Group of the European Network Information Security Agency (ENISA). His industry recognition includes being awarded Chief Security Officer of the Year (2006), IT Security Executive of the Year (2008) and his induction into the IT Security Hall of Fame (2009). His interests include the problem of establishing and communicating trust in IT systems, risk convergence (integrating IT Security with physical security and other risk disciplines) and demonstrating the value of security investment through alignment with management risk frameworks and business strategy. In addition to his academic interests, he currently runs two consultancy firms specialising in developing commercial security strategies and building programmes to improve security team capability and knowledge sharing in the industry.
|Prof Dieter Gollmann Dipl.-Ing. Dr.techn. (Linz) Dr.habil. (Karlsruhe) received his Dipl.-Ing. in Engineering Mathematics (1979) and Dr.tech. (1984) from the University of Linz, Austria, where he was a research assistant in the Department for System Science. He was a Lecturer in Computer Science at Royal Holloway, University of London, and later a scientific assistant at the University of Karlsruhe, Germany, where he was awarded the 'venia legendi' for Computer Science in 1991. He rejoined Royal Holloway in 1990, where he was the first Course Director of the MSc in Information Security. He joined Microsoft Research in Cambridge in 1998. In 2003, he took the chair for Security in Distributed Applications at Hamburg University of Technology, Germany. Dieter Gollmann is an editor-in-chief of the International Journal of Information Security and an associate editor of the IEEE Security & Privacy Magazine. His textbook on 'Computer Security' has appeared in its third edition.
|Mr Peter Hall is a design writer and educator based at Griffith University Queensland College of Art, where he heads the Design Futures program. His research focuses on uses of mapping and visualization in design criticism and practice. His books include Else/Where: Mapping - New Cartographies of Networks and Territories (2006). He has lectured and published widely on visualisation, including the Journal of American Society for Information Science and Technology and the books Graphic Design Now in Production (Walker Art Center, 2011) and Design and the Elastic Mind (Museum of Modern Art, 2008). He is a Visitor to the Information Security Group at RHUL working with Possible Futures Lab, and participates in visualisation research. He was awarded a BA (Hons) in English and Philosophy from the University of Hull, and is currently enrolled in the doctoral program at Griffith University Queensland College of Art. |
|Professor Masaki Hashimoto is an Associate Professor at the Graduate School of Information Security, Institute of Information Security, Japan. He received his PhD degree in 2010 and joined Institute of Information Security after engaging in the management of information systems in the industries. He has involved in the research and education of OS Security, Access Control, and Security Policy as an assistant professor since 2010 and as an associate professor since 2014. He is on the ICSS, CSEC committee and a member of IPSJ, IEICE, and IEEE.|
Room: McCrea 356b
Tel: 01784 414396
|Prof Igor Muttik B.Sc. (Hons), Ph.D. received his B.Sc. (Hons) and Ph.D. in Physics and Mathematics from Moscow State University (MSU) in 1985 and 1989 respectively. He was a lecturer in Low Temperature Physics and in Applied Computing at the Physics Faculty of MSU in 1988-1995. He started researching computer viruses in the 1980's when the anti-virus industry was in its infancy. In 1994, Igor Muttik joined Computer Antivirus Research Organization (CARO) and then took a position of Senior Virus Researcher at Dr Solomon's Software, UK in 1995. Igor shaped the current state of the anti-malware industry by pioneering detection of non-replicating malware in 1997 when he introduced the generic protection from AOL password stealing trojans. He discovered IRC worms in 1998. He implemented the first global commercial anti-malware telemetry and meta-data gathering system for McAfee in 2007. In 2010 he introduced the concept of cryptographically marking sources of obfuscated software (now known as 'software taggants').
Igor was the founding member of anti-malware testing standards organization (AMTSO) and Industry Connections Security Group (ICSG) of IEEE. He was on the Board of AMTSO for 3 years. He now holds the position of a Senior Principal Architect at McAfee Labs (Part of Intel Security Group), Vice Chair of IEEE ICSG and the Chair of the IEEE Taggant working group.
Igor has more than 25 issued patents and more than 100 publications (including 3 co-authored books) in four areas: low-temperature physics, malware reverse-engineering, anti-virus technologies and security industry cooperation. His research is currently focused on mobile/IoT devices and hardware-assisted security technologies. He is a regular speaker at major international computer security conferences (BlackHat, RSA, Defcon and many others).|
|Prof David Naccache is a Professor at Universite Paris II - PRES Sorbonne Universites and member of the Ecole normale superieure’s Computer Science Department (Paris). David received his Ph.D. in 1995 from the Ecole Nationale Superieure des Telecommunications, Paris and managed for several years Gemplus' Applied Research & Security Centre (70 researchers), published 150 papers in information security and cryptography, filed 130 patents and served in nearly 80 program committees. Amongst David's most noteworthy results are attacks against the signature standards ISO 9796-1 (the attack led to the withdrawal of this standard) and ISO 9796-2 (the attack led to an amendment of this standard) and PKCS#1 v1.5. David is a Forensic expert by the Court of appeal (Paris), an advisory professor at the Beijing Jiaotong University China and a member of the Banque de France’s smart-card security observatory. His current areas of interest are number theory, public key cryptography and side channel attacks.
|Prof Fred Piper BSc PhD (London) CEng CMath FIEE ARCS DIC FIMA M.InstIISP obtained a First Class Honours degree in Mathematics at Imperial College (University of London) in 1962 followed by a PhD in 1964. He began an academic career as an Assistant Lecturer in Mathematics at Royal Holloway College (University of London) and after one year was promoted to Lecturer. He transferred to Westfield College (University of London) in 1969, was promoted to Reader in 1971 and to Professor in 1975. He was the founding Director of the Royal Holloway Information Security Group that was awarded the Queen's Anniversary Prize for Higher and Further Education in 1998. He has held a number of visiting positions at other universities, including Illinois (Chicago Campus), Florence, Perugia, New York State (Albany), Michigan State, Western Ontario, Natal and Beijing.
Fred has published over 100 research papers, 6 books (4 on cryptography), and is on the editorial boards of two international journals. He has also supervised over 60 PhD students. He has lectured world-wide on a wide range of topics in information security, both academically and commercially.
In 1985 he formed a company, Codes & Ciphers Ltd, which offers consultancy advice in all aspects of information security. He has acted as a consultant for a number of financial institutions and major industrial companies in the UK, Europe, USA, Canada, Asia and South Africa. This consultancy has covered a wide range of subjects including design and analysis of cryptographic algorithms, and work on a number of ATM and EFTPOS systems. In the last few years he has served on a number of committees offering security advice to a number of UK Government departments and agencies.
Fred played a leading role in the establishment of the Institute of Information Security Professionals (IISP) and has been on the board of directors since its launch in 2005.
- He has been a member of the Board of Trustees, Bletchley Park since 1999.
- In 2002 he was awarded an IMA Gold Medal for 'Services to Mathematics'.
- In 2002 he was also awarded the first honorary CISSP for a European. This was for 'leadership in Information Security'.
- In 2003 Fred received an honorary CISM for 'globally recognised leadership' and 'contribution to the Information Security Profession'.
- In 2005 he was elected to the ISSA Hall of Fame.
- In 2008 he was elected to be a Fellow of (ISC)2.
- In 2008 he was the first person to be elected to the InfoSecurity Europe Hall of Fame.
- In 2008 he was elected to the International Advisory Board of IMPACT (the International Multilateral Programme Against Cyber Threats).
- In 2011 he was awarded an Honorary Fellowship by Royal Holloway, University of London.
Room: McCrea 233
Tel: 01784 443098
|Mr Claudio Rizzo is a Computer Science Engineering student at Politecnico di Milano. He gained his Bachelor degree in 2012 and is currently studying for his masters degree at Politecnico di Milano. He joined the PoliMiCFT Team (Tower of Hannoi) and has particpated in iCTF 2013, RuCTFe 2013, PlaidCTF2014, DEF Con Qualifiers 2014 and CSAW 2014. He has also recently participated in a summer-school about Android malware / mobile malware analysis.He is currently working on PuppetDroid for his master's thesis. This project is Android related and is in collaboration between Politecnico and Royal Holloway University, where he is working with Dr Lorenzo Cavallaro.|
|Mr Emanuele Uliana is a Computer Science Engineering student at Politecnico di Milano. He gained his Bachelor degree in 2012 and is currently studying for his masters degree at Politecnico di Milano. He joined the PoliMiCFT Team (Tower of Hannoi) and has particpated in iCTF 2013, RuCTFe 2013, PlaidCTF2014, DEF Con Qualifiers 2014 and CSAW 2014. He has also recently participated in the SysSec Summer School in Amsterdam where he learnt about Android application reversing/analysis.He is currently working on PuppetDroid (a tool designed to reuse registered interactions between users and applications to try to trigger malicious behaviours on suspicious apks) for his master's thesis. This project is Android related and is in collaboration between Politecnico and Royal Holloway University, where he is working with Dr Lorenzo Cavallaro.|
|Prof Richard Walton B.Sc. Ph.D (Nottingham) B.A. (Open University) CMath FIMA Professor Richard Walton CB B.Sc. Ph.D. (Nottingham) B.A. (O.U.) C.Math. C.Eng. FIMA MBCS FIET MInstISP received his B.Sc. (Hons) and Ph.D. in Mathematics from the University of Nottingham in 1968 and 1971 respectively. He studied with the Open University during the 1980's taking mainly Electronics courses and received his B.A. (Hons) in 1987. From 1971-1973 he was a lecturer in Mathematics at the North Staffordshire Polytechnic before joining GCHQ as a Mathematician at the end on 1973. He was appointed Companion of the order of the Bath (CB) in the 2003 New Year Honours.
His GCHQ career culminated in his appointment in January 1999 to the GCHQ Board as Director CESG, the National Technical Authority for Information Assurance. He held this post until October 2002 when he was seconded to the Cabinet Office to initiate work on the production of a National Strategy on Information Assurance.
His earlier posts included Head of the Division employing most of the GCHQ Mathematicians (1996-1999) and Head of the Mathematical Services Group in CESG (1985-1991). In the 1980s he initiated many of the changes in CESG's public profile as they started to engage in open fora, both national and international, during the early stages of the development of open standards for computer security. He was the first member of GCHQ to attend open cryptographic conferences (Eurocrypt in 1982, Crypto in 1985). His actions were instrumental in achieving the change of GCHQ policy to publish the early CESG work on Public Key Cryptography.
He retired from the Civil Service in May 2003 and undertakes occasional consultancy through his own company, Walton-Mackenzie Ltd. Since retirment, he has published several papers on topics concerned with information security and serves on the IT policy panel of the IET. He was appointed as an independent member of the Defence Scientific Advisory Council in April 2004.