Company Info

InGuardians was formed to provide complete security solutions, by meeting the ongoing need for holistic security within the ever-growing IT Security market. Our experts specialize in Intrusion Prevention, Detection, and Recovery.

InGuardians, Inc., and our group of leading security professionals include senior security consultants, leading security instructors, authors of many of the top industry bestsellers, and contributors to open source projects including, Honeynet Project, and Bastille Linux.

InGuardians provides network peace keeping for agencies and corporations worldwide.

InGuardians Team

Jimmy Alderson
Jimmy Alderson is a web application and data correlation expert. Jimmy conducts network architecture reviews and security audits. He is an author of the “Syngress best seller Nessus Network Auditing”.
Jimmy joins InGuardians after working for ISS, Meta Security Group, and ESecurity Inc.
Jay Beale
Jay Beale is a security specialist focused on host lock-down and security audits. He is the Lead Developer of the Bastille project, which creates a hardening program for Linux, HP-UX, and Mac OS X, a member of the Honeynet Project, and the Linux technical lead in the Center for Internet Security. Jay is a columnist for Information Security Magazine, a co-author of seven books, and the series editor of the Syngress Open Source Security series.
A senior research scientist with the George Washington University Cyber Security Policy and Research Institute, Jay teaches Unix Security at IDG and Black Hat conferences.
Matthew Carpenter
Matthew Carpenter is a Senior Security Analyst for InGuardians. Matthew also periodically teaches Track 504, "Hacker Techniques, Exploits and Incident Handling" for The SANS Institute.
With a background in telecommunications, and network and server security, Matthew's expertise includes hacker attacks and defenses, reverse engineering, and security vulnerability research.
Matthew has spoken at Defcon Security Conference, Information Systems Security Association(ISSA) and Fortune 500 corporations, as well as released several open-source security research tools.
Bob Hillery
Bob Hillery is an experienced consultant in Information Systems Security Management. He is a founder and Senior Security Analyst with InGuardians, Inc. and has an extensive background in computer networks gained through the Navy and R&D; labs.
Bob has worked in National Institute of Justice projects and been a Senior researcher with the Institute for Security Technology Studies at Dartmouth College. He served as the Vice President of Academic Affairs & Chair of Information Systems Department for NH Community Technical College, and currently teaches National Security and Cyber-terrorism research courses at the Henry C. Lee College of Forensic Sciences at the University of New Haven. He has significant experience with both the management side and technical issues of security incident handling from his consulting practice.
Bob's professional certifications and affiliations include CISSP, GIAC, MCSE, ISSA and HTCIA.
Kevin Johnson
Kevin Johnson is a Senior Security Analyst with InGuardians. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time contributes to a large number of open source security projects.
Kevin founded and leads the development on B.A.S.E. (the Basic Analysis and Security Engine) project. The BASE project is the most popular web interface for the Snort intrusion detection system.
Kevin is an instructor for SANS, teaching both the Incident Handling and Hacker Techniques class and the Web Application Security class. He has presented to many organizations, including Infragard, ISACA, ISSA and the University of Florida.
Tom Liston
Tom Liston joined InGuardians as a lead network penetration tester and code auditor. Tom is the developer of the Open Source security application LaBrea, the GDI Scanner, ISC Alert, and is the co-author (with Ed Skoudis) of the second edition of the security classic Counter Hack Reloaded. Tom is a Handler for the SANS Institute's Internet Storm Center where he authors a popular series of diaries titled Follow the Bouncing Malware.
Tom, as a part of research that InGuardians performed for the U.S. Department of Homeland Security, created the first public proof-of-concept exploit demonstrating the potential for malicious code to escape from a virtual machine - launching arbitrary code on a host machine from exploit code running in a guest.
Mike Poor
Mike Poor is a founder and Senior Security Analyst with InGuardians. Mike conducts forensic analysis, penetration tests, vulnerability assessments, security audits and architecture reviews. His primary job focus however is in intrusion detection, response, and mitigation.
Mike is an author and editor of the international best seller “Snort 2.1” book from Syngress, and is a Handler for the Internet Storm Center.
Mike teaches Intrusion Detection for the SANS Institute and has supported Intrusion Detection and Incident Response teams for the military, and has worked for Sourcefire as a research engineer, and for the SANS Institute leading their Intrusion Analysis Team.
Justin Searle
Justin Searle is a Senior Security Analyst with InGuardians. He specializes in network security architecture, penetration testing, and PCI compliance. Prior to InGuardians, Justin served as the IT Security Architect for JetBlue Airways. Justin helped secure their telecommuters' virtual call center and re-design the airline's infrastructure to help towards PCI compliance. He has also provided top-tier support for some of the largest supercomputers in the world.
Justin has taught courses in hacking techniques, intrusion detection, forensics and Cisco networking at both ITT Technical Institute and New Horizons. He has presented at a number of security conferences, including ToorCon and the SANS Institute Pentesters Summit.
Justin has an MBA in International Technology, as well as both the CISSP and SANS GCIH certifications.
Ed Skoudis
Ed Skoudis is a founder and Senior Security Consultant with InGuardians. Ed teaches SANS Track 4, "Hacker Techniques, Exploits and Incident Handling", on a regular basis. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed information security governance and operations teams for Fortune 500 companies, and responded to computer attacks for clients in financial, high technology, healthcare, and other industries.
Ed conducted a demonstration of hacker techniques against financial institutions for the United States Senate and is a frequent speaker on issues associated with hacker tools and defenses. He has published several articles on these topics, as well as the Prentice Hall best seller, Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses. His latest book is titled Malware: Fighting Malicious Code.
Ed was also awarded a 2007 Microsoft MVP award for Windows Server Security, and is a member of the Honeynet Project.
Joshua Wright
Joshua Wright is a senior security analyst with InGuardians. Prior to his work at InGuardians, Josh was the senior security researcher for Aruba Networks, leading the wireless security and product security analysis teams in identifying new risks and threats in wireless networks. Josh is also a senior instructor and author for the SANS Institute, teaching courses on wireless penetration testing, ethical hacking and database security. A regular speaker at information security conferences including RSA, CSI NetSec, InfraGard, Information Systems Audit and Control Association (ISACA) as well as popular hacker conferences, Josh is able to leverage his technical knowledge and teaching skills to help thousands of organizations each year in assessing and understanding emerging information security threats.
Josh's expertise is in wireless security analysis including Wi-Fi/802.11, Bluetooth, WiMax, ZigBee/802.15.4 and proprietary systems as well as security penetration testing and vulnerability/risk assessments. He is a regular contributor to the open-source community, having written multiple tools designed to highlight vulnerabilities in common protocols and communication systems. Josh is a contributing author of the Syngress Press "Wireshark and Ethereal Network Protocol Analyzer Toolkit" book, as well as "Emerging Technologies in Wireless LANs" published by Cambridge Press.