The following speakers have already confirmed their attendance at IT-Defense 2004:


Internationally renowned security technologist and author Bruce Schneier is the Founder and the Chief Technical Officer of Counterpane Internet Security, Inc., the world leader in Managed Security Monitoring. Counterpane provides security monitoring services to Fortune 2000 companies world-wide.

He is the author of six books on security and cryptography, including the security best seller, "Secrets & Lies: Digital Security in a Networked World." His first book, "Applied Cryptography," has sold over 150,000 copies world-wide, and is the definitive work in the field. Schneier designed the Blowfish and Twofish encryption algorithms, and writes the influential "Crypto-Gram" monthly newsletter. He is a frequent lecturer on computer security and cryptography.


Jaya Baloo (CCNP, CISSP) has been working in InfoSec for 5 years, starting at Unisource in The Netherlands. After moving to KPN Telecom, she has worked internationally for the Dutch Telecom Operator in Namibia, Egypt, Germany, and Costa Rica designing secure IP infrastructures for national operators. More recently she has worked in Prague for Czech Telecom on Lawful Interception.


James Bamford, leading authority on the Intelligence Services here and around the world, is the author of Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century, (Doubleday 4/01), a national bestseller. Bamford discusses the NSA, it's 37,000 employees and it's $30 billion budget in light of the recent terrorist attacks, which he calls "the biggest intelligence disaster since Pearl Harbor". Telling the tale of the tragedy from an intelligence perspective, his insights on what went wrong and how to go forward with a successful intelligence program are timely, thought provoking and unique.

He was until recently Washington Investigative Producer for ABC's "World News Tonight" with Peter Jennings and has written investigative cover stories for the New York Times Magazine, the Washington Post Magazine, and the Los Angeles Times Magazine. He also authored, The Puzzle Palace: A Report on the NSA, America's Most Secret Agency (Viking 1983), also a national bestseller


An original member of the now famous "Homebrew Computer Club", Mr. Draper (AKA Captain Crunch), has over 30 years of programming and security expertise.

Widely known as the first security pioneer, Mr. Draper became interested while learning how to penetrate phone networks. He now uses his penetration skills to test the vulnerabilities in computer networks, and make sure our firewall is as un-crackable as possible.

While serving in the USAF, he worked on long range radar and radio equipment used for encryption. After a stint with American Astrionics, designing high speed Operation Amplifiers for precision missile guidance, he worked as an Engineering Technician at National Semiconductor.

Mr. Draper then worked for Cartravision, designing the first Cartridge Video Recorders, predating VCR's by 10 years. After forming a small company making and selling audio distortion test equipment, he worked as Chief Engineer for KPER Radio until hired by Hugle International in 1972 to design the first cordless phone. This led to another small company formed by Mr. Draper, in which he developed the first encryption phone.

He has been an innovator, writing high-speed analog encryption programs, specialized chebychev and butterworth filter circuit programs, and some of the first CAD programs. He then wrote the first cross-assemblers used in writing Assembly Language for the 8080, 6502, 1802, and 6800 chips.

At the Homebrew Computer Club, Mr. Draper designed his own computers and helped create the "Blue Box" tone generator. Introducing, among others, Steve Wozniak and Steve Jobs to the computing world, and a generation of hackers to the glorious concept of "phone phreaking", spawning the worldwide "2600" clubs. His work with Jobs and Wozniak led him to become the 13th employee of Apple computers, designing telephone interface boards, and developing both hardware and software for the Apple II.

Mr. Draper implemented the first FORTH language on the Apple II, utilizing it to write a word processor. After modifying it for commercial sale, Easy Writer, the world's first word processor was born. It took him only 20 minutes to port FORTH to the PC, and 48 hours later, Easy Writer was delivered to IBM, beating out Bill Gates and the early Microsoft team on the project. While working for IBM, Mr. Draper created the "Virtual Machine Interface", a screen and keyboard driver.

All the while, he was refining and honing his security skills, penetrating systems at a time when it was considered more exploratory and helpful, rather than harmful to the industry. He then continued his work with Computer Aided Design, porting AutoCAD to the Apollo DN-3000, Sun, and Macintosh. While working with the "Future Group", an elite group of programmers, Mr. Draper developed 3D GUI's (Graphic User Interfaces), which led him to designing visual user interfaces for the Macintosh used to write "Screenplay", a story boarding and scripting program utilized by movie producers in Hollywood.

He is now a sought after Security consultant and Conference speaker, and has been touring the security conference circuit for years. His security expertise has led him to appearances on Nightline, Good Morning America and various radio shows nationwide, most recently on CNET radio in San Francisco, and The Learning Channel (The secret life of hackers).

Draper has appeared on A&E, and recently did a documentary for Channel Four in England. You can find him on the Discovery Channel Hall of Fame, further entrenching him as one of the true innovators of the industry. A co-founder of ShopIP, Mr. Draper performs security audits and is an architect of the CrunchBox firewall/IPS system. He also does database, Python, and secure GUI programming for SpamCruncher and CrunchBox.


Fyodor authored the popular Nmap Security Scanner, which was named security tool of the year by Linux Journal, Info World, and the Codetalker Digest. He also maintains the Insecure.Org security resource site and has authored seminal papers detailing techniques for stealth portscanning, remote operating system detection via TCP/IP stack fingerprinting, and the IPID Idle Scan. He is a member of the Honeynet project and a co-author of "Know Your Enemy: Honeynets".


Lieutenant colonel Volker Kozok works as IT security expert in the department of military base in the troops office in Bonn. In his field he is responsible for the supervision and control of IT security in 200 national and international offices and IT security of the troops contingents.

As network specialist and security analyst the main aspect of his tasks is in network security and in the field of computer network operations. In 2001 he was chief instructor of the 11 months training period of the new computer emergeny response team and he was involved in planning and organizing the office. He is a member of national and international workgroups on IT security. Since 1980 he has been lieutenant colonel in the German army.


After studying material science at the University of Erlangen-Nürnberg, Dr. Kreutzer began work at the Allianz Zentrum für Technik GmbH in Ismaning in 1977. He first worked in the field of scientific investigation into the causes and prevention of damage and later focused on the analysis and continued development of risk management in large companies and the analysis of future risks.

Since 1996 he has been the head of the Center of Competence for Risk Management and has been responsible for his own consulting on such subjects as risk management, security, future risks, strategy, success and issues of meaning.


Widely regarded as one of the world's foremost database security experts, Aaron is the co-author of the Oracle Security Handbook, printed by Oracle press. Aaron has delivered presentations on application security to organizations around the country and has written several white papers on the subject.

Aaron C. Newman is Co-Founder and the Chief Technology Officer of Application Security, Inc. (AppSecInc). In his current role, Aaron is responsible for defining the overall AppSecInc product vision.

Prior to AppSecInc, Aaron pioneered the database vulnerability assessment market by co-founding DbSecure, Inc. At DbSecure, Aaron played the role of both CEO and CTO. Aaron led the acquisition of DbSecure by the publicly-traded company Internet Security Systems (ISS) in 1998. After the acquisition of DbSecure, Aaron assumed the role of managing development of database security solutions at ISS.

Aaron also founded the consulting firm ACN Software Systems, Inc. ACN Software Systems provided development services specializing in security software. ACN Software Systems developed both intrusion detection and security assessment solutions for Windows NT.

Aaron has held several other positions in the technology market including managing the development of applications for Banker's Trust and as an IT consultant with Price Waterhouse.


Martin Rösch has 14 years industry experience in network security and embedded systems engineering, is also the author and lead developer of the Snort™ Intrusion Detection System ( that forms the foundation for the Sourcefire product suite.

Over the past seven years, Martin has developed various network security tools and technologies, including intrusion detection systems, honeypots, network scanners, and policy enforcement systems for organizations such as GTE Internetworking, Stanford Telecommunications, Inc., and the Department of Defense. He has applied his knowledge of network security to penetration testing and network forensics for numerous government and large corporate customers. Martin has been interviewed as an industry expert in multiple technology publications, as well as print and online news services such as MSNBC, Wall Street Journal, CNET, ZDNet, and numerous books. SnortTM has been featured in Scientific American, on A&E's Secret Places: Inside the FBI, and in several books, such as Network Intrusion Detection: An Analysts Handbook, Intrusion Signatures and Analysis, Maximum Security, Hacking Exposed, and others.

He founded Sourcefire in 2001 and serves as CTO. A respected authority on intrusion detection technology and forensics, he is responsible for the technical direction and product development efforts.

Martin holds a B.S. in Electrical and Computer Engineering from Clarkson University


Lance Spitzner, is a geek who constantly plays with computers, especially network security. He loves security because it is a constantly changing environment, your job is to do battle with the bad guys. This love for tactics first began in the Army, where he served for seven years. He served three years as an enlisted Infantryman in the National Guard and then four years as an Armor officer in the Army's Rapid Deployment Force. Following the Army he received his M.B.A and became involved in the world of information security. Now he fights the bad guys with IPv4 packets as opposed to 120mm SABOT rounds. His passion is researching honeypot technologies and using them to learn more about the enemy.

He is founder of the Honeynet Project, moderator of the honeypot maillist, author of Honeypots: Tracking Hacker, co-author of Know Your Enemy and author of several whitepapers.

He has also spoken at various conferences and organizations, including Blackhat, SANS, CanSecWest, the Pentagon, NSA, the FBI Academy, JTF-CNO, the President's Advisory Board, the Army War College, and Navy War College.


Stefan was one of the founders of Centaur in 1995 where he built up the security department which was sold to Integralis in 1998.

He did consulting for many multinational industrial clients in IT Security and later moved to the European Strategic Development Team of Articon-Integralis where he was responsible for finding and evaluating new technologies.

He is the author of several books which have been translated in more than 5 languages. His book on Firewalls is now in the 3rd edition. He regularly speaks at security congresses and teaches IT-Security and Cryptography at University of Applied Sciences at Heilbronn.

He is now co-founder and managing director of cirosec.


He studied mathematics (Abschluss: Sehr Gut) with a minor in computer science (Abschluss: 1.0) at the University of Mannheim. Master's thesis An algorithm for spline approximation via Gauss-Transformation. He did his Ph.D. thesis at Lehrstuhl Praktische Informatik IV (Practical Computer Science IV). Since then he’s the Chief Cryptographer of the Cryptolabs Amsterdam. In May 2002 I have joined the research group of Prof. Andrew S. Tanenbaum at the Vrije Universiteit Amsterdam. He’s also a long-time member of the Chaos Computer Club.