Andrea Barisani
Andrea Barisani is a security researcher and consultant. His professional career began 10 years ago but all really started
when a Commodore-64 first arrived in his home when he was 10. Now, 18 years later, Andrea is having fun with large-scale
IDS/Firewalls deployment and administration, forensic analysis, vulnerability assessment, penetration testing, security
training and his Open Source projects. He eventually found that system and security administration are the only effective
way to express his need for paranoia.
Being an active member of the international Open Source and security community he’s maintainer/author of the tenshi, ftester
projects as well as the founder and project coordinator of the oCERT effort, the Open Source Computer Emergency Reponse Team.
He has been involved in the Gentoo project, being a member of the Gentoo Security and Infrastructure Teams, and the Open
Source Security Testing Methodology Manual, becoming an ISECOM Core Team member. Outside the community he has been a
security consultant for Italian firms and he’s now the co-founder and Chief Security Engineer of Inverse Path Ltd. He has
been a speaker and trainer at PacSec, CanSecWest, BlackHat and DefCon conferences among many others, speaking about TEMPEST
attacks, SatNav hacking, 0-days, LDAP and other pretty things.VULNERLAB:399
Andrea Barisani
Andrea Barisani is a security researcher and consultant. His professional career began 10 years ago but all really started
when a Commodore-64 first arrived in his home when he was 10. Now, 18 years later, Andrea is having fun with large-scale
IDS/Firewalls deployment and administration, forensic analysis, vulnerability assessment, penetration testing, security
training and his Open Source projects. He eventually found that system and security administration are the only effective
way to express his need for paranoia.
Being an active member of the international Open Source and security community he’s maintainer/author of the tenshi, ftester
projects as well as the founder and project coordinator of the oCERT effort, the Open Source Computer Emergency Reponse Team.
He has been involved in the Gentoo project, being a member of the Gentoo Security and Infrastructure Teams, and the Open
Source Security Testing Methodology Manual, becoming an ISECOM Core Team member. Outside the community he has been a
security consultant for Italian firms and he’s now the co-founder and Chief Security Engineer of Inverse Path Ltd. He has
been a speaker and trainer at PacSec, CanSecWest, BlackHat and DefCon conferences among many others, speaking about TEMPEST
attacks, SatNav hacking, 0-days, LDAP and other pretty things.