Helping People In The Security Community – Paul’s Security Weekly #588

“Phoneboy” has been helping the security community for over 15 years. We fondly remember Phoneboy as a resource that helped us configure our Check Point firewalls back in the day! Phoneboy comes on the show to discuss how to help people in the security community, a topic near and dear to our hearts.

Full Show NotesFollow us on Twitter: https://www.twitter.com/securityweekly

Guests

Dameon Welch-Abernathy
Dameon D. Welch-Abernathy, widely known as “PhoneBoy”, is a Cyber Security Evangelist for Check Point Software Technologies. He is the public face of CheckMates, the Check Point cyber security community. A recognized industry security veteran, with more than two decades of experience, Welch-Abernathy is best known for his creation of the PhoneBoy FireWall-1 FAQ in the mid-1990s. It was used by Check Point and thousands of its customers worldwide. He is also the author of Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide. In past roles at Check Point, Welch-Abernathy led security architecture reviews and developed high level security architecture proposals for customers. Prior to joining Check Point in 2009 through the acquisition of Nokia’s security appliance business, he worked in Product Line Support where he supported customers using a variety of security solutions developed by Nokia, Check Point, and Sourcefire. He has also worked as a systems administrator for several small companies. Welch-Abernathy holds a B.S. in Computer Science from Santa Clara University and is a current Certified Information Systems Security Professional (CISSP)..

Hosts

Larry Pesce
Larry Pesce – Senior Managing Consultant and Director of Research, InGuardians.
Lee Neely
Lee Neely – Senior Cyber Analyst , Lawrence Livermore National Laboratory.
Paul Asadorian
Paul Asadorian – CEO, Security Weekly.
Jeff Man
Jeff Man – Sr. InfoSec Consultant, Online Business Systems.
Joff Thyer
Joff Thyer – Security Analyst, Black Hills Information Security.