George J. Proeller, D. CS.
Colorado Technical University
6320 Lange Drive
Colorado Springs, CO 80918
Phone: +1 719 358 2728
Calle 152a 16-A-60 T1 Ste 701
Telno: +57 313 818 4297
DVP term expires December 2013
Thirty-plus years of highly technical/increasingly responsible operations and management experience in Information Technology Systems (ITS) focusing on Information Assurance/Computer Network Security with Program Management, and Process Improvement/Quality. Dr. Proeller's experience encompasses all aspects of information systems life cycle from requirements definition through development and deployment to follow-on test and evaluation to decommissioning. He holds multiple security certifications including the Certified Information Systems Security Professional (CISSP) credential, the Certified Information Security Manager, and the GIAC Security Leadership Certification and is a pioneer in the transition of information security to academia. His Department of Defense (DoD) experience includes a Certified Acquisition Professional certification in Operational Test and Evaluation and extensive experience in the DoD Information Technology Security Certification and Accreditation Process. He also serves on the adjunct faculty of the Computer Science Department of one local university and departmental advisory boards two others.
Multimodal Biometrics Uses in Person Identification and Verification
Biometric Systems based solely on a single modality will most often not meet desired performance requirements for large user population applications due to size and differentiation. This becomes evident with increases in noisy data and the presence of more than a few statistical outliers thereby increasing error rates to an unacceptable range. This presentation discusses the possibilities available with the use of multiple biometric modalities to answer the questions of Identification "Who am I?" and verification "Am I who I claim to be?"
Personal Electronic Devices; iPODS, PDAs and Cell Phones a Forensics Discussion
iPods, PDAs, and cell phones continue to merge in form, fit, and functionality and now include data acquisition (cameras, keyboards, usb ports, etc), data aggregation, and storage (some up to 80 gigabytes), and communications capabilities (IR, Bluetooth, wireless internet access, and cellular telephone). This presentation provides insights into the features and capabilities of such systems, their possible uses in unethical and possibly unlawful activities, and as discussion of the concepts of forensic analyses and approaches useful in combating such uses.