Profile

Cover photo
Valerie Fenwick
Attended Purdue University
309 followers|42,639 views
AboutPostsPhotosYouTube

Stream

Valerie Fenwick

Shared publicly  - 
 
Book Review: Florentine Deception
The Florentine Deception by Carey Nachenberg My rating: 5 of 5 stars Amazing technical thriller that was technically realistic! Hard to impress a computer security nerd like myself, but he did it! Written by a computer security expert, all the technical stu...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
OWL: Bias in the Workplace
Professor Joan C. Williams, Hastings Foundation Chair; Director, Center for WorkLife Law; University of California, Hastings College of the Law. I had read Joan's book - What Works for Women at Work - and LOVED it, so I was so happy to see Oracle brought he...
Professor Joan C. Williams, Hastings Foundation Chair; Director, Center for WorkLife Law; University of California, Hastings College of the Law. I had read Joan's book - What Works for Women at Work - and LOVED it, so I was s...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: Collateral Damage—Vendor and Customer Impact of Frequent Policy Changes
Joshua Brickman , Director, Security Evaluations, Oracle; Glenn Brunette , Senior Director and Chief Technologist, Cybersecurity, Oracle Glenn started the talk. Oracle is a big company, nearly 40 years old. Originally started with one products, but no has 1...
Joshua Brickman, Director, Security Evaluations, Oracle; Glenn Brunette, Senior Director and Chief Technologist, Cybersecurity, Oracle Glenn started the talk. Oracle is a big company, nearly 40 years old. Originally started w...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: Commonly Accepted Keys and CSPs Initiative
Ryan Thomas , FIPS 140-2 Program Manager, CGI Global Labs Vendors understand their products and security, but are mystefied with how to list keys/CSPs in the way that the CMVP want. The labs understand the requirements, and review any different types of ven...
Ryan Thomas, FIPS 140-2 Program Manager, CGI Global Labs Vendors understand their products and security, but are mystefied with how to list keys/CSPs in the way that the CMVP want. The labs understand the requirements, and re...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: SP800-90B: Analysis of Linux /dev/random
Stephan Mueller , Principal Consultant and Evaluator, atsec information security Not only does Mr. Mueller work at atsec, but he also is a Linux kernel developer in his spare time.  How do we define the noise sources for /dev/random: Disk I/O Block device n...
Stephan Mueller, Principal Consultant and Evaluator, atsec information security Not only does Mr. Mueller work at atsec, but he also is a Linux kernel developer in his spare time. How do we define the noise sources for /dev...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: A Look Into Hard Drive Firmware Hacking
Khai Van , Security Tester, Gossamer Security Solutions Malware: malicious software, typically used to gain unsolicited access to computers. It comes in many forms: Trojan horses, viruses, bots, adware and worms.  They can be annoying or dangerous. You migh...
Khai Van, Security Tester, Gossamer Security Solutions Malware: malicious software, typically used to gain unsolicited access to computers. It comes in many forms: Trojan horses, viruses, bots, adware and worms. They can be ...
1
Add a comment...
Have her in circles
309 people
Darren Kenny's profile photo
Darrin Johnson's profile photo
Loel Fenwick's profile photo
Gheorghe Cornel Ardelean's profile photo
TED GUEVARA's profile photo
Harry Hall's profile photo
Chris Armes's profile photo
Rosie Issel's profile photo
Peter Harvey's profile photo

Valerie Fenwick

Shared publicly  - 
 
2015 Wrap Up
Inspired by Cate Huston and @femengineer - instead of focusing on what I didn't finish in 2015 that I had wanted to, I'm going to do a wrap up of what I did accomplish. This is by no means complete, but this is a great time of year for introspection. For wo...
Inspired by Cate Huston and @femengineer - instead of focusing on what I didn't finish in 2015 that I had wanted to, I'm going to do a wrap up of what I did accomplish. This is by no means complete, but this is a great time o...
1
Frank DeMarco's profile photo
 
+Valerie Fenwick - It seemed like you were having an exciting, busy and productive year!  But this wrap up shows that AMAZING is a better word for it.  

Me?  I'm going to go sit down and rest for a while.  I'm exhausted just reading/thinking about your 2015. :-)
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: Importance of Open Source to the Cryptographic Module Community
Chris Brych , Senior Principal Security Analyst, Oracle Chris's talk will focus primarily on OpenSSL's history and potential future The OpenSSL project has it's roots back to 1995 to the SSLeay project (Tim Hudson and Eric Young). In 1998, Tim and Eric join...
Chris Brych, Senior Principal Security Analyst, Oracle Chris's talk will focus primarily on OpenSSL's history and potential future The OpenSSL project has it's roots back to 1995 to the SSLeay project (Tim Hudson and Eric You...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: FIPS is FIPS, Real World is Real World and Never the Twain Shall Meet?
Ashit Vora , Co-Founder and Laboratory Director, Acumen Security Ashit's journey has taken him from a Lab, then to a Vendor, and now back to a Lab.  He's seen the experience from both sides.  He's been working with FIPS 140-2 since 2003. The world has chang...
Ashit Vora, Co-Founder and Laboratory Director, Acumen Security Ashit's journey has taken him from a Lab, then to a Vendor, and now back to a Lab. He's seen the experience from both sides. He's been working with FIPS 140-2 ...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: CMVP Programmatic Status
Carolyn French , ITS Engineer, CSE; Michael Cooper , IT Specialist, NIST; Apostol Vassilev, Cybersecurity Expert, Computer Security Division, NIST NIST will be increasing he fees for one year, cost recovery fees, so that they can hire contractors to work th...
Carolyn French, ITS Engineer, CSE; Michael Cooper, IT Specialist, NIST; Apostol Vassilev, Cybersecurity Expert, Computer Security Division, NIST NIST will be increasing he fees for one year, cost recovery fees, so that they c...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: Improved Approaches to Online Health Testing in SP800-90 RNGs
David Johnston , Hardware Security Architect, Intel There are two basic types of RNGs: big and fast, small and slow. You need to do online testing to be sure things are actually random, like a statistical test for nondeterministic part. Also need a logic in...
David Johnston, Hardware Security Architect, Intel There are two basic types of RNGs: big and fast, small and slow. You need to do online testing to be sure things are actually random, like a statistical test for nondetermini...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
ICMC15: The Next Steps Toward A Scalable International Cryptographic Evaluation Process
Clint Winebrenner , Technical Lead, Product Certifications Security & Trust Organization, Cisco How can we work together to eliminate time we're spending doing different validations for different companies. It's not just money to validate against different ...
Clint Winebrenner, Technical Lead, Product Certifications Security & Trust Organization, Cisco How can we work together to eliminate time we're spending doing different validations for different companies. It's not just money...
1
Add a comment...
People
Have her in circles
309 people
Darren Kenny's profile photo
Darrin Johnson's profile photo
Loel Fenwick's profile photo
Gheorghe Cornel Ardelean's profile photo
TED GUEVARA's profile photo
Harry Hall's profile photo
Chris Armes's profile photo
Rosie Issel's profile photo
Peter Harvey's profile photo
Work
Occupation
Software Engineer
Basic Information
Gender
Female
Story
Introduction
Valerie is has over a decade of experience with computer security and operating systems. Her interests include reading, skiing, singing, dancing, women in science and computing and... beer :)
Education
  • Purdue University
    Computer Science, 1992 - 1996