Herbert Hugh Thompson Explained

Hugh Thompson
Birth Place:Nassau, Bahamas
Citizenship:American
Field:Computer science
Work Institutions:Microsoft
Columbia University
RSA Conference
Blue Coat Systems
Symantec
Alma Mater:Florida Institute of Technology
Known For:security

Dr. Herbert Hugh Thompson is a computer security expert, an adjunct professor in the Computer Science Department at Columbia University,[1] and the Chief Technology Officer of NortonLifeLock.[2] He is also the Chairman of RSA Conference[3] the world's largest information security conference with over 25,000 attendees annually. Thompson is the co-author of a book on human achievement titled The Plateau Effect: Getting from Stuck to Success published by Penguin in 2013[4] [5] and has co-authored three books on information security including, How to Break Software Security: Effective Techniques for Security Testing published by Addison-Wesley,[6] and The Software Vulnerability Guide published by Charles River 2005.[7] He is known for his role in exposing electronic voting machine vulnerabilities as part of the HBO Documentary Hacking Democracy. He was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine[8] and has been referred to by the Financial Times as "One of the world’s foremost cryptology and internet security experts."[9]

Career

Thompson began his career as a research intern for Microsoft Corporation while working on his Ph.D. in Applied Mathematics at the Florida Institute of Technology, where he completed his degree in 2002.[10] He then went on to co-found Security Innovation Inc., an application security company and worked as their Chief Security Strategist. In 2007 he started another technology security company called People Security and also began teaching a course on "Software Security and Exploitation" at Columbia University that focused on methods to circumvent security mechanisms in software.[11] Thompson hosted a show that was sponsored by AT&T.<ref> AT&T Can't Pay An Audience To Agree With Internet Filtering . Wired. He has written several books and over 100 peer reviewed papers on Computer Security and Hacking.[12] [13] [14] Thompson has delivered keynotes at every RSA Conference since 2007. He has been interviewed by top news organizations including BBC News,[15] Bloomberg Television,[16] CNN,[17] Fox News,[18] The New York Times[19] and the Associated Press.[20] He is also a contributor to the New York Times,[21] Scientific American[22] and IEEE Security & Privacy magazine.[23] Thompson was Senior Vice President at security infrastructure company Blue Coat Systems.,[24] and was named CTO of Symantec after the acquisition of Blue Coat in August 2016.

Electronic Voting Security

In 2006, Thompson participated in four hack tests for the nonprofit election watchdog group Black Box Voting.[25] Two of his tests involved altering election results reports on the Diebold GEMS central tally machines. Thompson also collaborated with Harri Hursti in the Black Box Voting projects in Leon County, Florida and Emery County, Utah. Thompson's GEMS central tabulator hack was achieved by inserting a Visual Basic script onto the GEMS server machine at election headquarters. Both the Visual Basic script hack by Thompson and the memory card hack by Hursti Hack can be seen in HBO's "Hacking Democracy" where Hursti and Thompson hacked into Diebold Election Systems's voting machines and central tabulator system in Leon County, Florida proving its vulnerability.[26]

Education

Thompson completed his bachelors, masters and Ph.D. in applied mathematics at the Florida Institute of Technology.

Books

Notes and References

  1. https://www.cs.columbia.edu/~hthompson/ Columbia University course page for COMS E6998-9 Software Security and Exploitation
  2. https://web.archive.org/web/20160324191404/https://www.symantec.com/about/corporate-profile/management-team Symantec Management Team
  3. http://www.businesswire.com/news/home/20090812005023/en/RSA?-Conference-Appoints-Dr.-Herbert-H.-Thompson#.VJYE044A RSA Conference Appoints Dr. Herbert H. Thompson as Program Committee Chair and Advisory Board Member
  4. News: Schawbel. Dan. Bob Sullivan: How Plateaus Prevent You From Career Success. Forbes.
  5. Web site: Coffey. Laura. Hey, high-achieving women! Here's how perfectionism holds you back. 2 May 2013 . Today.
  6. Book: Whittaker, James . How to Break Software Security . 2003 . Addison Wesley . 0321194330.
  7. Book: Thompson, Herbert . The Software Vulnerability Guide . 2005 . Charles River Media . 1584503580.
  8. News: IT security reboot 2006: Top 5 influential security thinkers. SC Magazine.
  9. News: Jones. Sam. Encryption expert offers support to UK's GCHQ chief. Financial Times.
  10. Book: Thompson, Herbert . A Bayesian model of sequential test allocation for software reliability estimation . 2002 . Florida Institute of Technology . 0493619062.
  11. https://www.cs.columbia.edu/~hthompson/ Columbia University: COMS E6998-9: Software Security and Exploitation
  12. Thompson, Herbert H. "Why security testing is hard." IEEE Security & Privacy 1.4 (2003): 83-86.
  13. Whittaker, James A., and Herbert H. Thompson. "Black Box Debugging." Queue 1.9 (2003): 68.
  14. Thompson, Herbert H., and James A. Whittaker. "Rethinking software security." DOCTOR DOBBS JOURNAL 29.2 (2004): 73-75.
  15. News: How safe is the 'internet of things'? . en-GB . BBC News . 2023-03-07.
  16. Bloomberg Television, First Up with Susan Li, "Cyber Security Threat Dynamic, Dangerous". https://www.bloomberg.com/video/cyber-security-threat-dynamic-dangerous-thompson-VBG2kLSxRb6aBvXmoqUvvQ.html
  17. http://transcripts.cnn.com/TRANSCRIPTS/0610/31/ldt.01.html CNN transcripts
  18. Web site: Snyder . Christopher . 2015-03-24 . Increase in 'One-Day Wonder' websites helps disguise malware . 2023-03-07 . Fox News . en-US.
  19. Web site: Perlroth . Nicole . 2014-06-11 . Security Needs Evolve as Computing Leaves the Office . 2023-03-07 . Bits Blog . en.
  20. R. Satter, "RESEARCHERS STYMIED BY HACKERS WHO DROP FAKE CLUES", AP, 10 December 2014. http://hosted.ap.org/dynamic/stories/E/EU_HACKER_WHODUNIT
  21. Sullivan, Bob, and Hugh Thompson. "Brain, Interrupted," New York Times, May 5, 2013, pg. SR12.
  22. Thompson, H. "How I Stole Someone’s Identity." Scientific American, online feature posted August 18 (2008).
  23. Hugh Thompson, "The Human Element of Information Security", IEEE Security & Privacy, vol.11, no. 1, pp. 32-35, Jan.-Feb. 2013, doi:10.1109/MSP.2012.161
  24. Web site: Blue Coat Names Security Market Visionary Dr. Hugh Thompson as Senior Vice President and Chief Security Strategist.
  25. http://www.blackboxvoting.org Black Box Voting site containing Thompson and Hursti projects
  26. http://www.hbo.com/docs/programs/hackingdemocracy/ HBO's documentary "Hacking Democracy"