Fog Computing is a relatively new concept. Coined by Salvatore J. Stolfo, the idea was to launch a disinformation attack on malicious insiders. This is done by implementing user behavior profiling and decoy technology. Cisco later adopted Fog Computing and changed it to be more about a platform which could deal with the massive amounts of data created by the Internet of Things (IoT) but also keep the proximity of that data close to the end user.
This presentation will discuss a proposed framework which utilizes the concept of Fog Computing to establish a Defensive Network Sensor Environment using open source tools. Each network sensor can have one or more identities and act as a monitor or decoy. The concept is to develop a distributed modular system which can be easily adapted by each organization.
- Fog Computing
- Open Source Tools
- Security Standards
About Aaron Wampach

Dr. Aaron Wampach has been active in the field of technology for over 25 years. In the last 18 years, he has focused primarily on the area of information assurance. He holds several industry certifications: CISSP, GSEC, GCIH, CRISC and CISM. In his spare time he is an active member of the local information assurance community: volunteering his time in the local ISSA chapter; is an ISSA International Fellow; a SANS mentor; and teaches various graduate level cybersecurity classes.
His previous experience includes working or consulting for numerous Fortune 500 organizations to small start-up organizations. He has experience in several business verticals ranging from government and transportation to medical device manufacturing and healthcare. He is currently a manager of security engineering and is a security architect for a HealthPartners and is also an adjunct associate professor at St Mary’s University.
About Perry Hemmingsen

Perry Hemmingsen has worked in information security for nine years. Before landing at Target, he has been employed in the energy industry, healthcare/insurance and global finance. With a background in information security, data encryption and software development, his main focus is in application security. In addition to technical savvy, Hemmingsen has heavy experience working with software developers and managers in creating and maintaining application security programs. Throughout his time in the industry, he has done everything from complex code reviews to designing corporate-wide policies and procedures for brand new AppSec programs.