CTO Intrusion Inc.
Over 40 years in network security. Joe’s expertise has focused on understanding flow and communicants to discern between normal and abnormal traffic – and to use detailed traffic analysis to uncover previously unseeable compromises. Joe has found a number of major compromises, but never announced any of them publicly, ever. Security professionals that leak customer issues can’t be trusted. The goal of analysis is learning how to automatically prevent and defeat compromises automatically. Several patents and patents pending related to innovations in wire speed traffic analysis, endpoint protection, detection and prevention of East-West internal propagation of compromises (inside lateral spread) at both the detection and prevention levels. Work now has expanded to defending OT as well as IT. Degree in Electrical Engineering from Texas A&M University. Expertise in both offensive and defensive information operations. Created and run the largest continual inventory of the Internet since 2001 – which is one of the inputs to Shield Threat Intelligence.
Cofounder of Optical Data Systems in 1983 (first fiber optic and TEMPEST networking hardware) which went public and became Intrusion Inc. (network security products and services). Worked on EMP hardened fiber optic components and communications gear beginning in 1981. Currently support wide range of projects: producing monthly Internet inventory, specialty databases for Cyber community, specialized investigations. Serves as CTO at the company he cofounded in 1983.
Joe has been a licensed pilot since high school (solo at 16 and licensed at 17) and is instrument rated, enjoys sailing, scuba diving and skiing. Summer vacations with the family are often in Ouray Colorado where the family enjoys hiking and Jeeping the abundant 4 wheel drive only mountain passes. Sponsor of Bible translations and enjoys study. Has a bride of 35 years and 3 kids 27, 24 & 21.
Sunday | Aug 10th 2025
Adversary Village Workshop Stage | Las Vegas Convention Center
Panel Discussion
Adversary Philosophy
Cyber attacks have become a powerful extension of modern warfare and some of the most sophisticated threat actors out there are backed by nation-states. This panel dives into how attackers are using cyberspace to conduct espionage, disrupt critical systems, and wage silent wars. the panel will explore who these actors are, what motivates them, and how their operations are changing the global threat landscape. Whether you're defending networks or just curious about how cyber attacks fits into modern conflict, this discussion will unpack the realities behind the headlines.
Access Everywhere.
Join Adversary Village official Discord server to connect with our amazing community of adversary simulation experts and offensive security researchers!