<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Karen+Blakemore</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Karen+Blakemore"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Karen_Blakemore"/>
		<updated>2026-04-25T18:52:26Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148750</id>
		<title>Front Range OWASP Conference 2013/CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148750"/>
				<updated>2013-03-28T15:33:20Z</updated>
		
		<summary type="html">&lt;p&gt;Karen Blakemore: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture the Flag Overview==&lt;br /&gt;
Test your skills with a capture the flag (CTF) hacking competition created specifically for SnowFROC by members of the Boulder OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
Competitors will be provided a series of web applications containing a variety of vulnerabilities. Each discovered vulnerability will earn points. The harder the hack, the more points earned. At the end of the day, the team with the most points wins.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Basic plot intro, other background information? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
All conference attendees may participate in the CTF tournament for no additional cost. If you would prefer to attend the general conference proceedings, the competition will be made available to attendees after SnowFROC ends.&lt;br /&gt;
&lt;br /&gt;
===Format===&lt;br /&gt;
Contestants will be provided a virtual machine which will run locally on self-provided devices. This is a BYOD event and all contestants are responsible for providing their own machine. No &amp;quot;loaners&amp;quot; will be made available.&lt;br /&gt;
&lt;br /&gt;
All contestant machines should have:&lt;br /&gt;
* A virtual machine player that supports .vmdk files, such as [http://www.vmware.com/products/player/ VMware Player], [https://www.virtualbox.org/wiki/Downloads VirtualBox], or [http://www.parallels.com/ Parallels].&lt;br /&gt;
* Appropriate penetration testing tool ([http://www.backtrack-linux.org BackTrack], [http://samurai.inguardians.com/ SamuraiWTF], [[OWASP_Mantra_OS|Mantra OS]], and [[ZAP|OWASP ZAP]] will fit in well).&lt;br /&gt;
&lt;br /&gt;
===Acceptable behavior===&lt;br /&gt;
Competitors are only permitted to attack targets running on their local systems. Network traffic will be monitored to ensure there will be:&lt;br /&gt;
* No attacking the [[SnowFROC2013_CTF_Scoreboard| scoreboard]]. Misuse will result in punitive action.&lt;br /&gt;
* No targeting the VM. Do not mount the VM and harvest flags from within.&lt;br /&gt;
* No attacking other teams, whether through coercion, DoS, theft, sabotage, or other malicious activity.&lt;br /&gt;
* No collusion. Work only within your own team.&lt;br /&gt;
&lt;br /&gt;
===Prizes===&lt;br /&gt;
Small prizes will be awarded to winners. Anyone who worked on the project or who has access to project-related repositories is ineligible to win prizes.&lt;br /&gt;
&lt;br /&gt;
Both team and individual prizes will be awarded based on merit and other achievements.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Team prizes will be awarded to:&lt;br /&gt;
* The team with the most points;&lt;br /&gt;
* The team who completed the story first (or, as a tiebreaker, the team with the most plot-specific points);&lt;br /&gt;
* The team who took the shortest amount of time to complete Acts I-IV;&lt;br /&gt;
&lt;br /&gt;
Individual prizes will be awarded to:&lt;br /&gt;
* The person who solved the hardest challenge (worth the most points);&lt;br /&gt;
* The person who solved the most challenges (raw number);&lt;br /&gt;
* The person who scored the most points (total sum);&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
===Content acquisition===&lt;br /&gt;
&amp;lt;!-- Where to download the competitor VM as well as VM players, etc.. --&amp;gt;&lt;br /&gt;
This information will be released closer to the day of the event.&lt;br /&gt;
&lt;br /&gt;
===Installation and configuration instructions===&lt;br /&gt;
&amp;lt;!-- How to install the competitor VM, including VM players, etc.. --&amp;gt;&lt;br /&gt;
* Add the following entries to your hosts file:&lt;br /&gt;
  10.50.65.12 training.theagency.owasp, theagency.owasp&lt;br /&gt;
  10.56.65.87 theagency.owasp, Im.theagency.owasp&lt;br /&gt;
  10.50.65.26 www.pla.owasp, secretlogin.pla.owasp, download.pla.owasp&lt;br /&gt;
  10.50.65.187 shadowcorp.owasp&lt;br /&gt;
* Configure a host-only network on your VM with IP address 10.50.65.254/24&lt;br /&gt;
* Load the .vmdk files&lt;br /&gt;
* Make sure you are using a browser other than Internet Explorer which for security reasons is not supported by the scoreboard.&lt;br /&gt;
&lt;br /&gt;
===Registration instructions===&lt;br /&gt;
&amp;lt;!-- Registration/scoreboard location; team sizes and naming conventions; etc. --&amp;gt;&lt;br /&gt;
Coming soon.&lt;br /&gt;
&lt;br /&gt;
===Gameplay instructions===&lt;br /&gt;
&amp;lt;!-- How to use the scoreboard; where to get help; etc. --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Karen Blakemore</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148625</id>
		<title>Front Range OWASP Conference 2013/CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148625"/>
				<updated>2013-03-27T04:38:17Z</updated>
		
		<summary type="html">&lt;p&gt;Karen Blakemore: added hostnames&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture the Flag Overview==&lt;br /&gt;
Test your skills with a capture the flag (CTF) hacking competition created specifically for SnowFROC by members of the Boulder OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
Competitors will be provided a series of web applications containing a variety of vulnerabilities. Each discovered vulnerability will earn points. The harder the hack, the more points earned. At the end of the day, the team with the most points wins.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Basic plot intro, other background information? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
All conference attendees may participate in the CTF tournament for no additional cost. If you would prefer to attend the general conference proceedings, the competition will be made available to attendees after SnowFROC ends.&lt;br /&gt;
&lt;br /&gt;
===Format===&lt;br /&gt;
Contestants will be provided a virtual machine which will run locally on self-provided devices. This is a BYOD event and all contestants are responsible for providing their own machine. No &amp;quot;loaners&amp;quot; will be made available.&lt;br /&gt;
&lt;br /&gt;
All contestant machines should have:&lt;br /&gt;
* A virtual machine player that supports .vmdk files, such as [http://www.vmware.com/products/player/ VMware Player], [https://www.virtualbox.org/wiki/Downloads VirtualBox], or [http://www.parallels.com/ Parallels].&lt;br /&gt;
* Appropriate penetration testing tool ([http://www.backtrack-linux.org BackTrack], [http://samurai.inguardians.com/ SamuraiWTF], [[OWASP_Mantra_OS|Mantra OS]], and [[ZAP|OWASP ZAP]] will fit in well).&lt;br /&gt;
&lt;br /&gt;
===Acceptable behavior===&lt;br /&gt;
Competitors are only permitted to attack targets running on their local systems. Network traffic will be monitored to ensure there will be:&lt;br /&gt;
* No attacking the [[SnowFROC2013_CTF_Scoreboard| scoreboard]]. Misuse will result in punitive action.&lt;br /&gt;
* No targeting the VM. Do not mount the VM and harvest flags from within.&lt;br /&gt;
* No attacking other teams, whether through coercion, DoS, theft, sabotage, or other malicious activity.&lt;br /&gt;
* No collusion. Work only within your own team.&lt;br /&gt;
&lt;br /&gt;
===Prizes===&lt;br /&gt;
Small prizes will be awarded to winners. Anyone who worked on the project or who has access to project-related repositories is ineligible to win prizes.&lt;br /&gt;
&lt;br /&gt;
Both team and individual prizes will be awarded based on merit and other achievements.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Team prizes will be awarded to:&lt;br /&gt;
* The team with the most points;&lt;br /&gt;
* The team who completed the story first (or, as a tiebreaker, the team with the most plot-specific points);&lt;br /&gt;
* The team who took the shortest amount of time to complete Acts I-IV;&lt;br /&gt;
&lt;br /&gt;
Individual prizes will be awarded to:&lt;br /&gt;
* The person who solved the hardest challenge (worth the most points);&lt;br /&gt;
* The person who solved the most challenges (raw number);&lt;br /&gt;
* The person who scored the most points (total sum);&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
===Content acquisition===&lt;br /&gt;
&amp;lt;!-- Where to download the competitor VM as well as VM players, etc.. --&amp;gt;&lt;br /&gt;
This information will be released closer to the day of the event.&lt;br /&gt;
&lt;br /&gt;
===Installation and configuration instructions===&lt;br /&gt;
&amp;lt;!-- How to install the competitor VM, including VM players, etc.. --&amp;gt;&lt;br /&gt;
* Add the following entries to your hosts file:&lt;br /&gt;
  10.50.65.12 training.theagency.owasp, admin.theagency.owasp&lt;br /&gt;
  10.56.65.87 theagency.owasp, Im.theagency.owasp&lt;br /&gt;
  10.50.65.26 www.pla.owasp, secretlogin.pla.owasp, download.pla.owasp&lt;br /&gt;
  10.50.65.187 shadowcorp.owasp&lt;br /&gt;
* Configure a host-only network on your VM with IP address 10.50.65.254/24&lt;br /&gt;
* Load the .vmdk files&lt;br /&gt;
* Make sure you are using a browser other than Internet Explorer which for security reasons is not supported by the scoreboard.&lt;br /&gt;
&lt;br /&gt;
===Registration instructions===&lt;br /&gt;
&amp;lt;!-- Registration/scoreboard location; team sizes and naming conventions; etc. --&amp;gt;&lt;br /&gt;
Coming soon.&lt;br /&gt;
&lt;br /&gt;
===Gameplay instructions===&lt;br /&gt;
&amp;lt;!-- How to use the scoreboard; where to get help; etc. --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Karen Blakemore</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148562</id>
		<title>Front Range OWASP Conference 2013/CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148562"/>
				<updated>2013-03-26T00:52:27Z</updated>
		
		<summary type="html">&lt;p&gt;Karen Blakemore: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture the Flag Overview==&lt;br /&gt;
Test your skills with a capture the flag (CTF) hacking competition created specifically for SnowFROC by members of the Boulder OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
Competitors will be provided a series of web applications containing a variety of vulnerabilities. Each discovered vulnerability will earn points. The harder the hack, the more points earned. At the end of the day, the team with the most points wins.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Basic plot intro, other background information? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
All conference attendees may participate in the CTF tournament for no additional cost. If you would prefer to attend the general conference proceedings, the competition will be made available to attendees after SnowFROC ends.&lt;br /&gt;
&lt;br /&gt;
===Format===&lt;br /&gt;
Contestants will be provided a virtual machine which will run locally on self-provided devices. This is a BYOD event and all contestants are responsible for providing their own machine. No &amp;quot;loaners&amp;quot; will be made available.&lt;br /&gt;
&lt;br /&gt;
All contestant machines should have:&lt;br /&gt;
* A virtual machine player that supports .vmdk files, such as [http://www.vmware.com/products/player/ VMware Player], [https://www.virtualbox.org/wiki/Downloads VirtualBox], or [http://www.parallels.com/ Parallels].&lt;br /&gt;
* Appropriate penetration testing tool ([http://www.backtrack-linux.org BackTrack], [http://samurai.inguardians.com/ SamuraiWTF], [[OWASP_Mantra_OS|Mantra OS]], and [[ZAP|OWASP ZAP]] will fit in well).&lt;br /&gt;
&lt;br /&gt;
===Acceptable behavior===&lt;br /&gt;
Competitors are only permitted to attack targets running on their local systems. Network traffic will be monitored to ensure there will be:&lt;br /&gt;
* No attacking the [[SnowFROC2013_CTF_Scoreboard| scoreboard]]. Misuse will result in punitive action.&lt;br /&gt;
* No targeting the VM. Do not mount the VM and harvest flags from within.&lt;br /&gt;
* No attacking other teams, whether through coercion, DoS, theft, sabotage, or other malicious activity.&lt;br /&gt;
* No collusion. Work only within your own team.&lt;br /&gt;
&lt;br /&gt;
===Prizes===&lt;br /&gt;
Small prizes will be awarded to winners. Anyone who worked on the project or who has access to project-related repositories is ineligible to win prizes.&lt;br /&gt;
&lt;br /&gt;
Both team and individual prizes will be awarded based on merit and other achievements.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Team prizes will be awarded to:&lt;br /&gt;
* The team with the most points;&lt;br /&gt;
* The team who completed the story first (or, as a tiebreaker, the team with the most plot-specific points);&lt;br /&gt;
* The team who took the shortest amount of time to complete Acts I-IV;&lt;br /&gt;
&lt;br /&gt;
Individual prizes will be awarded to:&lt;br /&gt;
* The person who solved the hardest challenge (worth the most points);&lt;br /&gt;
* The person who solved the most challenges (raw number);&lt;br /&gt;
* The person who scored the most points (total sum);&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
===Content acquisition===&lt;br /&gt;
&amp;lt;!-- Where to download the competitor VM as well as VM players, etc.. --&amp;gt;&lt;br /&gt;
This information will be released closer to the day of the event.&lt;br /&gt;
&lt;br /&gt;
===Installation and configuration instructions===&lt;br /&gt;
&amp;lt;!-- How to install the competitor VM, including VM players, etc.. --&amp;gt;&lt;br /&gt;
* Add the following entries to your hosts file:&lt;br /&gt;
  10.50.65.12 training.theagency.owasp&lt;br /&gt;
  10.56.65.87 theagency.owasp&lt;br /&gt;
  10.50.65.26&lt;br /&gt;
  10.50.65.187 shadowcorp.owasp&lt;br /&gt;
* Configure a host-only network on your VM with IP address 10.50.65.254/24&lt;br /&gt;
* Load the .vmdk files&lt;br /&gt;
* Make sure you are using a browser other than Internet Explorer which for security reasons is not supported by the scoreboard.&lt;br /&gt;
&lt;br /&gt;
===Registration instructions===&lt;br /&gt;
&amp;lt;!-- Registration/scoreboard location; team sizes and naming conventions; etc. --&amp;gt;&lt;br /&gt;
Coming soon.&lt;br /&gt;
&lt;br /&gt;
===Gameplay instructions===&lt;br /&gt;
&amp;lt;!-- How to use the scoreboard; where to get help; etc. --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Karen Blakemore</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148434</id>
		<title>Front Range OWASP Conference 2013/CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/CTF&amp;diff=148434"/>
				<updated>2013-03-24T23:43:33Z</updated>
		
		<summary type="html">&lt;p&gt;Karen Blakemore: minor edits + installation and configuration information&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture the Flag Overview==&lt;br /&gt;
Test your skills with a capture the flag (CTF) hacking competition created specifically for SnowFROC by members of the Boulder OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
Competitors will be provided a series of web applications containing a variety of vulnerabilities. Each discovered vulnerability will earn points. The harder the hack, the more points earned. At the end of the day, the team with the most points wins.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Basic plot intro, other background information? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
All conference attendees may participate in the CTF tournament for no additional cost. If you would prefer to attend the general conference proceedings, the competition will be made available to attendees after SnowFROC ends.&lt;br /&gt;
&lt;br /&gt;
===Format===&lt;br /&gt;
Contestants will be provided a virtual machine which will run locally on self-provided devices. This is a BYOD event and all contestants are responsible for providing their own machine. No &amp;quot;loaners&amp;quot; will be made available.&lt;br /&gt;
&lt;br /&gt;
All contestant machines should have:&lt;br /&gt;
* A virtual machine player that supports .vmdk files, such as [http://www.vmware.com/products/player/ VMware Player], [https://www.virtualbox.org/wiki/Downloads VirtualBox], or [http://www.parallels.com/ Parallels].&lt;br /&gt;
* Appropriate penetration testing tool ([http://www.backtrack-linux.org BackTrack], [http://samurai.inguardians.com/ SamuraiWTF], [[OWASP_Mantra_OS|Mantra OS]], and [[ZAP|OWASP ZAP]] will fit in well).&lt;br /&gt;
&lt;br /&gt;
===Acceptable behavior===&lt;br /&gt;
Competitors are only permitted to attack targets running on their local systems. Network traffic will be monitored to ensure there will be:&lt;br /&gt;
* No attacking the scoreboard. Misuse will result in punitive action.&lt;br /&gt;
* No targeting the VM. Do not mount the VM and harvest flags from within.&lt;br /&gt;
* No attacking other teams, whether through coercion, DoS, theft, sabotage, or other malicious activity.&lt;br /&gt;
* No collusion. Work only within your own team.&lt;br /&gt;
&lt;br /&gt;
===Prizes===&lt;br /&gt;
Small prizes will be awarded to winners. Anyone who worked on the project or who has access to project-related repositories is ineligible to win prizes.&lt;br /&gt;
&lt;br /&gt;
Both team and individual prizes will be awarded based on merit and other achievements.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Team prizes will be awarded to:&lt;br /&gt;
* The team with the most points;&lt;br /&gt;
* The team who completed the story first (or, as a tiebreaker, the team with the most plot-specific points);&lt;br /&gt;
* The team who took the shortest amount of time to complete Acts I-IV;&lt;br /&gt;
&lt;br /&gt;
Individual prizes will be awarded to:&lt;br /&gt;
* The person who solved the hardest challenge (worth the most points);&lt;br /&gt;
* The person who solved the most challenges (raw number);&lt;br /&gt;
* The person who scored the most points (total sum);&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
===Content acquisition===&lt;br /&gt;
&amp;lt;!-- Where to download the competitor VM as well as VM players, etc.. --&amp;gt;&lt;br /&gt;
This information will be released closer to the day of the event.&lt;br /&gt;
&lt;br /&gt;
===Installation and configuration instructions===&lt;br /&gt;
&amp;lt;!-- How to install the competitor VM, including VM players, etc.. --&amp;gt;&lt;br /&gt;
* Internet Explorer is not supported in the VM.&lt;br /&gt;
* Add the following entries to your hosts file.&lt;br /&gt;
* Configure a host-only network on your VM with IP address 10.50.65.254/24&lt;br /&gt;
* Load the .vmdk files&lt;br /&gt;
* Make sure you are using a browser other than Internet Explorer which for security reasons is not supported by the scoreboard.&lt;br /&gt;
&lt;br /&gt;
===Registration instructions===&lt;br /&gt;
&amp;lt;!-- Registration/scoreboard location; team sizes and naming conventions; etc. --&amp;gt;&lt;br /&gt;
Coming soon.&lt;br /&gt;
&lt;br /&gt;
===Gameplay instructions===&lt;br /&gt;
&amp;lt;!-- How to use the scoreboard; where to get help; etc. --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Karen Blakemore</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Speakers/Ziring&amp;diff=148426</id>
		<title>Front Range OWASP Conference 2013/Speakers/Ziring</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Speakers/Ziring&amp;diff=148426"/>
				<updated>2013-03-22T20:37:36Z</updated>
		
		<summary type="html">&lt;p&gt;Karen Blakemore: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Neal Ziring ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
 |- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
 | Mr. Neal Ziring is the Technical Director for the [http://www.nsa.gov National Security Agency]'s Information Assurance Directorate (IAD), serving as a technical advisor to the IAD Director, Deputy Director, and other senior leadership.  Mr. Ziring is responsible for setting the technical direction across the Information Assurance mission space.  Mr. Ziring tracks technical activities, promotes technical health of the staff, and acts as liaison to various industry, intelligence, academic, and government partners. As part of his role, he guides IAD’s academic outreach program, acting as a technical liaison to several universities that are participants in the National Centers for Academic Excellence - Research (CAD-R) program.  His personal expertise areas include router security, IPv6, VM-based secure systems, cloud computing, cross-domain information exchange, and mobile code security.&lt;br /&gt;
&lt;br /&gt;
Mr. Ziring received B.S. degrees in computer science and electrical engineering (1985), and an M.S. in computer science (1986), all from Washington University in St. Louis. Since then, he has also taken courses from Columbia University and University of Maryland Baltimore County.&lt;br /&gt;
&lt;br /&gt;
Virtually Mr. Ziring’s entire government career has been based in the NSA Information Assurance Directorate. He joined NSA in late 1988, working on software tools and cryptosystem simulation.  In the 1990s he began working in IA Evaluations and, except for brief tours, has been there ever since. From 2003 to 2005 he held the position of technical director for the IA Evaluations System and Network Attack Center (SNAC).  Between 2006 and 2010 he was detailed to the NSA Mission Systems Development group as the security architect.&lt;br /&gt;
&lt;br /&gt;
Mr. Ziring is maintains his Cisco Certified Security Professional (CCSP) certificates. Prior to joining NSA, Mr. Ziring was a member of technical staff at AT&amp;amp;T Bell Laboratories.&lt;br /&gt;
In addition to work, Neal enjoys martial arts, running, and playing classical guitar. He holds a 3rd degree black belt in Shorinji Kempo.&lt;br /&gt;
 | style=&amp;quot;width: 200px; |&lt;br /&gt;
 | [[Image:SnowFROC2013_Ziring.png|160px|alt=Neal Ziring|right]]&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Karen Blakemore</name></author>	</entry>

	</feed>