Dr. Berny Goodheart

Manager, Lab Programs, PCI Security Standards Council

Dr. Goodheart is a computer scientist and author. He is best known for his books about Internet and Unix technologies. He started working with Unix in 1977 for Root Computers and Digitus. In 1987 he emigrated to Australia and initially worked for NEC before moving to Tandem Computers where he remained for 14 years during its merger with Compaq and then Hewlett-Packard. He returned to Britain in 1996. His most notable achievement upon his return was at Sun Microsystems where he was Project Manager and Chief Technical Architect for project Janus: an in-kernel Linux binary emulation and compatibility layer for Solaris 10 x 86 and AMD64 which has since appeared in OpenSolaris. He has also developed Ultra Density Optical disk based file systems on Linux-based servers for Plasmon and was the technical architect behind the Seagate Object-based Storage Device design. In 2005 he co-founded Secure Electrans Ltd and as CTO, developed a PCI compliant POI device for accepting utility payments in the home. He then took up position at Huawei as Director of R&D for mobile and tablet devices based in Helsinki and during his tenure was a member of the ARM Linaro technical steering Committee. He was awarded an Honorary Doctorate in the discipline of Computer Science by Associate Professor John Lions, University of New South Wales, Australia, for his work The Magic Garden Explained, The Internals of Unix System V Release 4 (1995) which, among other things outlines the history of Unix and its Australian connection. In 2015 he was hired by the PCI SSC as a subject matter expert in mobile and PCI PTS POI standards. He is currently a member of the PCI PTS POI device report review team.

Dr. Berny Goodheart's Events

Current Cyber Threat Landscape

Date: Thursday, 20 October

Track One

Presented by: Dr. Berny Goodheart, Manager, Lab Programs, PCI Security Standards Council

This session will inform security professionals about some of the current threats and a review of the latest cyber threats currently being tracked in the Cyber Community. We will discuss, the provenance surrounding new threats, what to look out for, and examples of new age of ransomware and how phishing attacks are evolving.