Brian Dykstra CISSP, CCFP
President & CEO
Mr. Dykstra has over 19 years experience in investigations, computer forensics, incident response, network and wireless security testing and information security. Mr. Dykstra was previously the CIO and Director of Professional Education at Mandiant, Inc. where he was responsible for the development and management of numerous advanced computer security and cybercrime investigation courses.
Before founding Atlantic Data Forensics (formerly Jones Dykstra and Associates, Inc.), Mr. Dykstra was the CIO & Director of Professional Education and a founding member of Mandiant, where he was responsible for the development and management of numerous advanced computer security and cybercrime investigation courses. While at Mandiant, Mr. Dykstra annually trained over 400 FBI Cyber Crime agents as well as many state and local investigators through a series of highly acclaimed cybercrime investigation courses. As Mandiant’s Chief Information Officer (CIO), Mr. Dykstra was also responsible for all planning, budgeting, implementation and security of the corporate information infrastructure. Prior to becoming a co-founder of Mandiant (formerly known as Red Cliff Consulting, LLC), Mr. Dykstra was a Senior Program Manager at Communications Technologies where he led commercialization efforts of computer security and managed services business groups; supervised the secure remote management of UNIX and Windows customer and network systems, and provided technical oversight for business development efforts and technical assistance to commercial and government sales groups. An enabling factor was his prior experience as the Senior Director of Managed Services at Apex Digital Services and Viaken Systems, Inc. where he managed scientific research networks worth over $9 million, and designed and implemented a Network Operations Center (NOC) and scientific computing system staging area valued over $3 million.
Prior to employment at Apex/Viaken, Mr. Dykstra was the Director of Technical Operations at Sytex, Inc where he co-developed a two-week computer intrusion response course for the Federal Bureau of Investigation. Not only did Mr. Dykstra teach on-site at the FBI Academy at Quantico for over one year where he trained hundreds of FBI Special Agents in computer crime investigations, he has also trained hundreds of students from the United States Air Force, State Department, Central Intelligence Agency and of Office of the Inspector General in computer crime, intelligence analysis and criminal investigations. He also received a Letter of Appreciation from the Director of the Federal Bureau of Investigation for investigative support to the international network intrusion investigation known as “Moonlight Maze”. Prior to joining SYTEX, Mr. Dykstra was a Counterintelligence Special Agent with the United States Army’s Military Intelligence Branch where he specialized in investigations and operations, to include information warfare and Technical Surveillance Counter Measures.
Mr. Dykstra holds Bachelor of Science (Summa Cum Laude) in Information Technology and Master of Science in Information Technology from Capella University. He has also earned and maintains several certifications to include the Certified Information Systems Security Professional (CISSP), Information Systems Security Management Professional (CISSP-ISSMP), Information Systems Security Architecture Professional (CISSP-ISSAP), and Certified Information Forensics Investigator (CIFI).
PROFESSIONAL EXPERIENCE TIMELINE
2007 – Present President & CEO
Atlantic Data Forensics, Columbia, MD
A specialized services company that provides Digital Forensics, E-Discovery, Expert Witness, and Cybercrime services to corporate and government clients.
2004 & 2007 CIO & Director
Professional Education Mandiant, Inc., Alexandria, VA
Managed the Professional Education service line. Responsible for the development and management of ten different advanced computer security and digital investigation courses. Personally trained over 600 FBI Cyber Crime Special Agents and corporate computer crime investigators.
As Mandiant’s CIO, responsible for all planning, budgeting, implementation and security of the corporate information infrastructure. Developed a bootable CD-ROM Linux distribution for computer incident response, network testing, wireless testing and computer forensics
2003 – 2004 Senior Program Manager
Communication Technologies, Inc., Chantilly, VA
Led the commercialization of Comtek’s telecommunications, computer security and managed services business groups. Supervised the secure remote management of customer systems (UNIX and Windows) and network systems. Provided technical oversight for business development efforts and technical assistance to commercial and government sales groups
2000 – 2003 Senior Director of Managed Services
Viaken Systems, Inc. / Apex Digital Services, LLC Gaithersburg and Silver Springs, MD
Managed over $9 million of scientific research networks for Apex customer and scientific users. Designed and built the Center for Excellence in Bioinformatics for the Center for Computational Research, SUNY Buffalo. Designed and built the Institute of Bioinformatics for the Genetics Department of the University of Georgia. Established multi-vendor partnerships to integrate Viaken’s services with products from companies such as Sun Microsystems, Hewlett-Packard, IBM, Oracle, Platform Computing, Scyld Computing, Informax, Accelrys, MDL, Chemical Computing Group, Spotfire, Lion Biosciences, Microway Systems, Dell Computers and others. Designed and built a $3 million Network Operations Center (NOC) and scientific computing system staging area.
1996 – 2000 Director of Technical Operations
Sytex, Inc, Columbia, MD
Co-Developed a two-week computer intrusion response course for the Federal Bureau of Investigation. Trained over 400 FBI agents specializing in computer intrusion investigations and analysis. Taught on- site at the FBI Academy at Quantico for over 1 year. Personally trained over 100 FBI agents in advanced computer intrusion investigations. Trained over 200 Air Force, State Department, CIA, and the Office of the Inspector General's (OIG) computer crime intelligence analysts and criminal investigators. Worked with the FBI’s National Infrastructure Protection Center on special network intrusion cases.
1995 – 1996 Technical Surveillance Countermeasures Special Agent
United States Army, 902d Military Intelligence Gp, Ft. Meade, MD
Responsible for the coordination, logistics and conduct of Technical Surveillance Countermeasure (TSCM) operations throughout Bosnia, Croatia, Hungary, and Italy for the IFOR Commander. Developed new methodologies, procedures and equipment for the conduct of TSCM operations in a tactical NATO environment. Responsible for training tactical TSCM agents from the US Marine Corps, US State Department and US Army. Credited by CIA intelligence analysts with having identified the only credible proof of intelligence collection on US forces within the Bosnian theatre of operation. Pioneered use of Internet technology to support Information Warfare operations, investigations, and training. Provided hands-on Information Warfare and Network Security instruction to students from Army Intelligence, Navy Intelligence, Air Force Office of Special Investigations, NSA and Defense Intelligence Agency
1987 – 1995 Counterintelligence Special Agent
United States Army, Various locations world-wide
Conducted counterintelligence operations and investigations throughout the Middle East. Responsible for completely automating the way the US Army managed Sensitive Compartmented Information (SCI) contracts, facilities, and personnel. Monitored and managed DoD SCI contracts for over 120 defense contractors from Kansas to Korea.
Expert Testimony, Indemnity Insurance Corporation RRG v. The Georgetown Bibliotheque, Inc., et al., Case No. 2011 CA 001601 B Consolidated with 2009 CA 007540B, Superior Court of the District of Columbia Civil Division, October 2012
Expert Testimony, Barry C. Curtis v. George Ray Brown, Jr., et al GRB Development, LLC, Case No. C- 07-071587 CN, Circuit Court for Howard County, Maryland, April 2009
Department of Defense TOP SECRET security clearance
PUBLICATIONS & MEDIA:
Riley, M. & Elgin, B., May 2013, “China’s Cyberspies Outwit Model for Bond’s Q”, Bloomberg, Visit Site
“Facebook and the FBI”, Business Edition, British Broadcasting Company, BBC World News, Washington, D.C., Dec 2012
Germain, J.M., Dec 2008; “Suckers for Spam: When Will They Ever Learn?”, E-Commerce Times; Visit Site
Ecker, K. Dec 2008, “Big Phish”, 12/1/08 issue of Inside Counsel magazine, Visit Site
Ecker, K. Nov 2008, “Tech-Assisted Decisions”, 11/1/08 issue of Inside Counsel magazine, Visit Site
Dykstra, B. Oct 2008, “Practice Online Social Networking Safety”, Law.com, Visit Site
Gaudin, S. Sep 2008, “Software holding back spread of multicore chips”, ComputerWorld, Visit Site
Tynan, D. Sep 2008, “Angry IT workers: A ticking time bomb?”, Infoworld.com, Visit Site
Dykstra, B. Aug 2008, “Top Ten Ways to Protect Your Corporation (or Corporate Legal Department) from Data Security Threats”, ACC.com
Jones, K. & Dykstra, B. Aug-Sep 2008, “Do’s and Don’ts of Wireless and Mobile Security”, Secure PC Magazine, pg. 38-42
Jones, K. & Dykstra, B. July 2008, “Black Hat 2008 Aftermath”, Law.com, Visit Site
Dykstra, B. & Jones, K. July 2008, “Legal Tracks on Black Hat Briefings”, Law.com, Visit Site
Kooser, A. Mar 2008, “Storage Smarts”, Entrepreneur Magazine, March 2008, pg. 28, Visit Site
Gaudin, S. Apr 2007, “5 Cheap But Effective Tips to Improve Security”, InformationWeek.com, Visit Site
“Cyber Security for Small Business Owners”, The Jeffrey Group at Morgan Stanley and Howard Bank, February 2013
“E-Discovery with Ease”, Invotex Group, October 2012
“E-Discovery with Ease”, Anne Arundel Bar Association, October 2009
“E-Discovery with Ease”, Maryland Institute for Continuing Professional Education of Lawyers (MICPEL), July 2009
“E-Discovery with Ease”, Dickstein Shapiro, LLP, April 2009
“Selecting and Managing Expert Witnesses”, Strafford Publications E-Discovery & Computer Forensics Teleconference, October 2008
“CyberCrime: Detection, Prevention and Remediation Strategies and Techniques”, The Greater Cincinnati ISACA and IIA Chapters Meeting, October 2008
“Digital Investigations”, Panelist, Open Memory Forensics Working Group, August 2008
“Keeping Your Virtual Environment Secure,” Ziff Davis Enterprise Virtual Tradeshow: Managing Virtualization, April 2008
“Incident Response, 2007 Trends”, General Electric Infrastructure Group, May 2008 “Incident Response, 2007 Trends”, General Electric Internal InfoSec Meeting, May 2008
"Prosecuting Insider Computer Crimes”, Siemens Corporation Internal InfoSec Meeting, March 2008,
“Employees: The First Line of Defense in Data Protection”, Ziff Davis Enterprise Virtual Tradeshow: The Data Protection Dilemma: Keeping Data Accessible and Secure, February 2008,
Advanced Network Investigations and System Exploitation, three-day course for over 400 federal and state law enforcement officers, 2005-2006
Wireless Network Investigations, two-day course for over 400 federal and state law enforcement officers, 2004-2006
Cyber Crime Executive Course, two-day course for FBI Special Agent in Charge (SAC) and Assistant Special Agent in Charge (ASAC), 2005-2006
Network Traffic Analysis, two-day course for over 400 federal and state law enforcement officers, 2005- 2006
Linux for Law Enforcement Officers (LEO), four-day for over 400 federal and state law enforcement officers, 2004-2006
Introduction to Malware Analysis, three-day course for limited groups of federal and state law enforcement officers, 2005-2006
Advanced Incident Response: Determining Functionality of Captured Unknown Binaries, Black Hat USA 2006, Las Vegas, July 2006
Incident Response, three-day course for financial services and insurance clients during 2006
Linux-Based Computer Forensics, three-day course for financial services and consulting clients during 2005
Linux for Law Enforcement Officers (LEO), HTCIA 2005 International Conference and Training Expo, August 2005
Investigating Wireless Network Intrusions Training Part 1 & 2, US CERT Government Forum of Incident Response and Security Teams (GFIRST) Conference, April 2005
Multiple presentations to pharmaceutical and biotechnology CIOs on building and managing secure bioinformatics environments at BioIT World and Drug Discover Technology – 2000 thru 2003
Using the Internet for Intelligence Collection, FBI International Computer Crimes conference in New York City, NY. – 1999
Course developer and instructor for the Department of the Army Computer Crime and Intrusion Fundamentals for Counterintelligence Agents. – 1996
OTHER CERTIFICATIONS & QUALIFICATIONS:
Certified Information Systems Security Professional (CISSP)
Information Systems Security Management Professional (CISSP-ISSMP)
Information Systems Security Architecture Professional (CISSP-ISSAP)
Certified Information Forensics Investigator (CIFI)
Certified Technical Surveillance Countermeasures Special Agent (TSCM)
Counterintelligence Special Agent, Badge Number 2332
HONORS AND AWARDS:
Letter of Appreciation from the Director of the FBI for investigative work on the international “Moonlight Maze” network intrusion investigation.
Received a Joint Meritorious Service Medal for technical intelligence and force protection work for the IFOR Commander.
2012 to Present, Membership Committee Member, The Center Club, Baltimore, Maryland
2011 to Present, League Commissioner for Howard County Wrestling
2009 to Present, Board of Directors for Howard County Wrestling, Vice President for Recreation League Wrestling
2003-2012, Volunteer wrestling coach for Howard County Wrestling
Master of Science Information Technology, Capella University. Concentration in enterprise system security, secure system development and application security testing, 2007
Bachelor of Science (Summa Cum Laude), Information Technology, Capella University. Concentration in project management, risk analysis and development strategy, 2005