I'm currently working for Akamai Technologies. The question is not, "How do we stop people from breaking into our systems," but, "How do we design systems with fewer flaws that attackers can exploit -- and structure development processes to design such systems?"
I ran Pre-Convention for Intercon M in March 2013, a day and a half of panels, talks, and workshops on the subject of LARP-playing and ‑writing, and again for Intercon N in February 2014. (The second time I wrote some software to help.)
I attended MIT as an undergraduate majoring in Computer Science.
Most of the action on this site is happening on the blog lately, so drop by there and check it out.
My personal PGP key has the 64-bit key ID
D8BFBBA3A7EE0B71 with the fingerprint
A218 9FAF 2BF0 501A AF6A 3C41 D8BF BBA3 A7EE 0B71. (Get that assertion delivered over HTTPS.)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The personal PGP key of Kevin Riggle <email@example.com>. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJU4xgSAAoJENi/u6On7gtxywwIAIOEuSj59JJOSp6hMGlDhUy9 lgDDRzEf8Ym80vx/VnUhGufLNTUqq9v51LpOpGMSO6kLXBRILSwUDMz+hCUwKP2J vXpRjAC+UDaFHHvmjom0veXBIi4eSuRAOsLLV4KOkWWIJlS1gZdUHmyfg93OB2fb lV6TF1ROC97onLCOmq0vAe+lz2CYuPGZopqOxAW/b15IgL/VtrJ3giGurx1KoHR7 D5cwqFfb3zox1iyqxi0fBIKnZE1wFvFKglM5F1FZZ+RM1hZ+ahZTWfKgXCyC/3uY WhKw0jN+RVMDLS3blATx45H27PKukZbRd6m0dzLWzFCNR1bYFU38nUYmJhchuI8= =F5aG -----END PGP SIGNATURE-----