Survival Guide: Ron Rubens, CFO and COO, Intense School

Intense School

8211 W. Broward Blvd., Suite 210

Fort Lauderdale, Fla. 33324

(800) 330-1446

www.intenseschool.com


  • Intense School provides accelerated certification boot camps for computer professionals. It holds boot camps offering certification in Microsoft, Cisco, CompTIA, Linux and systems security. It also performs onsite training for businesses.

  • Intense School services are offered on the General Services Administration Schedule 70. Its contract is GS-35F-0782J, and it offers training for federal, state and local government clients.

Ron Rubens, CFO and COO of the Intense School

Henrik G. de Gyor

When hackers go bad, they bust into your Web site and wreak havoc. But when they go good ... they may very well come from Intense School, a Fort Lauderdale, Fla., company that took part in the recent FOSE trade show. Among the certifications and education it offers, the IT company trains professional hackers -- computer criminals gone good, so to speak -- who are paid to break into their own employers' Web sites or networks to test how secure they are.

The company, which also offers certification in assorted computer systems and securities, uses a boot-camp method of teaching that brings people up to speed in a short amount of time. Learning to be a pro hacker, for instance, takes about seven days. The boot camp trainers -- former system engineers, administrators, technical trainers and writers -- developed the classes to get people proficient in the various cyberevils.

"Security is education," said Ron Rubens, the company's chief financial officer and chief operating officer, naming the National Security Agency and the departments of Defense and Energy as some of the federal agencies it's now involved with. Rubens talked to Managing Editor Evamarie Socha about the world of hacking.

WT: Why do hackers hack?

Rubens: Probably the No. 1 reason is to show off to their peers. There are some that actually do it for malicious reasons, targeting a bigger company for malicious purposes.

WT: Is most hacking malicious?

Rubens: For most companies that are secure, a small hack can do almost no damage but alert [the company] so it can prevent it. If companies are secure, people are going to try to get in, and some people do get in.

But if they set up their security properly, [the hackers] won't be able to do anything once they're there, and the system will be shut down immediately.

WT: What makes one a good target? What do hackers look for?

Rubens: The bigger the company or the more perceptively secure they should be, the higher the target. That's just my opinion.

WT: Can a hacker find system soft spots?

Rubens: It's very easy for them to do a quick scan to see if there are vulnerabilities. And that is the kind of things that are taught in our classes: how to go out and scan yourself to see what vulnerabilities you're exposing to the world, such as wireless.

So many companies have wireless networks that are so vulnerable; those are often easy doorways into companies.

WT: Is the federal government considered a good hacking target?

Rubens: I would say yes. If I were a hacker, I'd probably want to hack the biggest thing I could, the biggest thing that's going to make my hacker buddies proud of me.

WT: Once hacked, how likely is a system to fall victim again?

Rubens: If a company is hacked, and doesn't do a lot of things to protect themselves again, they're a likely target. Often, hackers will leave little things there to enable them to get in easier next time. If those things are undetected, well, then [the company or agency is] just leaving its door open.

WT: Once hacked, what is the first thing a company should do?

Rubens: Immediately shut down the doorway or whatever vulnerability [the hacker] used to get in. Then fix the problem and make sure all other vulnerabilities are fixed. [Look at] the recent SQL virus that did so much damage; to my understanding the patch for it came out a month after the vulnerability was found. Everyone who was damaged from that virus was simply IT departments that didn't buy a patch that was there to plug the dam.

WT: Are there ways to make yourself hackerproof?

Rubens: Security is education. And educating everyone in the company and having a real security policy that encompasses physical security, how you talk to customers, as well as IT. Security is not just about a firewall. That paves the way to be as safe as possible, but I don't think that anyone can be hackerproof if they talk to someone in the outside world or allow access to the outside world.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Our databases track awards back to 2013. Read More

  • Navigating the trends and issues of 2016 Nick Wakeman

    In our latest WT Insider Report, we pull together our best advice, insights and reporting on the trends and issues that will shape the market in 2016 and beyond. Read More

contracts DB

Washington Technology Daily

Sign up for our newsletter.

I agree to this site's Privacy Policy.