Avatar

Panos Kampanakis

Product Manager

Security & Trust Organization

Panos Kampanakis was born in Athens, Greece. He received his first degree on Electrical and Computer engineering from National Technical University of Athens. He received his MSc from NC State University. His thesis was on efficient elliptic curve cryptography and bilinear pairing on sensor networks.

He has extensive experience on cryptography, security automation, vulnerability management and cyber security. In his professional career, Panos has supported and provided security advice to multiple Cisco customers. He has trained and presented on various security topics at Cisco Live for numerous years. He has co-authored Cisco Press books, various standards and research publications. He has participated in various security standards bodies to provide common interoperable protocols and languages for security information sharing, cryptography and PKI. Previously he had worked extensively with Cisco's PSIRT to provide vulnerability mitigations. His current interests include next-generation cryptography, post-quantum cryptography, participation in standards efforts that enable cryptographic implementation interoperability and IoT security.

Articles

December 2, 2014

SECURITY

Step-by-Step Setup of ELK for NetFlow Analytics

Contents   Intro Java Elasticsearch Logstash Kibana   Intro   The ELK stack is a set of analytics tools. Its initials represent Elasticsearch, Logstash and Kibana. Elasticsearch is a flexible and powerful open source, distributed, real-time search and analytics engine. Logstash is a…

April 9, 2014

SECURITY

OpenSSL Heartbleed vulnerability CVE-2014-0160 – Cisco products and mitigations

*** UPDATED 15-April 2014  *** By now, almost everyone has heard of the OpenSSL Heartbleed vulnerability with CVE id CVE-2014-0160. The vulnerability has to do with the implementation of the TLS heartbeat extension (RFC6520) and could allow secret key or private information leakage in TLS encrypted…

April 5, 2013

SECURITY

Cross-Site Request Forgery Attacks and Mitigations

Cross-Site Request Forgery (CSRF) attacks: there are already enough articles out there that can explain what a CSRF attack is and provide potential examples. There are also plenty of security alerts that have been released by various vendors whose products are affected by CSRF-related vulnerabilitie…

February 11, 2013

SECURITY

Cisco Live London 2013: IPv6 Security Lab Recap

Last week my colleagues and I were excited to deliver a 4-hour lab on IPv6 Security at Cisco Live London 2013. The training enabled students to correctly identify, classify, and deter or prevent the nefarious IPv6-specific behaviors. They did so by configuring network threat defense, countermeasures…