George Kamis - Trusted Computer Solutions
Chief Technology Officer
Speaking Topic: System Administrators: Security Challenges and Best Practices Locking Down Linux

George Kamis is Chief Technology Officer (CTO) for Trusted Computer Solutions (TCS). In this position, Kamis works closely with Information Assurance industry leaders, government Executives, and the TCS executive management team to help guide TCS’ long-term technology strategy and keep it aligned with industry requirements. Prior to assuming his role as CTO in the fall of 2006, Kamis served as Vice President of Engineering at TCS for the past ten years. In this role he held a wide range of roles and responsibilities, including project and program management, strategic planning, product development, proposal generation, system design and development, testing, installation, configuration and control, and certification and accreditation (C&A) support.

Kamis has over 20 years of operational and management expertise in secure systems engineering. Prior to joining Trusted Computer Solutions, he served at the U.S. Naval Research Laboratory for the Center for High Assurance Computer Systems where he was the principal investigator for multiple Information and Communication Security related programs. Kamis holds active memberships in both the Institute of Electrical and Electronics Engineers (IEEE) and Armed Forces Communications and Electronics Association (AFCEA).


Operating system (OS) security is a priority for system administrators, but most agree that it is not easy. As Linux adoption continues to increase, many system administrators still don’t have the experience in locking down the machines as it can be time consuming and difficult. The process known as system lock down or system hardening can vary from one OS to another. Operating systems are not shipped with secure default configurations because that would make them difficult to install and that means system lock down needs to be done after the installation of the OS. Attendees will learn best practices for locking down Linux systems in Windows environments, as well as basic system-hardening techniques administrators can not afford to miss.