Industry & Media Highlights


Television
’15 RSA TV Interview: “RSA TV Interview”
’14 Television Interview: “Tips to Protect Your Personal Information This Holiday”
’14 Television Interview: “Holidays are prime season for cyber attacks”

Industry Volunteering
’11-Present: Body of Knowledge Developer & Exam Writer for the (ISC)² CISSP, CSSLP, ISSMP & CCFP certifications
’14-15: Founding Member- (ISC)2 Application Security Advisory Council
’08-’10 Board of Directors for ISSA Space Coast FL Chapter

Presentations
’17 Cisco Live US! – Designing for Scale to Enhance Defense, Detection, and Response
’17 Information Security Forum for Texas – Embedding IR into the DNA of the Business
’17 SFISSA Conference- Designing for Scale to Enhance Defense, Detection, and Response
’17 RSA (Cisco Booth) – Objectifying Cyber Intel Indicators
’17 RSA (Cisco Booth) – Embedding IR into the DNA of the Business
’16 (ISC)2 Congress – Embedding IR Into the DNA of the Business
’16 BlackHat (Cisco Booth) – IR: Missed Fundamentals from Thousands of Incidents
’16 RSA (Cisco Booth) – IR Demystified
’16 Cisco Webinar – Solving the Attack Puzzle
’15 Cyber Security Incident Response Conference: Invited Speaker
’15 ArchC0n: Invited Speaker – Embedding IR Into the DNA of the Business
’15 BlackHat (Cisco Booth): Demystifying Incident Response
’15 BSides NOLA: Embedding IR Into the DNA of the Business
’15 Dark Reading Interop: Understanding Targeted Attacks
’15 RSA Conference: POSitively under Fire: What are Retailers Facing?
’15 RSA Conference: Effective Incident Response from the Front Lines
’14 Gartner IT Symposium – Panel: “Incident Response from the Front Lines”
’14 Webinar: “Incident Response, How to Prepare”
’13 RVASec Richmond – Presentation: “Fortune 50 Intel & Incident Response”
’13 SANS Cyber Guardian Baltimore – Presentation: “Fortune 50 Intel & Incident Response”
’13 National Academies – Industry Panel: “Professionalizing the Nation’s Cybersecurity Workforce”
’13 Defense Industrial Base (DIB) Technical Exchange – Presentation: “3rd Party Forensics”
’13 Security Leaders Industry meeting – Presentation: “Incident Response Thoughts”
’11 Michigan InfraGard Fall Conference – Presentation: “Fortune 50 Incident Response”

Articles
’16 CSO Online: “Data Leaks Evolving Into Weapons of Business Destruction”
’16 CSO Online: “Why you shouldn’t pay the ransomware fee”
’16 SC Magazine: “Cybercrime for sale”
’16 CSO Online: “Does a Data Breach Really Affect Your Firms Reputation?”
’15 Business Insider: “Oracle CSO gaffe turned into funny meme”
’15 Security Magazine: “The High-Stakes Game of Cybersecurity Awareness Training”
’15 SC UK Magazine: “Why your IR team should be more like Scooby Doo”
’15 Techopedia: Security: Top Twitter Influencers to Follow
’15 CSO Online: “Who ‘owns’ an investigation into a security breach?”
’15 Wall Street Journal (WSJ): “CIOs Eye Obama Cybersecurity Push”
’15 SC UK Magazine: “US government to create cyber-intelligence agency”
’15 Network World: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 CIO.com Australia: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 CIO.com: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 TechWorld: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 PC Advisor UK: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 CSO.com Australia: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 IT World: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 Computer World: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’15 IT News: “Anthem Hack Personal Data Stolen Sells for 10x Price of Stolen CC Numbers”
’14 SC Magazine UK: “German iron plant hit by APT attack”
’14 Dark Reading Editorial: “Leveraging the Kill Chain for Awesome”
’14 SC Magazine UK: “FBI raids house of ‘2nd Snowden'”
’14 Dark Reading: “Incident Response Fail”
’14 Press Release: “(ISC)² Establishes New Application Security Advisory Council”
’14 Dark Reading: “What Not to Do in a Cyberattack”
’14 Dark Reading: “Incident Response now Shaping Security Operations”

Radio
’14 Simi Sara Radio Show: “Discussing Sony & LizardSquad”
’14 Simi Sara Radio Show: “Discussing the Sony Hack”

Magazine
’16 Health Management Technology: “A Patient’s Perspective on Ransomware”
’14 T3 Magazine Mexico: “Security In the Cloud”

Leave a Comment

Your email address will not be published. Required fields are marked *