Lunch and Speaker 2CPE
Overview:
The industry and the press make every hack out to be the results of super-human feats of geekery, perpetrated by the proverbial “advanced criminal activist”. In this presentation, we will look back on 2022 and highlight some of the most impactful events and draw out their root causes in palatable everyday language. We’ll follow that up by examining these actions and exploring what kind of preparation would be most meaningful for these organizations to have done (and *some* have taken action on). We hope to leave you with a short-list of the most effective audits that can be undertaken by a company to have meaningful positive impact to their security posture.
Learning Objectives:
Professional Experience
Creator, builder and leader of global businesses and highly effective teams, with nearly 2 decades of Information Security experience across all domains of security in support of Fortune 500 companies and government agencies, working throughout numerous international locations. [Ethical] Hacker turned business leader = creative thinker with an entrepreneurial spirit driving the development of multi-million-dollar security practices for both the private and public sector.
Mike has over two decades of experience in Information Security, in operations and consulting positions, helping companies across a variety of industries defend themselves from their cyber adversaries. Mike specializes in offensive security, including penetration testing, red teaming, risk assessment, and application security. Mike’s security career began in the government sector, running the security program for a DOE nuclear weapons facility, where he received numerous awards and accolades. He subsequently joined the state of Colorado as deputy CISO where he served three years working under the state’s first CISO. Most recently, Mike worked with a security startup, building an internal application security program for a cloud-native devops software firm. Prior to that, Mike built out the offensive security capabilities of a well-respected security consultancy, where he worked as a trusted security partner to some of the most well-known technology companies in the world.
past_event