Continuing Education

2018 Continuing Education – SANS

 Cyber Threat Intelligence in Security Operations

Owner’s Take on Tackling ICS Cybersecurity Challenges

Over Exposed and being Phished? Stop Sophisticated Attacks 

How to achieve autonomous hunting and detection

Breach Avoidance: Yes, You Can!

4 Techniques to Modernize Your DDoS Defenses 

Building Successful Awareness

Intro to Smart Contract Security 

Managing vulnerabilities with the PIACT process 

Collecting OSINT: Grabbing Your Data Now to Use Later 

PowerShell for PenTesting

Fundamentals of Security Operations

Cloud Security Visibility: Establishing security

No tool fits all – Why Building a solid Toolbox Matters

Forensics and Incident Response in Containers

Putting Out the Fire: Improving SecOps Retention

Diffuse Cryptojacking & Ransomware Attacks with a Sandbox

EnCase Forensic 8: A SANS Analyst Program Review

High Fidelity Alerts: Context for your context

Threat Intelligence Naming Conventions

2018's Biggest Bugs and How to Beat Them

PCAP Command-Line Madness

10 Tips for Effective Modern Day Endpoint Protection

Improve your defenses and response capabilities

Sharpen Your Threat Hunting Capabilities

LabMD: The Phony Data Breach

Updates to SEC599

So, You Wanna Be a Pen Tester? 3 Paths to Consider

Software Defined Radio for Penetration Testing and Analysis

Reclaim Your Freedom to Safely Access the Web

Blueprint for prioritizing efforts and finding the right solution

Fighting Cybercrime with Artificial Intelligence

Catching attackers living off the land

Anatomy of the TRITON ICS Cyberattack

Java on the Server? What Could Possibly Go wrong?

Exploring Registry Explorer

Real-time Incident Remediation

How hackers run circles around our defenses.

Moving Antivirus Security to the Cloud

How to write malware that evades detection

Success Factors for Identity When Moving to the Cloud Open Source Path to Automating Compliance

GDPR - What You Don't Know Can Hurt You

Maintaining Data Protection and Privacy after GDPR Implementation

Giving Back and Closing the Gender Gap in Technology

2018 Continuing Education – ISACA

Ways TO Defeat Two-Factor Authentication

Open Source Path to Automating Compliance

GDPR - What You Don't Know Can Hurt You

Data Protection and Privacy after GDPR Implementation

Giving Back and Closing the Gender Gap in Technology

2017 Continuing Education – SANS

- Security into IT & App Infrastructures

 - Multi-Container Research Environments

- Risk-based privilege management

- Effective Defense Against Insider Threat

- Win the Cyberwar With Zero Trust

- Windows Forensics Course: Windows 10

- Analysis Tactics: The New Forensics Poster

- Cloud Security Monitoring

- Bridging the O 365 Security Gap with CASB

- PowerShell Proxy

- NSS Labs NGFW Test

- Efficiently Contain Threats and Ease Operations

- Endpoint Detection and Response

- 2017 State of Security Operations and What\'s Being Done!

- Attack Attribution: It’s Complicated

- Threat Hunting - Modernizing Detection Operations

- Smartphone Forensics

- Malware Abuses Legitimate Services for Communications

- Impact of Isolated Cyber Security Functions

- AI to Minimize Your Cybersecurity Attack

- Real-World State of Security Operations in 2017

- Real Steps to Build a Threat Intelligence Framework

- Protection with Total Endpoint Protection

- Communicating to CEOs and Boards of Directors

- Exploring the Unknown ICS Threat Landscape

- AFF4: The New Standard in Forensic Image Format- Bring some trickery to fight Advanced Persistent Threats

- Protect your infrastructure against DNS attacks

- Protecting Business Mobility Against Emerging Threats

- Cybersecurity Trends to Increase Security Webcast

- Threat Hunting with Indicators:

- Cyber Threat Intelligence in Action - Social Engineering in Physical Security Assessments

- 3 Cs of Security Awareness

-Mimecast Targeted Threat Protection

-Don’t get marooned on Analytic Islands -Stop Threats in their Tracks- An Introduction to Advanced Malware Protection

-Implementing and Maintaining an Approach in the Cloud

-Introducing the NEW SANS Pen Test Poster - White Board of Awesome Command Line Kung-Fu

-2017 Cloud Security and Risk Benchmarks 

-Next generation analysts for next generation threats - lessons from deploying best practices to hundreds of SOC teams!

-Practical Application of Threat Intel for Network Defenders

-Using Cisco Stealth watch to Increase Security By Enhancing Critical Security Control Performance

2017 Continuing Education – ISACA

- North America CACS 2017 Conference

- The Dark Web - a Threat to Your Business

- Major Data Breaches with Threat Lifecycle Management

-Stability, Agility, and The Capable Organization

-Solving Business Problems with COBIT 5

 

2016 Continuing Education – SANS

- How a Managed Bug Bounty Program - SANS 2016

- Criteria for Hardware-Based Encryption - SANS 2016

- Conquering all Stages of the Attack Lifecycle - SANS 2016

- SANS 2016 ICS Survey - SANS 2016

- Bridging the Insurance/InfoSec Gap - SANS 2016

- PIM/PAM in Today’s Infosec - SANS 2016

- Incident Response Capabilities in 2016 - SANS 2016

- How to Negotiate a Cyber Insurance Policy - SANS 2016

- Scapy and Snort, Packet PB & J - SANS 2016

- Practical and Open Source Threat Intelligence - SANS 2016

- Stopping CEO Fraud - SANS 2016

- Managing Applications Securely - SANS 2016

- Overcome Privilege Management Obstacles - SANS 2016

- DNS Evidence - SANS 2016

- Cyber threats: Methodologies and Tools - SANS 2016

- Cyber threats: Threat Hunting 101 - SANS 2016

- Threat Hunting Methodologies and Tools - SANS 2016

- Threat Hunting 101 - SANS 2016

- Mobile forensics tool - SANS 2016

- Gamification of a Fortune 20 SOC - SANS 2016

- Mapping Attack Infrastructure - SANS 2016

- Evolving cyber Gatherers to cyber Hunters  - SANS 2016

- Security Awareness Report Key Findings - SANS 2016

 -Preparing for the Inevitable Cyber Breach - SANS 2016

- Mobile Data Loss – Threats/Countermeasures - SANS 2016

- Facilitating Fluffy Forensics - SANS 2016

- Enable inspecting TLS/SSL traffic - SANS 2016

- Compliance and Detecting Suspicious Activity - SANS 2016

- Benchmarking AppSec -  SANS 2016

- Managing Your Top Seven Human Risks - SANS 2016

- Cyber Investigations Law, Ethics & Evidence - SANS 2016

- Securing Mobile Data and Devices - SANS 2016

- Communicating to CEOs& Directors - SANS 2016

- Security Leadership: Strategies for Success - SANS - 2016

- IT Security Spending Strategies – SANS - 2016

- Threat Hunting - SANS 2016

- Application Security -  SANS 2016

- Enhance ICS Security - SANS 2016

- Critical Controls - SANS - 2016

- Threat Intelligence Awakens - SANS 2016

- Web API Security -  SANS 2016

- Security in Windows 10 and Server 2016 - SANS 2016

- Threat Intelligence - SANS 2016

- Incident Response with Behavioral Analysis - SANS 2016

- The Art of Risk Mitigation - SANS 2016

- Human Factor in the Age of Cyber Conflict - SANS 2016

- High-Impact SOC Rollout - SANS 2016

- Most Common Human Incidents - SANS 2016

- Holistic Network Visibility - SANS 2016

- Prioritizing the CIS Critical Controls for ICS - SANS 2016

- Intro to SDR Projects - SANS 2016

- Incident Response with Behavioral Analytics - SANS 2016

- The State of Vulnerability Discovery - SANS 2016

- Incidents, Risks and Preparedness - SANS 2016

- Security in Windows Server 2016 - SANS 2016

- Real Time Threat Hunting Using Passive DNS - SANS 2016

- SOC: In-house vs. Out-Sourcing - SANS 2016

- Financial Services Security Vendor Briefing - SANS 2016

- Office 365 Security & Risk Benchmarks - SANS 2016

- Your Threat Intelligence Program - SANS 2016

- Proactive Cyber Hunting Approach - SANS 2016

- Europe Threat Survey Report - SANS 2016

- ICS Cybersecurity Into Water Utility Planning - SANS 2016

- Credit Union Detected LAN Turtle Attacks - SANS 2016

- Threat Intelligence Vendor Briefing - SANS 2016

- Threat Landscape Survey Report - SANS 2016

- Health Care Security - SANA 2016

- Incident or Breach? - SANS 2016

- Layered Security Strategies Don't Work - SANS 2016

- Ransomware Dominating  Threat Landscape  - SANS 2016

2016 Continuing Education – ISACA

- Security in the Cloud - ISACA 2016

- Protecting the Software Defined Data Center - ISACA 2016

- EU Regulation’s Impact on Cyber Security - ISACA 2016

- Developing Robust Trojan Defenses - ISACA 2016

- Learning Defends Against Zero-Day Threats - ISACA 2016

- The State of Cybersecurity - ISACA 2016

- GDPR Will Mean to Global Businesses- ISACA 2016

- Economics of Cyber Attacks - ISACA 2016

- Effective Breach Investigations - ISACA 2016

- Assessing Cyber Risk Appetite - ISACA 2016

- Cybersecurity Evolves - ISACA 2016

- SSH Keys: Access Out of Control - ISACA 2016

- Pragmatic Networking - ISACA 2016

- Auditors Need to Know About Cyber Security - ISACA 2016

- 2016 Data Protection Benchmark Study - ISACA 2016

- Effective Third-Party Risk Assessment - ISACA 2016

- Convergence and Industrial Cybersecurity - ISACA 2016

- Protect Yourself World with No Parameters -  ISACA 2016

- Building a Road to GRC Maturity - ISACA 2016

- The Inverted Cloud of Operability - ISACA 2016

 

Continuing Education – ISACA and SANS

 

- Partnering with a Cyber Security Vendor - SANS 2015

- Predicting Cyber Security Trends - SANS 2015

- Third-Party Risk Management - ISACA 2015

- AML and BSA: Overcoming the Challenges - IIA 2015

- Leveraging Network Intelligence - SANS 2015

- Certifications that Matter - SANS 2015

- Compliance does not equal security - SANS 2015

- Monitor Third Party Cybersecurity - SANS 2015

- Cyber Centric Enterprise Dynamic Security- ISACA 2015

- Encrypting Managing Those Keys - ISACA 2015

- Security Awareness Programs - SANS 2015

- Hacked, or Human Error - SANS 2015

- ICS Cybersecurity - SANS 2015

- Network Attack Methods - ISACA 2015

- State of Cybersecurity - ISACA 2015

- Securing Data in age of  Mega Breaches - ISACA 2015

- Securing Smart Devices - ISACA 2015

- Crack the Code - ISACA 2015

- Full Circle Threat Management - ISACA 2015

- COBIT 5 for Business Benefits – ISACA 2015

- Third-Party Information Security – ISACA 2015

- Requirements in Access Management – ISACA 2015

- Cyber Threats Thru Security Intelligence – ISACA 2015

- Data Breaches MISS detection – ISACA 2015

- Advances in Android and iOS Attack – ISACA 2015

- Cybersecurity Share Information – ISACA 2015

- Auditing VoIP Networks – ISACA 2015

- Harsh Reality of Cyber Protection – ISACA 2015

- Auditing VoIP Networks – ISACA 2015

- Cybersecurity in e-governance – ISACA 2015

- Collaborating, Communicating – ISACA 2014

- Security for a Maturing Cloud – ISACA 2014

- Cybersecurity workforce – ISACA 2014

- Cybersecurity - IBAT 2014

- CobiT 5 – ISACA

- Mobile Security, ISACA 2014

- North America CASA Conference 2014 – ISACA

- Cybersecurity, ISACA 2014

- 2013 State of Cybercrime Today - Threats and Solutions

- 2013 IBAT Annual Conference

- Real Estate Broker (State of Missouri, 1982-89)

- Securities Salesman (NASDA, 1984-86)

- 2013 ISACA Managing and securing the mobile onslaught

- North America CASA Conference 2013 - ISACA

- TechMeca IBAT Conference, 2013

- Speaker at the annual ABA Compliance Conference

- Speaker at the annual conference for Credit Union Directors

- ICBA’s Community Bank Technology Conference, 2012

- Controls for Cyber Defense, ISACA 2014

- Providing Security from Cyber threats, ISACA 2012

- TechMeca IBAT Conference, 2012

- Information Security Conference, ISACA 2011

- ISACA - Security Management in the Cloud – 2011

- Securing and Audit Your Virtual Environment, ISACA 2011

- North America CASA Conference 2011 - ISACA

(Cloud and virtual machine auditing)

- TechMeca Conference, 2011

- IS Security & Risk Management Conference, ISACA: 2010

- Using Risk Based Approach – ISACA 2015

- Manage, monitor, & audit mobile users – ISACA 2015

- Data Protection and Privacy – ISACA 2015

- TechMeca Conference, 2010

- IS & Risk Management Conference, ISACA: 2009

- Network Security Conference, ISACA: 2008

- North America CASA Conference 2008 - ISACA

- Network Security Conference, ISACA: 2007

- North America CASA Conference 2007 - ISACA

- ISACA: 2007 – Update on CobiT

- ISACA: 2007 – Security Access Management

- Network Security Conference, ISACA: 2006

- ICBA Tech World, 2006

- TechMeca Conference, 2006

- Technology in Banking, TBA 2006

- Network Security Conference, ISACA: 2005

- North America CASA Conference 2005 - ISACA

- Network Security Conference, ISACA: 2004

-  ISACA - Key Tools to Network Security 2004

- Enterprise Network Security 2004

- Network Security Conference, ISACA: 2003

- Information Security Conference, OTS: 2002

- Auditing IT Security, ISACA: 2001

- Governor's Leadership Program: 1993-96

- Tom Hopkins' Sales Course: 1982

- Bank Examination School, Instructor's School, FDIC, Washington, D. C.: 1979

- LSU School of Banking of the South, Class - 1978

- EDP Examinations - CSBS, University of Chicago: 1973

- Meramec Junior College, Kirkwood, Missouri: 1971-72

- University of Missouri, Columbia: 1964-66

- Numerous courses with the ABA since 1964