Personal Information
Organization / Workplace
Austin United States
Occupation
Information Security Program Owner
Industry
Technology / Software / Internet
Website
http://www.joshsokol.com
About
My early career was focused around System Administration (Linux and Unix) with an emphasis on web technologies such as web servers, FTP servers, application servers, and databases. That said, Information Security has always been my passion and in early 2010 National Instruments finally gave me the opportunity to become the Information Security Program Owner. Today, I continue to run their security program handling everything from compliance to enterprise risk management to vulnerability management and more; none of which existed prior to me starting the program. I have instructed many different trainings internally and have presented externally at a large number of conferences includi...
Tags
security
austin
mod_proxy
firefox
tamperdata
webscarab
ratproxy
proxies
proxy
query
malware
patterns
network
analytics
data
system
compromised
application
web
owasp
See more
Presentations
(2)Personal Information
Organization / Workplace
Austin United States
Occupation
Information Security Program Owner
Industry
Technology / Software / Internet
Website
http://www.joshsokol.com
About
My early career was focused around System Administration (Linux and Unix) with an emphasis on web technologies such as web servers, FTP servers, application servers, and databases. That said, Information Security has always been my passion and in early 2010 National Instruments finally gave me the opportunity to become the Information Security Program Owner. Today, I continue to run their security program handling everything from compliance to enterprise risk management to vulnerability management and more; none of which existed prior to me starting the program. I have instructed many different trainings internally and have presented externally at a large number of conferences includi...
Tags
security
austin
mod_proxy
firefox
tamperdata
webscarab
ratproxy
proxies
proxy
query
malware
patterns
network
analytics
data
system
compromised
application
web
owasp
See more