SlideShare a Scribd company logo
1 of 1
Gavin Reid is the vice president of threat research at Lancope, Inc., a Georgia-based network
visibility and security analytics company. With over 25 years of experience in security research,
he is a driving force behind data analytics and research for threat identification and remediation.
Prior to joining Lancope, Reid held executive-level threat intelligence positions at Fidelity
Investments and Cisco Systems.
At Fidelity, Reid served as the vice president of threat intelligence. His team was responsible for
proactively preventing, detecting and understanding past, present and future cyber incidents.
Reid fulfilled a variety of roles during his 15-year stint as Cisco. He was the director of threat
research for Cisco’s Security Intelligence Operations, leading a team tasked with researching
advanced cybersecurity threats and developing new data analytics technologies to help combat
those threats.
One of Reid’s most notable achievements at Cisco was the creation of the company’s Computer
Security Incident Response Team (CSIRT), which is a global network of information security
professionals responsible for monitoring, investigating and responding to cybersecurity
incidents. Under his leadership, CSIRT grew from one person and a $500 thousand budget to
60 employees and a $14 million budget. Altogether, Reid spent over 10 years personally
overseeing all major security incidents at Cisco and Cisco-owned corporations.
Before joining Cisco in 1999, Reid spent nine years conducting IT Security at NASA’s Johnson
Space Center.
Reid is a regular speaker, and has delivered lectures across both the public and private sector
on computer forensics, incident response, and intrusion detection and prevention.

More Related Content

What's hot

Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityCareer Communications Group
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data CleanResolver Inc.
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesKaseya
 
Cyber Security April 2016 Presentation
Cyber Security April 2016 PresentationCyber Security April 2016 Presentation
Cyber Security April 2016 PresentationDenis Philippe
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake sheaColloqueRISQ
 
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINALRuss Dietz
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firmwilsonconsulting1
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity SolutionsErin Planting
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALRuss Dietz
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016ColloqueRISQ
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedIBM Security
 

What's hot (20)

Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in Cybersecurity
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
Cyber Security April 2016 Presentation
Cyber Security April 2016 PresentationCyber Security April 2016 Presentation
Cyber Security April 2016 Presentation
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
2016-CyberWeek-TLV-Next-Generation-Cyber-FINAL
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity Solutions
 
Outpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teamingOutpost24 webinar - Improve your organizations security with red teaming
Outpost24 webinar - Improve your organizations security with red teaming
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINAL
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
 
Why Cisco-for-Security
Why Cisco-for-SecurityWhy Cisco-for-Security
Why Cisco-for-Security
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 

Similar to Gavin Reid - bio

BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business SecurityBOLD Business
 
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsFernando Blasco
 
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815Richard Emrich
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
What Has Changed Since COVID-19?
What Has Changed Since COVID-19?What Has Changed Since COVID-19?
What Has Changed Since COVID-19?SophiaPalmira
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?InfoSec4TC
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Timothy Nolan
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfSymptai Consulting Limited
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame caSteve Alameda
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itSKIPS University
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportSarthak Nanda
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 ReportRahul Neel Mani
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfTHECIOWORLD
 

Similar to Gavin Reid - bio (20)

BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business Security
 
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
 
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)
 
What Has Changed Since COVID-19?
What Has Changed Since COVID-19?What Has Changed Since COVID-19?
What Has Changed Since COVID-19?
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015Resume - Timothy Nolan 8-5-2015
Resume - Timothy Nolan 8-5-2015
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame ca
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.it
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event Report
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdf
 

Gavin Reid - bio

  • 1. Gavin Reid is the vice president of threat research at Lancope, Inc., a Georgia-based network visibility and security analytics company. With over 25 years of experience in security research, he is a driving force behind data analytics and research for threat identification and remediation. Prior to joining Lancope, Reid held executive-level threat intelligence positions at Fidelity Investments and Cisco Systems. At Fidelity, Reid served as the vice president of threat intelligence. His team was responsible for proactively preventing, detecting and understanding past, present and future cyber incidents. Reid fulfilled a variety of roles during his 15-year stint as Cisco. He was the director of threat research for Cisco’s Security Intelligence Operations, leading a team tasked with researching advanced cybersecurity threats and developing new data analytics technologies to help combat those threats. One of Reid’s most notable achievements at Cisco was the creation of the company’s Computer Security Incident Response Team (CSIRT), which is a global network of information security professionals responsible for monitoring, investigating and responding to cybersecurity incidents. Under his leadership, CSIRT grew from one person and a $500 thousand budget to 60 employees and a $14 million budget. Altogether, Reid spent over 10 years personally overseeing all major security incidents at Cisco and Cisco-owned corporations. Before joining Cisco in 1999, Reid spent nine years conducting IT Security at NASA’s Johnson Space Center. Reid is a regular speaker, and has delivered lectures across both the public and private sector on computer forensics, incident response, and intrusion detection and prevention.