SlideShare a Scribd company logo
1 of 1
To Whom It May Concern,
It is with great respect that I write a letter of recommendation for Kathleen Wicks.
I have known of Kathleen Wicks for the past three years and had the pleasure of working with
Kathleen directly for just under a year at Hewlett Packard Enterprise. During this time Kathleen
had worn multiple hats as a security architect, security engineer and manager of security solutions
for Hewlett Packard Software. While wearing multiple hats, Kathleen was able to exceed
expectations in the identification, remediation and mitigation of security risks while enabling
Hewlett Packard Software to do business more securely by being a trusted advisor/subject matter
expert.
Kathleen has shown a tremendous passion for driving cyber security initiatives as an architect and
engineer while also being well rounded enough to provide ongoing security monitoring, forensic
analysis, and digital investigation. Kathleen is unique amongst peers with the ability to leverage
her practical technical skill with the ability to manage resources. In my view she has the ability to
succeed in either a technical or management career path.
Respectfully,
Adam J. DeMonaco
Senior Director
Kivu Consulting

More Related Content

Viewers also liked

Nice Or Cannes This Is The Question Catalan
Nice Or Cannes This Is The Question CatalanNice Or Cannes This Is The Question Catalan
Nice Or Cannes This Is The Question CatalanSaintrop.com
 
Apresentação1
Apresentação1Apresentação1
Apresentação1Bruna2604
 
Doc 20350761
Doc 20350761Doc 20350761
Doc 20350761catagerio
 
C:\Documents And Settings\Pc3\My Documents\PresentacióN1 Modulo I
C:\Documents And Settings\Pc3\My Documents\PresentacióN1  Modulo IC:\Documents And Settings\Pc3\My Documents\PresentacióN1  Modulo I
C:\Documents And Settings\Pc3\My Documents\PresentacióN1 Modulo IHERNANDEZPOLI
 
Frases enrico-picciotto-102005
Frases enrico-picciotto-102005Frases enrico-picciotto-102005
Frases enrico-picciotto-102005Pietra Picciotto
 
Entrevista aos irmãos pedro e inês
Entrevista aos irmãos pedro e inêsEntrevista aos irmãos pedro e inês
Entrevista aos irmãos pedro e inêsSusana Pelota
 
Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)
Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)
Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)reformadelestado
 
Propuestas Uso Rss V2
Propuestas Uso Rss V2Propuestas Uso Rss V2
Propuestas Uso Rss V2Juan Farnos
 
Intercanvi Alumnes Franceses Curs Posticeria
Intercanvi Alumnes Franceses Curs PosticeriaIntercanvi Alumnes Franceses Curs Posticeria
Intercanvi Alumnes Franceses Curs Posticerialoupema
 
Atividades diversificadas para uma Educação de qualidade
Atividades diversificadas para uma Educação de qualidadeAtividades diversificadas para uma Educação de qualidade
Atividades diversificadas para uma Educação de qualidadelu-costa
 
ModelacióN Ventanas Finalcomunidad
ModelacióN Ventanas FinalcomunidadModelacióN Ventanas Finalcomunidad
ModelacióN Ventanas Finalcomunidadpipaestevez
 
Red PAN,VPN
Red PAN,VPNRed PAN,VPN
Red PAN,VPNclayri15
 

Viewers also liked (20)

Delicious
DeliciousDelicious
Delicious
 
Nice Or Cannes This Is The Question Catalan
Nice Or Cannes This Is The Question CatalanNice Or Cannes This Is The Question Catalan
Nice Or Cannes This Is The Question Catalan
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
Doc 20350761
Doc 20350761Doc 20350761
Doc 20350761
 
C:\Documents And Settings\Pc3\My Documents\PresentacióN1 Modulo I
C:\Documents And Settings\Pc3\My Documents\PresentacióN1  Modulo IC:\Documents And Settings\Pc3\My Documents\PresentacióN1  Modulo I
C:\Documents And Settings\Pc3\My Documents\PresentacióN1 Modulo I
 
28o
28o28o
28o
 
Ppt nuvem (3)
Ppt nuvem (3)Ppt nuvem (3)
Ppt nuvem (3)
 
@BC Vertalingen
@BC Vertalingen@BC Vertalingen
@BC Vertalingen
 
Frases enrico-picciotto-102005
Frases enrico-picciotto-102005Frases enrico-picciotto-102005
Frases enrico-picciotto-102005
 
Arte Romanico
Arte RomanicoArte Romanico
Arte Romanico
 
Entrevista aos irmãos pedro e inês
Entrevista aos irmãos pedro e inêsEntrevista aos irmãos pedro e inês
Entrevista aos irmãos pedro e inês
 
Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)
Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)
Proyecto: Separación entre funciones políticas y ejecutoras (Mario Drago)
 
Propuestas Uso Rss V2
Propuestas Uso Rss V2Propuestas Uso Rss V2
Propuestas Uso Rss V2
 
Intercanvi Alumnes Franceses Curs Posticeria
Intercanvi Alumnes Franceses Curs PosticeriaIntercanvi Alumnes Franceses Curs Posticeria
Intercanvi Alumnes Franceses Curs Posticeria
 
Atividades diversificadas para uma Educação de qualidade
Atividades diversificadas para uma Educação de qualidadeAtividades diversificadas para uma Educação de qualidade
Atividades diversificadas para uma Educação de qualidade
 
ModelacióN Ventanas Finalcomunidad
ModelacióN Ventanas FinalcomunidadModelacióN Ventanas Finalcomunidad
ModelacióN Ventanas Finalcomunidad
 
O fogo perdido.
O fogo perdido.O fogo perdido.
O fogo perdido.
 
Web Quest Paises Desarrollados Y Subdesarrollados
Web Quest Paises Desarrollados Y SubdesarrolladosWeb Quest Paises Desarrollados Y Subdesarrollados
Web Quest Paises Desarrollados Y Subdesarrollados
 
Red PAN,VPN
Red PAN,VPNRed PAN,VPN
Red PAN,VPN
 
Cisnes
CisnesCisnes
Cisnes
 

Similar to Wicks_Recommendation

SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...thesiliconleaders
 
The 10 Most Influential People In Cyber Security, 2024.pdf
The 10 Most Influential People In Cyber Security, 2024.pdfThe 10 Most Influential People In Cyber Security, 2024.pdf
The 10 Most Influential People In Cyber Security, 2024.pdfciolook1
 
10 Most Influential Leaders in Cybersecurity 2023.pdf
10 Most Influential Leaders in Cybersecurity 2023.pdf10 Most Influential Leaders in Cybersecurity 2023.pdf
10 Most Influential Leaders in Cybersecurity 2023.pdfCIO Look Magazine
 
Benard Mulwa Blog.pdf
Benard Mulwa Blog.pdfBenard Mulwa Blog.pdf
Benard Mulwa Blog.pdfBenard76
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity MarketingAlex Weishaupt
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiCRAW CYBER SECURITY PVT LTD
 
Misha Hanin - Infographic Resume
Misha Hanin - Infographic ResumeMisha Hanin - Infographic Resume
Misha Hanin - Infographic ResumeMisha Hanin
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Merry D'souza
 
Exploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdf
Exploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdfExploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdf
Exploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdfbrianwhary8
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfTHECIOWORLD
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDClearedJobs.Net
 
The Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfThe Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfthesiliconleaders
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityMighty Guides, Inc.
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfCIO Look Magazine
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in DepthCIO Talk Network
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 

Similar to Wicks_Recommendation (20)

SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
SpaceBlock Technology Innovative Firm Powering Software Development and Cyber...
 
The 10 Most Influential People In Cyber Security, 2024.pdf
The 10 Most Influential People In Cyber Security, 2024.pdfThe 10 Most Influential People In Cyber Security, 2024.pdf
The 10 Most Influential People In Cyber Security, 2024.pdf
 
10 Most Influential Leaders in Cybersecurity 2023.pdf
10 Most Influential Leaders in Cybersecurity 2023.pdf10 Most Influential Leaders in Cybersecurity 2023.pdf
10 Most Influential Leaders in Cybersecurity 2023.pdf
 
Benard Mulwa Blog.pdf
Benard Mulwa Blog.pdfBenard Mulwa Blog.pdf
Benard Mulwa Blog.pdf
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in Delhi
 
Misha Hanin - Infographic Resume
Misha Hanin - Infographic ResumeMisha Hanin - Infographic Resume
Misha Hanin - Infographic Resume
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
Exploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdf
Exploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdfExploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdf
Exploring Cloudflare Inc.'s Executive Team An In-depth Analysis.pdf
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdf
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
 
The Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfThe Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdf
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint Security
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdf
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 

Wicks_Recommendation

  • 1. To Whom It May Concern, It is with great respect that I write a letter of recommendation for Kathleen Wicks. I have known of Kathleen Wicks for the past three years and had the pleasure of working with Kathleen directly for just under a year at Hewlett Packard Enterprise. During this time Kathleen had worn multiple hats as a security architect, security engineer and manager of security solutions for Hewlett Packard Software. While wearing multiple hats, Kathleen was able to exceed expectations in the identification, remediation and mitigation of security risks while enabling Hewlett Packard Software to do business more securely by being a trusted advisor/subject matter expert. Kathleen has shown a tremendous passion for driving cyber security initiatives as an architect and engineer while also being well rounded enough to provide ongoing security monitoring, forensic analysis, and digital investigation. Kathleen is unique amongst peers with the ability to leverage her practical technical skill with the ability to manage resources. In my view she has the ability to succeed in either a technical or management career path. Respectfully, Adam J. DeMonaco Senior Director Kivu Consulting