Derek Mezack is an experienced security professional seeking a versatile role involving research, development, and training. He has extensive experience developing security solutions like SIEM platforms and intrusion detection signatures. He also led large penetration tests and provided security consulting, compliance assessments, and incident response. Mezack holds patents for threat modeling and security information management technologies. He aims to further his skills while taking on leadership, individual contributor, or training responsibilities.
The cloud offers simplified application development and delivery by providing infrastructure, platform and software services that are ready to use immediately. However, the major inhibitor for businesses has been concerns around security. IBM has simplified the typical method for approaching this problem. Whether you’re looking to employ infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) or software-as-a-service (SaaS), use the framework below when designing your solution. Each platform comes with certain built-in security qualities and lets you use add-ons on top of the platform to secure each workload.
The cloud offers simplified application development and delivery by providing infrastructure, platform and software services that are ready to use immediately. However, the major inhibitor for businesses has been concerns around security. IBM has simplified the typical method for approaching this problem. Whether you’re looking to employ infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) or software-as-a-service (SaaS), use the framework below when designing your solution. Each platform comes with certain built-in security qualities and lets you use add-ons on top of the platform to secure each workload.
Content Strategy and Developer Engagement for DevPortalsAxway
Slides from Write the Docs Ottawa Meet Up at Shopify HQ in Canada, June 24, 2019
We’ll walk through 5 scenarios and concrete ways of reaching a developer community for frictionless and increased engagement.
Will your organization or enterprise expand cost-effectively with the power of a managed cloud? We outline 10 key reasons why this strategy will help you improve security, simplify compliance, reduce costs and streamline scalability.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
We will explore why the current industry approach to security is failing us. We will then discuss how building security as an architecture can raise the security level for any organization. An architectural approach is required to take security to the next level and defend against modern threats. We will discuss how you can use Cisco solutions to build a true security architecture.
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
My second paper on Cybersecurity frameworks and how Saudi Arabia is forming. This paper has been published by the International Journal of Computer Science and Information Security (IJCSIS) in April 2021, Vol. 19 No. 4 Publication.
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
Office 365 Seguro? Sym, Cloud!
1-Estratégia de Segurança da Symantec
2-VIP & SAM for Office 365
3-DLP for Office 365
4-Email Security.cloud
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
In this age of an interconnected global business ecosystem, businesses rely on network connections with partners, suppliers, and others for efficient business processes. You just have to look at the headlines to see that several recent security breaches have compromised these connections as a way into a corporate network. Utilizing CA Advanced Authentication, CenterPoint Energy is making connections more secure through multi-factor authentication and reduce the risk of standard network credentials becoming compromised.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
El control de cuentas y accesos privilegiados enfrenta la realidad actual que involucra complejidad de ambientes de nube, sistemas y plataformas SAAS, así como sistemas legados y bajo premisa. ¿Cómo se adecúan los productos de administración de accesos actuales a esta realidad tecnológica? ¿En torno a qué deben estar listas estas soluciones?
Content Strategy and Developer Engagement for DevPortalsAxway
Slides from Write the Docs Ottawa Meet Up at Shopify HQ in Canada, June 24, 2019
We’ll walk through 5 scenarios and concrete ways of reaching a developer community for frictionless and increased engagement.
Will your organization or enterprise expand cost-effectively with the power of a managed cloud? We outline 10 key reasons why this strategy will help you improve security, simplify compliance, reduce costs and streamline scalability.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
We will explore why the current industry approach to security is failing us. We will then discuss how building security as an architecture can raise the security level for any organization. An architectural approach is required to take security to the next level and defend against modern threats. We will discuss how you can use Cisco solutions to build a true security architecture.
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
My second paper on Cybersecurity frameworks and how Saudi Arabia is forming. This paper has been published by the International Journal of Computer Science and Information Security (IJCSIS) in April 2021, Vol. 19 No. 4 Publication.
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
Office 365 Seguro? Sym, Cloud!
1-Estratégia de Segurança da Symantec
2-VIP & SAM for Office 365
3-DLP for Office 365
4-Email Security.cloud
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
In this age of an interconnected global business ecosystem, businesses rely on network connections with partners, suppliers, and others for efficient business processes. You just have to look at the headlines to see that several recent security breaches have compromised these connections as a way into a corporate network. Utilizing CA Advanced Authentication, CenterPoint Energy is making connections more secure through multi-factor authentication and reduce the risk of standard network credentials becoming compromised.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
El control de cuentas y accesos privilegiados enfrenta la realidad actual que involucra complejidad de ambientes de nube, sistemas y plataformas SAAS, así como sistemas legados y bajo premisa. ¿Cómo se adecúan los productos de administración de accesos actuales a esta realidad tecnológica? ¿En torno a qué deben estar listas estas soluciones?
Quality Management, Information Security, Threat Hunting and Mitigation Plans for a Software Company or a Technology Start-up engaged in building, deploying or consulting in Software and Internet Applications.
Navigating the complex Risk Management Framework (RMF) requirements can be daunting. Learn best practices and gain a better understanding of NIST's RMF.
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
Project Quality-SIPOC
Select a process of your choice and create a SIPOC for this process. Explain the utility of a SIPOC in the context of project management.
(
Application security in large enterprises (part 2)
Student Name:
) (
Instructor Name
)
Detailed Description:
Large enterprises of a thousand persons or more often have distinctly distinct data security architectures than lesser businesses. Typically they treat their data security as if they were still little companies.
This paper endeavors to demonstrate that not only do large businesses have an entire ecology of focused programs, specific to large businesses and their needs, but that this software has distinct security implications than buyer or small enterprise software. identifying these dissimilarities, and analyzing the way this can be taken advantage of by an attacker, is the key to both striking and keeping safe a large enterprise.
The Web applications are the important part of your business every day, they help you handle your intellectual property, increase your sales, and keep the trust of your customers. But there's the problem that applications re fast becoming the preferred attack vector of hackers. For this you really need something that makes your application secure.
And, with the persistent condition of today's attacks, applications can easily be get infected when security is not considered and scoped into each phase of the software development life cycle, from design to development to testing and ongoing maintenance of the application. When you take a holistic approach to your application security, you actually enhance your ability to produce and manage stable, secure applications. Applications need training and testing from the leading team of ethical hackers, for this there should be an authentic plan to recover these issues that can help an organization to plan, test, build and run applications smartly and safely.
Large enterprises of a thousand people or even more have distinctly different information security architectures than many other smaller companies. Actually, they treat their information security as if they were still small companies.
We are going to discuss some attempts to demonstrate that not only do large companies have an entire ecology of specialized software, specific to large companies and their needs, but that this software has different security implications than consumer or small business software for the applications. Recognizing these differences, and examining the way this can be taken advantage of by an attacker, is the key to both attacking and defending a large enterprise. It’s really important to cover up the security procedures in the large enterprise.
Key Features:
· Web application security checking from development through output
· Security check web APIs and world wide web services that support your enterprise
· Effortlessly organize, view and share security-test outcomes and histories
· Endow broader lifecycle adoption th ...
Cyber Security presentation for the GS-GMIS in Columbia, SC on 7-19-2018, 125 people present, discussion at an Executive level to help Project Managers better understand Cyber Security and recent updates and guidance to help you plan for your company
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
Enterprise cybersecurity is a multi-layered approach that demands continuous adaptation to the evolving threat landscape. By understanding and implementing the crucial layers discussed above, businesses can fortify their defenses against cyber threats. Choosing the right enterprise IT solutions and adopting a proactive mindset are key to maintaining a robust cybersecurity posture in the age of digital connectivity.
Ensuring cyber resilience presents different risk points and many challenges. Not all organizations possess the internal capabilities and expertise necessary to strategize, execute, and safeguard their attack surface. By identifying vulnerabilities, deploying tools, and educating users, cybersecurity services can make the digital environment safer for all.
Our Cyber Resilience FasTrak provides three flexible options for personalized
protection. Select the service that is right for your organization:
- Improve cyber defenses with a Security Health Check
- Uncover hidden threats with AI powered Threat Hunting Service
- Don’t be scared, be prepared with Incident Response Simulation
1. Derek John Mezack
Woodstock, GA | 678-871-7566 hm | derek@mezackgroup.com
http://www.linkedin.com/in/derekjmezack/
Objective
· To further my skills and experience in security, development, and training in a versatile environment with opportunities
as an individualcontributor, team leadership, and/or training responsibilities.
Skills & Abilities
RESEARCH AND DEVELOPMENT
· Provided research leading to numerous discoveries in both the private sector and while under defense commission.
· Inventor and developer of multiple patents and patent-pending technologies in security information management and
threat protection. (See Patents)
· Developed over 400 intrusion detection system signatures, including development of the first cryptographic signature
for TFN2K when used by terrorists during Y2K
· Hands-on development of enterprise security information and event management (SIEM) solutions in a combination of
C#, WPF/XAML, C++, PowerShell, and Java.Application architecture featuring use of the .Net Enterprise Framework,
PRISM, Unity, Microsoft Entity Framework 4.0, and JNI.
· Vender Neutral and agentless security and network architecture, having one to many distributed collectors that tie to
best of breed vender devices, 12 common data types, and fully integrated Identity Management.
· Mass data management architecture with scalable delivery of near realtime features for alerting and analysis.
· First SIEM to be fully cloud ready, with multi-tenant SaaS features and each component delivered by default as a
virtual machine appliance.
· Abstract Threat Modeling – First to combine threat and fraud detection by allowing customers to model threat and
fraud strategies in an easy to understand security language that crosses and operates on all supported types of
information.
· Implementation of SIEM technology in enterprise,environments.
· Research integrating Tails privacy cloud solution with software defined radio,OpenBTS, and Asterisk solutions for
privatized and anonymized phone operations.
PROFESSIONAL SERVICES
· Led large-scale penetration tests including financial, health, and government institutions
· Assessment and custom remediation experience with enterprise,security, and cloud applications
· Compliance gap assessment for PCI-DSS,HIPPA, SOCS,FISMA, and Cloud Security Standards
· Provided incident response and forensics in a number of high profile and large scale cases for such organizations as
Chicago Board of Trade, Robins Federal Credit Union, Surgical Information Systems, and government crisis under
commission of the NSA.
· Experienced in application code assessment
· Working knowledge of numerous programming languages,technologies, as well as security frameworks.
· Inventor of methodology for application misuse and fraud assessment using the Scenario Based Security Model
· Specialized testing experience with emphasis on espionage, zero-day preparedness,amplification testing, and
evaluation of security operations management.
APPLICATION SECURITY
2. Page 2
· Invention of the Scenario Based Security Model in 1999,adopted by Microsoft’s SQL Server team, numerous enterprises,
and more recently the Cloud Security Alliance. Provided updates to the community with example security architectures
and sample code for enterprise systems.
· First to discover cryptographic flawin TFN2K while under defense commission during terrorist attacks on air traffic
control towers.
· Advanced pattern and regular expression development
· Over 400 IDS signature decodes
· Numerous data collection, translation, and analysis patterns for SIEM platforms. and used in products such as IBM/ISS
Real Secure today.
· Successful application penetration test on TecSec’s application privacy suite used by the NSA, including discovery of one
way hash vulnerability that allowed compromise of primary privacy content by a non-user.
· Development of first SIEM technology to combine threat and fraud management; incorporating 12 types of data,
including both network threat detection, DLP, system sources, web, and custom applications.
· Development of gap assessment methodology for use with the Scenario Based Security Model for fraud assessment and
security lifecycle evaluation within enterprise and cloud environments.
· Developed material and taught Secure Application Development as well as Advanced Assessment and Information
Management since 1999 with enterprise development and security auditors attending from the Air Force, Navy, US Post
Office, Credit Processors, Banks, MedicalTechnology, and numerous other continued sources.
· Successful application penetration test on airport, including penetration of widely used fingerprinting system
TRAINING
· Delivered seminars and training on information security, the state of the hack, threat management,advanced
penetration testing, and threat analysis to the US Air Force, Federal Trade Commission, NSA, SITA, GA Department of
Audits, US Post Office, and numerous others.
· Developed and provided XForce Boot camp training, Secure Application Development training, and ISS Connect
cryptography training while at ISS.
SECURITY OPERATIONS / ADMINISTRATION
· SOC oversight and management of hundreds of security devices and related threat data for managed security services
· Management of product-first based business maintaining profitability for 4 years.
· SOC Policy planning and development of service level agreement as well as policies and procedures for PCI-DSS, HIPAA,
SAS70 compliance as a managed security service provider as well as part of professional services for customers
· Vender neutraland best of breed integration and management of 12 types of security devices, including intrusion
detection/protection, data loss prevention,firewall, system logs, web logs, authentication/authorization (AAA) services,
custom applications, switches, routers, and more.
· SOC security architecture and standardization of virtualization infrastructure for cloud implementation, reduced cost,
and high availability
Experience
DIRECTOR OF SECURITY RESEARCH & DEVELOPMENT | MEZACK GROUP LLC – ACQUIRED BYFLYING CLOUD
TECHNOLOGIES | JULY 2009 – PRESENT (5 YEARS, 2 MONTHS)
Started corporation in mid-2009 without venture capitaland maintained profitability, while successfully developing one
of the first cloud SIEM products and managed services, including over 5.5 million lines of code in a combination of C#,
XAML, Java,and C++.
Integrating managed services, consulting, education as well as ongoing research and development, allowing
clients to achieve security and privacy measures while meeting high performance business objectives through
engineered solutions.
3. Page 3
o Mass data management and architecture featuring hybrid performance modelallowing distributed
translation of collected data, secure and scalable storage of each common data type per tenant, while
offering transparent,centralized, information access, alerting, and analysis.
o Comprehensive integration and analysis of 11 major types of security data. First to integrate raid data
caching with distributed security data collection (See LSI Publication).
Integrated Identity Management virtualappliance with cross platform and language options supporting Open-
ID, Federated,mixed authentication as well as cloud integration with Azure, AWS and VMWare. Integration
options for Windows LDAP and custom applications with tight SIEM integration allowing central and granular
reporting and response capabilities at an identity and session level.
Directed security research and development of continued features supporting multitenant managed security service. Lead
incident response during numerous enterprise cases.
SENIOR RESEARCH SCIENTIST | ENTEREDGE TECHNOLOGY | JUNE 2003 – JULY 2009 (6 YEARS 2 MONTHS)
Fulfilled chief technical research, and development role for the company. Provided research leading to a patent in Real
Time Threat Modeling. Received approvalby Nir Zuk for my modified implementation of statefulinspection for real time
activity analysis and persistent tracking of multi-stage threats across big data.
Developed entire SIEM solution and played key technical sales role in its presentation to analysts as well as enterprise
clients. Headed penetration test team, developing the criteria framework for all related deliverables and structured
service offerings. Performed numerous successfulnetwork, application, and wireless/mobile penetration tests as well as
providing design and implementation of enterprise and cloud security architecture and controls. Designed security
architecture and lead implementation of intrusion detection, DLP, identity management,and SIEM solutions for
enterprise clients. Became a partner in the firm 2 years into the position and played key role in partner decisions leading
to company growth and business development.
SENIOR RESEARCH SCIENTIST | GUARDENT (NOW VERISIGN) | FEBRUARY2001 – NOVEMBER 2002
75 3RD AVE, WALTHAM, MA
Provided security research and design of Managed Security Services as well as related supporting technology. Led
numerous successful penetration tests against large financialinstitutions, as well as application penetration tests against
software used by various defense agencies. Provided education and incident response for the Federal trade commission
leading to a Certificate of Appreciation from the Federal Trade Commissioner.
XFORCE SENIOR RESEARCH SCIENTIST | INTERNET SECURITYSYSTEMS (ISS/IBM) | JANUARY 1999 – FEBRUARY
2001
Development of newlicensing crypt-architecture that resolved software "crack" and allowed distributed licensing key
management.Designed first firewall to use block spoofed traffic leveraging TTL fingerprinting,passive fingerprinting.
Invented signatures of over 400 intrusion detection signatures,including TFN2K. Coinventor for Method and system for
managing computer security information, including some of the first correlation, anomaly detection, and analysis
technologies.
APPLICATION SECURITY ENGINEER | CONTINENTAL DATAGRAPHICS | JANUARY 1997 – JANUARY1999
9920 JEFFERSON BLVD, CULVER CITY, CA
Security Administrator for internalnetwork and hosted applications to Boeing and the ATA. Participated as lead security
architect and component developer for applications developed for the ATA and various airlines and manufacturers.
Developed numerous security components including web authorization system and interface to Secure Computing
SafeWord product, allowing web application usage of Tokens and strong authorization.
ERP/MRP MIDDLEWARE DEVELOPER | CHATSWORTH PRODUCTS INC. | FEBRUARY1996 – JANUARY 1997
TELEPHONE: 1-800-834-4969
SUPERVISOR: PETER STACIA
4. Page 4
Developed cross-platform middleware applications in C/C++,Java,Visual Basic, and scripting languages,
allowing simultaneous operations of PowerCerv, running on NT, and MAS90,running on SCO Unix,for long term
transition to PowerCervERP/MRP system
Designed security architecture for implementation of both ERP/MRP systems across multiple locations,
including near real-time synchronization and related security awareness.
Developed numerous custom ERP/MRP applications, including Capacity Planner and Available to Promise.
WEB ARCHITECT | GLOBAL PACIFIC TECHNOLOGY| JANUARY 1995 – FEBRUARY1996
SUPERVISOR: BRANT DEBOW
Website design and programming using HTML, Java, ASP, and CGI.
Programmed also in C++,Visual Basic 4, and Cold Fusion.
ASP, CGI, JNI, and JDBC multiplatform transactions.
Consulted and serviced clients
Patents
System and method for definition and automated analysis of computer security threat models
United States 20080148398,Filed June 19, 2008
Method for automated threatmodeling with supportfor attribute based correlation across multiple devices,data types,
recursive attack tracking, and persistentreal-time updates atevery pointof the threat.
Method and system for managing computer security information
United States 20060265746, Issued November 23, 2006
Research in securityinformation and event managementleading to the firstSIEM technologies.Research included
both bulk data flow and managementconcepts as well as correlation and strategic threatidentification.
Honors & Awards
· Certificate of Appreciation from the Federal Trade Commission for Information Security 11/2001
· Technology Association of Georgia Top 40 Most Innovative Businesses for 2 years while starting Vault Ecommerce Inc.
· Listed in 4th place by Linked-In for The Top 25 Application Security Engineer’s profiled by their site. At this time,
Linked-In profiled over 9000 application security engineers worldwide.
· Awarded technology partnership with LSI for tackling mass data security challenges by combining my SIEM technology
with LSI’s Cachecade raid technology.
· Selected speaker and trainer for the National Association of State Auditors, Controllers, and Treasurers 2005 on the
“state of the hack”
Education
1998 | CALIFORNIA POLYTECHNIC UNIVERSITY POMONA
· Computer Information Systems
· Minor: Epistemology