Sign in to view Daniel’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Daniel’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Dana Point, California, United States
Sign in to view Daniel’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
7K followers
500+ connections
Sign in to view Daniel’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Daniel
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Daniel
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Daniel’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Articles by Daniel
-
Rising Above the Bare Minimum: Lessons from Designing an Identity and Access Management Program
Rising Above the Bare Minimum: Lessons from Designing an Identity and Access Management Program
TLDR; Unmanaged applications can make identity and access management feel overwhelming, but shortcuts like binary…
17
2 Comments -
When Should You Hire a CISO?Aug 23, 2024
When Should You Hire a CISO?
This is written for the Founders, CEOs and CTOs out there. While you may already have some security capability on the…
28
1 Comment -
Onion vs. Crown Jewels. Which one is the best?Aug 1, 2024
Onion vs. Crown Jewels. Which one is the best?
As we think about cybersecurity risk management for enterprises, what is the best approach? “Onion” or “Crown Jewels”?…
19
3 Comments -
Is the CISO a Technical or Compliance Role?Jul 26, 2024
Is the CISO a Technical or Compliance Role?
Let me start by saying that I am not strongly opinionated on where the CISO should report in an organization. That not…
34
6 Comments -
Changing the Mental Model of Fellow ExecutivesJul 24, 2024
Changing the Mental Model of Fellow Executives
As a Chief Information Security Officer (CISO), my role extends beyond the technical realm; it involves shaping the…
42
11 Comments
Activity
7K followers
-
Daniel Hooper reposted thisDaniel Hooper reposted this🚨 𝑩𝒓𝒆𝒂𝒌𝒊𝒏𝒈: 𝙏𝙝𝙚 𝙚𝙧𝙖 𝙤𝙛 "𝙚𝙣𝙘𝙧𝙮𝙥𝙩 𝙖𝙩 𝙧𝙚𝙨𝙩" 𝙟𝙪𝙨𝙩 𝙚𝙣𝙙𝙚𝙙. Chinese hackers just used Anthropic's AI to breach 30+ companies and governments. "The attackers used AI's 'agentic' capabilities to an unprecedented degree – using AI not just as an advisor, but to execute the cyber attacks themselves." The AI made thousands of attacks per second, without any human intervention. Here's the thing: The attack only worked because plaintext data was left exposed Think about that 💡 Traditional security = building higher walls 🏰 AI attackers = processing at machine speed 24/7 🤖 Your walls just became irrelevant But what if there was NO plaintext to steal? 𝗧𝗵𝗮𝘁'𝘀 𝗽𝗿𝗲𝗰𝗶𝘀𝗲𝗹𝘆 𝘄𝗵𝗮𝘁 𝗕𝗹𝗶𝗻𝗱 𝗜𝗻𝘀𝗶𝗴𝗵𝘁 𝗱𝗼𝗲𝘀 ✅ Data stays encrypted during processing ✅ Field-level protection at ALL times ✅ Zero plaintext = zero value to attackers Even if AI breaches your system, no plaintext is exposed. Welcome to the age of encryption-in-use. Learn more → https://blindinsight.com #CyberSecurity #AI #DataProtection #DORA #SearchableEncryption https://lnkd.in/gJqaZCCwChinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage CampaignChinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign
-
Daniel Hooper reposted thisDaniel Hooper reposted this100+ tokens and counting! 🙌 We’ve just added support for: → HYPE + USDC on Hyperliquid → USDG by Paxos on Ethereum + Solana Developers can integrate these instantly via Mesh’s universal API, giving their users more options for deposits and payments. One integration = access to 100+ tokens, 300+ wallets & exchanges, and 24 networks.
-
Daniel Hooper reposted thisDaniel Hooper reposted thisHiring a rock star Staff level Front End engineer. Background in fintech, web3, trading systems, payments is a plus. #ownership --> This is how we operate, 100% of the times. Come work with us, be a part of reshaping the world of payments (note I did not say crypto payments, as thats a given at this point) . If this resonates with you, dm me, or apply directly. NOTE: No agencies please https://lnkd.in/g9GvugKA
-
Daniel Hooper shared thisIs it just me or is this the only threat intel report that gives a leading indicator of a potentially emerging threat? Not just a quick reaction to a realized event? "Deployment of new C2 nodes leveraging compromised cloud accounts linked to known cybercrime infrastructure groups... ". This isn't an attack, its preparation for an attack. Buckle-up!
-
Daniel Hooper posted thisOver recent weeks I've been working with a project that’s led me into one of the shadowy side streets of privileged access, namely managing non-human identities. We spend a lot of time contemplating how to protect people like employees, admins and contractors. But what about identities that belong to applications and services? I’m referring to API keys, service accounts, certificates, things that allow systems to communicate with one another with no humans involved. It all looked good on the surface. Services were communicating with each other, data was flowing back and forth, and nothing looked broken. But when we looked a bit closer, we found a different reality. Some non-human identities had much higher levels of access than they should. Some were still running on API keys that hadn’t been rotated in months, and in some cases, nobody even knew who owned them or whether they were still needed. So now we're concerned about triage and remediation. We started with basics as one does. Building a catalog of all non-human identities we could find. Just having seen them all aggregated has been an eye-opening learning experience. From then on, we've been adjusting privileges so services only have access to what they absolutely need. We're moving away from static API secrets to temporary tokens stored in a secrets vault, and we're incorporating monitoring so we can see how these identities are being used day-to-day. What I’m learning through this process is that non-human identities don’t behave like their human equivalents. They don’t onboard and offboard, login and logout at predictable times and they don’t expire. They simply persist into the background with routinely much more power than anyone even knows about. Unless you bring them into focus they can be missed. My point is that privileged access management is about more than people nowadays. When we don't bring the same discipline and governance to non-human identities, we're leaving a huge blind spot in our security posture. How are you all thinking about this? cataloging and managing? or still trying to get your arms around this? #CISO #CTO #CIO #PrivilegedAccess #IAM #Non-human #Cybersecurity
-
Daniel Hooper reposted thisDaniel Hooper reposted thisGrowing companies know this struggle, you need serious cybersecurity expertise, but you're not quite ready for a full-time CISO. Hire too early and they'll be twiddling their thumbs. Wait too long and the risks will be building up. There's a better way. Fractional CISOs give you senior-level security expertise without the senior-level salary commitment. Instead of learning expensive lessons the hard way (buying the wrong tools, implementing half-baked solutions, starting over), you get someone who's been there before. They bring proven frameworks that actually work and typically cost 30-50% less than rushing into a permanent hire. Here's what makes this approach work: Security isn't just about buying fancy tools. You need policies that make sense, training that people actually pay attention to, and incident response plans that work when things go sideways. A fractional CISO builds these foundations across your entire org from engineering to finance, sales and ops. This creates real capabilities that lasts long after their engagement ends. The CFO angle? Fixed costs, clear timelines, monthly progress reports. No surprises. Plus, they'll map out exactly what you'll need budget-wise as you scale including future hires, vendor relationships, the works. But here's the real value: when you're finally ready for that full-time security leader, they won't be starting from zero. They'll walk into established programs, trained teams, and defined budgets. Your fractional CISO essentially sets the table for their success. The bottom line is, if you're in that awkward growth stage where basic security measures aren't enough but a full-time executive feels premature, a fractional CISO bridges that gap while setting you up for long-term success.
-
Daniel Hooper reposted thisDaniel Hooper reposted this📣 🚨 𝐉𝐮𝐬𝐭 𝐫𝐞𝐥𝐞𝐚𝐬𝐞𝐝! 𝐑𝐞𝐚𝐥-𝐭𝐢𝐦𝐞 𝐚𝐠𝐠𝐫𝐞𝐠𝐚𝐭𝐢𝐨𝐧 𝐟𝐮𝐧𝐜𝐭𝐢𝐨𝐧𝐬 (𝘴𝘶𝘮, 𝘢𝘷𝘦𝘳𝘢𝘨𝘦, 𝘤𝘰𝘶𝘯𝘵, 𝘮𝘪𝘯, 𝘮𝘢𝘹) on 𝐟𝐮𝐥𝐥𝐲 𝐞𝐧𝐜𝐫𝐲𝐩𝐭𝐞𝐝 𝐝𝐚𝐭𝐚! 🚫 No, it's not #FHE, no, it's not secure enclaves. ✅ Yes, it uses NIST-approved, FIPS-compliant crypto. ✅ Yes, it integrates easily into existing systems. No latency hits, no specialized teams, no hardware lock-in. Just fully usable, fully protected, and compliant data and SQL-like analytic capabilities. #searchableEncryption #encryptionInUse
-
Daniel Hooper posted thisThoughts from roundtable discussions today: 1) Know the business North Star and align to that. What you do must be aligned to business goals 2) Manage relationships with your stakeholders. Spend time networking with your peers, leaders, supporting teams and listen. 3) Be consistent with your communication. Everyone should know the same story.
-
Daniel Hooper liked thisDaniel Hooper liked thisŞerefe! ☕🇹🇷 Last week our Product & Engineering teams gathered in Istanbul for their quarterly offsite. It was a week full of strategy sessions and hands-on workshops with a bit of baklava on the side. Turkey was the perfect backdrop for team alignment and creative problem-solving, and we couldn’t be more fired up to finish the year strong! 🧿✨
Experience & Education
-
Mesh
***** *********** ******** *******
-
********
*******
-
*******
***** *********** ******* *****
-
******* ********** **********
******** ** *********** ********** *********** undefined
View Daniel’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Recommendations received
-
LinkedIn User
“Excellent manager! Daniel is an expert in Information Security, has great work ethics and people skills. I enjoyed working with him and would recommend him anytime.”
3 people have recommended Daniel
Join now to viewView Daniel’s full profile
-
See who you know in common
-
Get introduced
-
Contact Daniel directly
Sign in
Stay updated on your professional world
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Other similar profiles
Explore more posts
-
Benjamin Harris
watchTowr
As a team at watchTowr, we’ve said it repeatedly - by the time a vulnerability hits the news, it’s too late to respond. At that point, speed dial your cyber insurer. In-the-wild exploitation now moves faster than ever - faster than most teams can identify affected systems, validate exposure, or start patching. “I just saw the news - are we vulnerable?” is already a losing question. That’s why we evolved the watchTowr Platform into a Preemptive Exposure Management solution - powered by world-class vulnerability research from watchTowr Labs, real-time live attacker telemetry, and AI-driven automation to move faster than attackers. The watchTowr Platform validates whether you’re exposed in minutes, not days - giving security teams the chance to act before attackers do. Consistency is everything, and we’re proud that the watchTowr Platform consistently gives our clients the one thing they need most: time to respond.
126
3 Comments -
Saket Bajoria
Safe Security
“If your TPRM team is slowing down the business, you don’t have a risk management problem — you have a design problem" 🎙️ In our latest Cyber Risk Podcast, Lindsay Baker (TPRM Leader) simplifies TPRM's core challenges: Reconciliation, Chasing and Communication — and how AI can fundamentally transform that! 🚨 Link in comments! #TPRM #CyberRisk #ThirdPartyRisk #CyberSecurity #CISO #RiskManagement #CyberResilience #CyberRiskPodcast hashtag
40
2 Comments -
Jean-Noël de GALZAIN
WALLIX Group
Compliance Isn't a Burden—It's Your Secret Weapon Through years of observing businesses navigate compliance, one thing is clear: those who see it as a burden often miss its strategic potential. ISO 27001 compliance often feels like a heavy burden—an endless list of requirements. But what if compliance wasn't just about satisfying auditors? 💡 Imagine it as a tool to build trust, attract partners, and protect your business. By streamlining privileged access, securing critical data, and ensuring traceability, you go beyond compliance—you gain a competitive edge. Those who embrace this view will stay ahead of the curve. Is your business ready to unlock this advantage? #ISO27001 #CyberSecurity #CompetitiveAdvantage
24
2 Comments -
Roy K.
Orchid Security
𝐖𝐡𝐨 𝐥𝐨𝐯𝐞𝐬 𝐚 𝐠𝐨𝐨𝐝 𝐚𝐮𝐝𝐢𝐭? 𝐒𝐚𝐟𝐞 𝐭𝐨 𝐬𝐚𝐲 - 𝐧𝐨 𝐨𝐧𝐞. I’ve led teams and companies through audits. They matter, but they’re often laborious and uncertain: ❓Will this auditor accept last time’s evidence? ❓Have “accepted practices” shifted again? ❓Are we judged on what’s in-scope- or what’s missing? ❓And if it takes a week or two to accommodate, does that just mean more tools and controls next time? 😩 We at Orchid Security have built a 7-step IAM audit playbook to cut the noise and deliver irrefutable, app-level evidence (not abstracts from docs, tools, or people): 1. Preparation - scope, frameworks, baselines, ownership 2. Application Inventory - managed + unmanaged, controls, gap analysis 3. Identity Lifecycle - J/M/L with timestamps & deprovisioning 4. Authentication Events - logins, failures, sessions 5. Access Governance - least privilege, SoD, elevation trails 6. Overlay Insights - orphan/local/dormant accounts, shadow apps, over-provisioning, high-risk patterns 7. Audit-Ready Outputs - unified identity audit logs, real-time dashboards, compliance-mapped exports If audits feel like firefights, this turns them into routine. Read more 👉 https://lnkd.in/dfwa2Bme #IAM #Audit #Compliance #GRC #IdentityInfrastructure #IdentityFirst #ISO27001 #PCI #NIS2 #FedRAMP #SOX #HIPAA #Security #OrchidSecurity
161
1 Comment -
Bob Carver
Cybersecurity Boardroom ™
Threat Actors Don’t Care About Your Compliance Score In today’s cybersecurity landscape, organizations are navigating a complex web of compliance frameworks—NIST-CSF, CMMC, ISO 27001, PCI-DSS, HIPAA, NERC, and GDPR, to name a few. Each requires thorough documentation to validate governance practices, policies, and technical safeguards. Successfully passing these audits offers value: it helps organizations benchmark their security posture and align with industry expectations. But the key to success lies in maintaining clear, consistent documentation—not just checking boxes, but demonstrating genuine security maturity. However, passing an audit doesn’t mean you’re safe. Threat actors don’t care about your audit score or whether your last assessment earned gold stars—they’re looking for weak spots, misconfigurations, and overlooked vulnerabilities. And ironically, the process of preparing for audits can drain crucial resources—hundreds of man hours that could be spent on active defense, network monitoring, and incident response. In some cases, chasing compliance may divert attention from more pressing security needs. That’s why it’s important to strike a balance. If an audit is required—by regulators, partners, or customers—it must be done right. But organizations shouldn’t lose sight of the bigger picture. Real security depends on visibility, context, cyber hygiene, and threat intelligence. A framework may tell you what “good” looks like on paper, but the attackers don’t follow checklists—they exploit gaps. Staying ahead requires moving beyond compliance and investing in continuous, adaptive security strategies. #cybersecurity #GRC #audits #documentation #threatactors #vulnerabilities #threathunting #riskmanagent #compliance #NIST #CMMC #GDPR #ISO27001 #PCI
604
48 Comments -
Abhisek Datta
SafeDep
🚀🚀 #vet 1.9.8 released and it supports scanning GitHub Actions "code" The recent tj-actions/changed-files supply chain attack is the topic of the town. While it is a major incident, it appears the actual impact was somewhat limited. Coincidentally or otherwise. We want to protect our users against such attacks but we faced a key challenge. Our malicious code and package scanning infrastructure is built on the assumption that a package version, such as `pkg/npm:express@4.17.1` is immutable. If we scan this package once, we can trust its result in future because npm package registry will guarantee that a package version cannot be updated. This assumption was broken when it comes to scanning GitHub Actions code because GitHub tags are MUTABLE and thats what we saw in tj-actions/changed-files hack as well. To workaround this limitation, we handle GitHub Actions as a special case. We resolve the commit SHA of a given GitHub Action at the time of scanning before initiating a code analysis session. The implementation is generic enough to scan any GitHub repository. Try it out. Feedbacks and suggestions from the community is what drives our roadmap. Link in comment. 💻 Omkar Phansopkar Arunanshu Biswas Sudhanshu Dasgupta Kunal Singh 🎯 Sahil Bansal
64
2 Comments -
Tim Prendergast
StrongDM
Last week I wrote about the end of legacy PAM and the rise of modern identity control planes. Many of you reached out asking about the "Identity Firewall" concept I mentioned. Specifically: "Tim, why are you calling it a firewall? That's confusing." I get it. When most people hear "firewall," they think “network firewall.” Something that sits between networks and blocks bad packets. But here's the thing, that's exactly why the analogy works. I’m using the term ‘firewall’ deliberately. Because just like the original firewalls transformed network security decades ago, the identity firewall will redefine access and authorization in the cloud-native world. Over the past year, I've had countless discussions with Amol Kabe about this evolution. One conversation really crystallized it for him: "We've been conditioned to think 'firewall' means network security. But firewalls were always about enforcement at boundaries—the network perimeter just happened to be where we drew those boundaries. Now that identity is the perimeter, that's where enforcement needs to happen." Think about it this way: Network firewalls inspect every packet between network zones and decide: allow or deny based on policy. Identity Firewalls inspect every privileged action between identity zones and decide: allow or deny based on policy. The boundary just shifted. It used to be between networks. Now it's between identities, systems, and the actions they want to take. A CISO at a financial services company put it perfectly: "We have firewalls that inspect every bit of network traffic, but we grant broad database access and hope for the best. That's backwards." Here's what really clicked for me: we already accept that firewalls evolved. Network firewalls became next-gen firewalls, then ZTNA, then SASE. The concept of "enforcement at the trust boundary" stayed the same—the boundary moved. Identity is the new perimeter. The firewall needs to move there too. Does Identity Firewall create some cognitive dissonance? Yeah, and that’s by design. 'Firewall' sounds old-school. But what if the term we knew from network security is exactly what’s needed to fix access and authorization? A new control layer. For a new perimeter. Sometimes the best way to explain a new concept is to anchor it to something people already understand, then show them how it's evolved. The Identity Firewall isn't about network packets. It's about controlling privileged actions between users, machines, and the systems they access. Real-time policy enforcement where it matters most—not just who gets in, but what they can do once they're there. Still think it's confusing? I'd love to hear your thoughts.
181
34 Comments -
Jonathan W.
Muse Cyber
Clarity. Control. Consequence. That’s the Muse lens on cybersecurity. We don’t make noise. We do measured guidance based on: - What’s enforced (not just written down) - What’s aligned to actual risk - What works under stress Security is a leadership issue. Make decisions from truth, not just tech dashboards.
16
1 Comment
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Daniel Hooper in United States
-
Daniel Hooper
Ethridge, TN -
Daniel Hooper
Charlotte Metro -
Daniel Hooper
Suffolk, VA -
Daniel Hooper
Denver Metropolitan Area
152 others named Daniel Hooper in United States are on LinkedIn
See others named Daniel Hooper