Leesburg, Virginia, United States
3K followers 500+ connections

Join to view profile

About

I am a highly accomplished, C-suite level information security executive with more than…

Activity

Join now to see all activity

Experience & Education

  • Navy Federal Credit Union

View Michael’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

  • Certified Chief Information Security Officer (C|CISO)

    EC-Council

    Issued
  • ISO 27001 Certified Internal Auditor

    BSI

    Issued
  • Certified Information Systems Security Professional (CISSP)

    (ISC)2

    Issued

Volunteer Experience

  • Vice President, Board of Directors

    Cloudbreak Foundation

    - Present 11 years 11 months

    Poverty Alleviation

    The Cloudbreak Foundation offers support to organizations that provide immediate services to individuals in need. Specifically, the Foundation assists community-based charitable organizations in the Washington, D.C., metropolitan area, which promote welfare of children, the elderly and the homeless.

  • Board of Directors

    Herndon Children's Center

    - 1 year 11 months

    Education

    Provide guidance and strategic direction on technology, security, and other matters pertaining to the center. Assist the center through its transition to privatization.

Publications

  • Should You BIY or BUY Security?

    Bricata

    Organizations involved in building out a security apparatus have much to consider. There are a number of key drivers that influence how, when and what to build including: size of the organization, geographic diversity, type of information being protected, and available resources. Inevitably, security organizations will be faced with the age old dilemma of build vs. buy. In Information Security there is no one size fits all approach and successful teams will tailor their strategy and programs to…

    Organizations involved in building out a security apparatus have much to consider. There are a number of key drivers that influence how, when and what to build including: size of the organization, geographic diversity, type of information being protected, and available resources. Inevitably, security organizations will be faced with the age old dilemma of build vs. buy. In Information Security there is no one size fits all approach and successful teams will tailor their strategy and programs to what their lines of business actually need.

    With an emphasis on open source intrusion prevention technologies such as Snort, Suricata and Bro, this paper explores the advantages and disadvantages of both building your own (BIY) or buying commercial solutions for sustainable security.

    See publication
  • Business opportunities with enhanced trust

    Black Hat USA 2014 Executive Summit

Recommendations received

5 people have recommended Michael

Join now to view

More activity by Michael

View Michael’s full profile

  • See who you know in common
  • Get introduced
  • Contact Michael directly
Join to view full profile

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses