Michael Wylie, MBA, CISSP is the leader of a global managed threat hunting team, bringing expertise in strategic threat hunting to the table. As the former Director of Threat Hunting at CrowdStrike and the Director of Cybersecurity Services at a top 100 accounting firm, he spearheaded the development and growth of DFIR and Threat Hunting. With extensive experience teaching and training, Michael has delivered courses for elite organizations, including the U.S. Department of Defense, LinkedIn Learning, DEFCON, Moorpark College, California State Universities, and numerous clients worldwide.
Videos:
Recordings of prior talks, workshops, interviews, and events can be found here: https://www.youtube.com/playlist?list=PLUP_XONq0uSCAGPCQaqJt6xU7CohJTbnw
Teaching & Workshops:
- Moorpark College: Intro to Pen Testing
- Moorpark College: CEH
- Moorpark College Blue Team & Threat Hunting
- ISSA: Using NMAP for network scanning and penetration testing
- ISACA: Using NMAP for network scanning and penetration testing
- BsidesLV: Using NMAP for network scanning and penetration testing
- California State University, Northridge: Information Security & Information Assurance
- ISSA: Using Wireshark for Incident Response and Threat Hunting
- Moorpark College: CCNA R&S
- Department of Defense: Certified Ethical Hacker
- Department of Defense: Security+
- Department of Defense: CCNA R&S
- ShellCon: Wireshark for Incident Response and Threat Hunting
- DEFCON 27: Wireshark for Incident Response and Threat Hunting
- BSidesLV: Wireshark for Incident Response and Threat Hunting
- ISSA: Fundamental of Malware Analysis
- ISACA: Preparing for the Event – Best Practices for Incident Response and Root-Cause Forensics
- Cloud Security Alliance (CSA): Examining Cloud File Storage Incidents
- OWASP: Wireshark for IR & Threat Hunting
- WSC: Linux for Cybersecurity
- ISSA NAC – Wireshark for IR & Threat Hunting
- ISSA Grand Traverse – Wireshark for IR & Threat Hunting
- ISSA Chattanooga – Wireshark for IR & Threat Hunting
- CSA LA: Intro to Linux for InfoSec
- DEFCON 28: Wireshark for Incident Response & Threat Hunting
- DEFCON 28: Fundamentals of Malware Analysis
Talks:
- DEFCON28: Discovering Cloud File Storage Artifacts
- DEFCON 28: Enumerating Cloud File Storage Gems
- ISSA VC: Fundamentals of Malware Analysis & Response
- ISSA: Shooting Puny Phish in a Barrel
- ISSA Thought Leadership Series: Is Your Organization Ready for Automation?
- ISSA Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle
- CISO Forum: Decentralized Workforce
- BSidesLV: Your tax data is being leaked
- ISACA: The costly Mistakes of Being Unprepared
- ISACA: AWS Cloud Security on the Dollar Menu
- BSides Augusta: The Costly Mistakes of Being Unprepared
- MSP Expo: The Costly Mistakes of Being Unprepared
- MSP Expo Panel: Panel: Locking up Your Data, Not Your Access is Key to Customer Success
- ToorCon: Shooting Puny Phish in a Barrel
- ToorCon: You’re not alone in your hotel room
- ToorCon: My Little AWS IR Sandbox
- RMISC: Cloud Security on the Dollar Menu
- MBA Regional Panel: The Latest In Cybersecurity
- DEFCON 27: Using Wireshark for Incident Response & Threat Hunting
- DEFCON 27: Phishing with Puny Bait
- ISACA: Counterhacking Websites
- ISACA: Continuous Cloud Security Monitoring
- AppSec California: Continuous Cloud Security Monitoring (CCSM)
- ISACA: Fundamentals of Malware Analysis & Response
- Content Protection Summit: Security Implication of ‘Work from Home’: The Year of Breaches
- OWASP 24 Hour Global Conference – Your Taxes are Still Being Leaked
- ISSA Denver – Continuous Cloud Security Monitoring for Enterprises
- ISSA Capital of Texas – Puny Phishing
Publications:
- Tripwire: State of Security: Your Taxes are Being Leaked
- Loan Vision: Your Role in Keeping Company Data Safe
- Packt (Technical Editor): CISSP in 21 Days
- Tripwire: Staving Off the Monetary Consequences of a Data Breach
- Best Company: What You Need to Know About Disney Plus Compared to Other Streaming Services
- Punycode Phishing: How to Prevent Attacks
- Men’s Journal: Is It Safe to Charge Your Phone At a Public USB Port? Here’s What Experts Say
- SANS: Learn from the Best Cyber Security Practitioners in the World
- SSLstore: The Top Cyber Security Certifications Hiring Managers Will Look For in 2020
- MESA Alliance: CPS 2019: SHIFT, Richey May Technology to Address Security Challenges
- Best Company: What You Need to Know About Disney Plus Compared to Other Streaming Services
- TechTarget: Enterprises betting on SOAR tools to fill security gaps
- Dark Reading: In the Market for a MSSP? Ask These Questions First
- M&E Daily: Important Updates to MPA Best Practices You Don’t Want To Miss
- M&E Daily: Richey May Tech: Remote Working a Daunting Security Challenge
News & Media:
Certifications:
- ISC2 – CISSP
- Cisco – CCNA R&S
- Cisco – CCNA CyberOps
- GIAC – GPEN
- GIAC – GMON
- GIAC – GCFE
- TPN – Certified TPN Assessor
- EC-Council – CEH
- EC-Council – CEI
- VMware – VCP-DCV
- CHPA
- CompTIA – PenTest+
- CompTIA – Security+
- CompTIA – Project+
- CompTIA – Network Vulnerability Assessment Professional
- Microsoft – Azure Fundamentals