About

Michael Wylie, MBA, CISSP is the leader of a global managed threat hunting team, bringing expertise in strategic threat hunting to the table. As the former Director of Threat Hunting at CrowdStrike and the Director of Cybersecurity Services at a top 100 accounting firm, he spearheaded the development and growth of DFIR and Threat Hunting. With extensive experience teaching and training, Michael has delivered courses for elite organizations, including the U.S. Department of Defense, LinkedIn Learning, DEFCON, Moorpark College, California State Universities, and numerous clients worldwide.

Videos:

Recordings of prior talks, workshops, interviews, and events can be found here: https://www.youtube.com/playlist?list=PLUP_XONq0uSCAGPCQaqJt6xU7CohJTbnw

Teaching & Workshops:

  • Moorpark College: Intro to Pen Testing
  • Moorpark College: CEH
  • Moorpark College Blue Team & Threat Hunting
  • ISSA: Using NMAP for network scanning and penetration testing
  • ISACA: Using NMAP for network scanning and penetration testing
  • BsidesLV: Using NMAP for network scanning and penetration testing
  • California State University, Northridge: Information Security & Information Assurance
  • ISSA: Using Wireshark for Incident Response and Threat Hunting
  • Moorpark College: CCNA R&S
  • Department of Defense: Certified Ethical Hacker
  • Department of Defense: Security+
  • Department of Defense: CCNA R&S
  • ShellCon: Wireshark for Incident Response and Threat Hunting
  • DEFCON 27: Wireshark for Incident Response and Threat Hunting
  • BSidesLV: Wireshark for Incident Response and Threat Hunting
  • ISSA: Fundamental of Malware Analysis
  • ISACA: Preparing for the Event – Best Practices for Incident Response and Root-Cause Forensics
  • Cloud Security Alliance (CSA): Examining Cloud File Storage Incidents
  • OWASP: Wireshark for IR & Threat Hunting
  • WSC: Linux for Cybersecurity
  • ISSA NAC – Wireshark for IR & Threat Hunting
  • ISSA Grand Traverse – Wireshark for IR & Threat Hunting
  • ISSA Chattanooga – Wireshark for IR & Threat Hunting
  • CSA LA: Intro to Linux for InfoSec
  • DEFCON 28: Wireshark for Incident Response & Threat Hunting
  • DEFCON 28: Fundamentals of Malware Analysis

Talks:

Publications:

News & Media:

Certifications:

  • ISC2 – CISSP
  • Cisco – CCNA R&S
  • Cisco – CCNA CyberOps
  • GIAC – GPEN
  • GIAC – GMON
  • GIAC – GCFE
  • TPN – Certified TPN Assessor
  • EC-Council – CEH
  • EC-Council – CEI
  • VMware – VCP-DCV
  • CHPA
  • CompTIA – PenTest+
  • CompTIA – Security+
  • CompTIA – Project+
  • CompTIA – Network Vulnerability Assessment Professional
  • Microsoft – Azure Fundamentals