As a seasoned security consultant with decades of experience, I've witnessed a wide range of cybersecurity incidents. In this talk, I will share a compelling true story of a prison that fell victim to a ransomware attack, leading to the exfiltration of over 250GB of personally identifiable information (PII).
Richard Suls
With over fifteen years of entrepreneurial experience in cybersecurity, I transitioned to a pivotal role within a multi-national corporation, continuing my journey in the realm of digital defense. My fascination with computers and security often places me in a state of flow, driving my passion and expertise in the field.
Over the years, I've delved into various specializations:
* Tabletop Exercises (TTX) and Cybersecurity Maturity Evaluations (CMEs): Crafting and executing realistic tabletop exercises and evaluations has been a cornerstone of my work, helping organizations gauge their preparedness and resilience against cyber threats.
* Incident Response (IR): I have orchestrated numerous incident response operations, leading teams through the crucial phases of detection, analysis, containment, and recovery. My goal is always to mitigate damage and swiftly restore normalcy.
* Build Reviews: Ensuring that system configurations are secure and compliant with industry standards is another area of my expertise. I meticulously review system builds from inception to deployment to safeguard against vulnerabilities.
* Threat Modeling: I specialize in identifying potential threats and vulnerabilities, devising strategies to counteract them. This proactive approach is essential in creating robust security architectures.
* Network Security (Netsec): My work in network security includes designing secure network infrastructures, deploying advanced intrusion detection and prevention systems, and conducting thorough security assessments to protect against emerging threats.
* Design Reviews: I engage deeply in design reviews to evaluate the security aspects of new systems and applications, collaborating with development teams to embed security into the foundation of their projects.
* Cloud Security: In the cloud security domain, I ensure that cloud environments are fortified against threats. My experience spans multiple cloud platforms, where I implement stringent security controls and best practices.
* Leadership: Throughout my career, I have embraced leadership roles, mentoring teams, spearheading strategic initiatives, and fostering a culture of security awareness. My leadership philosophy centers on collaboration, continuous improvement, and proactive cybersecurity.
My journey in cybersecurity has been marked by a passionate pursuit of knowledge and a personal desire to safeguard digital landscapes. Whether it's through hands-on incident response or strategic threat modeling, I am dedicated to advancing the field and empowering organizations to defend against the ever-evolving cyber threat landscape.