top of page
  • Twitter Social Icon
  • LinkedIn Social Icon

Whitepapers & Publications

2020

​

2019

 

2018

 

2013

  • Abstract on Detecting Anonymous Cyber Attacks, American Computing Machinery (ACM), as part of the Cyber Security and Information Intelligence Research Workshop CSIIRW

 

2012

  • Detecting Anonymous Cyber Attacks: Motivations, Adversaries, and Methods; Utica College

  • Creating a Structured and Sustainable Cyber Militia; Treasdstone71

  • Preparing for and Deploying Software Deception in a Corporate Environment; Treadstone71

  • Analysis of Coreflood and the FBI's Actions to Disband; Treadstone71

Presentations & Media

2025

  • Security Controls for Operational Technology

    • Cyber Risk Summit, NetDiligence, Toronto

 

2024​​

​

2023

  • Making Peace with the War Exclusion 

    • Executive Edge Insurance / Legal Summit 

​​

2022

  • Surviving and Thriving in Cybersecurity; Career Lessons Learned

    • Boise State CORe Seminar Series​

​

2020

  • NVTC Captial Cybersecurity Summit: The Operational Technology Cybersecurity Landscape

    • Panel​

  • Joining, Building, and Scaling a Fully Remote Team ​

    • BSides ID​

  • BSides IF: Starting in Cybersecurity​

    • Panel​

​

2019

 

2018

 

2017

  • IR Challenges 

    • Dragos Industrial Security Conference; Hanover, MD

  • Cybersecurity Trends for Senior Leadership

    • Venture Capital Summit; Anaheim CA

  • Understanding The Full Scope of Attacks: Hunting Methodologies 

    • Cybersecurity Summitt; Montreal, Canada
    • Private Forum; Atlanta, GA

  • FBI Threat Detection and IR Briefing 

    • Infragard Outreach; Orlando, FL

  • Incident Response Through Case Studies

    • Oklahoma City University

  • Industry Impacts of Ransomware

    • Kinber Webcast

  • Biotechnology in the High Desert Panelist

    • Portland, OR

  • Understanding the Full Scope of Attacks and Identifying Trends

    • RSA Techfest

  • Threat Hunting: From Hyped Buzzword to Practical Application

    • RSA Techfest

  • Held For Ransom

    • S4; Miami FL

 

2016

  • Current Threat Landscape Through Case Studies;

    • Secret Service and FBI Forum; Salt Lake City, UT

  • FBI Forum Incident Response Summit Panelist

    • Infragard Outreach; Seattle, WA 

  • Identifying TTP's from Incident Response

    • Infragard Forum; Boston, MA

  • Why So Many Endpoint Attacks are Still Going Undetected - And What You Can Do About It

    • SANS Webcast

  • Methodical Incident Response

    • Infragard Outreach; Redmond, WA; Tacoma, WA; Portland, OR

  • Ransomware Case Study

    • RSA TechFest

 

2015

  • FBI Incident Response and Current Threat Landscape Panelist

    • Infragard Outreach; Seattle, WA 

 

2014

  • Incident Response Techniques and Tactics

    • Department of Homeland Security ICS Training, Idaho Falls, ID

 

2008

  • Cyber Security Awareness Training

    • Department of Energy's Information Management Conference

  • Automated System Risk Assessment Tool

    • Department of Energy's Cyber Security Conference 

 

2007

  • PNNL's Approach to a Host-Based Firewall

    • Department of Energy's Cyber Security Conference 

  • Grey Twitter Icon
  • Grey LinkedIn Icon
bottom of page