Update CV.md
Этот коммит содержится в:
		
							родитель
							
								
									f8baeb50ae
								
							
						
					
					
						Коммит
						a6309e8927
					
				
							
								
								
									
										94
									
								
								CV.md
									
									
									
									
									
								
							
							
						
						
									
										94
									
								
								CV.md
									
									
									
									
									
								
							| @ -134,7 +134,7 @@ PHX2600 is a group of hackers and technology enthusiasts who gather monthly to d | ||||
| ##### Microsoft | ||||
| ###### Remote, U.S. | ||||
| -	Collaboratively identified emerging cyber threats with a team of analysts and researchers. | ||||
| -	Wrote 223 threat descriptions for the Microsoft Threat Encyclopedia, ensuring accuracy and completeness. | ||||
| -	Authored 223 threat descriptions for the Microsoft Threat Encyclopedia, ensuring accuracy and completeness. | ||||
| -	Reviewed and refined 45 threat analytics reports for the Microsoft Defender Threat Intelligence platform, maintaining Microsoft's standard for accuracy and clarity. | ||||
| -	Conducted additional research to supplement researcher data, ensuring a holistic understanding of threats. | ||||
| -	Elevated team knowledge on cybersecurity threats through meticulous research and documentation. | ||||
| @ -240,86 +240,120 @@ PHX2600 is a group of hackers and technology enthusiasts who gather monthly to d | ||||
| - Built website using HTML, CSS, and PHP. Maintained website, updating and troubleshooting as needed. | ||||
| - Maintained the Windows server that housed the customer management software. | ||||
| *** | ||||
| ### SPEAKING ENGAGEMENTS | ||||
| **Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (EMEA)**   | ||||
| ### THOUGHT LEADERSHIP | ||||
| #### Cybersecurity Podcasts | ||||
| ##### Acronis Cyber Protection Operations Center News | ||||
| January 2020 - June 2022 *Acronis*   | ||||
| -	Produced 200 webisodes focused on emerging cybersecurity threats. | ||||
| -	Scripted and presented newscasts on camera, bringing complex cybersecurity topics to a broader audience. | ||||
| -	Created graphics and edited video and audio content. | ||||
| -	Published these newscasts on platforms such as YouTube. | ||||
| 
 | ||||
| ##### Decoding Security | ||||
| June 2017 - October 2018 *SiteLock* | ||||
| -	Produced 29 episodes that delved into the latest cybersecurity news and trends. | ||||
| -	Scripted and presented in-depth stories on critical cybersecurity issues. | ||||
| -	Generated graphics and managed video and audio editing. | ||||
| -	Published content across multiple platforms, including YouTube and Spotify | ||||
| 
 | ||||
| #### Speaking Engagements | ||||
| ##### Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (EMEA) | ||||
| 2021-06-16 *Acronis*   | ||||
| Live ransomware demonstration and panel on best practices for preventing attacks | ||||
| 
 | ||||
| **Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (Americas)**   | ||||
| ##### Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (Americas) | ||||
| 2021-06-09 *Acronis*   | ||||
| Live ransomware demonstration and panel on best practices for preventing attacks | ||||
| 
 | ||||
| **2021 Partner Kickoff**   | ||||
| ##### 2021 Partner Kickoff | ||||
| 2021-02-02 *Acronis*   | ||||
| Moderated discussion with a panel of cybersecurity experts | ||||
| 
 | ||||
| **AZTC Cybersecurity Summit**   | ||||
| ##### AZTC Cybersecurity Summit | ||||
| 2020-12-02 *Arizona Tech Council and Arizona Cyber Threat Response Alliance*   | ||||
| Panel discussion on the subject of risk management | ||||
| *** | ||||
| ### PUBLICATIONS | ||||
| 
 | ||||
| #### Published Articles | ||||
| **#BHUSA or bust: Hopes and expectations for Black Hat 2021**   | ||||
| ##### Cross-Site Scripting Vulnerability In Download Manager Plugin | ||||
| 2021-06-07 *Wordfence Blog* [Article](https://www.wordfence.com/blog/2022/06/security-vulnerability-download-manager-plugin/) | ||||
| 
 | ||||
| ##### The Cybersecurity CIA Triad: What You Need to Know as a WordPress Site Owner | ||||
| 2021-06-01 *Wordfence Blog* [Article](https://www.wordfence.com/blog/2022/06/the-cybersecurity-cia-triad-what-you-need-to-know-as-a-wordpress-site-owner/) | ||||
| 
 | ||||
| ##### Your CEO Isn't Real: How to Deal With Deep Fakes | ||||
| 2021-12-06 *Security Boulevard* [Article](https://securityboulevard.com/2021/12/your-ceo-isnt-real-how-to-deal-with-deep-fakes/) | ||||
| 
 | ||||
| ##### Ransomware happens, be prepared: Preventing a LockBit attack | ||||
| 2021-09-30 *Adam Fowler IT* [Article](https://www.adamfowlerit.com/2021/09/ransomware-happens-be-prepared-preventing-a-lockbit-attack/) | ||||
| 
 | ||||
| ##### Recovering from a LockBit Ransomware Attack | ||||
| 2021-09-23 *Adam Fowler IT* [Article](https://www.adamfowlerit.com/2021/09/recovering-from-a-lockbit-ransomware-attack/) | ||||
| 
 | ||||
| ##### No user too small to target: A look at the new LockBit ransomware | ||||
| 2021-09-16 *Adam Fowler IT* [Article](https://www.adamfowlerit.com/2021/09/no-user-too-small-to-target-a-look-at-the-new-lockbit-ransomware/) | ||||
| 
 | ||||
| ##### #BHUSA or bust: Hopes and expectations for Black Hat 2021 | ||||
| 2021-07-28 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/bhusa-or-bust-hopes-and-expectations-black-hat-2021) | [Wayback Archive](https://web.archive.org/web/20210728172556/https://www.acronis.com/en-us/blog/posts/bhusa-or-bust-hopes-and-expectations-black-hat-2021) | ||||
| 
 | ||||
| **Detonating Ransomware on My Own Computer (Don’t Try This at Home)**   | ||||
| ##### Detonating Ransomware on My Own Computer (Don’t Try This at Home)**   | ||||
| 2021-07-14 *Bleeping Computer* [Article](https://www.bleepingcomputer.com/news/security/detonating-ransomware-on-my-own-computer-don-t-try-this-at-home/) | [Wayback Archive](https://web.archive.org/web/20210714144322/https://www.bleepingcomputer.com/news/security/detonating-ransomware-on-my-own-computer-don-t-try-this-at-home/) | ||||
| 
 | ||||
| **I Triggered a Ransomware Attack – Here’s What I Learned**   | ||||
| ##### I Triggered a Ransomware Attack – Here’s What I Learned | ||||
| 2021-06-23 *Security Boulevard* [Article](https://securityboulevard.com/2021/06/i-triggered-a-ransomware-attack-heres-what-i-learned/) | [Wayback Archive](https://web.archive.org/web/20210623070938/https://securityboulevard.com/2021/06/i-triggered-a-ransomware-attack-heres-what-i-learned/) | ||||
| 
 | ||||
| **Is There Hope for ICS and Supply Chain Security?**   | ||||
| ##### Is There Hope for ICS and Supply Chain Security? | ||||
| 2021-05-24 *Security Boulevard* [Article](https://securityboulevard.com/2021/05/is-there-hope-for-ics-and-supply-chain-security/) | [Wayback Archive](https://web.archive.org/web/20210524190519/https://securityboulevard.com/2021/05/is-there-hope-for-ics-and-supply-chain-security/) | ||||
| 
 | ||||
| **Cybersecurity Predictions For 2021**   | ||||
| ##### Cybersecurity Predictions For 2021 | ||||
| 2021-03-17 *Cyber Defense Magazine* [Article](https://www.cyberdefensemagazine.com/cybersecurity-predictions-for-2021/) |[Wayback Archive](https://web.archive.org/web/20210318020255/https://www.cyberdefensemagazine.com/cybersecurity-predictions-for-2021/) | ||||
| 
 | ||||
| **OSAMiner: The Apple cryptojacker that hid for five years**   | ||||
| ##### OSAMiner: The Apple cryptojacker that hid for five years | ||||
| 2021-01-28 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/osaminer-apple-cryptojacker-hid-five-years) | [Wayback Archive](https://web.archive.org/web/20210128194804/https://www.acronis.com/en-us/blog/posts/osaminer-apple-cryptojacker-hid-five-years) | ||||
| 
 | ||||
| **5 Ways to Protect Online Learning Environments**   | ||||
| ##### 5 Ways to Protect Online Learning Environments | ||||
| 2020-10-23 *Security Boulevard* [Article](https://securityboulevard.com/2020/10/5-ways-to-protect-online-learning-environments/) | [Wayback Archive](https://web.archive.org/web/20201023191257/https://securityboulevard.com/2020/10/5-ways-to-protect-online-learning-environments/) | ||||
| 
 | ||||
| **Securing Healthcare Data in a COVID World**   | ||||
| ##### Securing Healthcare Data in a COVID World | ||||
| 2020-09-01 *Security Boulevard* [Article](https://securityboulevard.com/2020/09/securing-healthcare-data-in-a-covid-world/) | [Wayback Archive](https://web.archive.org/web/20200903183508/https://securityboulevard.com/2020/09/securing-healthcare-data-in-a-covid-world/) | ||||
| 
 | ||||
| **The 2019 Database Gold Rush**   | ||||
| ##### The 2019 Database Gold Rush | ||||
| 2019-08-08 *SiteLock Blog* [Article](https://www.sitelock.com/blog/the-2019-database-gold-rush/) | [Wayback Archive](https://web.archive.org/web/20190926004030/https://www.sitelock.com/blog/the-2019-database-gold-rush/) | ||||
| 
 | ||||
| **The WordPress of the Future**   | ||||
| ##### The WordPress of the Future | ||||
| 2018-12-28 *SiteLock Blog* [Article](https://www.sitelock.com/blog/2018/12/wordpress-gutenberg/) | [Wayback Archive](https://web.archive.org/web/20190406053041/https://www.sitelock.com/blog/2018/12/wordpress-gutenberg/) | ||||
| 
 | ||||
| **When a Good Thing Goes Bad – How Vulnerabilities Were Intentionally Built Into pipdig**   | ||||
| ##### When a Good Thing Goes Bad – How Vulnerabilities Were Intentionally Built Into pipdig | ||||
| 2018-04-06 *SiteLock Blog* [Article](https://www.sitelock.com/blog/2019/04/pipdig-vulnerability/) | [Wayback Archive](https://web.archive.org/web/20190406053808/https://www.sitelock.com/blog/2019/04/pipdig-vulnerability/) | ||||
| 
 | ||||
| **Malware: The Gift That Keeps on Giving**   | ||||
| ##### Malware: The Gift That Keeps on Giving | ||||
| 2017-06-02 *Infosec Island* [Article](http://www.infosecisland.com/blogview/24935-Malware-The-Gift-That-Keeps-on-Giving.html) | [Wayback Archive](https://web.archive.org/web/20170606172629/http://www.infosecisland.com/blogview/24935-Malware-The-Gift-That-Keeps-on-Giving.html) | ||||
| 
 | ||||
| #### Contributed Content | ||||
| ##### Articles containing my quotes or research | ||||
| **What Does It Take To Be a Cybersecurity Researcher?**   | ||||
| Articles containing my quotes or research | ||||
| 
 | ||||
| ##### What Does It Take To Be a Cybersecurity Researcher? | ||||
| 2021-04-12 *The Hacker News* [Article](https://thehackernews.com/2021/04/what-does-it-take-to-be-cybersecurity.html) | [Wayback Archive](https://web.archive.org/web/20210412165613/https://thehackernews.com/2021/04/what-does-it-take-to-be-cybersecurity.html) | ||||
| 
 | ||||
| **ASIC Cyber Attack Linked to RBNZ Breach**   | ||||
| ##### ASIC Cyber Attack Linked to RBNZ Breach | ||||
| 2021-01-26 *The Australian* [Article](https://www.theaustralian.com.au/business/technology/asic-cyber-attack-linked-to-rbnz-breach/news-story/fa4e38dac3db4710bc5c8a46f607aa8d) (requires subscription) | ||||
| 
 | ||||
| **ASIC Cyber Attack Linked to RBNZ Breach**   | ||||
| ##### ASIC Cyber Attack Linked to RBNZ Breach | ||||
| 2021-01-26 *Daily Telegraph* [Article](https://www.dailytelegraph.com.au/business/asic-cyber-attack-linked-to-rbnz-breach/news-story/fa4e38dac3db4710bc5c8a46f607aa8d) (requires subscription) | ||||
| 
 | ||||
| **ASIC sic’d by sickening cyber security incident**   | ||||
| ##### ASIC sic’d by sickening cyber security incident | ||||
| 2021-01-26 *ITWire* [Article](https://www.itwire.com/security/asic-sic-d-by-sickening-cyber-security-incident.html) | [Wayback Archive](https://www.itwire.com/security/asic-sic-d-by-sickening-cyber-security-incident.html) | ||||
| 
 | ||||
| **Acronis Cyber Readiness Report: Pandemic reveals cybersecurity gaps, need for new solutions**   | ||||
| ##### Acronis Cyber Readiness Report: Pandemic reveals cybersecurity gaps, need for new solutions | ||||
| 2020-09-09 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/acronis-cyber-readiness-report-pandemic-reveals-cybersecurity-gaps-need-new-solutions) | [Report](https://dl.acronis.com/u/rc/WP_Acronis_Cyber_Readiness_Report_EN-US_200908.pdf) | [Wayback Archive (Article)](https://web.archive.org/web/20200910215942/https://www.acronis.com/en-us/blog/posts/acronis-cyber-readiness-report-pandemic-reveals-cybersecurity-gaps-need-new-solutions) | [Wayback Archive (Report)](https://dl.acronis.com/u/rc/WP_Acronis_Cyber_Readiness_Report_EN-US_200908.pdf) | ||||
| 
 | ||||
| **VMBlog Expert Interview: Topher Tebow of Acronis Reveals Findings from their 2020 MSP Cybersecurity Readiness Survey**   | ||||
| ##### VMBlog Expert Interview: Topher Tebow of Acronis Reveals Findings from their 2020 MSP Cybersecurity Readiness Survey | ||||
| 2020-06-09 *VMBlog* [Article](https://vmblog.com/archive/2020/06/09/vmblog-expert-interview-topher-tebow-of-acronis-reveals-findings-from-their-2020-msp-cybersecurity-readiness-survey.aspx) | [Wayback Archive](https://web.archive.org/web/20200619171146/https://vmblog.com/archive/2020/06/09/vmblog-expert-interview-topher-tebow-of-acronis-reveals-findings-from-their-2020-msp-cybersecurity-readiness-survey.aspx) | ||||
| 
 | ||||
| **Coronavirus crisis: Online church services attacked by hackers using child pornography**   | ||||
| ##### Coronavirus crisis: Online church services attacked by hackers using child pornography | ||||
| 2020-05-16 *Fox News* [Article](https://www.foxnews.com/tech/coronavirus-online-church-services-attacked-child-pornography-hackers) | [Wayback Archive](https://web.archive.org/web/20200515225920/foxnews.com/tech/coronavirus-online-church-services-attacked-child-pornography-hackers) | ||||
| 
 | ||||
| **Expert Advice During World Password Day 2020**   | ||||
| ##### Expert Advice During World Password Day 2020 | ||||
| 2020-05-07 *VMBlog* [Article](https://vmblog.com/archive/2020/05/07/expert-advice-during-world-password-day-2020.aspx#.Xsa7HxLQhhH) | [Wayback Archive](https://web.archive.org/web/20200521173300/https://vmblog.com/archive/2020/05/07/expert-advice-during-world-password-day-2020.aspx#.Xsa7WBLANhE) | ||||
| 
 | ||||
| **7 Steps to Web App Security**   | ||||
| ##### 7 Steps to Web App Security | ||||
| 2019-09-03 *Dark Reading* [Article](https://www.darkreading.com/analytics/7-steps-to-web-app-security/d/d-id/1335695) | [Wayback Archive](https://web.archive.org/web/20190904202018/https://www.darkreading.com/analytics/7-steps-to-web-app-security/d/d-id/1335695) | ||||
|  | ||||
		Загрузка…
	
	
			
			x
			
			
		
	
		Ссылка в новой задаче
	
	Block a user
	 kiltedhacker
						kiltedhacker