# TOPHER TEBOW ## CYBER SECURITY EXPERT See application for contact details. *** ### PROFESSIONAL PROFILE I began my journey in website technologies by simply answering customer support calls for web hosting services in order to pay for film school. This is where I tripped and fell into cybersecurity. I began to focus on identifying and removing malware from websites, and fell in love with cybersecurity. This led to taking a position as a web security analyst. In this role, I improved my website development skills, gained a deeper understanding of malware and vulnerabilities, and grew professionally into a leadership role. I eventually moved into a new role protecting endpoints, which allowed me to expand my knowledge of ransomware and other malware beyond web-based or Linux attacks, into malware targeted for Windows and Mac. I have continued to grow and thrive as an industry leader, and am ready to step up to new challenges. *** ### PROFESSIONAL AFFILIATIONS #### Arizona Cyber Threat Response Alliance (ACTRA) ##### Phoenix, AZ As a member of ACTRA, I have completed thier Threat Unit Fellows program, and have found success in cultivating a culture of collaboration and improved communication among member organizations. Together, we have helped to ensure that cyberattacks have a minimal impact on member organizations, and that new information on attacks reaches members quickly. I have reworked internal communication processes and workflows, and have begun filling a role as one of the trainers for the Threat Unit Fellows program. *** ### CAREER EXPERIENCE #### Senior Cyber Security Researcher ##### Acronis ###### Tempe, AZ As a cybersecurity researcher, I cultivate information-sharing relationships within the cybersecurity community and utilize available resources, such as blog posts, emails, and videos, to educate the public and SMBs about current cyberthreats and best practices. The role is cross-functional, requiring strong communication and collaboration with PR, Marketing, and R&D teams internally, as well as with company Directors and C-Suite. I regularly perform deep dives into active malware and other threats, write detection rules, and perform competitive analysis and compatibility testing. #### Manager, Web Security Research ##### SiteLock ###### Scottsdale, AZ In my time at SiteLock, I began by identifying and removing malware from websites. I started building tools to streamline processes, and digging deeper into malware behavior and origins. This led me to to join, and eventually lead, the Research team, where I analyze malware, write clean signatures, and assist our Marketing department in communicating our findings to internal and external sources. Being a leader on the Research team has landed with me managing the team. In this role, I have trained several new analysts, and split the team into a malware definitions team, and a threat reasearch team. This has enabled us to focus on thought leadership, dig deeper into the malware and vulnerabilities we find, and work on automation and machine learning. #### Hosting Support ##### Go Daddy ###### Gilbert, AZ I assisted customers with issues that may arise in their shared hosting accounts, as well as working the telephone, support ticket, and server support queues as needed. In this role I continued researching malware found on customer accounts, and reviewing possible attack vectors to provide suggestions to prevent future attacks. #### Chat Support ##### Go Daddy ###### Tempe, AZ I assisted customers with troubleshooting of their domain names, shared hosting accounts, email, and billing issues. I used multiple chat applications to assist customers with everything from basic account maintenance to creative problem solving as needed. Customer contacts were more account focused during this time, but I addressed technical issues as they arose. I also helped train and coach our team in India. #### Online Support ##### Go Daddy ###### Gilbert, AZ As an Online Support agent, I assisted customers with troubleshooting of account, domain, shared hosting, and server issues, utilizing our support ticket system. In this position, I began writing scripts to automate many of the repetitive tasks I performed, allowing my team and me to become more efficient. I found myself regularly reviewing malware infections on customer sites, and determining the best way to remediate the infection. #### Server Administrator ##### Terra Del Sol ###### Portland, OR At Terra Del Sol, I maintained the server and client management system. I also managed the company website, and provided desktop support as needed. *** ### SKILLS Skill | Level of 10 ------------ | ------------- Malware Analysis | • • • • • • • Cybersecurity Writing | • • • • • • • • Leadership | • • • • • • • • LAMP Administration | • • • • • • • • PHP | • • • • • • • JavaScript | • • • • • Perl | • • • • • Python | • • • • • MySQL | • • • • • • • Regex | • • • • • • • WordPress | • • • • • • • • *** ### VOLUNTEER EXPERIENCE #### Technical Director ##### Hillsong Phoenix ###### Phoenix, AZ I run the creative team during events, and troubleshoot software, computer, lighting, and audio systems when issues arise. #### Director of Things ##### Just Be Love Project ###### Phoenix, AZ I built the website, and manage the server that the website is housed on. I provide other technical services as needed for administration and project events. *** ### EDUCATION #### Certificate - Film Prodcuction with a focus on Sound Design ##### Film Production ###### Scottsdale School of Film & Theater In my time at SSFT, I studied all aspects of film and television production, from scriptwriting and pre-production, to crew positions on set, and the post-production process. *** ### SPEAKING ENGAGEMENTS **Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (EMEA)** 2021-06-16 *Acronis* Live ransomware demonstration and panel on best practices for preventing attacks **Acronis Virtual Conference: See Inside a Live Ransomware Attack Then Learn How to Prevent All of Them (Americas)** 2021-06-09 *Acronis* Live ransomware demonstration and panel on best practices for preventing attacks **2021 Partner Kickoff** 2021-02-02 *Acronis* Moderated discussion with a panel of cybersecurity experts **AZTC Cybersecurity Summit** 2020-12-02 *Arizona Tech Council and Arizona Cyber Threat Response Alliance* Panel discussion on the subject of risk management *** ### PUBLICATIONS #### Published Articles **I Triggered a Ransomware Attack – Here’s What I Learned** 2021-06-23 *Security Boulevard* [Article](https://securityboulevard.com/2021/06/i-triggered-a-ransomware-attack-heres-what-i-learned/) | [Wayback Archive](https://web.archive.org/web/20210623070938/https://securityboulevard.com/2021/06/i-triggered-a-ransomware-attack-heres-what-i-learned/) **Is There Hope for ICS and Supply Chain Security?** 2021-05-24 *Security Boulevard* [Article](https://securityboulevard.com/2021/05/is-there-hope-for-ics-and-supply-chain-security/) | [Wayback Archive](https://web.archive.org/web/20210524190519/https://securityboulevard.com/2021/05/is-there-hope-for-ics-and-supply-chain-security/) **Cybersecurity Predictions For 2021** 2021-03-17 *Cyber Defense Magazine* [Article](https://www.cyberdefensemagazine.com/cybersecurity-predictions-for-2021/) |[Wayback Archive](https://web.archive.org/web/20210318020255/https://www.cyberdefensemagazine.com/cybersecurity-predictions-for-2021/) **OSAMiner: The Apple cryptojacker that hid for five years** 2021-01-28 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/osaminer-apple-cryptojacker-hid-five-years) | [Wayback Archive](https://web.archive.org/web/20210128194804/https://www.acronis.com/en-us/blog/posts/osaminer-apple-cryptojacker-hid-five-years) **5 Ways to Protect Online Learning Environments** 2020-10-23 *Security Boulevard* [Article](https://securityboulevard.com/2020/10/5-ways-to-protect-online-learning-environments/) | [Wayback Archive](https://web.archive.org/web/20201023191257/https://securityboulevard.com/2020/10/5-ways-to-protect-online-learning-environments/) **Securing Healthcare Data in a COVID World** 2020-09-01 *Security Boulevard* [Article](https://securityboulevard.com/2020/09/securing-healthcare-data-in-a-covid-world/) | [Wayback Archive](https://web.archive.org/web/20200903183508/https://securityboulevard.com/2020/09/securing-healthcare-data-in-a-covid-world/) **The 2019 Database Gold Rush** 2019-08-08 *SiteLock Blog* [Article](https://www.sitelock.com/blog/the-2019-database-gold-rush/) | [Wayback Archive](https://web.archive.org/web/20190926004030/https://www.sitelock.com/blog/the-2019-database-gold-rush/) **The WordPress of the Future** 2018-12-28 *SiteLock Blog* [Article](https://www.sitelock.com/blog/2018/12/wordpress-gutenberg/) | [Wayback Archive](https://web.archive.org/web/20190406053041/https://www.sitelock.com/blog/2018/12/wordpress-gutenberg/) **When a Good Thing Goes Bad – How Vulnerabilities Were Intentionally Built Into pipdig** 2018-04-06 *SiteLock Blog* [Article](https://www.sitelock.com/blog/2019/04/pipdig-vulnerability/) | [Wayback Archive](https://web.archive.org/web/20190406053808/https://www.sitelock.com/blog/2019/04/pipdig-vulnerability/) **Malware: The Gift That Keeps on Giving** 2017-06-02 *Infosec Island* [Article](http://www.infosecisland.com/blogview/24935-Malware-The-Gift-That-Keeps-on-Giving.html) | [Wayback Archive](https://web.archive.org/web/20170606172629/http://www.infosecisland.com/blogview/24935-Malware-The-Gift-That-Keeps-on-Giving.html) #### Contributed Content ##### Articles containing my quotes or research **What Does It Take To Be a Cybersecurity Researcher?** 2021-04-12 *The Hacker News* [Article](https://thehackernews.com/2021/04/what-does-it-take-to-be-cybersecurity.html) | [Wayback Archive](https://web.archive.org/web/20210412165613/https://thehackernews.com/2021/04/what-does-it-take-to-be-cybersecurity.html) **ASIC Cyber Attack Linked to RBNZ Breach** 2021-01-26 *The Australian* [Article](https://www.theaustralian.com.au/business/technology/asic-cyber-attack-linked-to-rbnz-breach/news-story/fa4e38dac3db4710bc5c8a46f607aa8d) (requires subscription) **ASIC Cyber Attack Linked to RBNZ Breach** 2021-01-26 *Daily Telegraph* [Article](https://www.dailytelegraph.com.au/business/asic-cyber-attack-linked-to-rbnz-breach/news-story/fa4e38dac3db4710bc5c8a46f607aa8d) (requires subscription) **ASIC sic’d by sickening cyber security incident** 2021-01-26 *ITWire* [Article](https://www.itwire.com/security/asic-sic-d-by-sickening-cyber-security-incident.html) | [Wayback Archive](https://www.itwire.com/security/asic-sic-d-by-sickening-cyber-security-incident.html) **Acronis Cyber Readiness Report: Pandemic reveals cybersecurity gaps, need for new solutions** 2020-09-09 *Acronis Blog* [Article](https://www.acronis.com/en-us/blog/posts/acronis-cyber-readiness-report-pandemic-reveals-cybersecurity-gaps-need-new-solutions) | [Report](https://dl.acronis.com/u/rc/WP_Acronis_Cyber_Readiness_Report_EN-US_200908.pdf) | [Wayback Archive (Article)](https://web.archive.org/web/20200910215942/https://www.acronis.com/en-us/blog/posts/acronis-cyber-readiness-report-pandemic-reveals-cybersecurity-gaps-need-new-solutions) | [Wayback Archive (Report)](https://dl.acronis.com/u/rc/WP_Acronis_Cyber_Readiness_Report_EN-US_200908.pdf) **VMBlog Expert Interview: Topher Tebow of Acronis Reveals Findings from their 2020 MSP Cybersecurity Readiness Survey** 2020-06-09 *VMBlog* [Article](https://vmblog.com/archive/2020/06/09/vmblog-expert-interview-topher-tebow-of-acronis-reveals-findings-from-their-2020-msp-cybersecurity-readiness-survey.aspx) | [Wayback Archive](https://web.archive.org/web/20200619171146/https://vmblog.com/archive/2020/06/09/vmblog-expert-interview-topher-tebow-of-acronis-reveals-findings-from-their-2020-msp-cybersecurity-readiness-survey.aspx) **Coronavirus crisis: Online church services attacked by hackers using child pornography** 2020-05-16 *Fox News* [Article](https://www.foxnews.com/tech/coronavirus-online-church-services-attacked-child-pornography-hackers) | [Wayback Archive](https://web.archive.org/web/20200515225920/foxnews.com/tech/coronavirus-online-church-services-attacked-child-pornography-hackers) **Expert Advice During World Password Day 2020** 2020-05-07 *VMBlog* [Article](https://vmblog.com/archive/2020/05/07/expert-advice-during-world-password-day-2020.aspx#.Xsa7HxLQhhH) | [Wayback Archive](https://web.archive.org/web/20200521173300/https://vmblog.com/archive/2020/05/07/expert-advice-during-world-password-day-2020.aspx#.Xsa7WBLANhE) **7 Steps to Web App Security** 2019-09-03 *Dark Reading* [Article](https://www.darkreading.com/analytics/7-steps-to-web-app-security/d/d-id/1335695) | [Wayback Archive](https://web.archive.org/web/20190904202018/https://www.darkreading.com/analytics/7-steps-to-web-app-security/d/d-id/1335695)