Personal Information
Unternehmen/Arbeitsplatz
Austin United States
Beruf
Information Security Program Owner
Branche
Technology / Software / Internet
Webseite
http://www.joshsokol.com
Info
My early career was focused around System Administration (Linux and Unix) with an emphasis on web technologies such as web servers, FTP servers, application servers, and databases. That said, Information Security has always been my passion and in early 2010 National Instruments finally gave me the opportunity to become the Information Security Program Owner. Today, I continue to run their security program handling everything from compliance to enterprise risk management to vulnerability management and more; none of which existed prior to me starting the program. I have instructed many different trainings internally and have presented externally at a large number of conferences includi...
Tags
security
austin
mod_proxy
firefox
tamperdata
webscarab
ratproxy
proxies
proxy
query
malware
patterns
network
analytics
data
system
compromised
application
web
owasp
Mehr anzeigen
Präsentationen
(2)Personal Information
Unternehmen/Arbeitsplatz
Austin United States
Beruf
Information Security Program Owner
Branche
Technology / Software / Internet
Webseite
http://www.joshsokol.com
Info
My early career was focused around System Administration (Linux and Unix) with an emphasis on web technologies such as web servers, FTP servers, application servers, and databases. That said, Information Security has always been my passion and in early 2010 National Instruments finally gave me the opportunity to become the Information Security Program Owner. Today, I continue to run their security program handling everything from compliance to enterprise risk management to vulnerability management and more; none of which existed prior to me starting the program. I have instructed many different trainings internally and have presented externally at a large number of conferences includi...
Tags
security
austin
mod_proxy
firefox
tamperdata
webscarab
ratproxy
proxies
proxy
query
malware
patterns
network
analytics
data
system
compromised
application
web
owasp
Mehr anzeigen