Tom Kellermann is a cyber-intelligence expert, author, professor and leader in the field of cybersecurity. Tom is the co-founder of Strategic Cyber Ventures and serves as a Global Fellow for the Wilson Center.
Having held a seat on the Commission on Cyber Security for the 44th President of the United States and serving as an advisor to the International Cyber Security Protection Alliance (ICSPA), he has worked in the highest levels of cybersecurity. He has applied his expertise in the corporate world, as Chief Cybersecurity Officer for Trend Micro Inc. where Tom was responsible for analysis of emerging cybersecurity threats and relevant defensive technologies.
Prior to Trend Micro, Tom served as the Vice President of Security for Core Security. Tom began his career as Senior Data Risk Management Specialist for the World Bank Treasury Security Team, where he was responsible for cyber-intelligence and security policy as he advised central banks around the world about their cyber-risk posture.
In addition to his professional work, Tom believes in sharing his knowledge to benefit others in order to combat cybercrime. Tom was a Professor at American University's School of International Service and the Kogod School of Business, and he co-authored the book "E-safety and Soundness: Securing Finance in a New Age." He regularly presents at global cybersecurity conferences and is a contributor on cyber analysis for major networks. Tom is a Certified Information Security Manager and is a Certified Ethical Hacker.
The opinions expressed in this blog are those of Tom Kellermann and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.
Ever wonder why your identity got stolen? Post-Equifax this article highlights a modern security strategy for the credit bureaus.
CMOs must prepare to defend their brand and company with tools and strategies to combat almost inevitable cybersecurity events.
The importance of the European Global Data Protection Regulation and its implications for cybersecurity in America.
An effective hunt can mitigate lateral movement and the exfiltration of the crown jewel, but the true utility of an effective hunt team is to inhibit destructive attacks and effectuate attribution.