Glen Roberts
Charlotte, North Carolina, United States
9K followers
500+ connections
About
Information security and technology professional with a background in IT infrastructure…
Articles by Glen
Activity
-
Had a productive trip to Microsoft headquarters with the team to strategize on evolving the Corebridge partnership and boosting our growth strategy…
Had a productive trip to Microsoft headquarters with the team to strategize on evolving the Corebridge partnership and boosting our growth strategy…
Liked by Glen Roberts
-
Well folks, I jumped on the bandwagon. This is what ChatGPT created as a visual depiction to summarize my career thus far. At first I thought it…
Well folks, I jumped on the bandwagon. This is what ChatGPT created as a visual depiction to summarize my career thus far. At first I thought it…
Liked by Glen Roberts
-
🌍 It’s Global Volunteer Month at Corebridge Financial! This year, #TeamCorebridge in Durham, NC took action by completing Project Helping Kynd Kits…
🌍 It’s Global Volunteer Month at Corebridge Financial! This year, #TeamCorebridge in Durham, NC took action by completing Project Helping Kynd Kits…
Liked by Glen Roberts
Experience
Education
Licenses & Certifications
-
-
-
Certified Information Systems Security Professional (CISSP)
(ISC)2
Issued ExpiresCredential ID 414270 -
-
-
-
-
-
-
Volunteer Experience
-
Container Orchestration SIG Member
PCI Security Standards Council
- 2 years 1 month
Science and Technology
Special Interest Group for publishing best practices pertaining to container orchestration.
-
Cloud Cryptographic Services SIG Member
PCI Security Standards Council
- 3 years 10 months
Science and Technology
Special Interest Group for the use of cloud cryptographic services in transaction payments and P2PE solutions.
-
Speaker at Atlantic Security Conference in Halifax
AtlSecCon
- Present 11 years 2 months
Science and Technology
-
Speaker at Security Bsides Orlando Conference
Security BSides Orlando
- Present 11 years 2 months
Science and Technology
-
Speaker at Security BSides Salt Lake City Conference
Security Bsides SLC
- Present 11 years 3 months
Science and Technology
-
Speaker at Security BSides Indianapolis Conference
Security BSides Indy
- Present 11 years 4 months
Science and Technology
-
-
Speaker at 2nd Annual Prolexic Executive Forum
Prolexic Technologies
- Present 12 years 11 months
Science and Technology
Presentation: DDoS Attacks & Lessons Learned
-
Speaker at CUNA Technology Council Roundtable
CUNA -- Credit Union National Association
- 1 month
Science and Technology
Presentation: Distributed Denial of Service
-
Speaker at 2013 NAFCU Technology & Security Conference
National Association of Federal Credit Unions
- Present 13 years 4 months
Science and Technology
Presentation: Mitigating and Responding to a Distributed Denial of Service (DDoS) Attack
-
Director of Education
InfraGard
- 1 year
Science and Technology
FBI InfraGard - Central Texas
-
Facilitator of Project Management at SANSFIRE 2012
SANS Institute
- less than a year
Science and Technology
Washington, DC
-
Panelist at ConSec 2012
ConSec
- Present 13 years 9 months
Science and Technology
BYOD Trends: Emerging Devices and Usage
-
Speaker at NCUA Meeting of Corporate Credit Unions
NCUA
- Present 14 years 2 months
Science and Technology
Presentation: Collaborative Contingency in the Cloud
-
MC for Security B-Sides Austin
Security B-Sides
- Present 14 years 2 months
Science and Technology
Cloud Security Track
-
Speaker at CUISPA 2012: IT Risk & Security Summit
Credit Union Information Security Association
- Present 14 years 4 months
Science and Technology
Presentation: Sharing the Cloud
-
Project Manager at SANS Cyber Defense Initiative 2010
SANS Institute
- Present 15 years 6 months
Science and Technology
Publications
-
Hardware Keyloggers
SANS Institute White Paper
See publicationMost information security professionals are familiar with keyloggers. However, while the security industry has produced plenty of defenses for software-based keyloggers, hardware keyloggers continue to pose a daunting problem for the typical enterprise. A deeper understanding of these insidious devices can lead to viable techniques for both protection and detection.
-
Cybersecurity Inventory at Home
SANS Reading Room
See publicationConsumers need better home network security guidance for taking stock of the hardware
and software applications installed on their network and devices. The primary sources of
information security advice for the average person are TV, magazines, newspapers,
websites and social media. Unfortunately, these sources typically repeat the same advice,
provide limited guidance and miss key areas of security that should be taken into
consideration when securing home networks. On the other…Consumers need better home network security guidance for taking stock of the hardware
and software applications installed on their network and devices. The primary sources of
information security advice for the average person are TV, magazines, newspapers,
websites and social media. Unfortunately, these sources typically repeat the same advice,
provide limited guidance and miss key areas of security that should be taken into
consideration when securing home networks. On the other hand, enterprises receive
comprehensive, prioritized guidance such as the Critical Security Controls from The
Center for Internet Security. Unfortunately, these controls were not designed with
securing home networks in mind. The wide gap between consumer-media advice
columns and highly professional corporate security controls needs to be bridged. This can
be done by using the Critical Security Controls as a comprehensive foundation from
which to craft an authoritative yet easy-to-understand set of home network security
recommendations for individuals. The first step is distilling the guidance for inventorying
hardware and software applications. -
How to Take Charge of Your Infosec Career
The State of Security by Tripwire
See publicationA typical information security conference can cost $5,000 plus plane and hotel costs and, although it might seem to be an exorbitant sum of money, many of us could easily defend the value and necessity of the training to bolster one’s technical capabilities.
But when was the last time you invested even just a few hours of your time to working on developing your information security career in truly meaningful way?
Languages
-
English
Native or bilingual proficiency
-
Spanish
Limited working proficiency
Recommendations received
93 people have recommended Glen
Join now to viewMore activity by Glen
-
Excited to share a new opportunity within our team! We are looking for an Assistant Vice President II - IT Security Operations to join us at…
Excited to share a new opportunity within our team! We are looking for an Assistant Vice President II - IT Security Operations to join us at…
Shared by Glen Roberts
-
The ship has been successfully docked. A full community effort to make it happen. So thankful to the entire Third Party Risk Association (TPRA) -…
The ship has been successfully docked. A full community effort to make it happen. So thankful to the entire Third Party Risk Association (TPRA) -…
Liked by Glen Roberts
-
Excited to be hosting this Third Party Risk Association (TPRA) - Third Party Risk Management Roundtable at the upcoming in conference in Myrtle Beach…
Excited to be hosting this Third Party Risk Association (TPRA) - Third Party Risk Management Roundtable at the upcoming in conference in Myrtle Beach…
Liked by Glen Roberts
-
Two of my favorite people to converse with on TPRM in the same room. Nice! Thanks Christopher Strazishar & Andy Fiumefreddo for being part of the…
Two of my favorite people to converse with on TPRM in the same room. Nice! Thanks Christopher Strazishar & Andy Fiumefreddo for being part of the…
Liked by Glen Roberts
-
It is amazing how much third party management advances every year to keep up with the changing risks and customer need. So glad Third Party Risk…
It is amazing how much third party management advances every year to keep up with the changing risks and customer need. So glad Third Party Risk…
Liked by Glen Roberts
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content