About
Security leader with 20+ years of practical enterprise security experience, including…
Services
Courses by Marc
-
ISO 27001:2022-Compliant Cybersecurity: Getting Started1h 22m
ISO 27001:2022-Compliant Cybersecurity: Getting Started
By: Marc Menninger
Articles by Marc
Activity
-
I have been using AI to build something very pro-human. I will be announcing it soon. If you are interested in being an early tester before then…
I have been using AI to build something very pro-human. I will be announcing it soon. If you are interested in being an early tester before then…
Liked by Marc Menninger, CISSP, CRISC
-
If you’re not already following Morten Rand-Hendriksen…it’s time.
If you’re not already following Morten Rand-Hendriksen…it’s time.
Liked by Marc Menninger, CISSP, CRISC
-
Big milestone for us — OFFENSAI v2 is officially live!!! 🚀 As AI-powered offensive testing accelerates, we’re seeing a surge in vulnerabilities…
Big milestone for us — OFFENSAI v2 is officially live!!! 🚀 As AI-powered offensive testing accelerates, we’re seeing a surge in vulnerabilities…
Liked by Marc Menninger, CISSP, CRISC
Experience
Education
Licenses & Certifications
Volunteer Experience
-
Member
Rotary International
- Present 18 years 3 months
Social Services
Rotary International is an international service organization created to bring together business and professional leaders in order to provide humanitarian services, encourage high ethical standards in all vocations, and help build goodwill and peace in the world.
I have been an active member of Emerald City Rotary Club in Seattle since 2008.
Publications
-
The Cybersecurity Threat Landscape
LinkedIn Learning
See publicationAs tech systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect against them? In this course, Marc Menninger describes some of the most common cybersecurity threats, including phishing and ransomware, deepfakes, unmanaged Internet of Things (IoT) devices, business email…
As tech systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect against them? In this course, Marc Menninger describes some of the most common cybersecurity threats, including phishing and ransomware, deepfakes, unmanaged Internet of Things (IoT) devices, business email compromise, and more. He then teaches the best countermeasures for reducing or eliminating the impact of these threats.
-
Writing Security Policies and Standards
LinkedIn Learning
See publicationMaster the skills to develop and manage security policies that protect your organization’s critical information and resources. In this comprehensive course, Marc Menninger covers every aspect of security policy creation, from foundational concepts—like policies, standards, procedures, and guidelines—to crafting clear, effective policies that align with governance frameworks like ISO 27001 and HIPAA. Explore the security policy lifecycle, learn to create security policy architecture diagrams…
Master the skills to develop and manage security policies that protect your organization’s critical information and resources. In this comprehensive course, Marc Menninger covers every aspect of security policy creation, from foundational concepts—like policies, standards, procedures, and guidelines—to crafting clear, effective policies that align with governance frameworks like ISO 27001 and HIPAA. Explore the security policy lifecycle, learn to create security policy architecture diagrams, and discover how to leverage free templates and AI tools to streamline policy development. Learn to manage policy exceptions, write key policies such as Information Security, Data Protection, Acceptable Use, and Access Control, monitor compliance, and respond to violations. This course is essential for security professionals, IT personnel, and compliance officers looking to build a robust security framework that safeguards their organization’s data and systems.
-
Performing a Technical Security Audit and Assessment
LinkedIn Learning
See publicationThis course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course…
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure.
Learning objectives
🔹 Cite the three phases of external security assessments.
🔹 Explain the reasons for conducting a log review.
🔹 Explain what network sniffing is and why it’s used.
🔹 Describe when to use a file integrity checking tool.
🔹 Differentiate between active network discovery and passive network discovery.
🔹 Explain how to scan for vulnerabilities.
🔹 Relate the three techniques useful for validating target vulnerabilities.
🔹 Explain the four-stage methodology of conducting penetration tests. -
Transitioning to a Career in Cybersecurity
LinkedIn Learninng
See publicationCybersecurity continues to be one of the fastest-growing career fields, with thousands of jobs of all types going unfilled. If you’re eager to transition to a career in this vital industry but don’t know where to start, then this is the course for you.
Instructor Marc Menninger—a cybersecurity director with 20+ years of experience—explains how to use the skills and experience you already have to build a lucrative and successful career in cybersecurity.
Whether your background is…Cybersecurity continues to be one of the fastest-growing career fields, with thousands of jobs of all types going unfilled. If you’re eager to transition to a career in this vital industry but don’t know where to start, then this is the course for you.
Instructor Marc Menninger—a cybersecurity director with 20+ years of experience—explains how to use the skills and experience you already have to build a lucrative and successful career in cybersecurity.
Whether your background is in IT, security, or another field, Marc can help you identify the right cybersecurity specialization and pinpoint skill gaps. He explains how to update your cybersecurity resume and LinkedIn profile to maximize your visibility and create a strong first impression with potential employers. Marc also shares tips for increasing your chances of success in cybersecurity—both before and after you land your first job—as well as insights that illuminate the average workday of a real-world cybersecurity pro. -
ISO 27001:2022-Compliant Cybersecurity: The Annex A Controls
LinkedIn Learning
See publicationThe Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and demonstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive overview of all 93 security controls in Annex A of the ISO 27001 standard. You can use this knowledge to build a better security program and prepare for compliance with the ISO 27001 standard. This course…
The Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and demonstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive overview of all 93 security controls in Annex A of the ISO 27001 standard. You can use this knowledge to build a better security program and prepare for compliance with the ISO 27001 standard. This course includes handy documents with recommended ways to demonstrate compliance with ISO 27001, providing you with tools you need to get started on implementing the controls to build an ISO 27001-compliant cybersecurity program.
Note: It is recommended that you start with part one, ISO 27001:2022-Compliant Cybersecurity: Getting Started, which includes background information and compliance requirements you need to know if you're serious about building an ISO 27001-compliant cybersecurity program. -
ISO 27001:2022-Compliant Cybersecurity: Getting Started
LinkedIn Learning
See publicationDiscover why the ISO 27001-2022 standard is one of the most popular frameworks for building effective cybersecurity programs and learn what it takes to comply with and get certified as compliant with this standard. In this course, cybersecurity director Marc Menninger provides an overview of how to build an ISO 27001-2022-compliant cybersecurity program. Learn what this standard is and discover why it is used around the world as the guidebook for constructing information security programs that…
Discover why the ISO 27001-2022 standard is one of the most popular frameworks for building effective cybersecurity programs and learn what it takes to comply with and get certified as compliant with this standard. In this course, cybersecurity director Marc Menninger provides an overview of how to build an ISO 27001-2022-compliant cybersecurity program. Learn what this standard is and discover why it is used around the world as the guidebook for constructing information security programs that work. Dive into how the standard is organized and get a description of the certification process. Explore a step-by-step plan that you can follow if you want to build a cybersecurity program that complies with the ISO 2700-2022 standard. Additionally, go over gaps and criticisms of the standard and examine ways to fill those gaps. With the information in this course, you can begin to build a cybersecurity program that is both effective and compliant with ISO 27001-2022.
-
Cybersecurity Careers and Certifications
LinkedIn Learning
See publicationDemand for cybersecurity professionals has never been higher—and it's only projected to keep growing. Interested in finding a job in this exciting new field? Or simply advancing to the next level? Cybersecurity expert Marc Menninger explains how to launch and develop a successful career in cybersecurity, regardless of your background or current level of experience. Learn about the nine most common cybersecurity jobs and the duties and qualifications for each role. Learn which cybersecurity…
Demand for cybersecurity professionals has never been higher—and it's only projected to keep growing. Interested in finding a job in this exciting new field? Or simply advancing to the next level? Cybersecurity expert Marc Menninger explains how to launch and develop a successful career in cybersecurity, regardless of your background or current level of experience. Learn about the nine most common cybersecurity jobs and the duties and qualifications for each role. Learn which cybersecurity certifications appear in job listings and which ones will help you get the job you want. Follow example career paths to learn how others have progressed: from IT hobbyist to help-desk technician to analyst, systems architect, and more. Marc closes with career advice specific to cybersecurity, which will help you succeed in this dynamic and high-demand industry.
Organizations
-
ISACA
-
- Present
Recommendations received
-
LinkedIn User
35 people have recommended Marc
Join now to viewMore activity by Marc
-
They said not to pet the sharks but I couldn't resist, they're so damn cute! #paulontheroad
They said not to pet the sharks but I couldn't resist, they're so damn cute! #paulontheroad
Liked by Marc Menninger, CISSP, CRISC
-
Waiting for LinkedIn to allow me to update my profile, but as many people heard last week, I recently joined AISLE™ and the Field CISO. Few people…
Waiting for LinkedIn to allow me to update my profile, but as many people heard last week, I recently joined AISLE™ and the Field CISO. Few people…
Liked by Marc Menninger, CISSP, CRISC
-
Woh! I didn't know that was coming.
Woh! I didn't know that was coming.
Liked by Marc Menninger, CISSP, CRISC
-
The best part of RSA Conference isn't on the agenda. I just wrapped up four days at RSAC 2026 in San Francisco. I got to share my perspective on red…
The best part of RSA Conference isn't on the agenda. I just wrapped up four days at RSAC 2026 in San Francisco. I got to share my perspective on red…
Liked by Marc Menninger, CISSP, CRISC
-
When Vanta started, VCs would literally laugh at the idea. SOC 2 was like a ~$10M market, not venture-scale, and not worth much. Vanta founders saw…
When Vanta started, VCs would literally laugh at the idea. SOC 2 was like a ~$10M market, not venture-scale, and not worth much. Vanta founders saw…
Liked by Marc Menninger, CISSP, CRISC
-
Today, we announce the Business Leadership Summit for Men, taking place on June 12th in Mesa, Arizona. Most summits let you sit in the back and…
Today, we announce the Business Leadership Summit for Men, taking place on June 12th in Mesa, Arizona. Most summits let you sit in the back and…
Liked by Marc Menninger, CISSP, CRISC
-
Drawing on his experience in the military, in corporate America (AT&T), as a head football coach, and as a credit union board member, Category 6…
Drawing on his experience in the military, in corporate America (AT&T), as a head football coach, and as a credit union board member, Category 6…
Liked by Marc Menninger, CISSP, CRISC
-
I’ve reached over 75,000 Learners with my LinkedIn Learning courses 🚀 Getting to build, record, and share #AI and #GRC learning content on LinkedIn…
I’ve reached over 75,000 Learners with my LinkedIn Learning courses 🚀 Getting to build, record, and share #AI and #GRC learning content on LinkedIn…
Liked by Marc Menninger, CISSP, CRISC
-
What is the most effective organizational role for the CISO to report to? Does it matter? Have we really resolved this question? Not by a long…
What is the most effective organizational role for the CISO to report to? Does it matter? Have we really resolved this question? Not by a long…
Liked by Marc Menninger, CISSP, CRISC
-
There’s nothing quite like holding your newly published book in your hands for the first time after months of research, writing, long nights, and…
There’s nothing quite like holding your newly published book in your hands for the first time after months of research, writing, long nights, and…
Liked by Marc Menninger, CISSP, CRISC
-
The recent Artemis II mission has reignited America’s fascination with space and the future of exploration. Spacecraft expert Christianna Taylor, PhD…
The recent Artemis II mission has reignited America’s fascination with space and the future of exploration. Spacecraft expert Christianna Taylor, PhD…
Liked by Marc Menninger, CISSP, CRISC
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content