About
Five exits including acquisitions by Wiz, Microsoft Security, IBM Security, Symantec, and…
Services
Articles by Phil
Activity
-
Today is my last day at Veracode. After almost 11 years, I'm finding it harder to put this into words than I expected. I joined when the company had…
Today is my last day at Veracode. After almost 11 years, I'm finding it harder to put this into words than I expected. I joined when the company had…
Liked by Phil Neray, CCSK
-
Fun to sit with the NYSE while at RSAC several weeks ago.
Fun to sit with the NYSE while at RSAC several weeks ago.
Liked by Phil Neray, CCSK
Experience
Education
Licenses & Certifications
-
-
1st Degree Black Belt in Jiu-Jitsu (Hakko-Ryu)
American Jiu-Jitsu
Issued -
Certificate of Cloud Security Knowledge (CCSK)
Cloud Security Alliance
IssuedCredential ID 243281235616 -
Publications
-
Using Graph Analytics and Machine Learning to Continuously Monitor Embedded Code for Critical Vulnerabilities
Embedded Computing Design
Recent advances in graph analytics and machine learning, developed for DARPA and powered by cloud-scale infrastructures, now make it possible to precisely identify all public open source vulnerabilities affecting IoT and embedded code at a very granular level—including exactly which functions are vulnerable and why—even if you customize the open source code.
Other authorsSee publication -
Cybersecurity & Corporate Liability in the Boardroom
New York Stock Exchange (NYSE)
Cybersecurity is now the second leading risk to a company’s brand. This NYSE survey examines how cyber-liability risk is being prioritized at the board level. Nine out of ten corporate directors believe the FTC and other regulators should hold businesses liable for cyber breaches if due care has not been followed.
Other authorsSee publication -
State of Software Security: Focus on Industry Verticals
Veracode
This report benchmarks application-layer risk across seven verticals, based on analytics from 200,000 risk assessments performed using Veracode's cloud-based platform. Civilian government agencies come in dead last due to their reliance on outdated languages like ColdFusion, with 3 out of 4 web applications failing the OWASP Top 10 and 70% having cross-site scripting (XSS) vulnerabilities.
Other authorsSee publication -
Cybersecurity in the Boardroom
New York Stock Exchange (NYSE)
Boardrooms are increasingly assigning fault for breaches to CEOs, according to a survey of 200 corporate directors conducted by the NYSE. Brand damage, breach costs and loss of competitive advantage through corporate espionage are top cybersecurity fears. Two-thirds of respondents want CISOs to communicate cyber information as either risk metrics or high-level strategy descriptions.
Other authorsSee publication -
IoT Security — Research Study
Veracode
We probed and monitored a set of of always-on IoT devices to understand the real-world impact of each product’s security — and found IoT devices often aren't designed with data security or privacy in mind. The results show vulnerabilities within these devices to be a potential pathway for cyberattackers leading to robbery, theft of sensitive data, or even stalking.
Other authorsSee publication -
How a Russian Crime Ring Used SQLi to Steal 1.2B Credentials
Professional Security Online
See publicationIn the greatest breach to date, a gang of Russian cybercriminals used a massive botnet with automated malware and SQL injection to amass 1.2 billion username and password combinations from more than 420,000 websites. The same ring was implicated in the breach of JP Morgan's Corporate Challenge website. This article explains how they did it.
Languages
-
English
Native or bilingual proficiency
-
French
Native or bilingual proficiency
-
Spanish
Limited working proficiency
Recommendations received
6 people have recommended Phil
Join now to viewMore activity by Phil
-
As a fresh-faced 20-year-old intern, I was offered my first full-time job and oh boy was I lucky… The job was selling cybersecurity software into…
As a fresh-faced 20-year-old intern, I was offered my first full-time job and oh boy was I lucky… The job was selling cybersecurity software into…
Liked by Phil Neray, CCSK
-
Nasdaq recognizing XBOW’s recent inclusion on the Enterprise Tech 30 list! One of 60 enterprise tech leaders chosen from more than 15,000…
Nasdaq recognizing XBOW’s recent inclusion on the Enterprise Tech 30 list! One of 60 enterprise tech leaders chosen from more than 15,000…
Liked by Phil Neray, CCSK
-
Special night enabled by a special company. Our CFO had four tickets to spare for Red Sox-Yankees at Fenway. I asked around the office if anyone…
Special night enabled by a special company. Our CFO had four tickets to spare for Red Sox-Yankees at Fenway. I asked around the office if anyone…
Liked by Phil Neray, CCSK
-
I'm excited to share that I'm joining Sentra ! From my first conversations with the team, it was clear that the people behind the product are what…
I'm excited to share that I'm joining Sentra ! From my first conversations with the team, it was clear that the people behind the product are what…
Liked by Phil Neray, CCSK
-
Why do we even have a security operations program in the first place? To detect and respond to threats. That's it. Those are the two pillars…
Why do we even have a security operations program in the first place? To detect and respond to threats. That's it. Those are the two pillars…
Liked by Phil Neray, CCSK
-
Knowing you are actually detecting the right threats used to be the hardest challenge in security operations. Today, against an AI-powered adversary,…
Knowing you are actually detecting the right threats used to be the hardest challenge in security operations. Today, against an AI-powered adversary,…
Liked by Phil Neray, CCSK
-
With the deepest gratitude to Microsoft for 10+ years working at a world-class organization surrounded by some of the most talented people in the…
With the deepest gratitude to Microsoft for 10+ years working at a world-class organization surrounded by some of the most talented people in the…
Liked by Phil Neray, CCSK
-
Our very own Bryan Peace presenting “More Signal, Less Spend” and sharing the power of the CardinalOps and Cribl partnership during #RSAC
Our very own Bryan Peace presenting “More Signal, Less Spend” and sharing the power of the CardinalOps and Cribl partnership during #RSAC
Liked by Phil Neray, CCSK
-
I am thrilled to announce that I've joined Picus Security as Sr. Director of Sales for the East. After years in the cybersecurity space, I’ve…
I am thrilled to announce that I've joined Picus Security as Sr. Director of Sales for the East. After years in the cybersecurity space, I’ve…
Liked by Phil Neray, CCSK
-
I'm not big on posting pictures of myself but I'll make an exception. Here I am with a cybersecurity pioneer, Whitfield Diffie. If you work in…
I'm not big on posting pictures of myself but I'll make an exception. Here I am with a cybersecurity pioneer, Whitfield Diffie. If you work in…
Liked by Phil Neray, CCSK
-
So if you remember a few months back I was talking about writing a book. A lot of you gave me some great thoughts, advice and others who have say…
So if you remember a few months back I was talking about writing a book. A lot of you gave me some great thoughts, advice and others who have say…
Liked by Phil Neray, CCSK
-
Proud of my 16yo son Ben Zimmermann for sharing his AI Native skills and knowledge, and making a real impact. #ainative
Proud of my 16yo son Ben Zimmermann for sharing his AI Native skills and knowledge, and making a real impact. #ainative
Liked by Phil Neray, CCSK
-
451 Research’s Magnificent 7 of Infosec at #RSAC. Such an awesome bunch, such a privilege to get together when we can. Daniel Kennedy Mark Ehr Brenon…
451 Research’s Magnificent 7 of Infosec at #RSAC. Such an awesome bunch, such a privilege to get together when we can. Daniel Kennedy Mark Ehr Brenon…
Liked by Phil Neray, CCSK
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content