This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:Brennan"

From OWASP
Jump to: navigation, search
m
m
Line 5: Line 5:
 
'''
 
'''
  
 +
Tom Brennan is the Founder and CEO of ProactiveRISK known recently for CATScan℠ and CyberTOOLBELT™ and his volunteer service to the OWASP Foundation since 2007' most recently as the Global Vice Chairman.  Tom is a veteran of the United States Marine Corps and resides in the Rockaway Township, New Jersey, USA with his wife and children.  He enjoys building both open source and commercial software solutions, off-roading with his Jeep and flying FPV Drones in his spare time.
  
Tom Brennan is the founder of  [http://www.proactiverisk.com proactiveRISK] and veteran of the United States Marines Corps. Tom is a long time volunteer to the Open Web Application Security Project (OWASP) serving as the Global Vice Chairman and contributes to many other not-for-profit technical committees including the (ISC)2 Application Security Advisory Council (ASAC), the International Legal and Technology Association (ILTA) LegalSEC and Council of Cyber Security, Roles & Controls Panel that all have a global scope committed to the security of the open Internet.
+
Tom's strengths include;
  
He founded the OWASP [http://www.meetup.com/OWASP-New-Jersey/ New Jersey Chapter] after serving on the Board of Directors for the FBI Infragard program. The NJ OWASP Chapter later merged with the [http://www.meetup.com/OWASP-NYC New York City Chapter] in 2006 creating OWASP NYC Metro Chapter. Tom was appointed to the Global Board of Directors in 2007 by his peers and was [https://www.owasp.org/index.php/Membership/2012_Election#2012_Board_Election_RESULTS re-elected] by the membership for another term.  
+
- Secure Software Concepts - explaining what constitutes secure software and what design aspects to take into consideration to architect hack-resilient software.  
 +
 
 +
- Secure Software Requirements - facilitating the capture of all of the security requirements from various stakeholders and understanding the sources and processes needed to ensure a more effective design.  
 +
 
 +
- Secure Software Design - recommend secure design element including, software architecture, secure design review, and conduct threat modeling.  
 +
 
 +
- Secure Software Implementation/Coding - knowledgeable on how to review the code to ensure that there are no errors in the code or security controls.  
 +
 
 +
- Secure Software Testing - Conducting software testing for security functionality, reliability, resiliency to attack, and recoverability.
 +
 
 +
- Software Acceptance - experienced with software acceptance including completion criteria, risk acceptance and documentation, Common Criteria and methods of independent testing and verification
 +
 
 +
- Software Deployment, Operations, Maintenance and Disposal – experienced with security measures that must be taken when a product reaches its end of life.  
 +
 
 +
- Supply Chain and Software Acquisition – lifecycle thinker with a holistic outline of tasks required in managing risk for outsourced development, acquisition, and procurement of software and related services.
  
 
During his leadership of OWASP Foundation he has led many global and local initiatives for OWASP
 
During his leadership of OWASP Foundation he has led many global and local initiatives for OWASP

Revision as of 23:01, 1 April 2015

2013-Brennan-Press-Photo.JPG

Linkedin-button.png tomb(@)proactiverisk.com

Tom Brennan is the Founder and CEO of ProactiveRISK known recently for CATScan℠ and CyberTOOLBELT™ and his volunteer service to the OWASP Foundation since 2007' most recently as the Global Vice Chairman. Tom is a veteran of the United States Marine Corps and resides in the Rockaway Township, New Jersey, USA with his wife and children. He enjoys building both open source and commercial software solutions, off-roading with his Jeep and flying FPV Drones in his spare time.

Tom's strengths include;

- Secure Software Concepts - explaining what constitutes secure software and what design aspects to take into consideration to architect hack-resilient software.

- Secure Software Requirements - facilitating the capture of all of the security requirements from various stakeholders and understanding the sources and processes needed to ensure a more effective design.

- Secure Software Design - recommend secure design element including, software architecture, secure design review, and conduct threat modeling.

- Secure Software Implementation/Coding - knowledgeable on how to review the code to ensure that there are no errors in the code or security controls.

- Secure Software Testing - Conducting software testing for security functionality, reliability, resiliency to attack, and recoverability.

- Software Acceptance - experienced with software acceptance including completion criteria, risk acceptance and documentation, Common Criteria and methods of independent testing and verification

- Software Deployment, Operations, Maintenance and Disposal – experienced with security measures that must be taken when a product reaches its end of life.

- Supply Chain and Software Acquisition – lifecycle thinker with a holistic outline of tasks required in managing risk for outsourced development, acquisition, and procurement of software and related services.

During his leadership of OWASP Foundation he has led many global and local initiatives for OWASP

- Written recommendations from 60+ industry leaders: ONLINE - OWASP interview at AppSecUSA 2013 - Video - Interview with PenTest Magazine about OWASP Foundation. - 2012 OWASP Board Candidate Interview: Audio / Transcript - Video Interview about OWASP with Tom Brennan, 2008 - Video 1, Video 2 - Thousands of wiki commits to OWASP.ORG since 2004 see: Wiki Edits

Tom holds many industry certifications since he began his technical journey in 1983 including the (ISC)²® CBK / CISSP and many others

Contributor and champion to many OWASP projects including:

-- OWASP RFQ Criteria, Software Security

-- OWASP HTTP Post DoS Tool

-- OWASP Testing Guide

-- OWASP Mod_Security Core Rule Set

-- Incident Response Top 10 Project