This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:Brennan"

From OWASP
Jump to: navigation, search
m
 
(32 intermediate revisions by the same user not shown)
Line 1: Line 1:
[http://www.linkedin.com/in/tombrennan https://www.owasp.org/images/9/90/2013-Brennan-Press-Photo.JPG]  
+
 +
[http://www.linkedin.com/in/tombrennan https://www.owasp.org/images/7/7f/Linkedin-button.png]
 +
[[File:Brennan-press.jpg|left|thumb]]
 +
Tom Brennan is Chief Technology Officer/Chief Information Officer for Mandelbaum Salsburg provides strategic guidance to the Firm in regards to its cybersecurity efforts and critical infrastructure  He is a an alumni of ProactiveRISK, IOActive, McAfee, Intel Security, SAFECode, Trustwave, WhiteHat, ADP, Datek Online and the United States Marines.
  
[http://www.linkedin.com/in/tombrennan  https://www.owasp.org/images/7/7f/Linkedin-button.png]
+
Tom served the OWASP Foundation as an elected member of the Global Board of Directors for (10) years for OWASP Foundation and volunteers his time to the OWASP NYC/Manhatten and Northern New Jersey Chapter.
'''tomb(@)[http://www.proactiverisk.com proactiverisk.com]
 
'''
 
  
Tom Brennan is the Founder and CEO of ProactiveRISK known recently for CATScan℠ and CyberTOOLBELT™ and his volunteer service to the OWASP Foundation since 2007' most recently as the Global Vice Chairman.  Tom is a veteran of the United States Marine Corps and resides in the Rockaway Township, New Jersey, USA with his wife and children.  He enjoys building both open source and commercial software solutions, off-roading with his Jeep and flying FPV Drones in his spare time.
 
  
Tom's strengths include;
+
'''Artifacts:'''
  
- Secure Software Concepts - explaining what constitutes secure software and what design aspects to take into consideration to architect hack-resilient software.  
+
- Written recommendations from 60+ industry leaders: [http://www.linkedin.com/in/tombrennan ONLINE]
 +
 
 +
-OWASP interview at AppSecUSA 2013 - [http://www.youtube.com/watch?v=jU-QEUeh9-U Video]
  
- Secure Software Requirements - facilitating the capture of all of the security requirements from various stakeholders and understanding the sources and processes needed to ensure a more effective design.  
+
-Interview with [https://www.owasp.org/images/9/9f/WEB_APPC_PENTESTING_03_2012.pdf PenTest Magazine] about OWASP Foundation.
  
- Secure Software Design - recommend secure design element including, software architecture, secure design review, and conduct threat modeling.  
+
- 2012 OWASP Board Candidate Interview: [https://www.owasp.org/download/2012-board-election/OWASP2012BoardInterviews_TomBrennan.mp3 Audio] / [https://www.owasp.org/images/e/e3/OWASP_2012_Board_Interviews_-_Tom_Brennan.pdf Transcript]
  
- Secure Software Implementation/Coding - knowledgeable on how to review the code to ensure that there are no errors in the code or security controls.  
+
- 2008 OWASP Board Candidate Interview  - [http://vimeo.com/23889097 Video 1], [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference Video 2]
  
- Secure Software Testing - Conducting software testing for security functionality, reliability, resiliency to attack, and recoverability.
+
- Thousands of wiki commits to OWASP.ORG since 2004 see:  [https://www.owasp.org/index.php/Special:Contributions/Brennan Wiki Edits]
  
- Software Acceptance - experienced with software acceptance including completion criteria, risk acceptance and documentation, Common Criteria and methods of independent testing and verification
+
Contributor and champion to many OWASP projects including:
  
- Software Deployment, Operations, Maintenance and Disposal – experienced with security measures that must be taken when a product reaches its end of life.  
+
-- [https://www.owasp.org/index.php/OWASP_Incident_Response_Project OWASP Incident Response Top 10 Project]
  
- Supply Chain and Software Acquisition – lifecycle thinker with a holistic outline of tasks required in managing risk for outsourced development, acquisition, and procurement of software and related services.
+
-- [https://www.owasp.org/index.php?title=OWASP_Virtual_Lab_Tool_Project OWASP Virtual Village]
  
During his leadership of OWASP Foundation he has led many global and local initiatives for OWASP
+
-- [https://www.owasp.org/index.php/OWASP_RFP-Criteria OWASP RFQ Criteria, Software Security]
  
- Written recommendations from 60+ industry leaders: [http://www.linkedin.com/in/tombrennan ONLINE]
+
-- [https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool OWASP Switchblade HTTP Post DoS Tool]
- OWASP interview at AppSecUSA 2013 - [http://www.youtube.com/watch?v=jU-QEUeh9-U Video]
 
- Interview with [https://www.owasp.org/images/9/9f/WEB_APPC_PENTESTING_03_2012.pdf PenTest Magazine] about OWASP Foundation.
 
- 2012 OWASP Board Candidate Interview: [https://www.owasp.org/download/2012-board-election/OWASP2012BoardInterviews_TomBrennan.mp3 Audio] / [https://www.owasp.org/images/e/e3/OWASP_2012_Board_Interviews_-_Tom_Brennan.pdf Transcript]
 
- Video Interview about OWASP with Tom Brennan, 2008 - [http://vimeo.com/23889097 Video 1], [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference Video 2]
 
- Thousands of wiki commits to OWASP.ORG since 2004 see:  [https://www.owasp.org/index.php/Special:Contributions/Brennan Wiki Edits]
 
  
Tom holds many industry certifications since he began his technical journey in 1983 including the (ISC)²® CBK / CISSP and many others
+
-- [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide]
  
Contributor and champion to many OWASP projects including:
+
-- [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP Mod_Security Core Rule Set]
  
-- [https://www.owasp.org/index.php/OWASP_RFP-Criteria OWASP RFQ Criteria, Software Security]
+
-- [https://www.owasp.org/index.php/OWASP_Cyber_Defense_Matrix OWASP Matrix Project]
  
-- [https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool OWASP HTTP Post DoS Tool]
+
Additional Projects
  
-- [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide]
+
-- [http://www.penteston.com PENTESTON] a commercial vulnerability assessment platform utilizing the [http://www.proactiverisk.com CATSCAN] assessment methodology.
  
-- [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP Mod_Security Core Rule Set]
+
-- [http://www.hacknyc.com HACKNYC Conference]
  
-- [https://www.owasp.org/index.php/OWASP_Incident_Response_Project Incident Response Top 10 Project]
+
-- [http://www.nymjcsc.org New York Metro Joint Cyber Security Conference] (NYMJCSC)

Latest revision as of 14:30, 1 May 2019

Linkedin-button.png

Brennan-press.jpg

Tom Brennan is Chief Technology Officer/Chief Information Officer for Mandelbaum Salsburg provides strategic guidance to the Firm in regards to its cybersecurity efforts and critical infrastructure He is a an alumni of ProactiveRISK, IOActive, McAfee, Intel Security, SAFECode, Trustwave, WhiteHat, ADP, Datek Online and the United States Marines.

Tom served the OWASP Foundation as an elected member of the Global Board of Directors for (10) years for OWASP Foundation and volunteers his time to the OWASP NYC/Manhatten and Northern New Jersey Chapter.


Artifacts:

- Written recommendations from 60+ industry leaders: ONLINE

-OWASP interview at AppSecUSA 2013 - Video

-Interview with PenTest Magazine about OWASP Foundation.

- 2012 OWASP Board Candidate Interview: Audio / Transcript

- 2008 OWASP Board Candidate Interview - Video 1, Video 2

- Thousands of wiki commits to OWASP.ORG since 2004 see: Wiki Edits

Contributor and champion to many OWASP projects including:

-- OWASP Incident Response Top 10 Project

-- OWASP Virtual Village

-- OWASP RFQ Criteria, Software Security

-- OWASP Switchblade HTTP Post DoS Tool

-- OWASP Testing Guide

-- OWASP Mod_Security Core Rule Set

-- OWASP Matrix Project

Additional Projects

-- PENTESTON a commercial vulnerability assessment platform utilizing the CATSCAN assessment methodology.

-- HACKNYC Conference

-- New York Metro Joint Cyber Security Conference (NYMJCSC)