This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:Mchalmers"

From OWASP
Jump to: navigation, search
(Non-OWASP Involvement)
m (Non-OWASP Involvement)
Line 58: Line 58:
 
* [http://www.identitymanagementinstitute.org/ IMI] (Identity Management Institute)
 
* [http://www.identitymanagementinstitute.org/ IMI] (Identity Management Institute)
 
* [https://portal.mcafee.com/ Intel Security SPAC] (Security Product Advisory Council)
 
* [https://portal.mcafee.com/ Intel Security SPAC] (Security Product Advisory Council)
* [http://www.isaca.org/ ISACA] (Information Systems Audit and Control Association), [http://www.isaca-km.org/ Kettle Moraine Chapter]
+
* [http://www.isaca.org/ ISACA] (Information Systems Audit and Control Association)
 
* [http://www.isoc.org/ ISoc] (Internet Society)
 
* [http://www.isoc.org/ ISoc] (Internet Society)
 
** [http://www.ietf.org/ IETF] (Internet Engineering Task Force)
 
** [http://www.ietf.org/ IETF] (Internet Engineering Task Force)

Revision as of 20:57, 18 April 2016

150px-Chalmers%2C_Matthew.jpg
I've been focused on infosec-related work my entire professional career. I've earned numerous industry certifications such as the CISM and CEH as well as a Master of Science in Information Assurance. I specialize in information technology & technology process assurance, audit, compliance, control, governance, risk, and security.

I've been involved with OWASP since about 2002. I can be reached at matthew . chalmers @ owasp . org.


OWASP Involvement

OWASP Wiki

OWASP Projects

OWASP Chapters

  • Founding member of the original DC Local Chapter (which became the DC-Maryland chapter, then the Washington DC chapter)
    • Active member 2004-2005
    • Recorded meeting minutes and maintained chapter web pages (pre-wiki)
  • Founder and former chapter leader of the original Milwaukee chapter
  • "Member-at-Large"

Non-OWASP Involvement

"Credentials"

Certifications

  • CIAM - Certified Identity and Access Manager
  • CIRM - Certified Identity Risk Manager
  • ACE - AccessData Certified Examiner
  • CCISO - Certified Chief Information Security Officer
  • CISM - Certified Information Security Manager
  • CCSK - Certified in Cloud Security Knowledge
  • CRMA - Certified in Risk Management Assurance
  • GCFA - GIAC Certified Forensic Analyst
  • ITIL - Foundation Certified (Version 3)
  • CISA - Certified Information Systems Auditor
  • CEH - Certified Ethical Hacker
  • CHS - Certified in Homeland Security (Level III)
  • GSNA - GIAC-certified Systems and Network Auditor
  • MCP - Microsoft Certified Professional

Education

Training

  • CITI - Human Subjects Research (10/2014)
  • IIA - Risk-Based, Process-Oriented & Performance-Driven Operational Auditing (6/2013)
  • IIA - Antifraud Controls using Data Mining and Continuous Monitoring Techniques (8/2011)
  • ISACA - Auditing & Securing Cloud-Based Services (1/2011)
  • ISACA - Information Security Management & Strategies for Implementing IT Governance (12/2010)
  • PDS/SOScorp - ITIL v3 Foundation Course (9/2008)
  • SANS – Computer Forensics, Investigation, and Response (4/2008)
  • Entellus Technology Group – SAP ERP Basis Auditing & Security Risks (12/2007)
  • SAP America – Virsa Compliance Calibrator Training (10/2006)
  • IIA – SAP ERP Technical Audit (8/2006)
  • SPI Dynamics – Web Application Security Assessment with WebInspect (11/2005)
  • SANS – Hacker Techniques, Exploits and Incident Handling (10/2005)
  • Infosec Institute – Advanced Ethical Hacking: Expert Penetration Testing (1/2005)
  • Mile2 – Certified Ethical Hacker Training (7/2004)
  • Foundstone – Ultimate Web Hacking (9/2003)
  • Siegeworks – Advanced AppAuditor Training (12/2002)
  • SANS – Auditing Networks, Perimeters, and Systems (4/2002)
  • Sanctum – AppScan AppAuditor Training (5/2001)
  • National Cryptologic School - Information Systems Security Engineering (2/2000)
  • National Cryptologic School - Operational Information Systems Security (11/1998)

Social Media Profiles

linkedin-icon.png xing-icon.png facebook-icon.png google-plus-icon.png 4tBLt6aW_normal.png amazon-icon.png Research-Gate-Icon.png academia-small.png googlescholar.jpg sourceforge.png 5831184t.png photo.jpg ba86ae99ee34618394f7418cd801e7a9_normal.jpeg a8__KWaa_normal.png e9815d877cd092a19918df74e04f0415_normal.png mstc.png