Sponsored by Keepnet Labs

Cybersecurity Leadership Demystified Announcing 11 Experts

Cybersecurity Leadership Demystified Announcing 11 Experts

Cybersecurity Leadership Demystified Announcing 11 Experts , who is part of the book ūüôā

My new book is ready to be published and I am really proud to announce the 11 Experts who has contributed in the Bonus chapter ,called Ask The Experts. A  chapter which has not been written by me, but instead by a selection of very well-known Cybersecurity Experts, which some of protect worlds biggest organizations with their services, products , some who are trainers who teaches CISO classes as well as advanced security classes.

I’m honored to welcome Dr. Timothy Summers, Dr. Suleyman Ozturk, Dr. Mike Jankowski, and my very close friends Marcus Murray, Raymond Comvalius, Sukru Durmaz, Raif Sarica, Vladimir Meloski, Paula Januskiewicz, and Mert Sarica. They shared their time, insight, and experiences freely and without reservation. I am thankful for the contribution of their expertise and wisdom in this book.

Let’s learn more about those experts :

Marcus Murray

Marcus Murray is the founder of Truesec and an internationally recognized‚ÄĮcyber expert with 20+ years of experience in enabling organizations to predict, protect, detect and respond to cyber threats.

Marcus is frequently interviewed in national television, news press and media. He is also a top rated keynote speaker at cyber security and tech events worldwide, raising awareness about cyber threats, vulnerabilities and how to prevent cyber breach.

Marcus is the creator of state-of-the art cyber programs at Truesec and is a front runner in advanced threat intelligence and breach detection and response. He is also orchestrating large red team assignments, cyber incident response efforts and other cyber operations at global enterprise customers, government agencies, banks and military organizations.

 Adel Abdel Moneim

Adel Abdel Moneim, Registered ITU/ARCC Cybersecurity Expert, has over 25 years of experience in the IT / Cyber Security fields, spending most of his career in Information Security Consultation and Training. Adel is Globally recognized as a security Top Influencer “IFSEC Global influencers in security and fire 2019 in Security thought leadership category. In 2020 and 2021 Adel was selected top influencer in the cyber security category ranking # 3 and # 2 respectively at the global level.
Becoming the first Licensed Penetration Tester (LPT) in Egypt (2008), it comes as no surprise that Adel has been awarded the instructor of the year / Circle of Excellence awards from EC Council for Africa / Middle East regions eight times between 2008 and 2016.

Dr. Timothy C. Summers

Dr. Timothy C. Summers is a seasoned, high-impact executive with broad strategic perspective and a proven track record in growing businesses, delivering solutions to problems, and developing and executing sound internal processes from the ground up. He is an ethical hacker, professor, frequent media commentator, TED speaker, and consulted expert internationally recognized as one of the world’s leading experts on cyber strategy, blockchain, normal chaos, and how hackers think. He is a trusted adviser and executive consultant to Fortune 500 companies, academic institutions, and governments worldwide.

Timothy specializes in the scholarship and practice of hacker cognitive psychology (the hacker’s mindset) and normal chaos paradigm enabling him to advise on building and sustaining organizations during times of uncertainty. Dr. Summers is an executive scholar with an in-depth understanding of disruptive technologies and their strategic applications, as well as international business expertise, having conducted business in North America, the UK, Europe, Africa, and Asia. He is a motivated self-starter who has developed a thriving, reputable consulting practice that is considered among the best in the world while maintaining a dedication to community service.

Mert Sarica

Mert is a well-known and respected Cyber Security Researcher, Speaker and Blogger.

As of 2020 October, Mert is an Executive Vice President / CISO of IT Security & Risk Management Group which incorporates Cyber Defense Center, Cyber Security Technologies, Cyber Security Architecture, Information Security & Risk Management teams (40 HCs) at Intertech. Intertech is an Information Technology subsidiary of DenizBank, owned by Emirates NBD

In January 2018 ‚Äď September 2020 as the Vice President, Mert was responsible for the management of Akbank‚Äės Cyber Defence Center (CDC) which incorporates Vulnerability Management, Threat Detection, Threat Response & Intel and Security Engineering teams. (26 HCs)

In 2007 ‚Äď 2017 Mert was responsible for performing and managing penetration tests, malware analysis, security incident detection and response as a Technical Lead in Threat & Vulnerability Management team at IBTech. (Information Technology subsidiary of QNB Finansbank)

In 2014 ‚Äď 2016 Mert instructed Malware Analysis course in Cyber Security Graduate Program at Bahcesehir University.

In 2003 Mert’s career journey began by discovering a security vulnerability on the e-portal web application of the Yeditepe University where he was studying at that time. After sharing his findings with the executives of the university, he was awarded with an achievement grant and recruited as an Ethical Hacker. Mert graduated from Yeditepe University, Information Systems and Technologies in 2006 and Yeditepe University, Master of Business Administration program in 2010.

From the beginning of 2011 Mert spoke at more than 30 technical cyber security conferences. In addition, he was invited as a guest speaker to more than 40 universities to share his cyber security career journey and his profession ‚ÄúEthical Hacker‚ÄĚ to the students as a role model.

Dr Mike Jankowski-Lorek

Dr Mike is a security expert, solution architect & developer with more than 12-years experience in the field. He specializes in Databases, Network & Identity Management area, mainly for the Microsoft ecosystem.

Mike holds multiple certifications, especially security, database and software development related. He is know to be passioned about IT & education and he hold a PhD degree in Computer Science. Mike works at Cqure 

Dr. S√ľleyman √Ėzarslan

Dr Ozarslan is the a co-founder and VP of Picus Labs at Picus Security, which develops innovative cybersecurity software that assesses and validates the effectiveness of security controls.

He holds a Ph.D. degree in Information Systems from Middle East Technical University.

Dr Ozturk has¬† received several academic and professional awards and medals throughout his career, such as the “SANS Institute RSA 2016 NetWars Global Interactive Cyber Range Award” and “Medal of Centre of Excellence Defense Against Terrorism.”

He trained security experts from 10 different countries as part of NATO Advanced Cyber Defence Training Courses. He has a special focus on cyber threats, malware analysis, penetration testing, application security, and security controls. Since 2002, He has published various academical papers in information security

Raif Sarica

After serving more than 23 years at Turkish Gendarmerie, he recently joined DIFOSE as CIO. DIFOSE which stands for Digital Forensic Services provides a superior level of investigative, consulting, and training services.

Vladimir Meloski

Vladimir Meloski is a Microsoft Most Valuable Professional on Office Apps and Services, Microsoft Certified Trainer and consultant, providing solutions based on Office 365, Exchange Server, and Microsoft Azure.

With a bachelor degree in computer sciences, Vladimir has devoted more than 20 years of professional experience in information technology. Vladimir has been involved in Microsoft conferences in Europe and in the United States as a speaker, moderator, proctor for hands-on labs, and technical expert. He has been also involved as an author and technical reviewer for Microsoft official courses, including Exchange Server 2019, 2016, 2013, 2010, 2007, Office 365 and Windows Server 2016 and 2012, and one of the book authors of “Mastering Microsoft Exchange Server 2016“, ‚ÄúTroubleshooting Microsoft Exchange Server 2016‚ÄĚ and ‚ÄúMastering Windows Server 2016‚ÄĚ.

As a skilled IT professional and trainer, Vladimir shares his best practices, real-world experiences, and knowledge with his students and colleagues, and is devoted to IT community development by collaborating with user groups worldwide.

He enjoys his spare time in country with his son and wife.

 Sukru Durmaz

Ňě√ľkr√ľ is one of the leading experts in the field of cybercrime investigations on a global scale. He is an award-winning speaker & technical expert in worldwide conferences organized by INTERPOL, EUROPOL, FIEP, NATO, and OSCE. He is the founder and CEO of DIFOSE¬†

Raymond Comvalius

Multi-focused ICT specialist/architect with broad experience designing and implementing Microsoft centric IT infrastructures. Direct experience with companies ranging from small business to multi-national banking and governments.

Known as an inspiring speaker on a wide range of ICT subjects.

Also active as a Microsoft Certified Trainer, Author and ICT Journalist.

Specialties: Windows Modern Workplace, Cloud Transition, Security, PKI, Clustering, Windows based infrastructure design and implementaion.

About the Book

Cybersecuity Leadership Demystified ask the experts

The chief information security officer (CISO) is responsible for an organization’s information and data security. The CISO’s role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader.

The book begins by introducing you to the CISO’s role, where you’ll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You’ll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you’ll need a good team.

This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all the care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you’ll explore other key CISO skills that’ll help you communicate at both senior and operational levels.

By the end of this book, you’ll have gained a complete understanding of the CISO’s role and be ready to advance your career.

What you will learn

  • Understand the key requirements to become a successful CISO
  • Explore the cybersecurity landscape and get to grips with end-to-end security operations
  • Assimilate compliance standards, governance, and security frameworks
  • Find out how to hire the right talent and manage hiring procedures and budget
  • Document the approaches and processes for HR, compliance, and related domains
  • Familiarize yourself with incident response, disaster recovery, and business continuity
  • Get the hang of tasks and skills other than hardcore security operations

Who This Book Is For

This book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book.

To find out more about my books

Table of Contents

Cybersecurity Leadership Demystified by Dr Erdal Ozkaya

Cybersecurity Leadership Demystified

Announcing 11 Experts

  1. A CISO’s Role in Security Leadership
  2. End-to-End Security Operations
  3. Compliance and Regulations
  4. HR Management
  5. Documentation
  6. Disaster Recovery and Business Continuity
  7. Stakeholder Onboarding
  8. Other CISO Tasks
  9. Congratulations, You Are Hired!
  10. Security Leadership
  11. Conclusion
  12. Ask the Experts

Share this post

Leave a Reply

Your email address will not be published.