Profile

Michael Melore, CISSP, Cyber Security Advisor

IBM

Contact Details

IBM

Michael Melore, CISSP, Cyber Security Advisor

IBM

Contact Details

IBM

Bio

IBM Cyber Security Advisor, Certified Information Systems Security Professional, author, and recognized subject matter expert in Security Intelligence, Identity Access Governance, and Authorization.  Consulting roles include: Lead architect for many of the largest authentication and authorization infrastructures. This includes Billion user authentication infrastructures.

Speaking engagements include passionate discussions correlating blended threats across physical and logical infrastructure boundaries, Security Intelligence and Response, Identity Access Management and Governance, Security Visibility and Response, Defense in Depth, Security Immune Systems, Cloud Security, Business Process Risk Modeling, and Billion User Identity Crisis.

Conference and Summit speaking engagements include key notes, panelist, moderator: IANS Chicago, Executive Alliance CXO Summits across US cities, Executive Network CISO Chapter Meetings across US cities, ISACA Pittsburgh Information Security Awareness Day, ISSA, Fl Cyber Conference, APQC, Rochester Security Summit, Nebraska Cyber Security Conference, Evanta CISO Summits across US cities.

Publishing:

Cybersecurity Muscle Memory: Drilling for a Tight Incident Response
https://securityintelligence.com/cybersecurity-muscle-memory-drilling-for-a-tight-incident-response/

The Future of Cognitive Security Is Now
https://securityintelligence.com/the-future-of-cognitive-security-is-now/

When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook
https://securityintelligence.com/when-blocking-and-tackling-strategies-fail-take-a-page-out-of-the-threat-hunting-playbook/

Drowning in a Sea of Passwords? It's Time to Adopt a Password Manager
https://securityintelligence.com/drowning-in-a-sea-of-passwords-its-time-to-adopt-a-password-manager/

The Risk Modeling Gotcha: Roles Are Like Hammers to Screws
https://securityintelligence.com/the-risk-modeling-gotcha-roles-are-like-hammers-to-screws/

Where is your sensitive information and where is it going?
https://securityintelligence.com/where-is-your-sensitive-information-and-where-is-it-going/

Bio

IBM Cyber Security Advisor, Certified Information Systems Security Professional, author, and recognized subject matter expert in Security Intelligence, Identity Access Governance, and Authorization.  Consulting roles include: Lead architect for many of the largest authentication and authorization infrastructures. This includes Billion user authentication infrastructures.

Speaking engagements include passionate discussions correlating blended threats across physical and logical infrastructure boundaries, Security Intelligence and Response, Identity Access Management and Governance, Security Visibility and Response, Defense in Depth, Security Immune Systems, Cloud Security, Business Process Risk Modeling, and Billion User Identity Crisis.

Conference and Summit speaking engagements include key notes, panelist, moderator: IANS Chicago, Executive Alliance CXO Summits across US cities, Executive Network CISO Chapter Meetings across US cities, ISACA Pittsburgh Information Security Awareness Day, ISSA, Fl Cyber Conference, APQC, Rochester Security Summit, Nebraska Cyber Security Conference, Evanta CISO Summits across US cities.

Publishing:

Cybersecurity Muscle Memory: Drilling for a Tight Incident Response
https://securityintelligence.com/cybersecurity-muscle-memory-drilling-for-a-tight-incident-response/

The Future of Cognitive Security Is Now
https://securityintelligence.com/the-future-of-cognitive-security-is-now/

When Blocking and Tackling Strategies Fail, Take a Page Out of the Threat Hunting Playbook
https://securityintelligence.com/when-blocking-and-tackling-strategies-fail-take-a-page-out-of-the-threat-hunting-playbook/

Drowning in a Sea of Passwords? It's Time to Adopt a Password Manager
https://securityintelligence.com/drowning-in-a-sea-of-passwords-its-time-to-adopt-a-password-manager/

The Risk Modeling Gotcha: Roles Are Like Hammers to Screws
https://securityintelligence.com/the-risk-modeling-gotcha-roles-are-like-hammers-to-screws/

Where is your sensitive information and where is it going?
https://securityintelligence.com/where-is-your-sensitive-information-and-where-is-it-going/