This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
January 2019 ISSA Web Conference

ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

Recorded (1 Hour Event) on Wednesday, January 9, 2019

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.

Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

Join a panel of experts for an engaging discussion where you’ll learn:

Key considerations that should be in place before implementing automation
When is the right time to add automation (and when it isn’t)
Which common security tasks are ideal to automate
How to prepare your organization for SOAR



Mikhael Felker, Director of Information Security & Risk Management, Farmers Insurance

Mikhael is Director of Information Security & Risk Management for Farmers Insurance. He is also an Advisor for Safe-T Executive Advisory Committee. In the past decade he has taken on number of information security roles including engineering, teaching, writing, research and management. His sector experience includes insurance, defense, healthcare, nonprofit/education and technology/Internet, seeing first-hand the variance in information security culture and program maturity. Felker received his M.S. in information security policy and management from Carnegie Mellon University and B.S. in computer science from UCLA. He has over 50+ publications and has been a speaker for RSAC, CSA, ISSA, ISACA, ISC2 and OWASP events.


Scott King, Senior Director, Advisory Services, Rapid7

Scott has over 20 years of professional work experience in the IT and cybersecurity fields. He started his career as a network and systems engineer in the midst of the Silicon Valley dot com boom of the 90's. In 2001, Scott moved into an information assurance role supporting the Department of Defense, which kick started his career as a cybersecurity professional. Scott has worked for the DoD, state governments, large technology companies, mid-size manufacturing companies, and the spent significant time in the energy industry. Scott brings a unique mixture of hands-on experience in incident response, penetration testing, forensics, operations, architecture, engineering, and executive leadership as a former Chief Information Security Officer (CISO) to the Rapid7 Advisory team.

Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions

Michael Wylie, MBA, CISSP is the Director of Cybersecurity Services at Richey May Technology Solutions. In his role, Michael is responsible for delivering information assurance by means of vulnerability assessments, cloud security, penetration tests, risk management, and training. He has developed and taught numerous courses for the U.S. Department of Defense, Moorpark College, California State Universities, and clients around the country. Michael holds credentials from certifying bodies such as ISC2, Cisco, VMware, GIAC, Dell, EC-Council, CompTIA, and more. During client security testing, Michael has identified and responsibly disclosed four zero-day vulnerabilities in major tax software in 2018.
Twitter: @TheMikeWylie


Jason Winder, Managing Director, Aerstone Labs

Jason Winder has more than 20 years of experience in the information security field. He founded Aerstone in 2003, a boutique cybersecurity consultancy and service-disabled veteran-owned small business that is one of just five NSA-certified vulnerability assessors in the world. Aerstone's customers include some of the country's largest organizations and institutions in the federal, military, commercial, and intelligence sectors. Jason has an undergraduate degree in Economics from Drew University, and holds dual Master’s degrees from the Katz Graduate School of Business at the University of Pittsburgh, in Business Administration and International Business. His private interests include languages, golf, travel, writing, and cooking.

Community Search
Sign In


ISSA International Series: Legislative Aspects

ISSA Thought Leadership Series: Update on the latest cyber threats and trends

ISSA OC 34th Annual Symposium

InfoSec Nashville

ISSA International Series: New Trends in Security- Outsourcing and Other Tech

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information