Personal Information
Organization / Workplace
Cleveland/Akron, Ohio Area United States
Occupation
Experienced Software Architect
Industry
Technology / Software / Internet
About
25+ years experience in planning, developing and implementing information systems. Well-rounded IT background of infrastructure development, databases and project management. Excellent oral and written communication and support abilities. Knowledgeable, accurate, enthusiastic and self-motivated.
Specialties: Application Security, Internet based software development and websites, particularly in Banking, Investment, Human Resources, lead management and manufacturing. Search Engine Optimization.
Likes
(60)Building an API Security Strategy
SmartBear
•
6 years ago
Owasp appsec container_security_supply_chain
Michele Chubirka
•
2 years ago
2017 DevSecCon ZAP Scripting Workshop
Simon Bennetts
•
6 years ago
Risk Measurement and Management Using Open Source Tooling
Joe Kuemerle
•
3 years ago
Securing k8s With Kubernetes Goat
Muhammad Yuga Nugraha
•
3 years ago
Veracode Automation CLI (using Jenkins for SDL integration)
Dinis Cruz
•
7 years ago
Run Kubernetes with Amazon EKS - SRV318 - Chicago AWS Summit
Amazon Web Services
•
5 years ago
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worrying And Delete My Accounts
JosephTesta9
•
6 years ago
Learn Togaf 9.1 in 100 slides!
Sam Mandebvu
•
9 years ago
Laundry Day: The surprising complexity of simple workflows
Charles Johnson
•
6 years ago
SQL Injection Attacks: Is Your Data Secure?
Bert Wagner
•
6 years ago
Using threat models to control project brief
Dinis Cruz
•
7 years ago
Software Development Life Cycle – Managing Risk and Measuring Security
Thomas Malmberg
•
8 years ago
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Michael Coates
•
10 years ago
Agile Secure Development
Bosnia Agile
•
9 years ago
Agile Security—Field of Dreams
Priyanka Aash
•
8 years ago
Luncheon 2015-01-15 - Managing Security Requirements in Software Projects by Rohit Sethi
North Texas Chapter of the ISSA
•
9 years ago
Securing Java EE Web Apps
Frank Kim
•
12 years ago
Layer 7: Fine Grained Authorization for Web Services
CA API Management
•
13 years ago
Building Your Application Security Data Hub - OWASP AppSecUSA
Denim Group
•
9 years ago
AppSec California 2016 - Making Security Agile
Oleg Gryb
•
8 years ago
The Path to Proactive Application Security
Cigital
•
8 years ago
Making Threat Modeling Useful To Software Development
ConSanFrancisco123
•
14 years ago
BSIMM-V: The Building Security In Maturity Model
Cigital
•
8 years ago
Secure Coding For Java - Une introduction
Sebastien Gioria
•
9 years ago
Confess 2013: OWASP Top 10 and Java EE security in practice
Masoud Kalali
•
11 years ago
Running a Software Security Program with Open Source Tools (Course)
Denim Group
•
8 years ago
Setting up a secure development life cycle with OWASP - seba deleersnyder
Sebastien Deleersnyder
•
11 years ago
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
OWASP Ottawa
•
10 years ago
How to avoid top 10 security risks in Java EE applications and how to avoid them
Masoud Kalali
•
10 years ago
Personal Information
Organization / Workplace
Cleveland/Akron, Ohio Area United States
Occupation
Experienced Software Architect
Industry
Technology / Software / Internet
About
25+ years experience in planning, developing and implementing information systems. Well-rounded IT background of infrastructure development, databases and project management. Excellent oral and written communication and support abilities. Knowledgeable, accurate, enthusiastic and self-motivated.
Specialties: Application Security, Internet based software development and websites, particularly in Banking, Investment, Human Resources, lead management and manufacturing. Search Engine Optimization.