Personal Information
Organization / Workplace
Sydney, Australia, nsw Australia
Occupation
Sales Engineer, Enterprise Security
About
I am a sales engineer and solution architect with wide ranging experience in design and engineering of security solutions.
My skills are in communicating business value of information security, analyzing security requirements and their translation into security solutions, leading technology evaluation processes from discovery and demonstration through to proposal and solution validation.
I am customer focused, working with account management, product management and professional services to deliver solutions with strong business value to the customer. I have experience working with a private and public sector organizations and with channel partners and service providers.
Specialties...
- Presentations
- Documents
- Infographics
Security Analyst Workshop - 20190314
Florian Roth
•
4 years ago
Maturing your threat hunting program
Cybereason
•
7 years ago
Real-Eyes, Realize, Real Lies: Beating Deception Technologies
Matan Hart
•
5 years ago
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
•
6 years ago
Machine Learning for Threat Detection
Napier University
•
7 years ago
How to Improve Threat Detection & Simplify Security Operations
IBM Security
•
6 years ago
Threat Detection and Response at Scale with Dominique Brezinski
Databricks
•
5 years ago
BSides London 2018 - Solving Threat Detection
Alex Davies
•
5 years ago
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (RSA Conference 2016)
Sounil Yu
•
8 years ago
An Introduction to the Agile SoC
Cybereason
•
6 years ago
Threat Hunting 102: Beyond the Basics
Cybereason
•
7 years ago
You Can't Stop The Breach Without Prevention And Detection
CrowdStrike
•
7 years ago
Making the Case for Stronger Endpoint Data Visibility
dianadvo
•
6 years ago
EDR vs SIEM - The fight is on
Justin Henderson
•
6 years ago
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprises 2017-2018
Kaspersky
•
6 years ago
Malware evolution and Endpoint Detection and Response Technology
Adrian Guthrie
•
7 years ago
Windows Threat Hunting
GIBIN JOHN
•
7 years ago
Palo Alto Networks authentication
Alberto Rivai
•
8 years ago
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Networks
Amazon Web Services
•
8 years ago
Palo Alto Networks: Protection for Security & Compliance
Amazon Web Services
•
7 years ago