Austin Murphy

Austin Murphy

St Charles, Missouri, United States
3K followers 500+ connections

About

Helping organizations find, fix, track, target, and engage cyber…

Activity

Join now to see all activity

Experience

  • CrowdStrike Graphic

    CrowdStrike

    Greater St. Louis Area

  • -

    Greater St. Louis Area

  • -

    Greater St. Louis Area

  • -

    San Antonio, TX

  • -

    Scott AFB, IL

Education

Licenses & Certifications

  • GIAC Certified Forensic Analyst (GCFA)

    Global Information Assurance Certification (GIAC)

    Issued
    Credential ID 9739
  • Certified Information Systems Security Professional (CISSP) Graphic

    Certified Information Systems Security Professional (CISSP)

    (ISC)²

    Issued Expires
    Credential ID 506077
  • GIAC Security Essentials Certification (GSEC)

    Global Information Assurance Certification (GIAC)

    Issued Expires
    Credential ID 16023

Publications

  • Improving your Ability to Effectively and Efficiently Respond to Targeted Cyberattacks

    (ISC)^2 Security Congress

    Prevention is no longer an effective strategy. This discussion outlines a few real world examples of information security breaches from first-hand experience. Additionally, this session will share some components of an effective Information Security strategy that focus resources on breach detection, complication, and response.

  • Nabbing the Sticky Bandits

    RSA Security Analytics Summit 2013

    Ernst & Young’s Advanced Security Center conducted an investigation into the APT “Sticky bandits” intrusion set. after remediation, EY responded to attacks to regain access and found the same tactics, techniques, and procedures (TTPs) used at another organization. EY will present the case study, TTPs. The goal of this discussion is to highlight the power of threat intelligence sharing and give the audience insights into APT organizational structure.

    See publication
  • (Mostly) Open Source DFIR – A Toolkit for End-to-End Investigations

    SANS DFIR Summit 2013

  • Responding to Targeted Cyberattacks

    ISACA

    A Breach WILL Eventually Occur!
    Is your enterprise prepared?

    The threat environment has radically changed over the last decade. Most enterprises have not kept pace and lack the necessary fundamentals required to prepare and plan against cyberattacks.

    To successfully expel attackers, the enterprise must be able to:

    Conduct an investigation
    Feed threat intelligence into a detailed remediation/eradication plan
    Execute the remediation/eradication plan
    This…

    A Breach WILL Eventually Occur!
    Is your enterprise prepared?

    The threat environment has radically changed over the last decade. Most enterprises have not kept pace and lack the necessary fundamentals required to prepare and plan against cyberattacks.

    To successfully expel attackers, the enterprise must be able to:

    Conduct an investigation
    Feed threat intelligence into a detailed remediation/eradication plan
    Execute the remediation/eradication plan
    This publication covers a few of the basic concepts that will help answer the key questions posed by a new outlook: that a breach WILL eventually occur.

    See publication

More activity by Austin

View Austin’s full profile

  • See who you know in common
  • Get introduced
  • Contact Austin directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Austin Murphy in United States

Add new skills with these courses