Latest Cybersecurity News from ThreatPost
Welcome to my cybersecurity resources and professional information home. Here you can find information about various cybersecurity domains (topics), my blog, and my professional knowledge.
Here you can find academic assignments I created while pursuing an M.S. in Cyber Security Operations and Leadership from the University of San Diego. I will also share research related to my dissertation while pursuing a Doctorate in Computer Science (DCS) in Cybersecurity and Information Assurance from Colorado Technical University. Finally, you may find value in reviewing my curated cybersecurity Reference Link Library.
If you are on LinkedIn, review some articles and opinion pieces I post at https://www.linkedin.com/in/wayne-fischer-387212b3/. I welcome feedback, corrections, or offers for collaboration on information technology or cybersecurity research.
Here you can find academic assignments I created while pursuing an M.S. in Cyber Security Operations and Leadership from the University of San Diego. I will also share research related to my dissertation while pursuing a Doctorate in Computer Science (DCS) in Cybersecurity and Information Assurance from Colorado Technical University. Finally, you may find value in reviewing my curated cybersecurity Reference Link Library.
If you are on LinkedIn, review some articles and opinion pieces I post at https://www.linkedin.com/in/wayne-fischer-387212b3/. I welcome feedback, corrections, or offers for collaboration on information technology or cybersecurity research.
Defense Contractor / 2021
I work for an aerospace and defense contractor as a Sr. Principal Cyber Architect. I identify threats, analyze risk, and architect solutions to mitigate them. I plan and implement cybersecurity activities such as monitoring people, processes, and technology as part of an overall effort to minimize risk to our customers and our company. My scope of responsibility includes activities such as identifying ways to protect existing systems, protecting new systems, and training engineers and system administrators in secure practices. I review and write reports for management on risks and threats to our organization. I primarily maintain and create policy, processes, and procedures. I often perform secure software development, supply chain management, operational security, and help secure network and system administration. |
Holistic cybersecurity is accomplished by addressing one control at a time.” |
Graduate Student / 2019
In 2019 I graduated from the University of San Diego, #GoToreros. I earned an advanced Master of Science degree in Cyber Security Operations and Leadership. This degree helped me hone fifteen years of IT management experience into an even more effective set of skills to manage an organization's entire cybersecurity portfolio. I chose this program because it formalized and solidified my IT and leadership experience, extended my professional network, and added to my skills, knowledge, and abilities. It is critical for me to keep my technical skills fresh to help effectively lead diverse teams of cybersecurity personnel, system administrators, network engineers, and software developers. Information Technology Professional / More than 20 years
I have been working with computers and networks since I was a teenager. I lived through the Internet boom when homes connected with modems through dial-up access and during the transition to cable, DSL, satellite, fiber-optic, and wireless mediums. During my military service, I often troubleshot computer issues for my unit and fellow Airmen. Afterward, I worked for an Internet Service Provider supporting dial-up customers and ISDN and T-1/T-3 customers providing technical assistance before moving into a direct support role at the University of California, Davis. I spent over ten years learning more and transitioning from a help desk technician to an IT manager for two large departments. My career demonstrates that I am an energetic IT professional and leader. My previous employers and employees have been outstanding and excelled under my guidance. Nearly every employee I have worked with remains a friend, colleague, and subject matter expert I can call upon when needed. They also know they can call on me to provide advice and feedback. I am grateful to everyone who crossed my path. Every person has taught me that IT is a tool to enable people to do more, not a replacement for people. My greatest strengths today are that I continuously provide superior business strategy and cost-effective solutions with minimal risk. I can do this by understanding the high-level organizational strategies and aligning my activities to achieve our goals. I strive to include cybersecurity protection into initiatives, highlight risks, and create a secure and efficient corporate culture that thrives. |
Achievements
CTU Doctorate Student for Computer Science Program / 2021
I was accepted as a doctorate student at Colorado Technical University and I am working toward a Doctorate in Computer Science with a concentration in Cybersecurity and Information Assurance. M.S. Cyber Security Operations and Leadership (USD) / 2019 I graduated from the University of San Diego with a Master's degree with a 4.0 GPA while working full time and raising our two small children with my wife. Certifications and Mentoring / 2019 I have earned an ISC2 Cloud Certified Security Professional certification, as well as a static code analysis certification. In addition, I mentor local cyber security high school students in cyber security competitions which helps maintain essential skills and builds a better cyber security work force for the future. Patents / 2018 I was awarded a trade secret after identifying a need for a process which I developed to review open source software code for malicious or poorly written code prior to being used on networks and systems. This process has saved my organization millions of dollars in development work, and eliminated a backlog of software to be integrated which was regarded as untrustworthy until the code was formally reviewed. Publications / 2016 After 2015 I became very active with sharing knowledge in my sector regarding the cyber security realms. I worked with publishers at Educause, as well as the University of California Office of the President. I had blog articles and a magazine article published. These pieces discussed creating and maintaining a Security Operation Center in a Higher Education environment, and Ransomware prevention. |
Security Operations Lead / 2014
I worked for the enterprise IT organization under the CISO and Information Security Manager at the University of California, Davis. There we developed a PCI-DSS program, GRC framework, and cyber security policies, procedures, and processes. Our responsibility was to protect campus resources and perform security operations for the University of California, Davis and for all it's constituents. We performed network infrastructure security and planning and worked with the network operations personnel. I also drafted a plan and created UC Davis' first Security Operation Center (SOC). For the SOC, I led a team of security professionals to address cyber threats, respond to incidents, and detect and identify malicious actors. We also assisted IT directors, managers, and staff throughout campus to mitigate threats and protect their systems. USDA New Leader Program Graduate / 2010
I graduated with honors from the USDA's "New Leader Program" where I learned how to improve my leadership skills. I learned about my weaknesses, my strengths, public speaking, and became better prepared for senior leadership roles. IT Manager / 2009
Within eight years of starting a professional IT career I worked my way into management where I managed staff and resources for the Department of Political Science and International Relations at the University of California, Davis. I managed IT budgets, personnel, infrastructure, security, policy, and purchasing and inventory. My staff and I met faculty, staff, and student needs, and protected systems and data, specifically we performed help desk, system administration, network administration, web site development, mail server management, web server management, firewall and cyber security operations, created and maintained custom applications and databases, performed programming, database management, and infrastructure management. |
Get In Touch
I love academic work and digging deep into technical issues and I am also adept at business strategy and business planning. Contact me regarding any technical question, concern, or interest. |