Personal Information
Entreprise/Lieu de travail
Greater Detroit Area United States
Profession
The Chuck Norris of Securing & Managing Mobile & Networks
Site Web
http://www.iworkstech.com
À propos
Wow! My career came together a few years ago - merging all my experiences - from college to large enterprise, then to starting two companies, next working under the tutelage of a couple of high-tech luminaries. Finally, re-inventing InterWorks into something that I can't find anyone else doing quite the way we're doing it. Even my dinner with Steve Jobs taught me a few things. From the degree that, until recent years, went unused - to - my move to Michigan many years ago - to - stumbling into the security/networking field and then having the courage (or naivete) to start my own company. I'm able to use all those components to improve peoples' lives, create meaningful interactions be...
Mots-clés
iot
cio
ciso
internet of things
security
mobile
byod
high tech
websites
landscaping
vegetable gardening
mobile applications
gardening
technology usage
mobile apps
technology
master gardener
online safety
pc hygiene
midsize business
small business
crm cybersecurity
iot netsec secops "internet of things" security
mdm
"internet of things"
process controls
critical infrastructure
infragard
it
securing
future
"internet of things" iot mobile network security p
mobile hospitals security applications
investments
nac
infosec
malware
cloud
Tout plus
Présentations
(8)Documents
(2)J’aime
(16)Master gardeners... meet... "High Yech"
Caston Thomas
•
il y a 5 ans
How to Use Social Media Automation to Improve Your Marketing
Post Planner
•
il y a 7 ans
Deep Learning - Convolutional Neural Networks
Christian Perone
•
il y a 8 ans
Security of information and communication systems
SSA KPI
•
il y a 12 ans
Vulnerability Management Scoring Systems
Security B-Sides
•
il y a 14 ans
Automating networksecurityassessment
Glib Pakharenko
•
il y a 13 ans
Developing a Continuous Monitoring Action Plan
Tripwire
•
il y a 12 ans
Incident Response Swimlanes
Daniel P Wallace
•
il y a 14 ans
Resilient IoT Security: The end of flat security models
Milosch Meriac
•
il y a 8 ans
The 5 elements of IoT security
Julien Vermillard
•
il y a 9 ans
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down The Data Center?
Resilient Systems
•
il y a 11 ans
Reigion timeline presentation: Early Church
sfriess10
•
il y a 12 ans
What the Heck Just Happened?
Ken Evans
•
il y a 9 ans
How I learned to stop worrying & love the BYOD
Caston Thomas
•
il y a 10 ans
Avans optimization report phase 1 final
7signal Solutions, Inc.
•
il y a 10 ans
What Makes Great Infographics
SlideShare
•
il y a 10 ans
Personal Information
Entreprise/Lieu de travail
Greater Detroit Area United States
Profession
The Chuck Norris of Securing & Managing Mobile & Networks
Site Web
http://www.iworkstech.com
À propos
Wow! My career came together a few years ago - merging all my experiences - from college to large enterprise, then to starting two companies, next working under the tutelage of a couple of high-tech luminaries. Finally, re-inventing InterWorks into something that I can't find anyone else doing quite the way we're doing it. Even my dinner with Steve Jobs taught me a few things. From the degree that, until recent years, went unused - to - my move to Michigan many years ago - to - stumbling into the security/networking field and then having the courage (or naivete) to start my own company. I'm able to use all those components to improve peoples' lives, create meaningful interactions be...
Mots-clés
iot
cio
ciso
internet of things
security
mobile
byod
high tech
websites
landscaping
vegetable gardening
mobile applications
gardening
technology usage
mobile apps
technology
master gardener
online safety
pc hygiene
midsize business
small business
crm cybersecurity
iot netsec secops "internet of things" security
mdm
"internet of things"
process controls
critical infrastructure
infragard
it
securing
future
"internet of things" iot mobile network security p
mobile hospitals security applications
investments
nac
infosec
malware
cloud
Tout plus