“Omar is one of the most diligent, intelligent people I've ever worked with. He is very knowledgeable in most topics relating to networks and security or the nexus between. He is often an instigator of new ideas. On conference calls, when a new task comes up, he is usually the first to say "I'll do it," and those who work with him and look at all the things he is involved in have literally commented "When does this guy sleep?" “This reference is being made by me in a personal capacity. It is not intended and should not be construed as a reference from Cisco Systems, Inc. or any of its affiliated entities.””
Omar Santos
Raleigh, North Carolina, United States
12K followers
500+ connections
About
Omar Santos is a recognized leader in the cybersecurity community. He is the…
Activity
-
The Inquisite platform tackles information discovery and synthesis from multiple sources, integrating deep research and smart document editing. Learn…
The Inquisite platform tackles information discovery and synthesis from multiple sources, integrating deep research and smart document editing. Learn…
Liked by Omar Santos
-
Take the assessment and download the report at the link. Interesting information that may support teams adopting AI. A look at AI global readiness…
Take the assessment and download the report at the link. Interesting information that may support teams adopting AI. A look at AI global readiness…
Liked by Omar Santos
-
Cisco is a key part of the technology infrastructure for McLaren Racing, fueling the organization's pursuit of an F1 title. Check out my Network…
Cisco is a key part of the technology infrastructure for McLaren Racing, fueling the organization's pursuit of an F1 title. Check out my Network…
Liked by Omar Santos
Experience
-
Coalition for Secure AI
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Licenses & Certifications
Volunteer Experience
-
Chair of the Common Security Advisory Framework (CSAF) Technical Committee
OASIS
- Present 7 years 10 months
Science and Technology
The OASIS CSAF Technical Committee is chartered to make a major revision to the Common Vulnerability Reporting Framework (CVRF) under a new name for the framework that reflects the primary purpose: a Common Security Advisory Framework (CSAF). TC deliverables are designed standardize existing practice in structured machine-readable vulnerability-related advisories and further refine those standards over time.
https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=csaf -
Co-Lead
DEF CON Red Team Village
- Present 5 years 8 months
Science and Technology
Co-lead of the DEF CON Red Team Village. https://redteamvillage.io
-
Co-Chair of the PSIRT TC Third-party Software Security (open source security) working group
FIRST
- 10 months
Science and Technology
-
The Unified Security Incident Response Plan (USIRP) Workgroup Chair
Industry Consortium for Advancement of Security on the Internet (ICASI)
- 3 years
Science and Technology
The Unified Security Incident Response Plan (USIRP) is one of the primary means by which ICASI fulfills its mission of enhancing the global security landscape. Comprising a trusted forum and supporting processes, procedures, and tools, the USIRP enables Security Incident Response Teams (SIRTs) from ICASI member companies to collaborate quickly and effectively to resolve complex, multi-vendor Internet security issues. These issues include: vulnerabilities in commonly-used software; incidents -…
The Unified Security Incident Response Plan (USIRP) is one of the primary means by which ICASI fulfills its mission of enhancing the global security landscape. Comprising a trusted forum and supporting processes, procedures, and tools, the USIRP enables Security Incident Response Teams (SIRTs) from ICASI member companies to collaborate quickly and effectively to resolve complex, multi-vendor Internet security issues. These issues include: vulnerabilities in commonly-used software; incidents - urgent or emergent - that affect three or more ICASI member organizations; and ongoing or long-term problems that warrant a strategic response.
The USIRP works by harmonizing ICASI member companies' internal security incident response procedures and personnel by providing a common, formal framework with which these organizations can: trigger a USIRP event; share critical information about it; and work together effectively on a coordinated response.
More at: https://www.icasi.org/projects#usirp -
Original Organizer and President
BSIDES Raleigh
- 4 years 6 months
Science and Technology
-
Chair of OpenEoX
OASIS
- Present 1 year 2 months
Science and Technology
OpenEoX is an initiative aimed at standardizing the way End-of-Life (EOL) and End-of-Support (EOS) information is exchanged within the software and hardware industries. Covering both vendors and open-source maintainers, OpenEoX strives to provide a transparent, efficient, and unified approach to managing product lifecycles.
In today's fast-paced world of technological advancements, it's crucial for businesses and individuals to stay informed about the lifecycle status of the products…OpenEoX is an initiative aimed at standardizing the way End-of-Life (EOL) and End-of-Support (EOS) information is exchanged within the software and hardware industries. Covering both vendors and open-source maintainers, OpenEoX strives to provide a transparent, efficient, and unified approach to managing product lifecycles.
In today's fast-paced world of technological advancements, it's crucial for businesses and individuals to stay informed about the lifecycle status of the products they rely on. OpenEoX addresses this need by offering a common framework that simplifies the process of managing and sharing EOL and EOS information across the industry.
Founding members of the OpenEoX Technical Committee include Cisco, Microsoft, Red Hat, Siemens, BSI, and CISA. Many organizations have joined since the OpenEoX TC was introduced.
Publications
-
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Pearson
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and…As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals—and, increasingly, users—are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.
· An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future
· Introduction to AI models and implementations, as well as examples of emerging AI trends
· Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment
· Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology
· A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas
· An academic resource and guide for the evolving technical and intellectual challenges of AI
· Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination. -
Developing Cybersecurity Programs and Polices
Pearson
Learn How To
· Establish cybersecurity policies and governance that serve your organization’s needs
· Integrate cybersecurity program components into a coherent framework for action
· Assess, prioritize, and manage security risk throughout the organization
· Manage assets and prevent data loss
· Work with HR to address human factors in cybersecurity
· Harden your facilities and physical…Learn How To
· Establish cybersecurity policies and governance that serve your organization’s needs
· Integrate cybersecurity program components into a coherent framework for action
· Assess, prioritize, and manage security risk throughout the organization
· Manage assets and prevent data loss
· Work with HR to address human factors in cybersecurity
· Harden your facilities and physical environment
· Design effective policies for securing communications, operations, and access
· Strengthen security throughout the information systems lifecycle
· Plan for quick, effective incident response and ensure business continuity
· Comply with rigorous regulations in finance and healthcare
· Plan for PCI compliance to safely process payments
· Explore and apply the guidance provided by the NIST Cybersecurity Framework -
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons
Pearson
Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.
-
Security Penetration Testing (The Art of Hacking Series) LiveLessons
Pearson
This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an…
This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture.
With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired or wireless network and the systems within that network. Also covered are numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, and Maltego. You’ll find guidelines on how to write penetration testing reports, and learn how to plan and organize the them.
This course provides supplemental material to reinforce some of the critical concepts and techniques learned, scripts to help you build your own hacking environment, and examples of real-life penetration testing reports. This material can be accessed at theartofhacking.org. -
Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Cisco Press
ISBN 1587144468
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them.
The authors present authoritative coverage of Cisco ASA with FirePOWER Services;…ISBN 1587144468
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them.
The authors present authoritative coverage of Cisco ASA with FirePOWER Services; Cisco Firepower Threat Defense (FTD); Cisco Next-Generation IPS appliances; the Cisco Web Security Appliance (WSA) with integrated Advanced Malware Protection (AMP); Cisco Email Security Appliance (ESA) with integrated Advanced Malware Protection (AMP); Cisco AMP ThreatGrid Malware Analysis and Threat Intelligence, and the
Cisco Firepower Management Center (FMC).
You’ll find everything you need to succeed: easy-to-follow configurations, application case studies, practical triage and troubleshooting methodologies, and much more.
Effectively respond to changing threat landscapes and attack continuums
Design Cisco ASA with FirePOWER Services and Cisco Firepower Threat Defense (FTD) solutions
Set up, configure, and troubleshoot the Cisco ASA FirePOWER Services module and Cisco Firepower Threat Defense
Walk through installing AMP Private Clouds
Deploy Cisco AMP for Networks, and configure malware and file policies
Implement AMP for Content Security, and configure File Reputation and File Analysis Services
Master Cisco AMP for Endpoints, including custom detection, application control, and policy management
Make the most of the AMP ThreatGrid dynamic malware analysis engine
Manage Next-Generation Security Devices with the Firepower Management Center (FMC)
Plan, implement, and configure Cisco Next-Generation IPS—including performance and redundancy
Create Cisco Next-Generation IPS custom reports and analyses
Quickly identify the root causes of security problemsOther authorsSee publication -
FOG BASED ATTESTATION - INLINE DATAPLANE BASED INTEGRITY VALIDATION AND EVENT BASED ATTESTATION QUERY
IP.com
A process is presented that uses extensions to offload a hashing value for sensors to edge nodes. The hashing value can be included in an IPv6 Extension Header (in all packets, few packets, on-demand/request based). Any deviation in hashing is detected, and an instruction may be sent to a server using various extensions to trigger integrity/attestation validation. This provides an event-based integrity validation trigger from server to sensor. Until the integrity validation is completed, all…
A process is presented that uses extensions to offload a hashing value for sensors to edge nodes. The hashing value can be included in an IPv6 Extension Header (in all packets, few packets, on-demand/request based). Any deviation in hashing is detected, and an instruction may be sent to a server using various extensions to trigger integrity/attestation validation. This provides an event-based integrity validation trigger from server to sensor. Until the integrity validation is completed, all the packets from the sensors may be dropped. Thus, a dataplane-based integrity validation process is provided that achieves faster abnormality detection and prevents the falsified data from affecting the service.
-
Network Security with Netflow and IPFIX: Big Data Analytics for Information Security
Cisco Press
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security
-
Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons
Pearson
ISBN: 9781587205705
-
Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition)
Cisco Press
Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.
…Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.
Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT.
You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs–
all designed to help you make the most of Cisco ASA in your rapidly evolving network.Other authorsSee publication -
End-to-End Network Security: Defense-in-Depth
Cisco Press
Best practices for assessing and improving network defenses and responding to security incidents
-
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Pearson - Addison-Wesley Professional
-
CCNA Cyber Ops SECFND #210-250 Official Cert Guide
-
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops…
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops SECFND #210-250 Official Cert Guide is Cisco's official, comprehensive self-study resource for the first of these two exams.
Designed for all CCNA Cyber Ops candidates, it covers every SECFND #210-250 objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:
Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
Foundation topics sections that explain concepts and configurations, and link theory to practice
Key topics sections calling attention to every figure, table, and list you must know
Exam Preparation sections with additional chapter review features
Final preparation chapter providing tools and a complete final study plan
A customizable practice test library
This guide offers comprehensive, up-to-date coverage of all SECFND #210-250 topics related to:
Network concepts
Security concepts
Cryptography
Host based analysis
Security monitoring
Attack methods -
CCNA Cyber Ops SECFND 210-250 Complete Video Course and Practice Test
-
CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst.
CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos…CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst.
CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations. The Complete Video Course Premium Edition also comes with:
· Lesson quizzes to help you test yourself on concepts and commands
· Interactive exercises so you can put your knowledge to the test
· A full practice exam delivered in the Pearson Test Prep Engine
-
CCNA Cyber Ops SECOPS #210-255 Official Cert Guide
-
ISBN-13: 978-1587147036
ISBN-10: 1587147033
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable…ISBN-13: 978-1587147036
ISBN-10: 1587147033
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops SECOPS #210-255 Official Cert Guide is Cisco's official, comprehensive self-study resource for the second of these two exams.
Designed for all CCNA Cyber Ops candidates, it covers every SECOPS #210-255 objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:
Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
Foundation topics sections that explain concepts and configurations, and link theory to practice
Key topics sections calling attention to every figure, table, and list you must know
Exam Preparation sections with additional chapter review features
Final preparation chapter providing tools and a complete final study plan
A customizable practice test library
This guide offers comprehensive, up-to-date coverage of all SECOPS #210-255 topics related to:
Endpoint threat analysis and computer forensics
Network intrusion analysis
Incident response
Data and event analysis
Incident handling -
CCNA Cyber Ops SECOPS 210-255 Complete Video Course and Practice Tests
Pearson
CCNA Cyber Ops SECOPS 210-255 Complete Video Course is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) security analyst.
CCNA Cyber Ops SECOPS 210-255 Complete Video Course contains more…CCNA Cyber Ops SECOPS 210-255 Complete Video Course is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) security analyst.
CCNA Cyber Ops SECOPS 210-255 Complete Video Course contains more than four and a half hours of instruction with 11 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations.
Major topics include
* Endpoint Threat Analysis and Computer Forensics
* Network Intrusion Analysis
* Incident Response
* Data and Event Analysis
* Incident Handling
* Lesson quizzes to help you test yourself on concepts and commands
* Interactive exercises so you can put your knowledge to the test
* A full practice exam delivered in the Pearson Test Prep Engine -
CCNA Security 210-260 Official Cert Guide
-
CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security experts Omar Santos and John Stuppi share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and…
CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security experts Omar Santos and John Stuppi share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
Other authorsSee publication -
Certified Ethical Hacker (CEH) Version 10 Cert Guide
-
This study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. This concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.
-
Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons
-
7 hours of video training on Cisco ASA 5500-X Series Next-Generation Firewalls, from initial design to advanced configuration and troubleshooting.
Description
Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is an engaging and unique video course taught in front of a live audience. Omar Santos, senior incident manager and the technical leader of the Cisco Product Security Incident Response Team (PSIRT) and author of Cisco ASA: All-in-one Next-Generation…7 hours of video training on Cisco ASA 5500-X Series Next-Generation Firewalls, from initial design to advanced configuration and troubleshooting.
Description
Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is an engaging and unique video course taught in front of a live audience. Omar Santos, senior incident manager and the technical leader of the Cisco Product Security Incident Response Team (PSIRT) and author of Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, teaches you the skills you need to design, configure, and troubleshoot the firewall features of the Cisco ASA 5500-X Series Next-Generation Firewalls and FirePOWER services with Advanced Malware Protection (AMP).
This live video introduces Cisco ASA solutions to overcoming obstacles by providing complete configuration and troubleshooting guidance. Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is the definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco ASA firewall features. -
Cisco Firepower and Advanced Malware Protection LiveLessons
-
More than 4 hours of video training covering everything you need to know to design, configure, and troubleshoot Cisco ASA Firepower services.
Description
Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco ASA with FirePOWER Services and Firepower Threat Defense. Cisco Firepower and Advanced Malware Protection LiveLessons walks you through the steps for designing, configuring, and troubleshooting Cisco ASA Firepower services so you can…More than 4 hours of video training covering everything you need to know to design, configure, and troubleshoot Cisco ASA Firepower services.
Description
Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco ASA with FirePOWER Services and Firepower Threat Defense. Cisco Firepower and Advanced Malware Protection LiveLessons walks you through the steps for designing, configuring, and troubleshooting Cisco ASA Firepower services so you can implement latest threat detection services from Cisco. Omar Santos, best-selling author of CCNA Security Cert Guide and Complete Video Course and a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), provides step-by-step coverage of the new Cisco Firepower services and explores the Cisco Next-Generation IPS appliances, Cisco ASA with Firepower services, AMP for networks, endpoints and content security, and Firepower Management Center.
-
Cisco NetFlow LiveLessons: Big Data Analytics for Cyber Security
-
More than 6 hours of video training covering everything you need to know to deploy, configure, and troubleshoot NetFlow in many different Cisco platforms and learn big data analytics technologies for cyber security.
Description
Cisco NetFlow LiveLessons walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and…More than 6 hours of video training covering everything you need to know to deploy, configure, and troubleshoot NetFlow in many different Cisco platforms and learn big data analytics technologies for cyber security.
Description
Cisco NetFlow LiveLessons walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Cisco NetFlow LiveLessons is a key resource for understanding the power behind the Cisco NetFlow solution.
Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of Network Security with NetFlow and IPFIX, the CCNA Security 210-260 Official Cert Guide, and other key security video and book titles by Cisco Press demonstrates how NetFlow can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This video courseexplores everything you need to understand and implement the Cisco Cyber Threat Defense Solution, while also providing configuration and troubleshooting walk-throughs. -
CompTIA PenTest+ Cert Guide
Pearson
This book is a complete guide to prepare for the CompTIA PenTest+ certification exam. It covers all the topics in the exam including plan and scope a security penetration testing (ethical hacking) assessment, understanding legal and compliance requirements, and performing vulnerability scanning and penetration testing using appropriate tools and techniques. In addition, it guides the student on how to analyze the results and write a comprehensive report including remediation techniques and best…
This book is a complete guide to prepare for the CompTIA PenTest+ certification exam. It covers all the topics in the exam including plan and scope a security penetration testing (ethical hacking) assessment, understanding legal and compliance requirements, and performing vulnerability scanning and penetration testing using appropriate tools and techniques. In addition, it guides the student on how to analyze the results and write a comprehensive report including remediation techniques and best practices on how to effectively communicate results to the relevant stakeholders.
This book is in complete alignment with the CompTIA PenTest+ certification exam blueprint. The book includes practice questions, as well as real-life scenarios and tips. -
Developing Cybersecurity Programs and Policies
Pearson
This book is part of Pearson’s IT Cybersecurity Curriculum (ITCC) series is a turn-key curriculum solution for two- or four-year degree or certificate programs.
This book is a complete guide to establishing a cybersecurity program and governance in your organization. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security…This book is part of Pearson’s IT Cybersecurity Curriculum (ITCC) series is a turn-key curriculum solution for two- or four-year degree or certificate programs.
This book is a complete guide to establishing a cybersecurity program and governance in your organization. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems.
This book teaches you how to systematically identify, prioritize, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS. -
DYNAMIC TRUST AND RISK SCORING USING LAST-KNOWN-PROFILE LEARNING
-
Presented herein is a distributed and dynamic security threat and risk calculation method for Internet of Things (IoT) environments. Dynamic changes of IoT infrastructure are detected, and a "Risk Score" profile is derived from multiple "current" or "previously known" factors about the sensor or previous communication patterns. The Risk Score is updated and maintained over time. This method allows for enumerating and classifying IoT asset value in large-scale IoT environments.
Other authorsSee publication -
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
Pearson - Addison-Wesley Professional
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
Patents
-
Automated container security
US US20180027009A1
Systems, methods, and computer-readable storage media for determining threat mitigation policies and deploying tested security fixes. In some cases, the present technology involves gathering threat intelligence, identifying a security threat, identifying an application container that is affected by the security threat, determining a threat level for the security threat on the application container, applying a threat mitigation policy to the affected application container, spawning a clone of…
Systems, methods, and computer-readable storage media for determining threat mitigation policies and deploying tested security fixes. In some cases, the present technology involves gathering threat intelligence, identifying a security threat, identifying an application container that is affected by the security threat, determining a threat level for the security threat on the application container, applying a threat mitigation policy to the affected application container, spawning a clone of the affected application container, testing the clone with one or more security fixes, and deploying the clone of the affected container as a replacement for the affected container.
-
Fog-based hybrid system for optimal distribution of anomaly detection and remediation services
US US20170288988A1
In one embodiment, a device in a network reserves first and second sets of local resources for an anomaly detection mechanism. The device reports the first set of local resources to a supervisory node in the network. The device applies one or more anomaly detection rules from the supervisory node using the first set of reserved resources. The device receives one or more anomaly detection rules from a peer node in the network. The device applies the one or more anomaly detection rules from the…
In one embodiment, a device in a network reserves first and second sets of local resources for an anomaly detection mechanism. The device reports the first set of local resources to a supervisory node in the network. The device applies one or more anomaly detection rules from the supervisory node using the first set of reserved resources. The device receives one or more anomaly detection rules from a peer node in the network. The device applies the one or more anomaly detection rules from the peer node using the second set of reserved resources.
-
Side-Channel Integrity Validation of Devices
US US20170061131A1
Techniques are presented herein that validate integrity of a computing device. A command to a first processor of a security module of the computing device is received through an interface unit of the security module on a communication channel external to the computing device. A configuration of the security module cannot be changed by a second processor of the computing device which executes an operating system and at least one application on the computing device. In response to receiving the…
Techniques are presented herein that validate integrity of a computing device. A command to a first processor of a security module of the computing device is received through an interface unit of the security module on a communication channel external to the computing device. A configuration of the security module cannot be changed by a second processor of the computing device which executes an operating system and at least one application on the computing device. In response to receiving the command, one or more memory devices of the computing device are directly accessed by the first processor independent from the second processor to validate integrity of the computing device.
Languages
-
Spanish
Native or bilingual proficiency
-
English
Native or bilingual proficiency
Organizations
-
Multiple
-
Professional affiliations: Board Member of the Open Vulnerability and Assessment Language (OVAL) standard development Directly influenced and changed the OVAL language by creating OVAL schemas for Cisco products including IOS, ASA, and IOS-XE and changes to the OVAL language. Led the development of machine readable content for Cisco IOS security advisories. This allows customers to leverage this machine readable content to reduce the complexity and time necessary to respond to security…
Professional affiliations: Board Member of the Open Vulnerability and Assessment Language (OVAL) standard development Directly influenced and changed the OVAL language by creating OVAL schemas for Cisco products including IOS, ASA, and IOS-XE and changes to the OVAL language. Led the development of machine readable content for Cisco IOS security advisories. This allows customers to leverage this machine readable content to reduce the complexity and time necessary to respond to security advisories, assess their devices, and ensure compliance so they can allocate resources to focus on other areas of their network and security infrastructure. Technical Leader in the Industry Consortium for the Advancement of Security on the Internet (ICASI) – enabling members to proactively collaborate to analyze, mitigate, and resolve multi-vendor, global security challenges. Active member of the Information Systems Security Association (ISSA); delivered several technical presentations to the Raleigh and Piedmont Chapters. Active member of the Eastern Carolina Infragard (an FBI program that includes businesses, academic institutions, state and local law enforcement agencies, to investigate and share knowledge about cyber security). External Speaking Engagements: As an invited speaker I speak to numerous domestic and international audiences. • Cisco Live: Speaker and Instructor for past 12 years with high ratings (including Cisco Live/Networkers US, Mexico, Peru, UK, Argentina, and others). • Speaker and Instructor at Triangle InfoSeCon (2 years) • CarolinaCon (3 years) Internal Speaking Engagements: Cisco Security Conference (SecCon) for past 4 years Numerous EBCs, internal trainings to BUs, TAC, AS, and sales teams.
Recommendations received
13 people have recommended Omar
Join now to viewMore activity by Omar
-
Register by 5 November for the upcoming CSAF Workshops at the Information Security Hub at Munich Airport. Seats are limited - reserve your spot here:…
Register by 5 November for the upcoming CSAF Workshops at the Information Security Hub at Munich Airport. Seats are limited - reserve your spot here:…
Liked by Omar Santos
-
We are thrilled to announce that Aim Security has joined CoSAI, the Coalition for Secure AI! With our shared commitment to advancing the security…
We are thrilled to announce that Aim Security has joined CoSAI, the Coalition for Secure AI! With our shared commitment to advancing the security…
Liked by Omar Santos
-
i'm on a ~3 week round the world business trip and for the first time since ~Y2K my second (personal use) laptop is not thinkpad+windows. i'm trying…
i'm on a ~3 week round the world business trip and for the first time since ~Y2K my second (personal use) laptop is not thinkpad+windows. i'm trying…
Liked by Omar Santos
-
Tis the season to go phishing...fa lalalala...lalalalala https://lnkd.in/gS8e_hpi
Tis the season to go phishing...fa lalalala...lalalalala https://lnkd.in/gS8e_hpi
Liked by Omar Santos
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Omar Santos in United States
-
Omar Santos
Investment Analyst at Holocene Advisors
-
Omar Santos
Supply Chain Management at Baptist Health South Florida
-
Omar Santos
-
Omar Santos Velasco
137 others named Omar Santos in United States are on LinkedIn
See others named Omar Santos