Omar Santos

Omar Santos

Raleigh, North Carolina, United States
12K followers 500+ connections

About

Omar Santos is a recognized leader in the cybersecurity community. He is the…

Activity

Join now to see all activity

Experience

  • Coalition for Secure AI

  • -

  • -

    Raleigh, North Carolina, United States

  • -

    RTP, NC

  • -

  • -

    Raleigh, North Carolina, United States

  • -

  • -

Education

Licenses & Certifications

Volunteer Experience

  • OASIS Graphic

    Chair of the Common Security Advisory Framework (CSAF) Technical Committee

    OASIS

    - Present 7 years 10 months

    Science and Technology

    The OASIS CSAF Technical Committee is chartered to make a major revision to the Common Vulnerability Reporting Framework (CVRF) under a new name for the framework that reflects the primary purpose: a Common Security Advisory Framework (CSAF). TC deliverables are designed standardize existing practice in structured machine-readable vulnerability-related advisories and further refine those standards over time.

    https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=csaf

  • DEF CON Red Team Village Graphic

    Co-Lead

    DEF CON Red Team Village

    - Present 5 years 8 months

    Science and Technology

    Co-lead of the DEF CON Red Team Village. https://redteamvillage.io

  • FIRST Graphic

    Co-Chair of the PSIRT TC Third-party Software Security (open source security) working group

    FIRST

    - 10 months

    Science and Technology

  • The Unified Security Incident Response Plan (USIRP) Workgroup Chair

    Industry Consortium for Advancement of Security on the Internet (ICASI)

    - 3 years

    Science and Technology

    The Unified Security Incident Response Plan (USIRP) is one of the primary means by which ICASI fulfills its mission of enhancing the global security landscape. Comprising a trusted forum and supporting processes, procedures, and tools, the USIRP enables Security Incident Response Teams (SIRTs) from ICASI member companies to collaborate quickly and effectively to resolve complex, multi-vendor Internet security issues. These issues include: vulnerabilities in commonly-used software; incidents -…

    The Unified Security Incident Response Plan (USIRP) is one of the primary means by which ICASI fulfills its mission of enhancing the global security landscape. Comprising a trusted forum and supporting processes, procedures, and tools, the USIRP enables Security Incident Response Teams (SIRTs) from ICASI member companies to collaborate quickly and effectively to resolve complex, multi-vendor Internet security issues. These issues include: vulnerabilities in commonly-used software; incidents - urgent or emergent - that affect three or more ICASI member organizations; and ongoing or long-term problems that warrant a strategic response.

    The USIRP works by harmonizing ICASI member companies' internal security incident response procedures and personnel by providing a common, formal framework with which these organizations can: trigger a USIRP event; share critical information about it; and work together effectively on a coordinated response.


    More at: https://www.icasi.org/projects#usirp

  • Original Organizer and President

    BSIDES Raleigh

    - 4 years 6 months

    Science and Technology

  • OASIS Graphic

    Chair of OpenEoX

    OASIS

    - Present 1 year 2 months

    Science and Technology

    OpenEoX is an initiative aimed at standardizing the way End-of-Life (EOL) and End-of-Support (EOS) information is exchanged within the software and hardware industries. Covering both vendors and open-source maintainers, OpenEoX strives to provide a transparent, efficient, and unified approach to managing product lifecycles.

    In today's fast-paced world of technological advancements, it's crucial for businesses and individuals to stay informed about the lifecycle status of the products…

    OpenEoX is an initiative aimed at standardizing the way End-of-Life (EOL) and End-of-Support (EOS) information is exchanged within the software and hardware industries. Covering both vendors and open-source maintainers, OpenEoX strives to provide a transparent, efficient, and unified approach to managing product lifecycles.

    In today's fast-paced world of technological advancements, it's crucial for businesses and individuals to stay informed about the lifecycle status of the products they rely on. OpenEoX addresses this need by offering a common framework that simplifies the process of managing and sharing EOL and EOS information across the industry.

    Founding members of the OpenEoX Technical Committee include Cisco, Microsoft, Red Hat, Siemens, BSI, and CISA. Many organizations have joined since the OpenEoX TC was introduced.

Publications

  • Beyond the Algorithm: AI, Security, Privacy, and Ethics

    Pearson

    As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.

    Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and…

    As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.

    Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals—and, increasingly, users—are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.

    · An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future

    · Introduction to AI models and implementations, as well as examples of emerging AI trends

    · Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment

    · Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology

    · A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas

    · An academic resource and guide for the evolving technical and intellectual challenges of AI

    · Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.

    See publication
  • Developing Cybersecurity Programs and Polices

    Pearson

    Learn How To

    · Establish cybersecurity policies and governance that serve your organization’s needs

    · Integrate cybersecurity program components into a coherent framework for action

    · Assess, prioritize, and manage security risk throughout the organization

    · Manage assets and prevent data loss

    · Work with HR to address human factors in cybersecurity

    · Harden your facilities and physical…

    Learn How To

    · Establish cybersecurity policies and governance that serve your organization’s needs

    · Integrate cybersecurity program components into a coherent framework for action

    · Assess, prioritize, and manage security risk throughout the organization

    · Manage assets and prevent data loss

    · Work with HR to address human factors in cybersecurity

    · Harden your facilities and physical environment

    · Design effective policies for securing communications, operations, and access

    · Strengthen security throughout the information systems lifecycle

    · Plan for quick, effective incident response and ensure business continuity

    · Comply with rigorous regulations in finance and healthcare

    · Plan for PCI compliance to safely process payments

    · Explore and apply the guidance provided by the NIST Cybersecurity Framework

    See publication
  • Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons

    Pearson

    Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.

    See publication
  • Security Penetration Testing (The Art of Hacking Series) LiveLessons

    Pearson

    This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an…

    This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques. This course provides step-by-step real-life scenarios. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture.

    With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired or wireless network and the systems within that network. Also covered are numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, and Maltego. You’ll find guidelines on how to write penetration testing reports, and learn how to plan and organize the them.

    This course provides supplemental material to reinforce some of the critical concepts and techniques learned, scripts to help you build your own hacking environment, and examples of real-life penetration testing reports. This material can be accessed at theartofhacking.org.

    See publication
  • Cisco Next-Generation Security Solutions: All-in-one Cisco ASA Firepower Services, NGIPS, and AMP

    Cisco Press

    ISBN 1587144468

    Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them.

    The authors present authoritative coverage of Cisco ASA with FirePOWER Services;…

    ISBN 1587144468

    Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow’s threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them.

    The authors present authoritative coverage of Cisco ASA with FirePOWER Services; Cisco Firepower Threat Defense (FTD); Cisco Next-Generation IPS appliances; the Cisco Web Security Appliance (WSA) with integrated Advanced Malware Protection (AMP); Cisco Email Security Appliance (ESA) with integrated Advanced Malware Protection (AMP); Cisco AMP ThreatGrid Malware Analysis and Threat Intelligence, and the
    Cisco Firepower Management Center (FMC).

    You’ll find everything you need to succeed: easy-to-follow configurations, application case studies, practical triage and troubleshooting methodologies, and much more.
    Effectively respond to changing threat landscapes and attack continuums
    Design Cisco ASA with FirePOWER Services and Cisco Firepower Threat Defense (FTD) solutions
    Set up, configure, and troubleshoot the Cisco ASA FirePOWER Services module and Cisco Firepower Threat Defense
    Walk through installing AMP Private Clouds
    Deploy Cisco AMP for Networks, and configure malware and file policies
    Implement AMP for Content Security, and configure File Reputation and File Analysis Services
    Master Cisco AMP for Endpoints, including custom detection, application control, and policy management
    Make the most of the AMP ThreatGrid dynamic malware analysis engine
    Manage Next-Generation Security Devices with the Firepower Management Center (FMC)
    Plan, implement, and configure Cisco Next-Generation IPS—including performance and redundancy
    Create Cisco Next-Generation IPS custom reports and analyses
    Quickly identify the root causes of security problems

    Other authors
    See publication
  • FOG BASED ATTESTATION - INLINE DATAPLANE BASED INTEGRITY VALIDATION AND EVENT BASED ATTESTATION QUERY

    IP.com

    A process is presented that uses extensions to offload a hashing value for sensors to edge nodes. The hashing value can be included in an IPv6 Extension Header (in all packets, few packets, on-demand/request based). Any deviation in hashing is detected, and an instruction may be sent to a server using various extensions to trigger integrity/attestation validation. This provides an event-based integrity validation trigger from server to sensor. Until the integrity validation is completed, all…

    A process is presented that uses extensions to offload a hashing value for sensors to edge nodes. The hashing value can be included in an IPv6 Extension Header (in all packets, few packets, on-demand/request based). Any deviation in hashing is detected, and an instruction may be sent to a server using various extensions to trigger integrity/attestation validation. This provides an event-based integrity validation trigger from server to sensor. Until the integrity validation is completed, all the packets from the sensors may be dropped. Thus, a dataplane-based integrity validation process is provided that achieves faster abnormality detection and prevents the falsified data from affecting the service.

    See publication
  • Network Security with Netflow and IPFIX: Big Data Analytics for Information Security

    Cisco Press

    A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security

    See publication
  • Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition)

    Cisco Press

    Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.

    Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.

    Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT.

    You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs–
    all designed to help you make the most of Cisco ASA in your rapidly evolving network.

    Other authors
    See publication
  • End-to-End Network Security: Defense-in-Depth

    Cisco Press

    Best practices for assessing and improving network defenses and responding to security incidents

    See publication
  • Beyond the Algorithm: AI, Security, Privacy, and Ethics

    Pearson - Addison-Wesley Professional

    Other authors
    See publication
  • CCNA Cyber Ops SECFND #210-250 Official Cert Guide

    -

    Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops…

    Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops SECFND #210-250 Official Cert Guide is Cisco's official, comprehensive self-study resource for the first of these two exams.

    Designed for all CCNA Cyber Ops candidates, it covers every SECFND #210-250 objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:
    Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
    Foundation topics sections that explain concepts and configurations, and link theory to practice
    Key topics sections calling attention to every figure, table, and list you must know
    Exam Preparation sections with additional chapter review features
    Final preparation chapter providing tools and a complete final study plan
    A customizable practice test library
    This guide offers comprehensive, up-to-date coverage of all SECFND #210-250 topics related to:
    Network concepts
    Security concepts
    Cryptography
    Host based analysis
    Security monitoring
    Attack methods

    See publication
  • CCNA Cyber Ops SECFND 210-250 Complete Video Course and Practice Test

    -

    CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst.

    CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos…

    CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst.

    CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations. The Complete Video Course Premium Edition also comes with:


    · Lesson quizzes to help you test yourself on concepts and commands
    · Interactive exercises so you can put your knowledge to the test
    · A full practice exam delivered in the Pearson Test Prep Engine

    See publication
  • CCNA Cyber Ops SECOPS #210-255 Official Cert Guide

    -

    ISBN-13: 978-1587147036
    ISBN-10: 1587147033

    Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable…

    ISBN-13: 978-1587147036
    ISBN-10: 1587147033

    Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops SECOPS #210-255 Official Cert Guide is Cisco's official, comprehensive self-study resource for the second of these two exams.

    Designed for all CCNA Cyber Ops candidates, it covers every SECOPS #210-255 objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:
    Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
    Foundation topics sections that explain concepts and configurations, and link theory to practice
    Key topics sections calling attention to every figure, table, and list you must know
    Exam Preparation sections with additional chapter review features
    Final preparation chapter providing tools and a complete final study plan
    A customizable practice test library
    This guide offers comprehensive, up-to-date coverage of all SECOPS #210-255 topics related to:
    Endpoint threat analysis and computer forensics
    Network intrusion analysis
    Incident response
    Data and event analysis
    Incident handling

    See publication
  • CCNA Cyber Ops SECOPS 210-255 Complete Video Course and Practice Tests

    Pearson

    CCNA Cyber Ops SECOPS 210-255 Complete Video Course is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) security analyst.

    CCNA Cyber Ops SECOPS 210-255 Complete Video Course contains more…

    CCNA Cyber Ops SECOPS 210-255 Complete Video Course is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) security analyst.

    CCNA Cyber Ops SECOPS 210-255 Complete Video Course contains more than four and a half hours of instruction with 11 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations.

    Major topics include
    * Endpoint Threat Analysis and Computer Forensics
    * Network Intrusion Analysis
    * Incident Response
    * Data and Event Analysis
    * Incident Handling
    * Lesson quizzes to help you test yourself on concepts and commands
    * Interactive exercises so you can put your knowledge to the test
    * A full practice exam delivered in the Pearson Test Prep Engine

    See publication
  • CCNA Security 210-260 Official Cert Guide

    -

    CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security experts Omar Santos and John Stuppi share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and…

    CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security experts Omar Santos and John Stuppi share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

    Other authors
    See publication
  • Certified Ethical Hacker (CEH) Version 10 Cert Guide

    -

    This study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. This concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

    See publication
  • Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons

    -

    7 hours of video training on Cisco ASA 5500-X Series Next-Generation Firewalls, from initial design to advanced configuration and troubleshooting.

    Description

    Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is an engaging and unique video course taught in front of a live audience. Omar Santos, senior incident manager and the technical leader of the Cisco Product Security Incident Response Team (PSIRT) and author of Cisco ASA: All-in-one Next-Generation…

    7 hours of video training on Cisco ASA 5500-X Series Next-Generation Firewalls, from initial design to advanced configuration and troubleshooting.

    Description

    Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is an engaging and unique video course taught in front of a live audience. Omar Santos, senior incident manager and the technical leader of the Cisco Product Security Incident Response Team (PSIRT) and author of Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, teaches you the skills you need to design, configure, and troubleshoot the firewall features of the Cisco ASA 5500-X Series Next-Generation Firewalls and FirePOWER services with Advanced Malware Protection (AMP).

    This live video introduces Cisco ASA solutions to overcoming obstacles by providing complete configuration and troubleshooting guidance. Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is the definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco ASA firewall features.

    See publication
  • Cisco Firepower and Advanced Malware Protection LiveLessons

    -

    More than 4 hours of video training covering everything you need to know to design, configure, and troubleshoot Cisco ASA Firepower services.

    Description
    Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco ASA with FirePOWER Services and Firepower Threat Defense. Cisco Firepower and Advanced Malware Protection LiveLessons walks you through the steps for designing, configuring, and troubleshooting Cisco ASA Firepower services so you can…

    More than 4 hours of video training covering everything you need to know to design, configure, and troubleshoot Cisco ASA Firepower services.

    Description
    Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco ASA with FirePOWER Services and Firepower Threat Defense. Cisco Firepower and Advanced Malware Protection LiveLessons walks you through the steps for designing, configuring, and troubleshooting Cisco ASA Firepower services so you can implement latest threat detection services from Cisco. Omar Santos, best-selling author of CCNA Security Cert Guide and Complete Video Course and a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), provides step-by-step coverage of the new Cisco Firepower services and explores the Cisco Next-Generation IPS appliances, Cisco ASA with Firepower services, AMP for networks, endpoints and content security, and Firepower Management Center.

    See publication
  • Cisco NetFlow LiveLessons: Big Data Analytics for Cyber Security

    -

    More than 6 hours of video training covering everything you need to know to deploy, configure, and troubleshoot NetFlow in many different Cisco platforms and learn big data analytics technologies for cyber security.

    Description



    Cisco NetFlow LiveLessons walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and…

    More than 6 hours of video training covering everything you need to know to deploy, configure, and troubleshoot NetFlow in many different Cisco platforms and learn big data analytics technologies for cyber security.

    Description



    Cisco NetFlow LiveLessons walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Cisco NetFlow LiveLessons is a key resource for understanding the power behind the Cisco NetFlow solution.

    Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of Network Security with NetFlow and IPFIX, the CCNA Security 210-260 Official Cert Guide, and other key security video and book titles by Cisco Press demonstrates how NetFlow can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This video courseexplores everything you need to understand and implement the Cisco Cyber Threat Defense Solution, while also providing configuration and troubleshooting walk-throughs.

    See publication
  • CompTIA PenTest+ Cert Guide

    Pearson

    This book is a complete guide to prepare for the CompTIA PenTest+ certification exam. It covers all the topics in the exam including plan and scope a security penetration testing (ethical hacking) assessment, understanding legal and compliance requirements, and performing vulnerability scanning and penetration testing using appropriate tools and techniques. In addition, it guides the student on how to analyze the results and write a comprehensive report including remediation techniques and best…

    This book is a complete guide to prepare for the CompTIA PenTest+ certification exam. It covers all the topics in the exam including plan and scope a security penetration testing (ethical hacking) assessment, understanding legal and compliance requirements, and performing vulnerability scanning and penetration testing using appropriate tools and techniques. In addition, it guides the student on how to analyze the results and write a comprehensive report including remediation techniques and best practices on how to effectively communicate results to the relevant stakeholders.

    This book is in complete alignment with the CompTIA PenTest+ certification exam blueprint. The book includes practice questions, as well as real-life scenarios and tips.

    See publication
  • Developing Cybersecurity Programs and Policies

    Pearson

    This book is part of Pearson’s IT Cybersecurity Curriculum (ITCC) series is a turn-key curriculum solution for two- or four-year degree or certificate programs.
    This book is a complete guide to establishing a cybersecurity program and governance in your organization. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security…

    This book is part of Pearson’s IT Cybersecurity Curriculum (ITCC) series is a turn-key curriculum solution for two- or four-year degree or certificate programs.
    This book is a complete guide to establishing a cybersecurity program and governance in your organization. In this book, you will learn how to create cybersecurity policies, standards, procedures, guidelines, and plans —and the differences among them. This book covers the Confidentiality, Integrity & Availability (CIA) security model. You will also learn how threat actors are launching attacks against their victims compromising confidentiality, integrity, and availability of systems and networks. This book covers the NIST Cybersecurity Framework and ISO/IEC 27000-series standards. You will learn how to align security with business strategy, as well as define, inventory, and classify your information and systems.

    This book teaches you how to systematically identify, prioritize, and manage cybersecurity risks and reduce social engineering (human) risks with role-based Security Education, Awareness, and Training (SETA). You will also learn how to implement effective physical, environmental, communications, and operational security; and effectively manage access control. In this book you will learn how to respond to incidents and ensure continuity of operations and how to comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS.

    See publication
  • DYNAMIC TRUST AND RISK SCORING USING LAST-KNOWN-PROFILE LEARNING

    -

    Presented herein is a distributed and dynamic security threat and risk calculation method for Internet of Things (IoT) environments. Dynamic changes of IoT infrastructure are detected, and a "Risk Score" profile is derived from multiple "current" or "previously known" factors about the sensor or previous communication patterns. The Risk Score is updated and maintained over time. This method allows for enumerating and classifying IoT asset value in large-scale IoT environments.

    Other authors
    See publication
  • The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

    Pearson - Addison-Wesley Professional

    The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

    See publication

Patents

  • Automated security enclave generation

    Issued US 10,135,859

  • Automated container security

    US US20180027009A1

    Systems, methods, and computer-readable storage media for determining threat mitigation policies and deploying tested security fixes. In some cases, the present technology involves gathering threat intelligence, identifying a security threat, identifying an application container that is affected by the security threat, determining a threat level for the security threat on the application container, applying a threat mitigation policy to the affected application container, spawning a clone of…

    Systems, methods, and computer-readable storage media for determining threat mitigation policies and deploying tested security fixes. In some cases, the present technology involves gathering threat intelligence, identifying a security threat, identifying an application container that is affected by the security threat, determining a threat level for the security threat on the application container, applying a threat mitigation policy to the affected application container, spawning a clone of the affected application container, testing the clone with one or more security fixes, and deploying the clone of the affected container as a replacement for the affected container.

    See patent
  • Fog-based hybrid system for optimal distribution of anomaly detection and remediation services

    US US20170288988A1

    In one embodiment, a device in a network reserves first and second sets of local resources for an anomaly detection mechanism. The device reports the first set of local resources to a supervisory node in the network. The device applies one or more anomaly detection rules from the supervisory node using the first set of reserved resources. The device receives one or more anomaly detection rules from a peer node in the network. The device applies the one or more anomaly detection rules from the…

    In one embodiment, a device in a network reserves first and second sets of local resources for an anomaly detection mechanism. The device reports the first set of local resources to a supervisory node in the network. The device applies one or more anomaly detection rules from the supervisory node using the first set of reserved resources. The device receives one or more anomaly detection rules from a peer node in the network. The device applies the one or more anomaly detection rules from the peer node using the second set of reserved resources.

    See patent
  • Side-Channel Integrity Validation of Devices

    US US20170061131A1

    Techniques are presented herein that validate integrity of a computing device. A command to a first processor of a security module of the computing device is received through an interface unit of the security module on a communication channel external to the computing device. A configuration of the security module cannot be changed by a second processor of the computing device which executes an operating system and at least one application on the computing device. In response to receiving the…

    Techniques are presented herein that validate integrity of a computing device. A command to a first processor of a security module of the computing device is received through an interface unit of the security module on a communication channel external to the computing device. A configuration of the security module cannot be changed by a second processor of the computing device which executes an operating system and at least one application on the computing device. In response to receiving the command, one or more memory devices of the computing device are directly accessed by the first processor independent from the second processor to validate integrity of the computing device.

    See patent

Languages

  • Spanish

    Native or bilingual proficiency

  • English

    Native or bilingual proficiency

Organizations

  • Multiple

    -

    Professional affiliations: Board Member of the Open Vulnerability and Assessment Language (OVAL) standard development Directly influenced and changed the OVAL language by creating OVAL schemas for Cisco products including IOS, ASA, and IOS-XE and changes to the OVAL language. Led the development of machine readable content for Cisco IOS security advisories. This allows customers to leverage this machine readable content to reduce the complexity and time necessary to respond to security…

    Professional affiliations: Board Member of the Open Vulnerability and Assessment Language (OVAL) standard development Directly influenced and changed the OVAL language by creating OVAL schemas for Cisco products including IOS, ASA, and IOS-XE and changes to the OVAL language. Led the development of machine readable content for Cisco IOS security advisories. This allows customers to leverage this machine readable content to reduce the complexity and time necessary to respond to security advisories, assess their devices, and ensure compliance so they can allocate resources to focus on other areas of their network and security infrastructure. Technical Leader in the Industry Consortium for the Advancement of Security on the Internet (ICASI) – enabling members to proactively collaborate to analyze, mitigate, and resolve multi-vendor, global security challenges. Active member of the Information Systems Security Association (ISSA); delivered several technical presentations to the Raleigh and Piedmont Chapters. Active member of the Eastern Carolina Infragard (an FBI program that includes businesses, academic institutions, state and local law enforcement agencies, to investigate and share knowledge about cyber security). External Speaking Engagements: As an invited speaker I speak to numerous domestic and international audiences. • Cisco Live: Speaker and Instructor for past 12 years with high ratings (including Cisco Live/Networkers US, Mexico, Peru, UK, Argentina, and others). • Speaker and Instructor at Triangle InfoSeCon (2 years) • CarolinaCon (3 years) Internal Speaking Engagements: Cisco Security Conference (SecCon) for past 4 years Numerous EBCs, internal trainings to BUs, TAC, AS, and sales teams.

Recommendations received

More activity by Omar

View Omar’s full profile

  • See who you know in common
  • Get introduced
  • Contact Omar directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Omar Santos in United States

Add new skills with these courses