Courses

Risk Management
Test your knowledge of Risk Management to identify strengths, gaps, and weaknesses in areas like IT asset inventory & criticality mapping, business impact analysis, risk assessment and mitigation, and vulnerability prioritization. Measure your mastery of risk management and advance your career with targeted course recommendations.

Case Study: Change Control Failure
In this challenge, you will review a case study about monitoring and governance. You will consider the benefits of two approaches to reform after a breach.

Case Study: Third-Party Access
In this challenge, you will review a case study about third-party access. You will consider the benefits of real-time monitoring improvements or governance-driven oversight reforms.

Risk Mitigation
In this course, you will be introduced to mitigation strategies. You will learn about designing effective controls, implementing mitigation plans, monitoring and validating controls, as well as reporting mitigation progress.

Vulnerability Prioritization
In this course, you will be introduced to vulnerabilities. You will learn about scanning and discovery, prioritization models, how to operationalize vulnerability management, as well as vulnerability governance.

Risk Profile
In this course, you will be introduced to risk profiles. You will learn how to define a risk profile, build an organizational risk profile, use the risk profile for decision-making, as well as how to report risk posture.
As a global executive in cybersecurity with 20+ years of experience leading elite teams across the U.S., Asia, Europe, and the Middle East, I bring both strategic vision and operational precision to digital defense. Most recently, as Head of Mandiant Managed Defense Consulting at Google Cloud, I led cyber and strategic initiatives that consistently elevated service delivery, drove revenue growth across new, incremental, and renewal streams, and enhanced customer outcomes.
My leadership journey spans Fortune 500s, sovereign entities, educational institutions, and mission-critical operations—delivering impactful results in threat detection, incident response, digital forensics, and cyber governance advisory. I’ve led a deep technical assessment lab covering IT, OT, and mobile technologies, and built cyber operations from the ground up in Japan, Australia, and the UAE. I’ve also directed consulting businesses across APJ and EMEA.
I’m the author of the Amazon best selling book the Blue Team Field Manual (BTFM) and Forensic Team Field Manual (FTFM), trusted resources used by cyber defenders around the world. My certifications include CISSP, CISA, CEH, CISA, CCE, and GCIH, and I’ve completed advanced executive education including MBA Program from LSE, Entrepreneurship at Oxford, Innovation from MIT, and AI Strategy from Berkeley. I am also a former Lieutenant Colonel in U.S. Army Cyber.


