“Since joining Arctic Wolf in 2020, I have had the opportunity to work alongside Rich. He quickly stood out as one of the most knowledgeable and dedicated professionals among our partners. I fully believe that he was strongly influential in Nth's ability to provide an exceptional level of service. In conversations with our potential clients, Rich stood out not just as knowledgeable but, it was obvious that he cared deeply about the wellbeing of the organizations we worked with. I just hope we'll get the opportunity to work together again!”
Rich Lindberg
Orange County, California, United States
6K followers
500+ connections
About
Rich Lindberg is a technologically capable, results-driven, and seasoned leader with over…
Contributions
-
What techniques can you use to identify and prioritize risks for monitoring and reporting?
What techniques can you use to identify and prioritize risks for monitoring and reporting? 1) Leverage a Business Impact Analysis (BIA) to drive weighting metrics for risk/impact correlation in the threat detection and response function. 2) Have a completed Incident Response Plan (IRP) for clear escalation and communication proceedures. 3) Develop as much response automation as possible to quickly contain any active threat.
-
How can you secure mobile devices during incident response?
How can you secure mobile devices during incident response? Should a mobile device become compromised as part of an incident I would againd look toward the advanced preparation done while developing an Incident Response Plsn (IRP). Does your scenario playbook set include mobile devices? If it does, then you likely have: 1) Faraday bags. 2) A forensic service or tool set to preserve the phone image.
-
How can you prioritize IAM incidents?
How can you prioritize IAM incidents? Interesting question as it suggests that multiple security incidents are in flight simultaneously. Given that premise from the question as written, it would fall to the Incident Response Plan (IRP). An IRP only works well when the work is put in before the incident. The solution a well-developed IRP privides is a communication and authorization chain based on organizatinal risk tolerance and approved by executive leadership. That is how one may have a clear path forward to deal with multiple incidents simultaneously; or even many security events comprising a single security incident. ;-)
Activity
-
I cannot tell you how excited CyAlliance® is to be partnering with this amazing company! Congratulations to the HUMAN team and to their funding team,…
I cannot tell you how excited CyAlliance® is to be partnering with this amazing company! Congratulations to the HUMAN team and to their funding team,…
Liked by Rich Lindberg
-
Southern California SIM (SCSIM) is pleased to share what promises to be an interesting event in the laid-back vibe that defines San Diego from our…
Southern California SIM (SCSIM) is pleased to share what promises to be an interesting event in the laid-back vibe that defines San Diego from our…
Liked by Rich Lindberg
Experience
Organizations
-
Evanta Southern California CISO Community
Member
- PresentEvanta is a local community of like-minded peers who share interests, challenges, and business priorities. Members of the community come together several times a year to connect with each other, share ideas and experiences, and validate strategies and solutions. Each community is led by a Governing Body of C-level practitioners, following our unique ‘by C-level, for C-level’ model. Their leadership ensures the content and discussions are most relevant to the challenges affecting your role…
Evanta is a local community of like-minded peers who share interests, challenges, and business priorities. Members of the community come together several times a year to connect with each other, share ideas and experiences, and validate strategies and solutions. Each community is led by a Governing Body of C-level practitioners, following our unique ‘by C-level, for C-level’ model. Their leadership ensures the content and discussions are most relevant to the challenges affecting your role today.
-
Information Systems Audit and Control Association (ISACA)
Member
- PresentAs an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves. ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through…
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves. ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. The COBIT framework and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals for the benefit of their enterprises.
-
(ISC)²
Member - CISSP
- Present(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 140,000 certified members strong, we empower professionals who touch every aspect of information security. -Protect society, the common good, necessary public trust and confidence, and the infrastructure. -Act honorably, honestly, justly, responsibly, and legally. -Provide diligent and competent service to…
(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 140,000 certified members strong, we empower professionals who touch every aspect of information security. -Protect society, the common good, necessary public trust and confidence, and the infrastructure. -Act honorably, honestly, justly, responsibly, and legally. -Provide diligent and competent service to principals. -Advance and protect the profession.
-
Southern California System Information Managers (SCSIM)
Member
- PresentSouthern California SIM (SCSIM) is more than a professional association dedicated to advancing IT excellence in leadership. We are the largest IT leadership association in California. Our members are a dynamic community of corporate IT leaders, principal-level consultants, digital change agents and academics who are shaping the evolving digital world in which we live today. SCSIM provides members opportunities to develop trust-based relationships with colleagues and mentors they might never…
Southern California SIM (SCSIM) is more than a professional association dedicated to advancing IT excellence in leadership. We are the largest IT leadership association in California. Our members are a dynamic community of corporate IT leaders, principal-level consultants, digital change agents and academics who are shaping the evolving digital world in which we live today. SCSIM provides members opportunities to develop trust-based relationships with colleagues and mentors they might never meet regularly, anywhere else. Members who share their challenges with each other come from established corporations and Silicon Beach startups; from private sector and public sector; from companies being disrupted and others that are the disrupters; and from as varied corporate cultures and missions as one can imagine. SCSIM offers a collaborative environment in which members can learn from colleagues, esteemed guest speakers and respected thought leaders.
-
Regular Industry Conferences
Attendee / Trainer / Speaker
- PresentBlackhat CanSecWest Core Cornerstones of Trust Defcon EuSec Interz0ne LayerOne PacSec RSA SecurityOPUS ShmooCon ToorCon
-
Security OPUS Information Security Conference
Organizer / Owner
-This annual San Francisco event caters to working security professionals and researchers. Sole owner and operator of this event. Manage a staff and coordinate all aspects of this event. It is a personal project, accomplished on own time as a contribution to the security community.
Recommendations received
11 people have recommended Rich
Join now to viewMore activity by Rich
-
Ransomware is doing more to change the security landscape than the last 20 years of SDL, DevSecOps, Zero Days, Breaches, or any corporate memo. Pair…
Ransomware is doing more to change the security landscape than the last 20 years of SDL, DevSecOps, Zero Days, Breaches, or any corporate memo. Pair…
Liked by Rich Lindberg
-
Just delivered another application security program maturity assessment to another happy customer, which is always an awesome feeling. They've now…
Just delivered another application security program maturity assessment to another happy customer, which is always an awesome feeling. They've now…
Liked by Rich Lindberg
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Rich Lindberg in United States
27 others named Rich Lindberg in United States are on LinkedIn
See others named Rich Lindberg