Leading Security Experts

Trend Micro is invested in helping to build the future

Ed Cabrera

Chief Cybersecurity Officer

Ed Cabrera

"The largest threats to global cybersecurity are those that emanate from cybercriminal undergrounds. What is needed is a global cybersecurity strategy that leverages the power of public-private partnerships to disrupt, degrade, and deny cybercriminals’ freedom of movement and the ability to monetise their attacks."

Experience: 20 years

Specialty: Financial, retail, healthcare, and government sector cybersecurity

Education: B.S., Florida State University; G.C., Naval Post Graduate School; CISSP; CISA

About: Ed is responsible for analysing emerging cyber threats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran and former CISO of the United States Secret Service with experience in leading information security, cyber investigative, and protective programs in support of the Secret Service integrated mission.

Ed started his career investigating transnational cybercriminal groups targeting the financial and retail sectors. He proudly served on the Presidential Protective Division for President George W. Bush before transitioning to lead cyber forensic operations in support of Secret Service large-scale data breach investigations. In his role as the secret service strategic advisor to the DHS National Cybersecurity & Communications Integration Centre (NCCIC) Ed led an interagency effort to share real-time actionable threat intelligence with Information Sharing and Analysis Organisations (ISAO) and critical infrastructure partners.

Ed is a guest lecturer at New York University Polytechnic Institute, Computer Science and Engineering Department and was a contributing subject matter expert on law enforcement, cybersecurity strategy and policy, computer forensics, and network intrusion incident response for the 2014 Risk and Responsibility in a Hyperconnected World; 2012 Homeland Security Advisory Council Task Force on Cyber Skills Report; and 2012 Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Auditor (CISA).

Favorite quote: “Difficulties mastered are opportunities won.” ~Winston Churchill

Twitter: @Ed_E_Cabrera

Rik Ferguson

Vice President, Security Research

Rik Ferguson

“This is not about open source versus closed; it’s also not about Android versus iOS or any other mobile operating system. It’s about criminals versus people, it’s about hype and reality, and it’s about knee-jerk self-preservation versus openness and consideration.”

Experience: 17+ years

Specialties: Secure infrastructure design, emerging threats, security technologies

Education: B.A., University of Wales; CISSP-ISSAP; Certified Ethical Hacker

About: Rik is actively engaged in research into online threats and the underground economy. He also researches the wider implications of new developments in the Information Technology arena and their impact on security both for consumers and in the enterprise and contributes to product development and marketing strategy. Recognised as an industry thought leader and analyst, Rik is regularly quoted by trade, national, and international media on issues surrounding information security, cybercrime, and the future of technology. Follow Rik on Twitter.

Favorite quote: “If you want to live life on your own terms, you’ve got to be willing to crash and burn” – Nikki Sixx

Expert in Action

See Rik’s insights on TrendLabs' Security Intelligence blog and on Countermeasures.

Rik discusses the launch of the International Cyber Security Protection Alliance – ICSPA

Mark Nunnikhoven

Vice President, Cloud Research

Mark Nunnikhoven

“Ignore the hype. What’s exciting about the cloud is that it enables focus, it enables amplification. For the first time, teams can spend almost 100% of their time directly delivering business value, and that opens up worlds of possibilities.”

Experience: 20 years

Specialties: Cloud technologies, usable security systems at scale

Education: M.S. in information security systems, Charles Sturt University; GCFA; GCIA: CISSP

About: Mark helps organisations build securely in the cloud
Opinionated, passionate, and driven, Mark is more than a clichéd byline. In his 20+ years of tackling development and operational challenges around the world, he has seen all manner of "interesting" solutions.

Teaching the community through his writing, speaking, and code, Mark works hard to help modernise security practices.

As the vice president of cloud research, Mark sits at the nexus of internal product development, academic, and industry research and the latest advancements from Trend Micro's cloud partners. This unique viewpoint gives Mark a down-to-earth view despite his focus on cloud computing.

He holds a master’s degree in information security systems with specialisation in digital forensics, is an engaging public speaker, an O'Reilly video author, and an accomplished computer scientist and security executive.

Mark is available online at http://markn.ca and @marknca.

Favorite quote: “Technologies are morally neutral until we apply them. It's only when we use them for good or for evil that they become good or evil.” – William Gibson

Expert in Action

Read Mark's thoughts on various topics related to cloud security on the Simply Security blog.

See Mark's talk on defending against 0-days from AWS re:Invent 2015.

Chat with Mark on Twitter (@marknca) or LinkedIn.

William J. Malik    

Vice President, Infrastructure Strategies

William  Malik

Experience: 40+ years

Specialties: Information security architecture, policy, program development, privacy, infrastructure design, IT operations, cloud migration

Education: SecMIT Mathematics

About: Bill helps clients achieve an effective information security posture spanning endpoints, networks, servers, cloud, and the Internet of Things. This process involves technology, policy, organisational design, and procedures and influences the product life cycle from acquisition or development through deployment, operations, maintenance, and replacement, or retirement. Starting as an application developer, Bill moved to OS development at IBM in Poughkeepsie and joined Gartner in 1990 where he ran the Information Security Strategies and Application Integration and Middleware services. He served as CTO of Waveset, an Identity Management provider, prior to its acquisition by Sun.

Favorite quote: “Knowledge rests not upon truth alone, but upon error also” – Carl Jung

Chat with him on Twitter @WilliamMalikTM

Greg Young

Vice President, Cybersecurity

Greg Young

Experience: 30 years in cybersecurity

Specialty: Securing networks, architectures, and data

About: Greg’s focus is enterprise-class security. He is keen on sharing the reality of security in larger organisations and how business can be done securely in those environments. As a research vice president with Gartner for 13 years Greg advised thousands of companies and governments on how to better secure themselves, evaluated and advised hundreds of security vendors, and has seen those same technologies successfully used, abused, put on a shelf, or pushed into a deep hole, never to be spoken of again.

At Gartner he led research for network security, threat trends, data centre security, cloud netsec and microsegmentation. He authored more than 20 Magic Quadrants for firewall, IPS, WAF, and UTM, and was Conference Chair for 4 Security Summits. Greg headed several large security consulting practices, was CISO for the Department of Communications, and served as chief security architect for a security product company. He was a commissioned officer in the military police and counterintelligence branch working as a certifier/accreditor at the national authority and received the Confederation Medal from the Governor General of Canada for his work with smart card security.

Greg was named in the “12 Most Powerful Security Companies” and as one of “100 Most Powerful Voices in Worldwide Security.” And, as he mentions too often, Greg was an extra in 2 episodes of Airwolf.

Favorite Quote: “Knowledge is of no value unless you put it into practice” – Anton Chekov

Chat with Greg on Twitter via @OrangeKlaxon and on LinkedIn

Lynette Owens

Global Director, Internet Safety for Kids and Families

Lynette Owens

“A community approach to teaching kids to think critically on their own about what they are saying, doing, and sharing online is more important than ever.”

Experience: 20 years

Specialty: Internet safety for youth, families, and teachers

Education: M.B.A, University of California, Berkeley; B.S. Finance, Boston College

About: Lynette is the founder and global director of Trend Micro’s Internet Safety for Kids and Families (ISKF) program. After many years in various marketing roles and having served 6 years as associate vice president of corporate marketing for Trend Micro, Lynette founded ISKF in 2008 to extend the company’s vision of making a world safe for the exchange of digital information to the world’s youngest citizens. As a pro-technology parent and internet safety advocate, Lynette spends her time educating the public, collaborating with NGOs and technology and media companies, and recruiting employee volunteers in 19 countries. She is an advisory board member of the newly formed U.S. Safer Internet Day Awareness Committee. Follow Lynette on Twitter.

Favorite quote: "Education is not the filling of a pail, but the lighting of a fire." – William Butler Yeats

Expert in Action

See Lynette's insights on the Internet Safety for Kids and Families blog.

Lynette recently shared insights on the work she is doing with the Natick, Massachusetts school district's 1:1 laptop program in PBS MediaShift

Read her guest blog for Forbes, "Bad Apple? Who's To Blame For Kids' In-Game Shopping Sprees?"

Jon Clay

Cybersecurity Expert and Director of Global Threat Communications

Jon Clay

“The threats today are unique for each victim and move from endpoint to data centre, and organisations need to shift the paradigm of multiple vendors to a single, connected threat defence model to improve detection and visibility across their network.”

Experience: 20+ years in cybersecurity, 30+ in technology

Specialties: Cyber threat landscape, advanced detection technologies

Education: B.S. in electrical engineering, emphasis on computer engineering, Michigan State University

About: Jon is responsible for managing several core technologies, marketing messages, and external publication of all the threat research and intelligence within Trend Micro. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats. Jon has held roles within Trend Micro as a sales engineer, sales engineering manager, training manager, and product marketing manager for small and medium-sized businesses prior to taking over as director of global threat communications. He is also a volunteer speaker for our Internet Safety for Kids and Families program. This experience has given him a broad technical background and understanding of the security requirements of businesses as well as an excellent understanding of the threat landscape. In his spare time he enjoys fly fishing, fly tying, golf, tennis, and spending time with his family.

Expert in Action

See Jon’s Monthly Threat Webinar series and his weekly roundup blog.

Chat with Jon on Twitter (@jonlclay)

Myla Pilao

Cybersecurity Expert

Jon Clay

Experience: 15+ years in cybersecurity and strategic communication

Specialties: Global communication of threat information, solution delivery

Education: M.B.A., National University, Singapore

About: Myla leads security research communications at TrendLabs, Trend Micro’s Research and Development Centre. She heads the division of the company that monitors the security threat landscape, including high-profile attacks, like advanced persistent threats (APTs) and prevalent digital security threats to mobile, cloud, and critical infrastructure.

Myla oversees a team that monitors and manages critical incidents and developments in the threat landscape. She supervises the development of information assets supporting communication plans to broaden understanding of the threat landscape.

Myla contributes technical guidance in nation-building exercises related to the development of strategic cybersecurity frameworks. She’s shared her insights on digital threats and their real-world impact, along with countermeasure strategies for the computing public, in numerous public and media engagements in Europe, Asia Pacific, and the Middle East.

Myla is an active supporter of and advocate for the protection of children online. She also supports international movements that work on stopping the online commercial distribution of inappropriate images of children.