Ken Dunham

Ken Dunham Email and Phone Number

CEO and Strategic Consultant @ 4D5A Security
Nampa, ID, US
Ken Dunham's Location
Nampa, Idaho, United States, United States
Ken Dunham's Contact Details

Ken Dunham personal email

n/a
About Ken Dunham

30 years of consulting experience in cybersecurity leadership, incident response, dark web operations, malware research and response, and strategic transformation. I work remote out of Idaho willing to travel up to 50%. I thrive in a team environment where leadership, innovation, and improvements for efficiency and effectiveness are celebrated. One of my differentiators that aids my team(s) in being effective is the ability to understand deeply technical subjects and partner with executives to uplift tactical, strategic, and operational business outcomes for maturity uplifts.Notable accomplishments to date:2022 $16M F100 in individual consulting and led five global practices2020 Innovator and implemented the Optiv Threat DNA Platform (TM) PaaS2014 top 1% of global security professionals recognized Distinguished Fellow, ISSA2009 Honeysting innovation award, iSIGHT Partners (automated drive-by detonation and analysis appliance)2008-2015 VxURL CTI global program with over 50 partners2006 #1 quoted global security professional 2006 - Current #1 private global CTI private intel group1995 #1 Antivirus website1994 #1 Downloaded global software 8 published books including best seller in series 2 #1 startups in their space, key global leader and innovator

Ken Dunham's Current Company Details
4D5A Security

4D5A Security

View
CEO and Strategic Consultant
Nampa, ID, US
Website:
qualys.com
Employees:
1
Ken Dunham Work Experience Details
  • 4D5A Security
    Ceo And Strategic Consultant
    4D5A Security
    Nampa, Id, Us
  • Qualys
    Director, Cyber Threat
    Qualys Nov 2023 - Present
    Foster City, Ca, Us
    Moving to the left of boom leading tactical, strategic, and operational CTI outcomes driven by TTPs of prioritized threats and purple team operations. Global media support, threat response support, actor attribution, and threat and risk modeling.
  • Taylor & Francis Group
    Cyber Ciso Marksmanship Book
    Taylor & Francis Group Aug 2023 - Present
    Milton Park, Abingdon, Oxfordshire, Gb
    Co-authored with James Johnson, Joe McComb, and Jason Elrod.By CISOs for CISOs - a new storytelling book of experience on the job, with what works and what doesn't work - pitfalls to watch out for and insights to champion to help you be successful as a cyber CISO. We brought in additional CISOs to give us their perspective on anonymous stories we share in the book, to help us all learn and glean in our community. Private fireside chats are shared too, with video recordings in a private web community for book owners that are approved CISO/CIO leaders. You're not just buying a book you are joining a community where we've got your back and you've got ours. By CISOs, for CISOs, hitting the mark of digital transformation, counter-threats, fighting nation state, maturing operations, and striving for excellence in leadership. This is the most unique layout and book of its kind to date - we can't wait to share it with you in the summer of 2024!
  • 4D5A Security Inc.
    Ceo/Strategic Consultant
    4D5A Security Inc. Jan 1992 - Present
    Consultation, largely focused upon incident response support and advisory consultation, helping clients move from reactive to proactive. Activities are ongoing but vary quarterly.
  • Industry Leadership & Outreach
    Industry Outreach
    Industry Leadership & Outreach Jan 2000 - Present
    Founder & Current President, Boise ISSAFounder of the 19th Annual Boise ISSA Information Security Regional ConferenceElected 2018-2020 ISSA INTL DirectorFounder & Current President, Cloud Security Alliance, Boise Founder Idaho Infragard (FBI)Former Officer and Conference Planner, HTCIAGuest Speaker and Strategic Cyber Degree Consultation - Multiple Universities
  • Marsh Mcclennan
    Lead Specialist
    Marsh Mcclennan May 2023 - Oct 2023
    Technical Risk Assessments to reduce risk prior to onboarding of Cloud Software-as-a-Service (SaaS). Established initial operations, KPIs, and metrics for sub-team operations performing Commercial Off the Shelf (COTS) and browser extensions risk assessments for software risk management. Lifecycle of assessments includes meeting with various stakeholders to identify risks, creation of architectural diagram, processing a framework driven set of relevant controls within scope for security context to evidence collection, and final reporting with recommendations towards remediation to reduce risk.
  • World Wide Technology
    Principal Security Consultant
    World Wide Technology May 2020 - Feb 2023
    Maryland Heights, Missouri, Us
    Cybersecurity consultant with F500 executives and practice managers. Apply thought leadership for Risk Management practice tools, tactics, and procedures applied to consultation business outcomes to lower risk for clients. Provide strategic input and direction to improve cybersecurity programs, architectures, and technology integrations.
  • Optiv Inc
    Senior Technical Director, Cyber Operations
    Optiv Inc Oct 2016 - Mar 2020
    Denver, Colorado, Us
    Global technical leader of cyber operations and services. Innovator, implementor, and manager of the Optiv ThreatDNA (TM) intelligence platform and ThreatBEAT (SM) service (PaaS) and manager of the ThreatDNA team.INFORMATION SECURITY: Direct innovation and development of an integrated differentiated intelligence platform; serve as community expert through blog presence; contribute to implementation of pilot programs focused on automation analysis of hostile codes; leverage data analytics, automation, and data science to ensure sustainability of technical solutions; and analyze and mitigate emerging threats and risks affecting clients across industries. TECHNOLOGY INTEGRATION: Align IT solutions with business objectives; guide integration of new architecture and infrastructure for big data operations program; and redesign customer portal and manage similar projects. STRATEGIC LEADERSHIP: Guide vision and strategic planning; develop processes; coach and mentor cross-functional teams; negotiate and manage partnerships with Fortune 500 organizations; create training curriculum, materials, and roadmap for apprenticeship program; and represent organization as thought leader at international conferences and industry trade shows.
  • Isight Partners/Fireeye, Inc.
    Director Of Global Response & Principal Incident Intelligence Engineer
    Isight Partners/Fireeye, Inc. Aug 2007 - Aug 2016
    RISK RESPONSE: Managed response for counterintelligence and innovated Darknet operations; led investigations on high-profile data breaches, such as POS fraud in the retail sector in 2015; and maintained membership in International High Technology Crime Investigation Association (HTCIA) to improve strategic leadership for organization. SYSTEMS DEVELOPMENT: Contributed to startup of organization as consultant before being hired full-time to lead development of best-in-class Cyber Threat Intelligence (CTI) solutions for emerging market and designed automated and scalable drive-by capture tool. COLLABORATION: Partnered with local and federal law enforcement and intelligence agencies; maintained relationships with global clientele from the private and public sectors; and guided team and clients through M&A process. TRAINING & LEADERSHIP DEVELOPMENT: Established iSIGHT Partners University and apprenticeship program to optimize talent pipeline, including strategic consultation for White Wolf training.
  • Idefense/Verisign
    Director Of Rapid Response
    Idefense/Verisign Nov 2001 - Aug 2007
    MALICIOUS CODE DETECTION & PREVENTION: Oversaw malicious code intelligence operations for Fortune 500 and government clients; identified new malicious code and related attacks; prepared comprehensive responses and mitigation strategies; and partnered with antivirus solutions firms on distribution of codes.RISK MITIGATION: Communicated with senior-level federal government officials and geopolitical experts on emerging threats; identified changes to the security landscape and techniques for mitigating related vulnerability risks; and participated in blue and red team government exercises. PUBLIC RELATIONS: Reported directly to CEO on driving hyper-growth strategies and building brand positioning as a global leader in the cyber-intelligence space; served as media relations spokesperson to lead public awareness initiatives; introduced responsible disclosure process now used widely by major organizations; served as VeriSIGN CERT FIRST Representative to Law Enforcement and Artifact Analysis Special Interest Groups; and acted as keynote speaker for conferences, including Gartner, to position company as a leader in the field.
  • Various Organizations
    Various Roles
    Various Organizations Jan 1992 - Jan 2001
    Additional experience in the field includes:Senior Engineer & Researcher with multiple technology startupsSenior Online Learning Specialist & Trainer for DirecTV (introduced automated and virtual learning options)Courseware Manager with Reflectone Training Systems & British Air (in partnership with US Air Force)Antivirus Expert at About.com (including creating and launching most popular antivirus solution and educational website in the field)Middle School Teacher (Computer Science, Integrated Sciences, & Math)

Ken Dunham Skills

Malware Analysis Viruses Phishing Spyware Security Research Network Forensics Steganography Social Engineering Computer Forensics Analysis Computer Security Ethical Hacking Intrusion Detection Network Security Security Cyber Security Antivirus Information Security Management Hacking Vulnerability Assessment Cybercrime Security Information Cissp Information Security Policy Investigations Security Management Operating Systems Windows Information Security Python Yara Ceh Penetration Testing Application Security Private Investigations Internet Security Security Audits Incident Response Pci Dss Cryptography Incident Handling Security Awareness Iso 27001 Web Application Security Ids Security Policy Data Security Information Assurance Forensic Analysis Security Architecture Design Strategic Planning Business Intelligence Counterintelligence Research Risk Mitigation Crisis Management Cybercrime Prevention Emerging Threat Detection Investigative Procedures Malware Organization Leadership New Business Development Consensus Building And Teaming Strategic Partnerships Artificial Intelligence Automation Business Continuity Disaster Recovery Machine Learning Process Improvements Performance Optimization Corporate Administration Negotiations Stakeholder Communications Advanced Critical Thinking C Suite Consulting Data Analytics Government Relations It Architecture Design Orchestration Partnership Development Policy Development

Ken Dunham Education Details

  • Eastern Oregon University
    Eastern Oregon University
    Alternative Assessments Of Multiple Intelligences

Frequently Asked Questions about Ken Dunham

What company does Ken Dunham work for?

Ken Dunham works for 4d5a Security

What is Ken Dunham's role at the current company?

Ken Dunham's current role is CEO and Strategic Consultant.

What is Ken Dunham's email address?

Ken Dunham's email address is ke****@****wwt.com

What is Ken Dunham's direct phone number?

Ken Dunham's direct phone number is +120828*****

What schools did Ken Dunham attend?

Ken Dunham attended Eastern Oregon University.

What skills is Ken Dunham known for?

Ken Dunham has skills like Malware Analysis, Viruses, Phishing, Spyware, Security Research, Network Forensics, Steganography, Social Engineering, Computer Forensics, Analysis, Computer Security, Ethical Hacking.

Who are Ken Dunham's colleagues?

Ken Dunham's colleagues are Rhythm Agarwal, Trishali Maheshwari, Rushabh Shah, Shilpa Sabale, Satyajit More, Chris Kennedy, Chetan Savdekar.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.