Alyson Van Stone, Mba

Alyson Van Stone, Mba Email and Phone Number

Business Information Security Analyst (BISA) - as a strategic liaison, I bridge the gap between enabling the business and mitigating cybersecurity risk ๐Ÿ“ˆ๐Ÿ” | Future BISO | Adjunct Instructor | CompTIA Security+ @ Make Waves Marketing
Alyson Van Stone, Mba's Location
Miami-Fort Lauderdale Area, United States, United States
About Alyson Van Stone, Mba

๐ŸŒŸ๐ŸŒŸ Mentorship Mondays is currently on hiatus, but I hope to bring it back soon! ๐ŸŒŸ๐ŸŒŸHi, Iโ€™m Alyson! ๐Ÿ‘‹๐Ÿป๐Ÿ˜Š My background is in business, specifically marketing, and recently I made a career change into cybersecurity. Iโ€™m now working as a BISA, a Business Information Security Analyst. Itโ€™s a very unique role in the industry that bridges the gap between two departments that often speak completely different languages โ€“ the cybersecurity (aka information security or IT security) team and the rest of the business (marketing, finance, legal, etc).๐Ÿ’  I love this role for several reasons! First, because it makes a great impact on the organization by fostering more effective communications and strengthening relationships across multiple teams. In this capacity, I rely heavily upon my soft skills and business acumen. ๐Ÿ’  Secondly, I am able to utilize the cybersecurity skills and knowledge Iโ€™ve obtained over the past three years. I work directly with subject matter experts across all areas of cybersecurity - offense/defense, cloud, IAM, AppSec, GRC, and more! My technical learning and development is a constant work in progress, and seeing my growth here is super exciting and motivating!๐Ÿ’  And lastly, I love this work because of its overall mission. Every day I get to help people. I feel so good about doing work that matters. Cybersecurity risk is not something that will ever go away, but I can do my best to protect myself, my family and friends, my company and other businesses.I'm also now working as a part-time cybersecurity instructor for one of the universities located in Florida. It is the same program I graduated from in June 2022, and I'm so happy to be back, this time to teach what I've learned and to help others launch their own cybersecurity careers. It's such a rewarding experience!It truly takes a village. My career success wouldnโ€™t have been possible without my amazing network here on LinkedIn. Youโ€™ve all played a part and I thank you so much for that. I hope that I can give back to each of you so that this wonderful community continues to grow and all of our dreams come true. ๐Ÿ˜Š๐Ÿ’—P.S. You will not see the names of my current employers here on LinkedIn in order to prevent phishing attempts and other security issues. It also protects me from potential legal issues. While this is a public platform, my account is personal to me (not owned by any of my employers) and all views I express here are my own. An extra benefit of not disclosing my employer names is fewer sales pitches in my inbox here too!

Alyson Van Stone, Mba's Current Company Details
Make Waves Marketing

Make Waves Marketing

View
Business Information Security Analyst (BISA) - as a strategic liaison, I bridge the gap between enabling the business and mitigating cybersecurity risk ๐Ÿ“ˆ๐Ÿ” | Future BISO | Adjunct Instructor | CompTIA Security+
Alyson Van Stone, Mba Work Experience Details
  • Undisclosed
    Cybersecurity Consultant
    Undisclosed May 2022 - Present
    โ€ข Performed full security audit for a recently compromised small business ownerโ€ข Identified the attack, responded to the incident, and hardened systems to prevent future attacksโ€ข Explained technical security concepts and trained client on security awareness best practicesโ€ข Conducted risk assessment and recommended control selections to reduce risk to an acceptable levelโ€ข Planned, designed, and managed information security initiatives in support of confidentiality, integrity, and availabilityโ€ข Wrote technical documents and published cybersecurity content to educate users of social media platforms and search engines
  • Make Waves Marketing
    Founder & Lead Digital Marketing Consultant
    Make Waves Marketing Jul 2016 - Present
    Digital Marketing & Content Creation Services | We Help Small Businesses Make Big WavesSERVICES:โ€ข Providing general business management and marketing services to small business clients and entrepreneurs across a variety of industriesโ€ข Creating digital marketing strategies and executing content marketing, search engine optimization (SEO), search engine marketing (SEM/Google Ads), email marketing (Mailchimp, Kartra), social media marketing (Facebook, Instagram, TikTok, Clubhouse), online advertising (social media & Google Ads), website optimization, influencer marketing, affiliate marketing and salesโ€ข Analyzing digital marketing campaigns using Google Analytics and social media analyticsRESULTS:โ€ข Wrote strategic plan to drive incremental revenue of $3.3M through integrated digital marketing campaigns and expansion into new channelsโ€ข Developed new online revenue stream to add $144K per year in incremental, passive incomeโ€ข Completely revamped a clientโ€™s operations and administrative systems to save $58K a year and significantly reduce staffโ€™s time spent on reporting and analyticsโ€ข Grew Instagram account organically by over 1,000 targeted followers in 2 weeks, achieved 22% engagement rate
  • Women In Cybersecurity (Wicys) Florida
    Board Member
    Women In Cybersecurity (Wicys) Florida Jan 2023 - Aug 2023
    Pensacola, Fl, Us
  • Cybersecurity Home Lab
    Governance, Risk, And Compliance (Grc)
    Cybersecurity Home Lab Mar 2023 - Mar 2023
    โ€ข Prepared, executed, and reported on audit of NIST SP 800-53 cybersecurity controls that included interview, document review, and testing of systems to support compliance audit activitiesโ€ข Applied knowledge of NIST Cybersecurity Framework and how the Identify, Protect, Detect, Respond, and Recover categories comprise and facilitate an information security programโ€ข Quantitatively analyzed cybersecurity risk using NIST SP 800-30 to identify highest system risksโ€ข Executed threat modeling exercise to determine higher likelihood threat eventsโ€ข Developed information security policy to establish authorized access management and authenticator management for internal and third-party personnelโ€ข Ensured policy documents are aligned with business objectives, implementable by the organization, and practical for compliance โ€ข Incorporated operational perspective and constraints throughout policy purpose, scope, and authority
  • Cybersecurity Home Lab
    Digital Forensics & Incident Response (Dfir) - Part 3 - And Threat Hunting
    Cybersecurity Home Lab Jun 2022 - Jun 2022
    Threat Huntingโ€ข Conducted IoC research by downloading malware, identifying the indicators of compromise (IoCs) and the incident using Wiresharkโ€ข Utilized ThreatConnect, a Threat Intelligence Platform (TIP), to research the Mimikatz exploitation toolโ€ข Created persistent malware using MSF, and hunted for its processesStatic Malware Analysisโ€ข Performed basic static malware analysis on a file and wrote a report on my investigation findingsโ€ข Investigated dynamic-link library (DLL) files to identify functionality and potential malwareDynamic Malware Analysisโ€ข Executed malware in a Cuckoo sandbox environmentโ€ข Analyzed file system changes, network activity, registry changes, utilized Sysinternals Autoruns tool, Process Explorer, Regshot, and Process Monitor (ProcMon) to investigate a malware sample and identify IoCs.โ€ข Created malware with MSFvenom and investigated it with dynamic investigation tools such as Netstat, online block list databases, FakeNet-NG and INetSimNetwork Forensicsโ€ข Set up and reviewed data from a reverse proxyโ€ข Used Zeek, a network security monitor, to detect and investigate a DNS tunnelโ€ข Followed the following steps in malware investigation: 1. Checked for malware signatures, used an IDS, 2. Identified traffic abnormalities using Wireshark, 3. Identified key stations, 4. Filtered by IoCs and gathered data, 5. Analyzed the protocol dataMalware Defense & Persistenceโ€ข Conducted an APT investigation and located persistent malware in a victimโ€™s machineโ€ข Discovered an information leakage caused by a computer
  • Cybersecurity Home Lab
    Digital Forensics & Incident Response (Dfir) - Part 2
    Cybersecurity Home Lab May 2022 - May 2022
    Windows Dead Analysis:โ€ข Investigated a raw image file using PowerForensics and determined where an attack originatedโ€ข Created a disk image and uncovered the original content from alternate data streamsโ€ข Accessed and retrieved hidden data from an image file using file carving techniques with the Binwalk tool and a hex editorMemory Analysisโ€ข Inspected an image for IoCs (indictors of compromise) revealing the system was infected with WannaCryโ€ข Investigated processes using pslist and pstree, investigated network activity using connscan and socket, investigated DLLs using dlllist, kerberos.dll, and netlogon.dll and detected a code injection using malfindLinux Forensicsโ€ข Created a forensics acquisition CD with static binaries and used it to extract information from a Linux OSโ€ข Investigated a server image and identified deleted and modified filesโ€ข Mimicked bind shell behavior and conducted a live analysis of the /proc/ directory contentLog Analysis & Timelineโ€ข Searched for events in Windows Event Viewer to understand their structureโ€ข Examined the Event Viewer investigation process via SQL queriesโ€ข Deleted and modified logs in Linux and Windows machines to mimic attack techniquesDFIR Simulationโ€ข Handled a โ€œreal-lifeโ€ DFIR investigation scenario through a Capture the Flag (CTF) challenge
  • Cybersecurity Home Lab
    Digital Forensics & Incident Response (Dfir) - Part 1
    Cybersecurity Home Lab Apr 2022 - Apr 2022
    Introduction to DFIR:โ€ข Discovered evidence of programs executed upon startup using AutoRuns64โ€ข Recovered files from a suspicious USB drive and proved they were used to steal sensitive data, used HashMyFiles to verify match between leaked and suspected files, also used exiftool to examine metadataโ€ข Analyzed multiple attack scenarios in an organization, and recommended the best DFIR methodology to applyIncident Response Preparation:โ€ข Deployed Lansweeper to scan a network and identify, map, manage and protect assetsโ€ข Created incident response plans for alerts including the four phases of preparation, identification, containment, and eradicationIncident Response Implementation:โ€ข Assigned priorities to incidents based on the methodology of function, information, and recovery (FIR)โ€ข Successfully contained a malicious program (that was spreading infection and controlled by an intruder) by air gapping the network and creating a sandbox environment in a FLARE virtual machineData Acquisition:โ€ข Created a drive capture using CAINE (Computer Aided Investigative Environment) Linux distribution for digital forensicsโ€ข Created a disk image with FTK Imager and mounted it using OSFMountโ€ข Captured the RAM of a virtual machine (using FTK Imager) and acquired basic information about it using Volatility in a SIFT (Sans Investigative Forensics Toolkit) Workstationโ€ข Configured Windows 10 to create a memory dump during a system crashWindows Live Analysis:โ€ข Conducted a forensics review of web browser usage by examining the DNS cacheโ€ข Identified USB connection history using NirSoftโ€™s USBDeview toolโ€ข Investigated browser history using NirLauncherโ€ข Identified evidence within prefetch files that a deleted program was previously executed on a computer, using the WinPrefetchView toolโ€ข Looked for suspicious activity in the registry using regeditโ€ข Examined web history using NirSoftโ€™s MyLastSearch
  • Cybersecurity Home Lab
    Ethical Hacking
    Cybersecurity Home Lab Mar 2022 - Apr 2022
    โ€ข Executed a variety of mock cyberattacks in a virtual lab environment, including social engineering, man-in-the-middle/on-path, brute-force, cryptographic, network, database, and application attacksโ€ข Conducted reconnaissance and bypassed defense systemsโ€ข Enumerated organizations and exploited services and portsโ€ข Performed privilege escalation to become a system administratorโ€ข Seized control over websites, web platforms, and their host serversโ€ข Used advanced web application penetration techniques such as Cross-Site Scripting (XSS) and file inclusion, to discover and exploit vulnerabilities in cloud-based systemsโ€ข Compromised a database with SQL injectionโ€ข Conducted vulnerability scanning and wrote penetration testing reports with security defense recommendationsKey Tools used:Nmap, Hping3, Masscan, Arpspoof (dSniff), Bettercap, SSL Strip, John the Ripper, Rar2John, Hashcat, Common User Passwords Profiler (CUPP), Hydra, Medusa, Ncrack, SEToolkit, HiddenEye, WinRAR Self-Extracting Archive (SFX), Metasploit, Searchsploit, Reverse shells, Meterpreter, Bloodhound, HTTP servers Apache2 and Nginx, Burp Suite, SQLMap, OWASP Zed Attack Proxy (ZAP), Nikto, bWAPP (buggy web application)
  • Cybersecurity Home Lab
    Python For Security
    Cybersecurity Home Lab Mar 2022 - Mar 2022
    โ€ข Set up a Python environment in Windows and Linuxโ€ข Used and customized PyCharm as my IDE (Integrated Development Environment)โ€ข Executed nested loopsโ€ข Created a range with various inputs in a loopโ€ข Built a calculatorโ€ข Created a network client and server socket, built basic connectivity between the twoโ€ข Wrote an ARP poisoning detector to detect On-Path (aka Man-In-The-Middle) attacksโ€ข Resolved errors in code using try and except statements
  • Cybersecurity Home Lab
    Cyber Infrastructure & Technologies
    Cybersecurity Home Lab Feb 2022 - Feb 2022
    โ€ข Bypassed anti-virus software using file encryption techniquesโ€ข Implemented endpoint detection and response (EDR) security suitesโ€ข Created YARA rules to find malicious applications at endpointsโ€ข Updated a ClamAV virus database with the YARA rules and an allow-listโ€ข Installed a Modern Honey Network (MHN), configured a Dionea honeypot, simulated attacks on the honeypotโ€ข Configured a Valhalla honeypot to capture POP3 trafficโ€ข Demonstrated data loss prevention (DLP) techniques through regular expressions โ€ข Connected to a POP3 machine with Telnet and used POP3 commands to view messagesโ€ข Established understanding of a log fileโ€™s flow, from creation to processing in a SIEM, to determining whether or not it classifies as an alertโ€ข Worked with Splunk as a SIEM service to monitor infrastructureโ€ข Configured Snort, an open-sourced Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), on pfSense and monitored ICMP traffic with rulesโ€ข Automated processes using Security, Orchestration, Automation, and Response (SOAR) for better incident managementโ€ข Used Shodan to locate Industrial Control System (ICS) componentsโ€ข Designed a secure network architecture
  • Cybersecurity Home Lab
    Networking Security
    Cybersecurity Home Lab Jan 2022 - Jan 2022
    โ€ข Utilized Cisco Packet Tracer to examine and troubleshoot network behavior and evaluated network security threat typesโ€ข Configured security settings for a Cisco network switch and a Cisco ASA firewallโ€ข Created, deleted, and managed VLANs and Trunk linesโ€ข Configured Open VPN connections and TOR browserโ€ข Implemented Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS) using Snort and Suricata
  • Cybersecurity Home Lab
    Linux Security
    Cybersecurity Home Lab Dec 2021 - Dec 2021
    โ€ข Created and managed ownership of Linux files and foldersโ€ข Executed common commands using the GUI and Terminal Emulatorโ€ข Installed packages, software updates, and upgradesโ€ข Configured network settings using Linux commandsโ€ข Identified and minimized network and workstation vulnerabilitiesโ€ข Wrote scripts to automate IP blocking and other system hardening techniquesโ€ข Leveraged Linux System Service Management to implement features, services, and perform critical system tasksโ€ข Utilized the Bash default shell and scripting tool to automate repetitive tasks and functionsโ€ข Established password and user policies to prevent data theft
  • Cybersecurity Home Lab
    Cloud Security
    Cybersecurity Home Lab Nov 2021 - Dec 2021
    โ€ข Established off-premise services in the cloud by setting up an AWS (Amazon Web Services) account with an Amazon EC2 (Elastic Compute Cloud) instanceโ€ข Implemented AWS IAM (Identity Access Management)โ€ข Created a network in UniFi SDN and a virtual applianceโ€ข Used Amazon Security Groups and Amazon Inspector to secure data in the cloud
  • Cybersecurity Home Lab
    Computer Networking
    Cybersecurity Home Lab Oct 2021 - Nov 2021
    โ€ข Applied networking concepts including protocols such as TCP/IP, topologies, and network devicesโ€ข Investigated network traffic using Wireshark and Nagiosโ€ข Managed Cisco device configurations and system filesโ€ข Executed port security commands on a Cisco switchโ€ข Configured SSH, configured and verified IPv6 addressing on a routerโ€ข Configured IPv4 standard, default, summary and dynamic routesโ€ข Conducted troubleshooting on network issues using CDP, LLDP, Syslog, and NTPโ€ข Utilized the ACL (Access Control List) and configured firewall for network securityโ€ข Set up a DHCP service on a Cisco router
  • Cybersecurity Home Lab
    Microsoft Security
    Cybersecurity Home Lab Sep 2021 - Oct 2021
    โ€ข Managed, operated, and hardened a Microsoft domain environment (Windows 2016 Server) along with newer operating systems (Windows 10 Client and Windows 2019 Server)โ€ข Implemented configuration utilities in the Windows OS (both client and server)โ€ข Deployed a domain controller on the server with the Active Directory Domain Services role installedโ€ข Created users and groups and utilized the Group Policy tool to manage securityโ€ข Performed a remote connection to a Windows machine using Remote Desktop protocol (RDP)โ€ข Executed Windows maintenance tasks such as updates and backups to support system healthโ€ข Practiced DNSSEC in a Windows environment to protect against cyberattacksโ€ข Utilized BitLocker, User Access Control, and Windows Defender to strengthen defensesโ€ข Explored execution policy modes and bypass techniquesโ€ข Wrote scripts using PowerShell to automate tasks from the command line
  • Cybersecurity Home Lab
    Introduction To Cybersecurity
    Cybersecurity Home Lab Jul 2021 - Aug 2021
    Began my cybersecurity experience by completing project #1 of over 250 for the year!Installed and configured Oracle VirtualBox to run virtual machines for further lab work.
  • B&G Foods Inc.
    Business Strategy Manager | Category Marketing Analyst
    B&G Foods Inc. Sep 2011 - Aug 2016
    Parsippany, New Jersey, Us
    โ€ข Wrote strategic plan to achieve growth and profitability goals for Sales and Marketingโ€จโ€ข Managed cross-functional teams including Finance, R&D, and Operations to align on corporate strategic objectives โ€จโ€ข Extracted key consumer and customer insights from vast amounts of data and a variety of research sources to make fact-based decisions โ€จโ€ข Developed and tested concepts for innovative new products generated by qualitative and quantitative data analysis, industry trends, and consumer insightsโ€ข Supervised and managed 5 vendor teams with a total of 17 indirect reportsโ€ข Managed Nielsen and Market Track contracts, led successful year-end negotiations
  • L'Orรฉal
    Assistant Marketing Manager
    L'Orรฉal May 2010 - Aug 2011
    Paris, Fr
    โ€ข Managed salon professional brands in the haircolor and texture categories to achieve sales goals of $22.5M โ€ข Launched a new haircolor brand to a multicultural, niche target marketโ€จโ€ข Contributed innovative ideas for brand strategy and operational marketing planโ€จโ€ข Planned and executed promotions, local advertising and media strategyโ€จโ€ข Managed marketing budget, product forecast, inventory, COGs, and pricing
  • Church & Dwight Co., Inc.
    Product Management Mba Intern
    Church & Dwight Co., Inc. May 2009 - Aug 2009
    Ewing, New Jersey, Us
  • Sanofi Pasteur
    Professional Biological Products Specialist
    Sanofi Pasteur 2006 - 2008
    Paris, France, Fr
  • Pfizer
    Healthcare Representative
    Pfizer 2004 - 2006
    New York, New York, Us
  • Iri
    Project Manager
    Iri 2003 - 2004
    Chicago, Il, Us

Alyson Van Stone, Mba Skills

Product Marketing Grc Consulting Splunk Amazon Web Services Linux Hubspot Salesforce.com Active Directory Cybersecurity Burp Suite Microsoft Powerpoint Penetration Testing Content Marketing International Marketing Digital Marketing Wireshark Amazon Ec2 Seo Virtualization Powershell Marketing Automation Html It Consulting Artificial Intelligence Demand Generation Microsoft Office Metasploit Microsoft Word Virtualbox Risk Analysis Risk Assessment Marketo Marketing Microsoft Excel Risk Management Wordpress Google Analytics Social Media Marketing Threat Modeling Email Marketing Css Python Computer Networking Project Management Vulnerability Assessment Google Ads Marketing Strategy Machine Learning Hootsuite Copywriting Ethical Hacking Search Engine Optimization Programmatic Media Buying Spanish

Alyson Van Stone, Mba Education Details

  • Continuing Education At The University Of Miami
    Continuing Education At The University Of Miami
    Cybersecurity Professional Certification
  • Fordham Gabelli School Of Business
    Fordham Gabelli School Of Business
    Marketing And International Business
  • Villanova School Of Business
    Villanova School Of Business
    Marketing

Frequently Asked Questions about Alyson Van Stone, Mba

What company does Alyson Van Stone, Mba work for?

Alyson Van Stone, Mba works for Make Waves Marketing

What is Alyson Van Stone, Mba's role at the current company?

Alyson Van Stone, Mba's current role is Business Information Security Analyst (BISA) - as a strategic liaison, I bridge the gap between enabling the business and mitigating cybersecurity risk ๐Ÿ“ˆ๐Ÿ” | Future BISO | Adjunct Instructor | CompTIA Security+.

What schools did Alyson Van Stone, Mba attend?

Alyson Van Stone, Mba attended Continuing Education At The University Of Miami, Fordham Gabelli School Of Business, Villanova School Of Business.

What skills is Alyson Van Stone, Mba known for?

Alyson Van Stone, Mba has skills like Product Marketing, Grc, Consulting, Splunk, Amazon Web Services, Linux, Hubspot, Salesforce.com, Active Directory, Cybersecurity, Burp Suite, Microsoft Powerpoint.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.