Dan Ricci

Dan Ricci Email and Phone Number

Senior Consultant @Ampyx Cyber | Independent Consultant & CEO @Industrial Data Works LLC | Founder @ICS Advisory Project l Critical Infrastructure Cybersecurity, Vulnerability Management @ Industrial Data Works LLC
United States
Dan Ricci's Location
Washington DC-Baltimore Area, United States, United States
Dan Ricci's Contact Details

Dan Ricci work email

Dan Ricci personal email

n/a
About Dan Ricci

With over 28 years of experience in multiple domains of Security and Cybersecurity, Dan is the founder/CEO of Industrial Data Works, providing ICS vulnerability intelligence APIs and consulting services for ICS/OT asset owners and vendors. He holds the Global Industrial Cyber Security Professional (GICSP), the Security Essentials (GSEC), CompTIA Certified Advance Security Professional (CASP+), and the Certified Ethical Hacker (CEH) certifications from the SANS Institute and EC-Council.He is also the founder of the ICS Advisory Project, an open-source initiative to help small and medium-sized ICS asset owners across the 16 critical infrastructure sectors prioritize vulnerabilities and plan mitigation for their ICS/OT environments. He created a data visualization tool that integrates vulnerability information from CISA ICS advisories and maps it to ICS vendor products, allowing asset owners to identify vulnerabilities relevant to their systems quickly. He aims to provide a free and accessible resource to secure critical infrastructure and protect the public.

Dan Ricci's Current Company Details
Industrial Data Works LLC

Industrial Data Works Llc

View
Senior Consultant @Ampyx Cyber | Independent Consultant & CEO @Industrial Data Works LLC | Founder @ICS Advisory Project l Critical Infrastructure Cybersecurity, Vulnerability Management
United States
Dan Ricci Work Experience Details
  • Industrial Data Works Llc
    Industrial Data Works Llc
    United States
  • Industrial Data Works Llc
    Ceo/Founder, Industrial Data Works Llc
    Industrial Data Works Llc Mar 2023 - Present
  • Ics Advisory Project
    Founder Of Ics Advisory Project
    Ics Advisory Project Feb 2022 - Present
    Frederick, Maryland, Us
    Founded the ICS Advisory Project, an open-source project to help small and medium-sized ICS asset owners across the 16 critical infrastructure sectors prioritize vulnerabilities and plan mitigation for their ICS/OT environments.Created a data visualization tool that integrates vulnerability information from CISA ICS advisories and maps it to ICS vendor products, allowing asset owners to quickly identify vulnerabilities relevant to their systems.Created a data visualization tool that integrated MITRE ATT&CK and other open-source data for Enterprise, Mobile, and ICS and mapped it to the threat groups, associated groups, countries targets, industry sectors targeted, threat group motivation, known tactics, techniques, mitigations, software, platforms, detection techniques, Living off the Land Binaries, and MITRE D3FEND Techniques. Developed the tool in collaboration with a team of developers and subject matter experts, ensuring it is intuitive, user-friendly, and aligned with industry standards and best practices.Worked with various stakeholders, including ICS security vendors, asset owners, and government agencies, to identify data sources and ensure that the tool is meeting the community's needs.Conducted outreach and education to build awareness of the tool and its benefits, including participating in webinars with Nozomi Networks, podcast with Claroty, and recently at the S4x23 Worthy Causes Exhibit.Continuously monitored and updated the tool to reflect changes in vulnerability information and user feedback, ensuring it remains relevant and practical.Developed partnerships with other organizations in the ICS/OT cybersecurity space to expand the scope and impact of the project.Acted as a spokesperson for the project, representing it to stakeholders, policymakers, and the media and promoting its mission and impact.
  • Idaho National Laboratory
    Power Systems Engineer/Researcher
    Idaho National Laboratory Jan 2024 - Dec 2024
    Idaho Falls, Id, Us
    Principal Investigator (PI) for Cyber SHIELD (Security through Hardware Integration, Education, and Layered Defense) for the Renewable Energy sector.INL Cyber SHIELD Program is funded by the Department of Energy, and is a collaborative effort between the Wind Energy Technologies Office (WETO), Water Power Technologies Office (WPTO), and Solar Energy Technologies Office (SETO). As Cyber SHIELD PI, lead efforts on enhancing CSET for renewables, Malcolm, and assessments through engagements for utility-scale renewable owner/operators.Long Duration Energy Storage (LDES) National Consortium Tiger Team Lead for Safety and Grid Security.
  • Frequentis Defense, Inc
    Senior Information Security Officer
    Frequentis Defense, Inc Nov 2021 - Feb 2024
    Develop and implement comprehensive Cybersecurity policies and procedures across IT and OT systems in accordance with NIST SP 800-171 and maintain DFARS compliance in preparation for CMMC Compliance and SPRS reporting.Oversee the security of products used in systems delivered to defense customers, including conducting security assessments and ensuring compliance with industry and government security standards.Lead the development and implementation of security awareness and training programs for employees, contractors, and vendors.Manage and mentor a team of security professionals to ensure the effective operation of security programs.Conduct risk assessments and develop risk mitigation strategies to protect the confidentiality, integrity, and availability of information and systems.Coordinate with internal and external stakeholders to ensure the timely resolution of security incidents and vulnerabilities.Work with business and technology stakeholders to align security strategies with business objectives and ensure security is integrated into the development lifecycle.Provide guidance to senior management on emerging security risks for internal security, supply chain risk, product security and best practices to address them.Stay up-to-date on evolving security threats, trends, and technologies and make recommendations for security improvements based on this knowledge.
  • Synsaber
    Engagement And R&D Director
    Synsaber Oct 2023 - Dec 2023
    Chandler, Us
    Served as SynSaber Engagement and R&D Director until dissolvement of the company.
  • Frequentis
    Senior Systems Security Engineer
    Frequentis Sep 2021 - Mar 2022
    Vienna, At
    Design, develop, and implement security controls for Frequentis products and systems delivered to defense customers in accordance with NIST SP 800-53, NIST SP 800-82, ISA 62443, and DISA STIGs as required.Oversee the development and maintenance of Risk Management Framework (RMF) documentation, including security plans, system security controls, and vulnerability assessments.Provide guidance and support to development teams to ensure that security is integrated into the product development lifecycle.Conduct security assessments and penetration testing to identify vulnerabilities and recommend remediation strategies for products and systems.Serve as the primary security point of contact for customers during the authorization process, providing technical expertise and guidance on the security features and functions of the product or system.
  • Applied Integrated Technologies, Inc
    Senior Cybersecurity Engineer
    Applied Integrated Technologies, Inc Feb 2020 - Sep 2021
    Columbia, Md, Us
    Assistant Assessment Team leader for Cybersecurity Risk Assessments of Industrial Control Systems (ICS)/Supervisory Control And Data Acquisition (SCADA) for Building Automation, Electric, Fire/Life Safety Systems, and Water/Wastewater Treatment systems.Leads a team of ICS Cybersecurity analysts in the in-depth of analysis of vulnerabilities affecting critical ICS and SCADA systems based on current governance program documentation, asset inventory management, control system network architecture, and analysis of vendor-specific threats for control systems software/firmware, and development of mitigative measures to improve Cybersecurity resilience.Lead Network Architect for capturing current state physical/logical OT environments and designing security reference architectures based on the Purdue Enterprise Reference Architecture (PERA) or Unified Facilities Criteria (UFC) 4-010-06 Cybersecurity of Facility-Related Control Systems to create network segmentation/segregation and minimize impact to availability of ICS/SCADA systems.
  • Saic
    Senior Principal, Cyber Operations Planner
    Saic Sep 2019 - Feb 2020
    Reston, Va, Us
    Advised senior management on continuous monitoring techniques for Cybersecurity operations.Advised senior management on Incident response and recovery plans in accordance with SOPs, threat and vulnerability assessment, analyze networks events detected by network monitoring systems, coordinate responses, and participate in meetings with other cyber organizations including service components, government agencies, law enforcement, etc.Provided innovative recommendations on efficiency, infrastructure, performance, Cybersecurity posture, SOPs, and general improvements to the way business is conducted.Developed reporting and provided recommendations for organization-wide improvements in Information Systems (IS), Industrial Control Systems (ICS)/Supervisory Control and Data Acquisition (SCADA) systems architecture; networking; telecommunications; automation; communications protocols; risk management; electronic analysis; software; lifecycle management; software development methodologies; and modeling and simulation. Analyzed and documented Cybersecurity operations functions including weekly status reports and in-progress reviews.Analyzed and provided reports with analysis and recommendations on security engineering, network operations, and information management solutions to support operational challenges.
  • Gormat
    Senior Cyber Security Professional
    Gormat Nov 2018 - Aug 2019
    Rockville, Maryland, Us
    Provided clients expertise in performing Cybersecurity risk assessments to identify vulnerabilities affecting critical Industrial Control Systems(ICS)/Supervisory Control And Data Acquisition (SCADA) power systems based current governance program documentation, asset inventory management, OT network architecture, and analysis of vendor specific threats for ICS/SCADA software/firmware. Designed client OT security reference architectures based on the Purdue Enterprise Reference Architecture (PERA) and Unified Facilities Criteria (UFC) 4-010-06 Cybersecurity of Facility-Related Control Systems to create network segmentation/segregation and minimize impact to availability of ICS/SCADA systems. Provided ICS/SCADA threat analysis based on known vulnerabilities and potential exploits affecting ICS/SCADA systems and development of mitigative measures to improve these systems Cybersecurity resilience.Developed PowerShell and Bash scripts to perform automated information gathering locally on individual ICS/SCADA systems to minimize risk and impact to system process and operations.
  • Deloitte
    Manager, Specialist Master
    Deloitte Jul 2017 - Nov 2018
    Worldwide, Oo
    Managed a team in providing clients assistance in developing Cybersecurity risk strategies and mitigation programs for Industrial Control Systems(ICS)/Supervisory Control And Data Acquisition (SCADA) systems, and Industrial Internet of Things (IIOT) based on business priorities, risk, and desired maturity level to protect ICS/SCADA/IIOT assets. Assist Project Lead in developing a vulnerability management processes and patch management strategy for multiple automotive plant manufacturing execution systems (MES) production lines to minimize impact to production schedules, financial risk, and ensure availability through hardening of ICS and IIoT systems from Cybersecurity threats. Advised clients in developing tailored approaches to governance related to regulatory compliance/guidance under National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO), and identifying methods and tools to support Cybersecurity risk programs. Proposal and presenting experience on Request For Proposals (RFP) specifically for Cyber Risk Assessments, Managed Security Service Provider (MSSP), and Intrusion Detection System (IDS) projects for ICS/SCADA system networks.Proposal Development experience in drafting Statements of Work (SOW) to include scope of work, technical objectives/goals, specific requirements, technical planning, cost estimating for time and materials, resource allocation, timelines, and status reporting for deliverables.Assumed the role of project manager performing task central to MES intrusion detection sensor deployment project progress, including scheduling, budgeting, and accounting and resource management.Managed and executed risk engagement to develop life-cycle strategy, design, and implementation. Further provided technical and management advisory to leadership and track industry trends pertaining to Cybersecurity risk.
  • Us Navy
    Cyber Warrant Officer
    Us Navy May 2014 - Jun 2017
    Washington, Dc, Us
    Subject matter expert for Navy Cyber Warfare Development Group providing technical consulting in the principles of computer science/computer engineering to research, design, develop, test, and evaluate network infrastructure and supporting hardware, software, and firmware for Cyberspace operations. Extensive knowledge and experience in operational planning, cyberspace operations and SIGINT policy as related to capability development and transition. Project management experience in developing RFP and SOW for contracted work with research laboratories and cleared defense contractors to acquire technical expertise and professional services to perform specific tasking for each level of effort and achieve project milestones on schedule.Led the gathering of Navy Cyber technical requirements and the gap analysis for the Joint Initial Capability Document (ICD) and Capability Development Document (CDD) for the Office of the Secretary of Defense, U.S. Cyber Command, Air Force Space Command, and Army Cyber Command supporting two Acquisition Category I (ACAT I) programs.
  • Us Navy
    Information Warfare Officer
    Us Navy Jan 2012 - Apr 2014
    Washington, Dc, Us
    Tactical Information Warfare Officer for a Surface Combatant managing information operations (IO) personnel, shipboard signals exploitation space equipment, and training programs. Principal adviser to the commanding officer for SIGINT and IO while supporting a numbered fleet and task force commanders collection requirements during deployments within the Pacific Command (PACOM) area of operations. Participated in multiple Navy specific operations and exercises throughout the PACOM. Performed the administration and technical requirements of a Special Security Office (SSO) and Security for the operation of collateral and sensitive compartmented information facility (SCIFs). Manage the operations of communications, threat detection, and weapons systems essential for controlling air, ground, and naval operations. Executed ship's bridge team responsibilities for safe navigation and proper operation of the ship and other watch related activities. Represented the Commanding Officer for routine shipboard operations and watch related activities while supervising and directing key watchstanders in matters concerning the operations and safety of the ship.
  • Us Navy
    Tactical Information Operations Analyst
    Us Navy Dec 2007 - Nov 2011
    Washington, Dc, Us
    Tactical Information Operations Analyst performing SGA and DNI analysis for two Joint Task Forces during two deployments with a Naval Special Warfare Squadron in the Central Command area of responsibility. Served as the Cryptologic Service Group Non-Commission Officer-in-Charge managing Joint service and civilian SGA and DNI analysts in support of Joint Task Force operations. Produced serialized reports derived from data and developed concepts of operations that enabled computer network operations.
  • Us Navy
    Computer Network Defense Watch Officer/Lead Incident Handler
    Us Navy Sep 2004 - Oct 2007
    Washington, Dc, Us
    Computer Network Defense Watch Officer supervising Cyber Security analysts personnel supporting Cyber Defense operations for the Navy Cyber Defense Operations Command. Performed duties as lead Incident Handler coordinating investigations into network intrusions to collect forensic data, conduct analysis on discovered vulnerabilities and exploits. Advised Navy Fleet and Shore commands on procedures to complete Information Assurance Vulnerability Alert (IAVA) security patches and configuration compliance guidance on workstation/servers, DNS, proxies, routers, and firewalls in accordance with DoD information assurance policies. Efforts increased security of classified and unclassified computer networks world-wide to mitigate further network attack and exploitation.
  • Us Navy
    Naval Aircrewmen And Information System Security Officer
    Us Navy Jan 2000 - Aug 2004
    Washington, Dc, Us
    Naval Aircrewmen aboard EP-3 ARIES II aircraft as a Secure Communication operators with a Fleet Air Reconnaissance Squadron supporting SIGINT reporting for numerous operations in the European, Central, and Southern, Command AORs. Performed duties as Network Security Vulnerability Technician and Information Systems Security Officer ensuring strict compliance with Navy and DoD Information Assurance policy and Security Technical Implementation Guide (STIG) for workstations, servers, and router configuration and patching. Ensure timely IAVA compliance reporting for an oversea location.
  • Us Navy
    Facilities Control Technician
    Us Navy Dec 1996 - Jan 2000
    Washington, Dc, Us
    As a Facilities Control Technician operating and troubleshooting numerous video and data encrypted circuits for Commander Second Fleet and U.S. Joint Force Command. Performed duties as local Electronic Key Management System (EKMS) user and ensured strict compliance with Naval Communication Security Management System (CMS) manuals, Navy and National policy and procedures for protecting keying material and equipment.

Dan Ricci Skills

Leadership Cloud Computing Iaas Nist Csf Defense Operational Planning Cyber Defense Navy Military Training Incident Handling Iso 62443 Csms Command U.s. Department Of Defense Force Protection Microsoft Excel Military Experience Cyber Operations Nist Sp 800 82 Ics Security National Security Intelligence Analysis Military Information Security Management Security Clearance Ics Reference Architecture Military Operations Project Management Security Dod Information Assurance Cloud Base Wargaming Sigint

Dan Ricci Education Details

  • Lewis University
    Lewis University
    Computer Science (Cyber Security Ops Concentration)
  • American Military University
    American Military University
    Intelligence Studies
  • University Of Phoenix
    University Of Phoenix
    General Studies

Frequently Asked Questions about Dan Ricci

What company does Dan Ricci work for?

Dan Ricci works for Industrial Data Works Llc

What is Dan Ricci's role at the current company?

Dan Ricci's current role is Senior Consultant @Ampyx Cyber | Independent Consultant & CEO @Industrial Data Works LLC | Founder @ICS Advisory Project l Critical Infrastructure Cybersecurity, Vulnerability Management.

What is Dan Ricci's email address?

Dan Ricci's email address is da****@****mat.net

What schools did Dan Ricci attend?

Dan Ricci attended Lewis University, American Military University, University Of Phoenix.

What skills is Dan Ricci known for?

Dan Ricci has skills like Leadership, Cloud Computing Iaas, Nist Csf, Defense, Operational Planning, Cyber Defense, Navy, Military Training, Incident Handling, Iso 62443 Csms, Command, U.s. Department Of Defense.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.