Itzik Kotler

Itzik Kotler Email and Phone Number

California, United States
Itzik Kotler's Location
San Francisco Bay Area, United States, United States
About Itzik Kotler

Itzik Kotler is a Fellow at ICIT (Institute for Critical Infrastructure Technology). He possess expertise in computer security, penetration testing, application security, information security, network security and 45 more skills. Colleagues describe him as "Itzik is a highly experienced senior Information Security expert. He has a lot of knowledge that he is willing to share in addition to the tasks assigned to him. He brings a lot of value to the organization, with fresh ideas, views and invoation.", "Itzik helped us to understand different cyber attacks and to module them for further analysis. He has a very good understanding of the cyber environment and did a very good job for us.", and "Itzik is one of the finest minds in the information security research and development. I am always impressed with his enthusiasm for doing research and his ability to handle complex security stuff. Whenever I have to discuss any security related concepts,I approach him right away and he is there to discuss and provides very insightful thinking. He also reviews my papers and I incorporate all his recommendations before publishing them. I really recommend Itzik for any complex security work and sincerely believe that he is an asset for any organization. In short, ".Itzik is elite and aims for perfection in his work all the time"."

Itzik Kotler's Current Company Details
ICIT (Institute for Critical Infrastructure Technology)

Icit (Institute For Critical Infrastructure Technology)

View
Fellow
California, United States
Itzik Kotler Work Experience Details
  • Icit (Institute For Critical Infrastructure Technology)
    Fellow
    Icit (Institute For Critical Infrastructure Technology)
    California, United States
  • Raven.Io
    Advisor
    Raven.Io Aug 2024 - Present
    Palo Alto, California, Us
    Raven.io is on a mission to help companies protect their cloud native applications by focusing on runtime. The Raven platform helps drastically reduce the noise and effort spent on triaging application vulnerabilities with runtime analysis, minimize attack surface by applying least privilege policies on libraries and protect application against runtime threats.
  • Vorlon
    Advisor
    Vorlon Mar 2023 - Present
    Mountain View , Ca, Us
    Vorlon enables continuous near real-time detection and identification of third-party apps consuming your data. Our agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.
  • Mission Critical
    Advisor, Founding Member, And Fellow
    Mission Critical Oct 2022 - Present
    Pittsburgh, Pa, Us
    Mission Critical is a nonprofit organization that facilitates collaboration between academia, industry, and government to develop and disseminate interdisciplinary, peer-reviewed, technical and non-technical research focused on improving critical infrastructure security and resilience.
  • Nextgen Cyber
    Strategic Advisor
    Nextgen Cyber Feb 2021 - Present
    San Jose, California, Us
    Educating underprivileged, underserved talent and increasing diversity in Cybersecurity
  • Icit (Institute For Critical Infrastructure Technology)
    Fellow
    Icit (Institute For Critical Infrastructure Technology) Nov 2020 - Present
    Washington, D.C., Us
    As America’s Cybersecurity Think Tank, ICIT’s mission is to cultivate a cybersecurity renaissance that will improve the resiliency of our Nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders. The primary responsibility of an ICIT Fellow is to share our expertise with the cybersecurity and national security community by engaging in various ICIT thought leadership and educational engagements including publications and briefings.
  • Safebreach
    Co-Founder & Cto
    Safebreach Feb 2014 - Present
    Sunnyvale, California, Us
    SafeBreach is the world's most widely used breach-and-attack-simulation platform. The company's patented platform provides a near real-time "hacker's view" of an enterprise's security posture to proactively predict attacks, validate security controls, and improve security operations center (SOC) analyst response capabilities. SafeBreach automatically and safely executes thousands of breach methods validating network, endpoint, cloud, and email security controls by leveraging its extensive and growing Hacker's Playbook™ of research and real-world investigative data. Headquartered in Sunnyvale, California, the company is funded by Sequoia Capital, Deutsche Telekom Capital Partners, OCV Partners, DNX Ventures, Hewlett Packard Pathfinder, PayPal and investor Shlomo Kramer
  • Forbes Technology Council
    Official Member
    Forbes Technology Council Jul 2016 - Jul 2024
    Boston, Ma, Us
  • Hack In The Box
    Member Of The Program Committee
    Hack In The Box 2011 - 2016
    As part of the Program Committee I support friends and colleagues in selecting and reviewing CFP.
  • Owasp
    Board Member, Owasp Israel
    Owasp Sep 2013 - Aug 2014
    Wakefield, Ma, Us
  • The Standards Institution Of Israel
    Member Of The Information Security Committee
    The Standards Institution Of Israel Aug 2012 - Aug 2014
    Tel Aviv, Israel, Il
  • Self-Employed
    Independent Security Consultant
    Self-Employed Oct 2011 - Feb 2014
  • Hackersh
    Lead Developer
    Hackersh Apr 2013 - Jan 2014
    Hackersh ("Hacker Shell") is a free and open source shell (command interpreter) written in Python with Pythonect-like syntax, builtin security commands, and out of the box wrappers for various security tools. It is like Unix pipeline, but for processing security information and metadata rather than bytes.http://www.hackersh.org
  • Pythonect
    Lead Developer
    Pythonect Apr 2012 - Jan 2014
    Pythonect is a new, experimental, general-purpose dataflow programming language based on Python. It provides both a visual programming language and a text-based scripting language. The text-based scripting language aims to combine the quick and intuitive feel of shell scripting, with the power of Python. The visual programming language is based on the idea of a diagram with “boxes and arrows”. Crazy? Most definitely. And yet, strangely enough, it works!For source code download and installation instructions go to: http://www.pythonect.org
  • Hackito Ergo Sum
    Member Of The Program Committee
    Hackito Ergo Sum 2010 - 2012
    As part of the Program Committee I support friends and colleagues in selecting and reviewing CFP.
  • Security Art
    Chief Technology Officer
    Security Art Jul 2010 - Sep 2011
    East Palo Alto, California, Us
    • Managed a team of penetration testers and security researchers who performed assessment services for Fortune 500 and startup companies.• Supported sales activities by visiting clients, delivering presentations and developing proposals.• Created new services such as VoIP penetration testing and Mobile application penetration testing. In addition, designed a number of security product prototypes, including a patent pending server-side detection and mitigation of Man-in-the-Browser attacks.• Initiated and led research activities and, as a result, the team and I conducted and presented original research at Hackito Ergo Sum, Hack In The Box Amsterdam, BSides Las Vegas, Defcon, and OWASP Israel annual conference in 2011.
  • Radware
    Security Operation Center Team Leader
    Radware Mar 2007 - Jun 2010
    Tel Aviv, Tel Aviv, Il
    • Reported directly to the V.P. of Security Products, and led a team responsible for creation and maintenance of IDS/IPS signatures. Interface with Product Managers, Product Marketing Managers and the R&D Manager.• Initiated and led research activities and, as a result, the team conducted and presented original research at Black Hat USA, RSA Europe, DEFCON and Hackito Ergo Sum conferences in 2008, 2009 and 2010. In addition, vulnerabilities were found in Mozilla Firefox 3, as well as, Safari on the Apple iPhone and Apple iPod• Led the team to be more closely aligned with the sales and support teams by providing improved turnaround on custom signature requests, and driving fast response to queries from the support organization.• Collaborated with the marketing team to help establish the company as a leader by acting as a spokesman for the Security Operation Center (SOC), writing bylined articles, and speaking at industry conferences.
  • Safend
    Security Researcher
    Safend Feb 2006 - Mar 2007
    New York, New York, Us
    • Discovered more than one dozen different vulnerabilities while auditing various Microsoft USB protocol and device drivers. Methods included both fuzzing and reverse engineering.• Designed and implemented a fuzzer in C and Python for the Windows USB protocol and its devices based on USB Host Controller hardware.• Researched and implemented new innovations, features and technologies for the company’s product under Windows/WDM environment. Such as Hardware key logger detection and protection and Content filtering hooks at various exit points.• Evaluated and recommended Anti-Tampering features for the company’s product
  • Idf
    Software Engineer
    Idf Dec 2002 - Dec 2005
  • 2Xs
    Security Researcher
    2Xs 2001 - 2002
    • Designed and implemented a TCP/IP sanity module and bytes-based exploit detection module for a Linux based NIDS company’s product. The module was created in C in a Linux environment.• Designed and implemented a TCP/IP and command line arguments fuzzers in C in a Linux environment.• Audited various open source applications at source code level. Advisories released for Exim 3.34, elm bug 2.5.3, UUCP/BSDi.

Itzik Kotler Skills

Computer Security Penetration Testing Application Security Information Security Network Security Security Information Security Management Web Application Security Vulnerability Assessment Reverse Engineering Firewalls Problem Solving Leadership Wdm White Box Testing Black Box Testing Ethernet Security Research Python Programming X86 Assembly Tcp/ip Http Smtp Dns Ips Ids Regular Expressions R&d Rapid Prototyping Protocol Analysis Public Speaking Bylined Articles Blogging Management Thought Leadership Team Leadership Ida Pro Malware Analysis Low Level Programming Shell Scripting C/c++ Stl Ollydbg Windbg Strace Gnu Debugger Team Management Entrepreneurship Internet Security Cryptography

Frequently Asked Questions about Itzik Kotler

What company does Itzik Kotler work for?

Itzik Kotler works for Icit (Institute For Critical Infrastructure Technology)

What is Itzik Kotler's role at the current company?

Itzik Kotler's current role is Fellow.

What is Itzik Kotler's email address?

Itzik Kotler's email address is it****@****ach.com

What is Itzik Kotler's direct phone number?

Itzik Kotler's direct phone number is +140874*****

What are some of Itzik Kotler's interests?

Itzik Kotler has interest in Business Strategy, Entrepreneurship, Pythonect, Technology, Python (Programming Language), Science, Economics, Technology Trends, Books, Startup Founders And Entrepreneurs.

What skills is Itzik Kotler known for?

Itzik Kotler has skills like Computer Security, Penetration Testing, Application Security, Information Security, Network Security, Security, Information Security Management, Web Application Security, Vulnerability Assessment, Reverse Engineering, Firewalls, Problem Solving.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.