Ken Muir

Ken Muir Email and Phone Number

University Lecturer @ University of Waterloo
Toronto, ON, CA
Ken Muir's Location
Toronto, Ontario, Canada, Canada
Ken Muir's Contact Details

Ken Muir work email

Ken Muir personal email

n/a
About Ken Muir

Since 1993, has built his career from the proverbial “mailroom” up through the ranks to the present day. Chronology of Experience:1993 – Computing. - Studied computing Engineering Principles. - First Introduction to Viruses, causes and remediation. - Studied Virus writers and their motivations and coding - First time realizing and growing an interest in Information Security (now Cyber)1995 - Novell networking engineering certification (7 Exams)1996 - Admin for networking engineering and cybersecurity1997 - Developed skills in computer manipulation tactics1999 to Present - Working exclusively in cybersecurity.2019 - Developed enthusiasm for crypto and blockchain2019 - Became CISO of LCMKen Muir is a highly accomplished cybersecurity professional with a career spanning back to 1993. He began with a strong foundation in computing engineering principles and an early immersion in the world of viruses, understanding their origins and the motivations of their creators. In 1995, he achieved his Novell networking engineering certifications, later assuming roles as an administrator for networking engineering and cybersecurity. By 1997, he had honed skills in computer manipulation tactics, enhancing his understanding of the attacker's mindset.In addition, his technical proficiency encompasses troubleshooting, threat hunting, advanced support, and the management of complex security design projects, including the construction and reconstruction of security operation centers.Ken's career cover a wealth of roles and industry certifications, including CISO, vCISO, CSC, CISA, CRISC, and others. This diverse background gives him the ability to plan and execute secure network architecture. His experience extends to executive and board-level instruction, governance risk and compliance consultation, research contributions, and risk management consulting. His broad experience across various sectors, such as aerospace, energy, major retail, governments, and educational institutions, provides unique insights into the cybersecurity challenges faced in different environments.Ken is not only an accomplished professional but also a published author and keynote presenter with appearances on prominent platforms such as Voice of America and the Global Counter-Terrorism Council. His global recognition is evident through his inclusion in the Top 100 Global Thought Leaders and Who's Who in Cybersecurity. He serves on a global advisory board, advises the Centre for Internet Security, and actively mentors others in the field.

Ken Muir's Current Company Details
University of Waterloo

University Of Waterloo

View
University Lecturer
Toronto, ON, CA
Website:
uwaterloo.ca
Ken Muir Work Experience Details
  • University Of Waterloo
    University Lecturer
    University Of Waterloo
    Toronto, On, Ca
  • Lcm Security Inc.
    Ciso/Csc/Cisa/Crisc/Global Advisory Board/Business Transformation
    Lcm Security Inc. Jan 2019 - Present
    Oakville, Ontario, Ca
  • Lcm Security Inc.
    Chief Information Security Officer
    Lcm Security Inc. Jan 2019 - Jan 2019
    Oakville, Ontario, Ca
    LCM Security has been a managed security and professional services provider since 2001. LCM (Life Cycle Management) enables organizations from many verticals to reduce risk and achieve Compliance with our highly experienced consultants and technology integrators. LCM's service delivery model is designed to help organizations reduce risk and increase awareness of their environments. This allows more rapid response to minimize exposure to ever-evolving threats. In addition, LCM has partnered with industry-leading technology vendors to build a portfolio to help organizations consolidate capabilities, and reduce management overhead, thereby reducing the cost of ownership while still maintaining adequate controls.
  • Uzado Inc.
    Senior Risk Management Consultant/Vciso
    Uzado Inc. Dec 2016 - Dec 2018
    Richmond Hill, Ontario, Ca
    Uzado is an industry-leading SAAS security provider with a strong focus on information security management. The Uzado Platform is designed to help organizations manage areas of incidents, vulnerability, Compliance, a repository of files that are visible to the rest of the organization, sharing or sending confidential files securely and visualizing an organization's posture in the form of KPIs and Metrics when referring to incidents, vulnerabilities and Compliance. There are also a pre-defined incident, vulnerability and Compliance reports based on an organization's results, displayed in the form of KPIs and metrics and some trending information.
  • Cgi
    Director, Cyber Security Consulting | Public And Health Care Sectors
    Cgi Sep 2015 - Nov 2016
    Montreal, Quebec, Ca
    Founded in 1976, CGI is a global I.T. and business process services provider delivering high-quality business consulting, systems integration and managed services. With 68,000 professionals in 40 countries, CGI has an industry-leading track record of delivering 95% of projects on time and within budget, aligning our teams with clients' business strategies to achieve top-to-bottom line results. Duties: Providing thought Leadership as a security lead in cyber security consulting, delivering assessments, projects and solutions for Public Sector clients across Ontario. Provide client-facing technical guidance in support of strategic goals•. Identify and manage multi-disciplinary teams as required for proposal development and delivery.Thought Leadership in all areas of information securityFifteen years of directly related cyber security experience that includes developing and implementing security solutions and managed security services.Strong business acumen and experience shaping win themes and costing models. Strong knowledge of a variety of network and security technologies such as SOC Services (SIEM), Log Monitoring, Intrusion Prevention/Detection, File Integrity Monitoring, Firewall, VPN, Vulnerability Management, Patch Management, End Point Security, Strong Authentication, IDP, Web Filtering,Database Activity Monitoring, Anti-Virus, Anti-Malware, Anomaly Detection andPrevention, WIPS, Bridging, Noting, Routing; inc. dynamic (RIP, OSPF andBGP), Switching, Deep packet analysis, Endpoint Protection, Firewall, VPN, DLP, SUMO, Splunk, Single-Sign-On, PKI, WAF, VA Scanning and Analysis, Report Writing and analysis.
  • The Herjavec Group
    Senior Security Director
    The Herjavec Group Oct 2014 - Aug 2015
    Kansas City, Mo, Us
    Roles and responsibilities remained the same as with Sentry Metrics.News of Acquisition: http://www.newswire.ca/news-releases/the-herjavec-group-announces-majoracquisition-as-part-of-250-million-expansion-515512411.html
  • Sentry Metrics
    Senior Security Director
    Sentry Metrics May 2014 - Oct 2014
    Toronto, Ca
    As Senior Security Director, duties included overseeing and coordinating service delivery efforts for the SOC and aided business development. Key Responsibilities:Reported directly to the CEO and Executive Team for planning and information updates concerning strategic alignment.Deployed business efficiencies through technology and new processes to ensure Compliance with company policies and standards.Serve as liaison to Business and Sales for continuous alignment with company strategy.I redesigned the entire SOC structure for improved efficiencies to provide a significantly increased customer experience.Work with the Team Leads to develop information technology systems and processes to enable departments and employees to accomplish the security goals set by the business.Met regularly with Department Heads to ensure accountability regarding all office and department initiatives and projects.Served as an internal information security consultant to the organization. Initiated, facilitated, and promoted activities to create information security awareness throughout the organization.Responsibility to serve in an advisory capacity to assist the Management Team in understanding the direction of the Security Services.Ensure that all project plans for existing clients are on target.Develop Security threat and attack countermeasures.Ability to conduct in-depth forensic analytical studies and investigations.Have excellent communication skills.Client-facing communication - promptly report issues to the customer, demonstrate overall business expertise and develop presentations to highlight results and solutions.Exceptional Time Management skills.Exceptional Customer Service skills.A positive and constructive-minded team player. Strong troubleshooting, reasoning and problem-solving skills.Team player with the ability to work autonomously.
  • Qualys
    Security Management Consultant
    Qualys Jun 2012 - Apr 2014
    Foster City, Ca, Us
    Qualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. As a Technical Account Manager (TAM), I was responsible for actively driving and managing the post-sales process with direct and channel customers. Able to articulate the company's evolving suite of technology products while positioning to both business and technical users. Able to identify all technical and business issues of assigned accounts to ensure complete customer satisfaction. Capable of establishing and maintaining strong relationships throughout the sales/technical cycle.Key Responsibilities:•Identify and develop potential new business opportunities•Convey customer requirements to Product Management, Marketing and Engineering teams•Respond to customer questions on technical and business-related issues•Deliver high-level and detailed sales and technical presentations•Responsible for attending conferences and seminars.•Reporting through Company's CRM•Provide product and technical support for assigned accounts•Provide functional and technical support to customersQualifications: Self-motivated with strong knowledge in cybersecurity: Vulnerability Management, Policy Compliance, Intrusion Detection Systems IDS, Intrusion Prevention Systems IPS, Network Scanners, PCI, Policy Compliance and Audit Tools and other enterprise security solutions. Knowledge of various Federal Regulatory Compliance frameworks: HIPAA, GLBA, Sarbanes Oxley SOX, etc.Possesses strong presentation skills and can communicate professionallyOrganized and analytical, able to eliminate sales obstacles through creative and adaptive approachesPosses Industry-specific qualificationsExcellent written and oral communication skills
  • Lcmsecurity
    Director - Security Consulting Services
    Lcmsecurity Oct 2001 - May 2012
    Oakville, Ontario, Ca
    Security and I.T. since 1993, with origins in technical and sales. Exclusively committed to information security and networking disciplines. Project lead on large-scale and complex security design projects. Solutions have included technical implementations and training (ISO & PCI) audits and vulnerability assessments, security and network design, as well as process development. Designed and built a security operation centre, delivering managed security services for private and public companies.Using previously acquired business skills in the auto industry placed me in a pivotal position to help turn LCM into a multi-million-dollar business in both Canada and the U.S. An ability to provide sales direction as part of the technical sale to customers has brought both success and satisfaction to LCM's Customer base.Have deployed over 300 projects through to completion.
  • Unilynx Business Systems
    Director Of It/Information Security Consulting Services
    Unilynx Business Systems Sep 1999 - Oct 2001
    Kirstenhof, Cape Town, Western Cape, Za
  • Sony Of Canada Ltd.
    It Systems/Security Admin
    Sony Of Canada Ltd. 1996 - 1999
    Network and Security Analyst - Business Consultant
  • Auto Industry
    Fleet Sales And Finance Manager
    Auto Industry Jan 1985 - Dec 1990
    Previous to I.T.Working in the Auto-Industry providing company (including high performance) and commercial vehicles for six years, I was able to provide a very high-level, customer-driven approach to small, medium and enterprise-sized businesses. This, in turn, allowed me to build an extensive customer base. Since switching to I.T. and cybersecurity, I have successfully translated this approach throughout my career.

Ken Muir Skills

Information Security Security Vulnerability Assessment Network Security Computer Security Vulnerability Management Information Security Management Pci Dss Firewalls Cloud Computing Managed Security Services Penetration Testing Cissp Security Architecture Design Iso 27001 Disaster Recovery Ids Ips Security Audits Dlp Intrusion Detection Siem Data Security Application Security Encryption Security Information And Event Management Internet Security Payment Card Industry Data Security Standard Endpoint Security Rsa Security Mcafee Identity Management Pki Web Application Security Security Awareness Computer Forensics Checkpoint Wireless Security Log Management Vulnerability Scanning Qualys Payment Industry Cloud Security Ceh Fortinet Cisa Senior Security Director Host Intrusion Prevention Malware Analysis Security Operations Management

Ken Muir Education Details

  • Havering Technical College
    Havering Technical College
    Electrical And Electronics Engineering

Frequently Asked Questions about Ken Muir

What company does Ken Muir work for?

Ken Muir works for University Of Waterloo

What is Ken Muir's role at the current company?

Ken Muir's current role is University Lecturer.

What is Ken Muir's email address?

Ken Muir's email address is km****@****ity.com

What schools did Ken Muir attend?

Ken Muir attended Havering Technical College.

What skills is Ken Muir known for?

Ken Muir has skills like Information Security, Security, Vulnerability Assessment, Network Security, Computer Security, Vulnerability Management, Information Security Management, Pci Dss, Firewalls, Cloud Computing, Managed Security Services, Penetration Testing.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.