Stephen A. Ridley

Stephen A. Ridley Email and Phone Number

New York, NY, US
Stephen A. Ridley's Location
New York, New York, United States, United States
Stephen A. Ridley's Contact Details

Stephen A. Ridley personal email

Stephen A. Ridley phone numbers

About Stephen A. Ridley

Stephen A. Ridley is a security researcher and author with more than 10 years of experience in software development, software security, and reverse engineering. Within that last few years, he has presented his research and spoken about reverse engineering and software security research on every continent except Antarctica. Stephen and his work have been featured on NPR and NBC and in Wired, Washington Post, Fast Company, VentureBeat, Slashdot, The Register, and other publications. Prior to his current work Mr. Ridley previously served as the Chief Information Security Officer of a financial services firm. Prior to that, various information security researcher/consultant roles including his role as a founding member of the Security and Mission Assurance (SMA) group at a major U.S defense contractor where he did vulnerability research and reverse engineering in support of the U.S. Defense and Intelligence community. Mr. Ridley calls Manhattan home and has guest lectured at NYU, Rensselaer PolyTechnic (RPI), Dartmouth, and other universities on subject of software exploitation and reverse engineering.

Stephen A. Ridley's Current Company Details
NYU Tandon School of Engineering

Nyu Tandon School Of Engineering

View
Professor
New York, NY, US
Stephen A. Ridley Work Experience Details
  • Nyu Tandon School Of Engineering
    Professor
    Nyu Tandon School Of Engineering
    New York, Ny, Us
  • Nyu Tandon School Of Engineering
    Professor
    Nyu Tandon School Of Engineering Dec 2019 - Present
    Brooklyn, Ny, Us
    Adjunct Professor of Reverse Engineering & ExploitationI'm honored to be teaching several new courses based on my custom developed curriculum for the NYU CSE graduate program. The first of these began with a course for the 2020 Spring semester entitled "The Art Of Binary Exploitation: Mobile & Embedded Systems". The NYU Tandon School of Engineering is a National Security Agency "Cybersecurity Center of Excellence".
  • Senrio
    Cto
    Senrio Jan 2015 - Present
    Portland, Or, Us
    As an IoT cybersecurity platform, Senrio provides visibility and analytics for networked embedded devices (aka The Internet of Things) where traditional, signature-based security technologies fail to deliver actionable insights. Senrio uses patented technology (SenrioTrace and SenrioInsight) to address the IoT and embedded device security problem for both network operators, cybersecurity vendors, and device manufacturers.
  • Xipiter
    Principal
    Xipiter Nov 2011 - Present
    Xipiter is a small independent information security firm. With a focus on mobile and embedded systems, we provide our clients with a range of software security services but we specialize in software exploitation, hardware and software reverse engineering, code-audits, embedded systems, and operating system internals. Beyond services, we produce hardware products used by almost every other security firm in the industry.
  • Simple Finance
    Chief Information Security Officer
    Simple Finance Jan 2011 - May 2012
    Portland, Us
    Building the Information Security practice from scratch. Responsible for and built business processes for:Financial Regulatory Compliance, Vendor Management, Forensics and Incident Response, Application Security and Secure Protocol Design, Cryptographic implementations, Infrastructure and Operational Security, Application and Product Security, Mobile Reverse Engineering and Mobile Application Security.
  • Matasano Security
    Senior Researcher/Senior Consultant
    Matasano Security Jul 2008 - Dec 2010
    San Francisco, California, Us
    Provided research and consultation services to a number of the world's largest companies and financial institutions, finding vulnerabilities in everything from National critical infrastructure to embedded devices and financial high frequency trading applications. Through his publications and research Stephen is responsible for bringing several very high-profile companies (including some Fortune 100 companies) into Matasano's family of clients. Software Security Research, Reverse Engineering, Software Development, Microsoft Kernel Internals, Cryptographic implementations, Embedded Device Reverse Engineering.
  • Instructor
    Reverse Engineering And Software Exploitation Instructor
    Instructor Oct 2007 - Aug 2008
    I taught Advanced Software Reverse Engineering and Advanced Software Exploitation to clients from varied backgrounds (government, intelligence, military, and private sector). As an instructor, some of Stephen's more noteworthy clients for this specific material included:--> General Dynamics AIS--> The Bank of Sweden--> The Netherlands GOVCERT--> Dutch National Police Agency--> The Forensics Institute (The Netherlands)--> U.S. Department of Defense Cyber Crimes Division--> a number of leading IT companies (Guidance Software, Trend Micro, Oracle, Google, etc.)These teaching engagements required domestic and international travel.
  • Mcafee
    Senior Security Architect
    Mcafee Apr 2006 - Sep 2007
    San Jose, California, Us
    Founding member of the Security Architecture Research group. The research group provided subject matter expertise for M&A due diligence, performed other executive consultation services, and guidance for McAfee R&D efforts. At McAfee Stephen discovered vulnerabilities in all of McAfee's flagship products (VirusScan, EPO, etc). He is also the author of the McAfee Secure Coding Guidelines adhered to by all McAfee business units and developers worldwide. Stephen also researched and developed automated vulnerability discovery processes that are (to this day) an integral part of the software release cycles for every McAfee product.
  • Aegis Research Corporation
    Intrusion Engineer/Research Analyst
    Aegis Research Corporation Oct 2004 - Apr 2006
    Herndon, Virginia, Us
    Software Security (reverse engineering, vulnerability research) in support of the U.S. Defense and Intelligence community. Founding member of the Intrusion Operations Directorate subdivision of the Security and Mission Assurance Group.To this day, the best and most rewarding job I have ever had.

Stephen A. Ridley Skills

Computer Security Application Security Security Information Security Reverse Engineering Vulnerability Assessment Network Security Computer Forensics Security Architecture Design Python Software Development Penetration Testing Information Security Management Security Research C Web Application Security Pci Dss X86 Assembly Vulnerability Management Exploitation Embedded Systems Cryptography Security Audits Malware Analysis C++ Arm Ruby Java Incident Response Intrusion Detection Software Engineering Data Security Software Reverse Engineering Pki Mobile Applications Development Quality Auditing Internet Security Digital Photography Arm Assembly Hardware Reverse Engineering Financial Regulation Compliance Audits

Stephen A. Ridley Education Details

  • Tennessee State University
    Tennessee State University
    Physics
  • H.B. Woodlawn
    H.B. Woodlawn

Frequently Asked Questions about Stephen A. Ridley

What company does Stephen A. Ridley work for?

Stephen A. Ridley works for Nyu Tandon School Of Engineering

What is Stephen A. Ridley's role at the current company?

Stephen A. Ridley's current role is Professor.

What is Stephen A. Ridley's email address?

Stephen A. Ridley's email address is s7****@****ail.com

What is Stephen A. Ridley's direct phone number?

Stephen A. Ridley's direct phone number is +164678*****

What schools did Stephen A. Ridley attend?

Stephen A. Ridley attended Tennessee State University, H.b. Woodlawn.

What are some of Stephen A. Ridley's interests?

Stephen A. Ridley has interest in Getting Lost In Foreign Countries, Writing Fiction, Film And Photography.

What skills is Stephen A. Ridley known for?

Stephen A. Ridley has skills like Computer Security, Application Security, Security, Information Security, Reverse Engineering, Vulnerability Assessment, Network Security, Computer Forensics, Security Architecture Design, Python, Software Development, Penetration Testing.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.