About
Articles by Andrew
Activity
-
CEO: I want to hire my first VP of Sales ME: That's exciting. Tell me about your current sales team. Do you have any managers or directors…
CEO: I want to hire my first VP of Sales ME: That's exciting. Tell me about your current sales team. Do you have any managers or directors…
Liked by Andrew Hay
-
27 years ago, I learned about this amazing thing called Linux. My home Internet connection at the time was via dialup modem so instead of downloading…
27 years ago, I learned about this amazing thing called Linux. My home Internet connection at the time was via dialup modem so instead of downloading…
Liked by Andrew Hay
-
Awards that you have to pay for, are not awards.
Awards that you have to pay for, are not awards.
Liked by Andrew Hay
Experience & Education
Publications
-
The 2015 Internet of Things In The Enterprise Report
OpenDNS, Inc.
This report covers our methodologies of data discovery, red flags for IT professionals regarding the security of IoT devices, key takeaways, and suggestions for how to manage IoT deployed in an enterprise environment. It also includes a contextual survey with responses from more than 500 IT and security professionals.
-
Talk at BlackHat USA : "Unveiling the Open Source Visualization Engine for Busy Hackers"
BlackHat USA at Mandalay Bay, Las Vegas
-
OpenStack Security Guide
OpenStack Foundation
This book was written by a close community of security experts from the OpenStack Security Group in a short, intense week-long effort at an undisclosed location. One of the goals for this book is to bring together interested members to capture their collective knowledge and give it back to the OpenStack community.
Other authorsSee publication -
Security and the Cloud 2012
CloudPassage, Inc.
This report reflects the detailed analysis of CloudPassage, Inc.’s 2012 Security and the Cloud
survey. The respondent demographics show that 201 unique respondents
from 11 different countries answered our survey. The majority of respondents (90.1%) were from
the United States but 20 individuals responded from other countries – including Canada, Ireland,
India, Korea, Japan, Switzerland, South Africa, Mexico, Italy, and the United Kingdom. -
The Cyber-Security Playbook
451 Research
The primary purpose of this report is to open the eyes of security technology vendors to the slew of cyber-security opportunities and related monies made available by the cyber-security concerns of the government, military and intelligence communities. If you are a security vendor looking to make money in this lucrative sector, this report explains some of the lesser-known government programs that could help you gain entry into the market, as well as the natural technology affinities within the…
The primary purpose of this report is to open the eyes of security technology vendors to the slew of cyber-security opportunities and related monies made available by the cyber-security concerns of the government, military and intelligence communities. If you are a security vendor looking to make money in this lucrative sector, this report explains some of the lesser-known government programs that could help you gain entry into the market, as well as the natural technology affinities within the realm of cyber security that will succeed. From an opportunity standpoint, we also explain the potential exits for technology companies and show investors how they can make more money (while taking fewer risks) than ever before. Although this report is primarily US-centric due to the US having the majority of government funding and R&D-backed initiatives in this space, in addition to the largest defense industrial base in the world, many of therecommendations still apply across geographic boundaries.
-
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Syngress
The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization.
Other authorsSee publication -
Nokia Firewall, VPN, and IPSO Configuration Guide
Syngress
The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia…
The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.
Other authorsSee publication -
OSSEC Host-based Intrusion Detection Guide
Syngress
This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to…
This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.
Other authorsSee publication
Honors & Awards
-
Top 50+ Tech Influencers and Thought Leaders You Should Follow
SolarWinds Worldwide, LLC
Today's technology is growing at an extraordinary pace, so it is important to follow industry influencers and thought leaders to stay in the loop and learn new trends and best practices. Keeping on top of things in the industry is a great way to make sure you are functioning most effectively every day.
We have compiled a list (in no particular order) of tech geeks from system, virtualization, storage, database, network, and security management domains, who we think are the top…Today's technology is growing at an extraordinary pace, so it is important to follow industry influencers and thought leaders to stay in the loop and learn new trends and best practices. Keeping on top of things in the industry is a great way to make sure you are functioning most effectively every day.
We have compiled a list (in no particular order) of tech geeks from system, virtualization, storage, database, network, and security management domains, who we think are the top influencers and thought leaders you should follow. -
100 DevOps leaders, enthusiasts, and experts you should follow today
TechBeacon
A list of the top 100 DevOps leaders, enthusiasts, and influencers you should be following right now. - See more at: http://techbeacon.com/100-devops-leaders-enthusiasts-experts-you-should-follow-today#sthash.3Ys7jN1X.dpuf
-
40 Information Security Blogs You Should Be Reading
Security Innovation Europe
Compiled list of 40 top information security blogs that provide frequent, quality content covering a full range of security issues relevant to organisations worldwide.
Ref: http://www.securityinnovationeurope.com/blog/40-information-security-blogs-you-should-be-reading -
The 79 Best Tech Blogs for sysadmins to follow
GFI Software
Andrew Hay is a senior security analyst at 451 Research, and serves on the GIAC Advisory Board. A CISSP with four SANS certifications and a veritable alphabet of other security certifications to his name, his blog covers log management, compliance, firewalls, and more.
Ref: http://www.gfi.com/blog/the-79-best-tech-blogs-for-sysadmins-to-follow/ -
Top Chief Security Officers (CSOs) to Follow on Twitter
CEOWORLD Magazine
Ref: http://ceoworld.biz/2014/04/04/top-chief-security-officers-csos-to-follow-on-twitter-198120
-
Top 25 Influencers In Security You Should Be Following
Tripwire, Inc.
Active blogger, Hay writes a lot about M&A in the security space for The 451 Group. We’ve talked to him about that and security bloggers’ responsibility to the rest of the industry. While interested in the marketplace, his security head is firmly placed in SIEM, forensics, and incident response.
Ref: http://www.tripwire.com/state-of-security/security-data-protection/top-25-influencers-in-security-you-should-be-following/ -
Most Powerful Voices in Security
Cloud Computing Journal, Kim Kaskade
Ref: http://cloudcomputing.sys-con.com/node/1974029
-
IT Knowledge Exchange blogger of the week
IT Knowledge Exchange, a TechTarget Expert Community
This week’s featured IT blogger of the week is Andrew Hay. Andrew is a security professional and author whose blog has recently covered SIEM, SANS security training, and security in the cloud. Andrew has recently released a book on host-based intrusion detection, and has also contributed to a book on Naigos network monitoring and another on Nokia firewall and VPN configuration. You can visit Andrew Hay, self-dubbed “devastatingly handsome” and a BBQer to boot, on his blog here. You can also…
This week’s featured IT blogger of the week is Andrew Hay. Andrew is a security professional and author whose blog has recently covered SIEM, SANS security training, and security in the cloud. Andrew has recently released a book on host-based intrusion detection, and has also contributed to a book on Naigos network monitoring and another on Nokia firewall and VPN configuration. You can visit Andrew Hay, self-dubbed “devastatingly handsome” and a BBQer to boot, on his blog here. You can also find him on Twitter at @andrewsmhay.
Ref: http://itknowledgeexchange.techtarget.com/itke-community-blog/featured-it-blogger-of-the-week-andrew-hay/ -
Security Thought Leader
The SANS Institute
Honored by Stephen Northcutt of The SANS Institute as a Security Thought Leader in the area of SIEM and intrusion analysis.
Ref: http://www.sans.org/thought-leaders/andrew_hay_leader
Organizations
-
Austin Huns Rugby
Coach
-Founded in 1972, the Huns Rugby Football Club develops people of all ages and skill level to play rugby, from the grassroots level to national and international competitions. For 50 years the Huns have focused on community outreach and engagement, developing a brotherhood and sisterhood of individuals from all walks of life and striving for excellence on the field while teaching players of tomorrow, the value and benefits of the game of rugby.
More activity by Andrew
-
Fun fact that only people in my immediate family know, but I was baptized in the bell of the H.M.C.S. Bonaventure - Canada's third and last aircraft…
Fun fact that only people in my immediate family know, but I was baptized in the bell of the H.M.C.S. Bonaventure - Canada's third and last aircraft…
Shared by Andrew Hay
-
Tomorrow, I'll be giving my first-ever conference talk on SMB reflection attacks at BSides London. Looking forward to seeing some familiar faces…
Tomorrow, I'll be giving my first-ever conference talk on SMB reflection attacks at BSides London. Looking forward to seeing some familiar faces…
Liked by Andrew Hay
-
Het contactcenter van morgen: Ben jij er klaar voor? In de steeds sneller digitaliserende wereld van vandaag liggen de verwachtingen van klanten…
Het contactcenter van morgen: Ben jij er klaar voor? In de steeds sneller digitaliserende wereld van vandaag liggen de verwachtingen van klanten…
Liked by Andrew Hay
-
𝐓𝐡𝐞 𝐂𝐨𝐧𝐭𝐚𝐜𝐭 𝐂𝐞𝐧𝐭𝐫𝐞 𝐨𝐟 𝐓𝐨𝐦𝐨𝐫𝐫𝐨𝐰: 𝐈𝐬 𝐘𝐨𝐮𝐫𝐬 𝐑𝐞𝐚𝐝𝐲? In today's fast-emerging digital world, customer expectations…
𝐓𝐡𝐞 𝐂𝐨𝐧𝐭𝐚𝐜𝐭 𝐂𝐞𝐧𝐭𝐫𝐞 𝐨𝐟 𝐓𝐨𝐦𝐨𝐫𝐫𝐨𝐰: 𝐈𝐬 𝐘𝐨𝐮𝐫𝐬 𝐑𝐞𝐚𝐝𝐲? In today's fast-emerging digital world, customer expectations…
Liked by Andrew Hay
-
If you had told me 10 years ago that I'd be responsible for the marketing and positioning of an international systems integrator with a presence in…
If you had told me 10 years ago that I'd be responsible for the marketing and positioning of an international systems integrator with a presence in…
Posted by Andrew Hay
-
Wrapped up another Black Hat conference, just over 10 years since I attended my first. Over the years I've had the chance to see some really good…
Wrapped up another Black Hat conference, just over 10 years since I attended my first. Over the years I've had the chance to see some really good…
Liked by Andrew Hay
-
Excited to share that I've joined the Athena Alliance as a member. This is an incredible community of women of diverse backgrounds with the goal of…
Excited to share that I've joined the Athena Alliance as a member. This is an incredible community of women of diverse backgrounds with the goal of…
Liked by Andrew Hay
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Andrew Hay in United States
-
Andrew Hay
SaaS Sales Executive | Business Growth Strategist
-
Andrew Hay
VP IT & Security at PacificWest Asset Management
-
Andrew Hay
-
Andrew Hay
177 others named Andrew Hay in United States are on LinkedIn
See others named Andrew Hay