Andrew Hay

Austin, Texas Metropolitan Area
9K followers 500+ connections

About

Andrew Hay is an accomplished and multidisciplined executive renowned for his leadership…

Articles by Andrew

Activity

Join now to see all activity

Experience & Education

  • Damovo

View Andrew’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • The 2015 Internet of Things In The Enterprise Report

    OpenDNS, Inc.

    This report covers our methodologies of data discovery, red flags for IT professionals regarding the security of IoT devices, key takeaways, and suggestions for how to manage IoT deployed in an enterprise environment. It also includes a contextual survey with responses from more than 500 IT and security professionals.

    See publication
  • OpenStack Security Guide

    OpenStack Foundation

    This book was written by a close community of security experts from the OpenStack Security Group in a short, intense week-long effort at an undisclosed location. One of the goals for this book is to bring together interested members to capture their collective knowledge and give it back to the OpenStack community.

    Other authors
    See publication
  • Security and the Cloud 2012

    CloudPassage, Inc.

    This report reflects the detailed analysis of CloudPassage, Inc.’s 2012 Security and the Cloud
    survey. The respondent demographics show that 201 unique respondents
    from 11 different countries answered our survey. The majority of respondents (90.1%) were from
    the United States but 20 individuals responded from other countries – including Canada, Ireland,
    India, Korea, Japan, Switzerland, South Africa, Mexico, Italy, and the United Kingdom.

    See publication
  • The Cyber-Security Playbook

    451 Research

    The primary purpose of this report is to open the eyes of security technology vendors to the slew of cyber-security opportunities and related monies made available by the cyber-security concerns of the government, military and intelligence communities. If you are a security vendor looking to make money in this lucrative sector, this report explains some of the lesser-known government programs that could help you gain entry into the market, as well as the natural technology affinities within the…

    The primary purpose of this report is to open the eyes of security technology vendors to the slew of cyber-security opportunities and related monies made available by the cyber-security concerns of the government, military and intelligence communities. If you are a security vendor looking to make money in this lucrative sector, this report explains some of the lesser-known government programs that could help you gain entry into the market, as well as the natural technology affinities within the realm of cyber security that will succeed. From an opportunity standpoint, we also explain the potential exits for technology companies and show investors how they can make more money (while taking fewer risks) than ever before. Although this report is primarily US-centric due to the US having the majority of government funding and R&D-backed initiatives in this space, in addition to the largest defense industrial base in the world, many of therecommendations still apply across geographic boundaries.

    See publication
  • Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices

    Syngress

    The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization.

    Other authors
    See publication
  • Nokia Firewall, VPN, and IPSO Configuration Guide

    Syngress

    The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia…

    The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.

    Other authors
    See publication
  • OSSEC Host-based Intrusion Detection Guide

    Syngress

    This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to…

    This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.

    Other authors
    See publication

Honors & Awards

  • Top 50+ Tech Influencers and Thought Leaders You Should Follow

    SolarWinds Worldwide, LLC

    Today's technology is growing at an extraordinary pace, so it is important to follow industry influencers and thought leaders to stay in the loop and learn new trends and best practices. Keeping on top of things in the industry is a great way to make sure you are functioning most effectively every day.

    We have compiled a list (in no particular order) of tech geeks from system, virtualization, storage, database, network, and security management domains, who we think are the top…

    Today's technology is growing at an extraordinary pace, so it is important to follow industry influencers and thought leaders to stay in the loop and learn new trends and best practices. Keeping on top of things in the industry is a great way to make sure you are functioning most effectively every day.

    We have compiled a list (in no particular order) of tech geeks from system, virtualization, storage, database, network, and security management domains, who we think are the top influencers and thought leaders you should follow.

  • 100 DevOps leaders, enthusiasts, and experts you should follow today

    TechBeacon

    A list of the top 100 DevOps leaders, enthusiasts, and influencers you should be following right now. - See more at: http://techbeacon.com/100-devops-leaders-enthusiasts-experts-you-should-follow-today#sthash.3Ys7jN1X.dpuf

  • 40 Information Security Blogs You Should Be Reading

    Security Innovation Europe

    Compiled list of 40 top information security blogs that provide frequent, quality content covering a full range of security issues relevant to organisations worldwide.

    Ref: http://www.securityinnovationeurope.com/blog/40-information-security-blogs-you-should-be-reading

  • The 79 Best Tech Blogs for sysadmins to follow

    GFI Software

    Andrew Hay is a senior security analyst at 451 Research, and serves on the GIAC Advisory Board. A CISSP with four SANS certifications and a veritable alphabet of other security certifications to his name, his blog covers log management, compliance, firewalls, and more.

    Ref: http://www.gfi.com/blog/the-79-best-tech-blogs-for-sysadmins-to-follow/

  • Top Chief Security Officers (CSOs) to Follow on Twitter

    CEOWORLD Magazine

    Ref: http://ceoworld.biz/2014/04/04/top-chief-security-officers-csos-to-follow-on-twitter-198120

  • Top 25 Influencers In Security You Should Be Following

    Tripwire, Inc.

    Active blogger, Hay writes a lot about M&A in the security space for The 451 Group. We’ve talked to him about that and security bloggers’ responsibility to the rest of the industry. While interested in the marketplace, his security head is firmly placed in SIEM, forensics, and incident response.

    Ref: http://www.tripwire.com/state-of-security/security-data-protection/top-25-influencers-in-security-you-should-be-following/

  • Most Powerful Voices in Security

    Cloud Computing Journal, Kim Kaskade

    Ref: http://cloudcomputing.sys-con.com/node/1974029

  • IT Knowledge Exchange blogger of the week

    IT Knowledge Exchange, a TechTarget Expert Community

    This week’s featured IT blogger of the week is Andrew Hay. Andrew is a security professional and author whose blog has recently covered SIEM, SANS security training, and security in the cloud. Andrew has recently released a book on host-based intrusion detection, and has also contributed to a book on Naigos network monitoring and another on Nokia firewall and VPN configuration. You can visit Andrew Hay, self-dubbed “devastatingly handsome” and a BBQer to boot, on his blog here. You can also…

    This week’s featured IT blogger of the week is Andrew Hay. Andrew is a security professional and author whose blog has recently covered SIEM, SANS security training, and security in the cloud. Andrew has recently released a book on host-based intrusion detection, and has also contributed to a book on Naigos network monitoring and another on Nokia firewall and VPN configuration. You can visit Andrew Hay, self-dubbed “devastatingly handsome” and a BBQer to boot, on his blog here. You can also find him on Twitter at @andrewsmhay.

    Ref: http://itknowledgeexchange.techtarget.com/itke-community-blog/featured-it-blogger-of-the-week-andrew-hay/

  • Security Thought Leader

    The SANS Institute

    Honored by Stephen Northcutt of The SANS Institute as a Security Thought Leader in the area of SIEM and intrusion analysis.

    Ref: http://www.sans.org/thought-leaders/andrew_hay_leader

Organizations

  • Austin Huns Rugby

    Coach

    -

    Founded in 1972, the Huns Rugby Football Club develops people of all ages and skill level to play rugby, from the grassroots level to national and international competitions. For 50 years the Huns have focused on community outreach and engagement, developing a brotherhood and sisterhood of individuals from all walks of life and striving for excellence on the field while teaching players of tomorrow, the value and benefits of the game of rugby.

More activity by Andrew

View Andrew’s full profile

  • See who you know in common
  • Get introduced
  • Contact Andrew directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Andrew Hay in United States

Add new skills with these courses