“I had the pleasure to get to know Kris during the time that I was responsible for building out Verizon’s Security business in EMEA, post the Cybertrust acquisition in 2007. For me Kris has always stood out as a consummate professional, highly skilled, hardworking and dedicated to his clients. He also possesses that rare skill of being able to take complex technical issues and summarise them in a clear business centric manner.”
About
Activity
-
Yesterday, we closed out the 2024 Verizon Business Innovation Sessions tour in Los Angeles at SoFi Stadium, one of the most technologically advanced…
Yesterday, we closed out the 2024 Verizon Business Innovation Sessions tour in Los Angeles at SoFi Stadium, one of the most technologically advanced…
Liked by Kris Philipsen
-
So good to be back in Tokyo this week to host Verizon Business’s annual Japan executive leadership dialogue. With the theme of Accelerating Social…
So good to be back in Tokyo this week to host Verizon Business’s annual Japan executive leadership dialogue. With the theme of Accelerating Social…
Liked by Kris Philipsen
-
What an amazing event at SoFi Stadium and Hollywood Park to wrap up the 2025 Verizon Business Innovation Sessions! We had some fascinating…
What an amazing event at SoFi Stadium and Hollywood Park to wrap up the 2025 Verizon Business Innovation Sessions! We had some fascinating…
Liked by Kris Philipsen
Experience & Education
Publications
-
Keynote: Leveraging AI to Burn Down Your Cyber Risk Exposures
Black Hat 2024 AI Summit
Presented at the inaugural BlackHat AI Summit on Cyber Risk Quantification leveraging AI assisted approaches. Few topics reside at the intersection of cybersecurity practitioners and senior business stakeholders. Cyber Risk Quantification truly spans the "war room to the board room" and is key for helping organizations more accurately measure, articulate, and prioritize cyber security investments.
Key Takeaways:
1. Organizations are facing an uphill battle in terms of human capital…Presented at the inaugural BlackHat AI Summit on Cyber Risk Quantification leveraging AI assisted approaches. Few topics reside at the intersection of cybersecurity practitioners and senior business stakeholders. Cyber Risk Quantification truly spans the "war room to the board room" and is key for helping organizations more accurately measure, articulate, and prioritize cyber security investments.
Key Takeaways:
1. Organizations are facing an uphill battle in terms of human capital and investments needed to balance increased velocity of threats and growing amounts of data that require analysis.
2. A profound disconnect plagues key business decision makers in their comprehension, assessment, measurement, and articulation of cyber risk. Collectively, we need to do a better job at communicating cyber risk in business-relevant terms.
3. Subjectivity, assumptions, and point-in-time views often result in investing in things that don't move the cyber dial (enough). Good news is organizations have the data and when applying the right AI-assisted technology lens, augmented by a human lens of articulation and communication, quality of cybersecurity expenditure decisions can be significantly improved. -
Round Table: Cyber Risk Quantification: Transitioning from the War Room to the Boardroom
ISMG
Round Table event to where I discussed Cyber Risk Quantification and the following aspects:
- Understanding Cyber Risk Quantification: Defining the concept and its importance in the modern business environment.
- Transitioning from Cyber Risk Qualification to Quantification: Practical steps for moving from subjective assessments to data-driven methodologies.
- Implementing Quantitative Risk Management: Integrating quantitative tools and methodologies into business operations.
-…Round Table event to where I discussed Cyber Risk Quantification and the following aspects:
- Understanding Cyber Risk Quantification: Defining the concept and its importance in the modern business environment.
- Transitioning from Cyber Risk Qualification to Quantification: Practical steps for moving from subjective assessments to data-driven methodologies.
- Implementing Quantitative Risk Management: Integrating quantitative tools and methodologies into business operations.
- Challenges and Solutions in Cyber Risk Quantification: Overcoming common obstacles in transitioning from subjective to objective risk assessments. -
Special Cyber Security Presentation - US Delegation
Royal United Services Institute for Defence and Security Studies Australia
Met with and presented to industry and defense leaders at the Australian Defence College in Canberra, Australia. Shared insights on the present and emerging cyber threat, observations on geopolitical concerns in the Asia Pacific region and the importance of the public and private sector partnership. This audience of great leaders is at the forefront of shaping today's cyber security strategies and devising a comprehensive response to tomorrow's emerging cyber threats. Achieving strong defensive…
Met with and presented to industry and defense leaders at the Australian Defence College in Canberra, Australia. Shared insights on the present and emerging cyber threat, observations on geopolitical concerns in the Asia Pacific region and the importance of the public and private sector partnership. This audience of great leaders is at the forefront of shaping today's cyber security strategies and devising a comprehensive response to tomorrow's emerging cyber threats. Achieving strong defensive and offensive cyber capability starts with clear direction of mission, executing through trusted partnerships and informing current and future decision makers with the right data points to deliver outcome success on the cyber battlefield.
-
Into the New Decade: Regional and Global Threat Landscape Evolution
RSA Conference APJ 2020 - Executive Security Action Forum
-
From the war room to the boardroom
Verizon News
Victims of cybercrime are not random, therefore security controls should not be random. If you're making a business or purchasing decision, then you not only need access to intelligence that is relevant to your industry, you also need to know how to operationalize the data and to make it pertinent to your business.
-
Operationalized Risk Modeling Using The Data Breach Repository
RSA Conference 2018 Singapore
Delivered an informative discussion during a Learning Lab on how organizations can apply real-life data breach insights to their existing cybersecurity strategy – and in doing so, improve their chances of keeping cybercriminals at bay.
Other authorsSee publication -
Understanding the Cyber Threat Landscape Across Asia Pacific
RSA Conference 2018 Singapore - Executive Security Action Forum
In a session to business and security leaders and executives, Kris presented a data-centric approach to gaining a better understanding of the Global and Asia Pacific regional cyber threat landscape, as well as YoY trending, and linkage to geopolitical drivers, actors, and policy regulatory implications.
-
Interview: RSAC TV - RSA Conference 2017 Asia Pacific & Japan.
RSAC TV
Britta Glade, Senior Content Manager at RSA Conference, speaks with Kristof Philipsen, Managing Executive, Verizon about his engagement with senior business leaders at RSA Conference 2017 Asia Pacific & Japan.
-
Panel: Getting the Board On-Board: Ransomware’s Impact on your Business
RSA Conference 2017 Singapore - Ransomware Seminar
Participated in and provided perspectives during a panel on how to tackle the challenge of gaining Senior Leadership support and obtaining buy in for cybersecurity expenditures to address the Ransomware threat.
Panelists:
- Kris Philipsen, Managing Executive, Verizon
- Jonathan Trull, Global Chief Cybersecurity Advisor, Microsoft
- Joyce Chua, Assistant Vice President, Singapore Post Ltd -
Panel: Perspectives on the Cyber Threat Landscape
RSA Conference 2017 Singapore - Executive Security Action Forum
Participated in and provided perspectives during a panel at the RSA Executive Security Action Forum to discuss various perspectives on the Cyber Threat Landscape.
Panelists:
- Hon Dan Tehan MP, Minister Assisting Prime Minister on Cyber Security, Commonwealth of Australia
- Kris Philipsen, Managing Executive, Verizon
- Bryce Boland, CTO for Asia Pacific, FireEye
- Christian Karam, Director - Head of Cyber Threat Intelligence, UBS AG
-
Understanding the Threat Landscape - Geopolitical Drivers, Actors, and Policy/Regulatory Implications
RSA Conference 2017 Singapore - Executive Security Action Forum
Selected as number one rated presentation at RSA Conference 2017 Singapore - Executive Security Action Forum.
In a session to business and security leaders and executives, Kris presented a data-centric approach to gaining a better understanding of the Global and Asia Pacific regional cyber threat landscape, as well as linkage to geopolitical drivers, actors, and policy regulatory implications.
- Offered a global picture of the Cyber Threat Landscape, as well as a deep dive into…Selected as number one rated presentation at RSA Conference 2017 Singapore - Executive Security Action Forum.
In a session to business and security leaders and executives, Kris presented a data-centric approach to gaining a better understanding of the Global and Asia Pacific regional cyber threat landscape, as well as linkage to geopolitical drivers, actors, and policy regulatory implications.
- Offered a global picture of the Cyber Threat Landscape, as well as a deep dive into the APAC regional landscape.
- Delved deeper into "What keeps the C-Suite up at night".
- Discussed the balancing act organizations face in dealing with today's and tomorrow's adversaries, weighing the risks, while navigating legislation, regulation, and other challenges that may impact cyber security controls. -
WebCast: Beyond the Code - Holistic Application Security
BrightTalk - Application Security Summit 2013
The growing nature of online business and transactions has resulted in an exponential need for integrated and distributed application architectures. The paradigm of application security over many years has focused on much-needed fixing of common vulnerabilities in application code, without actually understanding their impact on the application’s overall security posture.
In “Beyond the Code – Holistic Application Security”, we will run through several scenarios, based on real-world case…The growing nature of online business and transactions has resulted in an exponential need for integrated and distributed application architectures. The paradigm of application security over many years has focused on much-needed fixing of common vulnerabilities in application code, without actually understanding their impact on the application’s overall security posture.
In “Beyond the Code – Holistic Application Security”, we will run through several scenarios, based on real-world case studies, where security was compromised by not looking at application security in a holistic way. The goal of this session is to understand a number of factors to be taken into account when securing the application architecture as a whole, understanding the impact integrated solutions, cloud based Content Delivery Networks and other design choices can have on the application’s overall security. The key takeaway from this talk should be increased awareness, allowing you to cast a wider net and look at the security of an application architecture in a broader and more holistic manner. -
Speaker Event: How Holistic Enterprise and Application Security Solutions can save you from being a statistic in the Verizon Data Breach Report
Cyber Security in the Middle East (Dubai Summit)
-
Speaker Event: Security in the Solution Development Lifecycle
SecureWorld Expo
This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority…
This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority threats, and (3) adapting to agile development.
Other authorsSee publication -
Webcast: Implementing and Monitoring Application Security with Essential Controls
BrightTalk - Application Security Summit 2012
As applications become more prevalent in today's world, there's an increasing threat of attacks targeting web-based and mobile applications. Often times, quick fixes are added to the applications or additional components are introduced to minimize the impact of these vulnerabilities, but these are no longer scalable approaches as applications are getting more sophisticated, providing even great integration, functionality and requiring ease of use. It is more important than ever to implement…
As applications become more prevalent in today's world, there's an increasing threat of attacks targeting web-based and mobile applications. Often times, quick fixes are added to the applications or additional components are introduced to minimize the impact of these vulnerabilities, but these are no longer scalable approaches as applications are getting more sophisticated, providing even great integration, functionality and requiring ease of use. It is more important than ever to implement application security from the ground up as part of the software development lifecycle by ensuring there are sound policies at the base of every development project and proper procedures and processes are in place for the design, inception, development, testing and implementation of applications.
Kris Philipsen will discuss the essential controls necessary to ensure an effective application security strategy is being followed and how these essential controls improve the overall security of the application. -
Speaker Event: “What the Eyes See and the Ears Hear, the Mind believes” – An overview of common Internet attacks targeting end users’ personal information and ways to tackle these threats.
DTCC Security Summit 2009
As Corporations, Financial Institutions and Governments around the world have increased their security postures over the last few years, criminal organizations and malicious groups have shifted their efforts towards end users. End users in the digital world are becoming victims of attacks such as phishing, client side scripting, spamming and similar threats which are aimed at tricking end users into unwillingly disclose personal information, such as e-banking credentials, credit card numbers…
As Corporations, Financial Institutions and Governments around the world have increased their security postures over the last few years, criminal organizations and malicious groups have shifted their efforts towards end users. End users in the digital world are becoming victims of attacks such as phishing, client side scripting, spamming and similar threats which are aimed at tricking end users into unwillingly disclose personal information, such as e-banking credentials, credit card numbers, e-mail logon information, corporate credentials. We will look at methods used by organized crime and malicious groups to trick users into providing their personal information by showing the lengths and level of detail these black hat users go to in order to achieve this objective. Furthermore, we will look at how to more easily identify these types of threats, how to stop them before they reach your end users as well as what end users can do to thwart these threats when they do appear in your inbox or web browser.
-
Security Software: PIX Logging Architecture
Kris Philipsen
PIX Logging Architecture is a project allowing for correlation of Cisco PIX Firewall traffic, IDS, and informational logs. It parses Cisco PIX logs from syslog files, then pushes the parsed data to a database. It contains a Web-based front end for displaying and searching the Cisco PIX Firewall logs.
Third Party Write Up / Review of PIX Logging Architecture: http://practical.wordpress.com/2007/10/22/pix-parsing-usable-logs/Other authorsSee publication -
Magazine Article: Nouveau livre blanc de Cybertrust sur les menaces concernant les applications Web
Mags Security (French Information Security Magazine)
Ce White Paper décrit en détail les risques et problèmes auxquels sont confrontées les applications web actuelles et la manière d´effectuer les bons diagnostics afin de les identifier et d´y apporter les meilleures solutions possibles (d´y remédier).
-
Speaker Event: Web Application Vulnerability Assessment Discovering and Mitigating Vulnerabilities in Web Applications
Hack.LU 2005 Security Conference
The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This lecture discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security…
The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This lecture discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security issues.
-
Security Software: issPolicy
Kris Philipsen
issPolicy is a free open-source utility for converting an ISS RealSecure Network Sensor and ISS Proventia Inline Appliance Policy to a static HTML file.
Written in Perl, issPolicy allows for granular parsing of ISS RSNS and ISS Proventia policies (also refer to the "support" section), and supports a wide variety of features (see "features" section) allowing the HTML generation to be customized based on different policy parameters. -
Security Advisory: Computalynx CProxy Denial-of-Service Vulnerability (CVE-2005-0657) (SA14461)
Secunia
Discovered a Denial-of-Service vulnerability in Computalynx CProxy Server
-
Security Advisory: Computalynx CProxy Directory Traversal Vulnerability
Bugtrack
Discovered an arbitrary access control vulnerability in Computalynx Proxy Server
-
Book Coverage: Security Warrior (O'Reilly)
O'Reilly
Some of my work and research on Remote Operating System Fingerprinting and Detection has been covered within O'Reilly's "Security Warrior" book.
-
University Courseware: "The Art of (Application) Fingerprinting"
University of Technology Aachen - Germany
Some of my work and research on Remote Operating System Fingerprinting and Detection has been covered within the summer course on Application Fingerprinting at the University of Technology Aachen.
-
Paper: Web Application Vulnerability Assessment - Discovering and Mitigating Security Issues in Web Applications
Hack.LU 2005 Security Conference
The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This paper discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security…
The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This paper discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security issues.
-
Paper: The theory and practice of hijacking TCP connections throughout an Internet-wide environment.
SANS / GIAC
This paper aims to describe multiple vulnerabilities, which exist in the TCP/IP protocol suite, in relation to Initial Sequence Number generation and predictability. The Symantec Raptor Weak Initial Sequence Number Vulnerability had been used as a basis for this paper and its research. The foundation for this paper stems from personal experience. The vulnerability, as well as different
avenues of attack, and a possible incident handling process will be described in detail throughout the…This paper aims to describe multiple vulnerabilities, which exist in the TCP/IP protocol suite, in relation to Initial Sequence Number generation and predictability. The Symantec Raptor Weak Initial Sequence Number Vulnerability had been used as a basis for this paper and its research. The foundation for this paper stems from personal experience. The vulnerability, as well as different
avenues of attack, and a possible incident handling process will be described in detail throughout the course of this paper. -
Security Advisory: Multiple Symantec Product Weak TCP Initial Sequence Number Vulnerability (CVE-2002-1463)
Symantec
Discovered a security issue regarding TCP Initial Sequence Numbers on Symantec's Raptor Firewall
-
Magazine Article: Flaw discovered in Symantec firewall
ZDNet
Summary: A weakness in the way new connections are handled could allow an attacker to hijack any session, according to researchers
Honors & Awards
-
Capture The Flag Contest - HackMiami 2014
HackMiami
Our 2 man team finished in 2nd place out of 10 teams at the Capture The Flag Hacking Challenge at HackMiami 2014.
-
Verizon 2013 President's Club
Verizon Enterprise Solutions
Granted Verizon 2013 President's Club award by Verizon Enterprise Solutions President in honor of outstanding achievement.
-
Capture The Flag Contest - Hack.lu 2005
Hack.lu
Our 3 man team ("Ubiteam") won the Capture The Flag Hacking Challenge at Hack.LU 2005.
Languages
-
English
Native or bilingual proficiency
-
French
Full professional proficiency
-
Dutch
Native or bilingual proficiency
-
German
Professional working proficiency
-
Portuguese
Professional working proficiency
Recommendations received
4 people have recommended Kris
Join now to viewMore activity by Kris
-
Thank you for the team at #ebara for their partnership with #verizonbusiness and sharing our journey. It has been a pleasure to work and learn…
Thank you for the team at #ebara for their partnership with #verizonbusiness and sharing our journey. It has been a pleasure to work and learn…
Liked by Kris Philipsen
-
Verizon and Ericsson are thrilled to invite you to the exclusive Verizon Business Innovation Sessions event at the iconic SoFi Stadium in Los…
Verizon and Ericsson are thrilled to invite you to the exclusive Verizon Business Innovation Sessions event at the iconic SoFi Stadium in Los…
Liked by Kris Philipsen
-
Each day brings more cyberthreats. The Verizon Business 2024 Data Breach Investigations Report examines 30,458 real-world security incidents. The…
Each day brings more cyberthreats. The Verizon Business 2024 Data Breach Investigations Report examines 30,458 real-world security incidents. The…
Liked by Kris Philipsen
-
With cyberthreats continuing to grow in both number and sophistication, how can organisations ensure they are sufficiently protected? In our latest…
With cyberthreats continuing to grow in both number and sophistication, how can organisations ensure they are sufficiently protected? In our latest…
Liked by Kris Philipsen
-
Old school Verizon #DBIR reunion in Charlotte this past weekend with Alex Hutton. Just a couple of CISOs hanging out, putting up the festivus pole,…
Old school Verizon #DBIR reunion in Charlotte this past weekend with Alex Hutton. Just a couple of CISOs hanging out, putting up the festivus pole,…
Liked by Kris Philipsen
-
Great article discussing #AI positives and negatives in #cybersecurity with Anshuman Sharma.
Great article discussing #AI positives and negatives in #cybersecurity with Anshuman Sharma.
Liked by Kris Philipsen
-
What a great time at CYBERWARCON today! I’d like to thank John Hultquist. Not only did he put on a heck of a show today, but for the first time…
What a great time at CYBERWARCON today! I’d like to thank John Hultquist. Not only did he put on a heck of a show today, but for the first time…
Liked by Kris Philipsen
-
Today, I successfully defended my dissertation, "Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention.” PhD…
Today, I successfully defended my dissertation, "Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention.” PhD…
Liked by Kris Philipsen
-
Time to rethink on how secure are your payment systems. Speak to our team of experts to protect your brand and finanical systems as we head towards…
Time to rethink on how secure are your payment systems. Speak to our team of experts to protect your brand and finanical systems as we head towards…
Liked by Kris Philipsen
-
Nothing better than to spend time with our clients! This week Verizon Business hosted our Retail, Heathcare and Manufacturing Customer Advisory…
Nothing better than to spend time with our clients! This week Verizon Business hosted our Retail, Heathcare and Manufacturing Customer Advisory…
Liked by Kris Philipsen
-
We’re leading the charge in transforming manufacturing with the power of data. Join @SunnySamara and @PaulThomas at the Manufacturing Leaders' Summit…
We’re leading the charge in transforming manufacturing with the power of data. Join @SunnySamara and @PaulThomas at the Manufacturing Leaders' Summit…
Liked by Kris Philipsen
-
We’re proud to be part of the AmCham Parliamentary Showcase, where we’re highlighting two incredible partners: Atturra and TNL IT. At Palo Alto…
We’re proud to be part of the AmCham Parliamentary Showcase, where we’re highlighting two incredible partners: Atturra and TNL IT. At Palo Alto…
Liked by Kris Philipsen
-
Claudine Beltrami shouts out Verizon’s amazing people and culture as reasons for joining the #VTeamLife. A year into her career, and she’s now loving…
Claudine Beltrami shouts out Verizon’s amazing people and culture as reasons for joining the #VTeamLife. A year into her career, and she’s now loving…
Liked by Kris Philipsen
-
Check out our largest hacking event, Zero Day Quest! This is so cool! #MicrosoftLife #MSRC
Check out our largest hacking event, Zero Day Quest! This is so cool! #MicrosoftLife #MSRC
Liked by Kris Philipsen
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Kris Philipsen
3 others named Kris Philipsen are on LinkedIn
See others named Kris Philipsen