Kris Philipsen

Kris Philipsen

Phoenix, Arizona, United States
3K followers 500+ connections

About

Information Security Professional with over 20 years combined experience in information…

Activity

Join now to see all activity

Experience & Education

  • Verizon Business

View Kris’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Keynote: Leveraging AI to Burn Down Your Cyber Risk Exposures

    Black Hat 2024 AI Summit

    Presented at the inaugural BlackHat AI Summit on Cyber Risk Quantification leveraging AI assisted approaches. Few topics reside at the intersection of cybersecurity practitioners and senior business stakeholders. Cyber Risk Quantification truly spans the "war room to the board room" and is key for helping organizations more accurately measure, articulate, and prioritize cyber security investments.

    Key Takeaways:
    1. Organizations are facing an uphill battle in terms of human capital…

    Presented at the inaugural BlackHat AI Summit on Cyber Risk Quantification leveraging AI assisted approaches. Few topics reside at the intersection of cybersecurity practitioners and senior business stakeholders. Cyber Risk Quantification truly spans the "war room to the board room" and is key for helping organizations more accurately measure, articulate, and prioritize cyber security investments.

    Key Takeaways:
    1. Organizations are facing an uphill battle in terms of human capital and investments needed to balance increased velocity of threats and growing amounts of data that require analysis.
    2. A profound disconnect plagues key business decision makers in their comprehension, assessment, measurement, and articulation of cyber risk. Collectively, we need to do a better job at communicating cyber risk in business-relevant terms.
    3. Subjectivity, assumptions, and point-in-time views often result in investing in things that don't move the cyber dial (enough). Good news is organizations have the data and when applying the right AI-assisted technology lens, augmented by a human lens of articulation and communication, quality of cybersecurity expenditure decisions can be significantly improved.

    See publication
  • Round Table: Cyber Risk Quantification: Transitioning from the War Room to the Boardroom

    ISMG

    Round Table event to where I discussed Cyber Risk Quantification and the following aspects:
    - Understanding Cyber Risk Quantification: Defining the concept and its importance in the modern business environment.
    - Transitioning from Cyber Risk Qualification to Quantification: Practical steps for moving from subjective assessments to data-driven methodologies.
    - Implementing Quantitative Risk Management: Integrating quantitative tools and methodologies into business operations.
    -…

    Round Table event to where I discussed Cyber Risk Quantification and the following aspects:
    - Understanding Cyber Risk Quantification: Defining the concept and its importance in the modern business environment.
    - Transitioning from Cyber Risk Qualification to Quantification: Practical steps for moving from subjective assessments to data-driven methodologies.
    - Implementing Quantitative Risk Management: Integrating quantitative tools and methodologies into business operations.
    - Challenges and Solutions in Cyber Risk Quantification: Overcoming common obstacles in transitioning from subjective to objective risk assessments.

    See publication
  • Special Cyber Security Presentation - US Delegation

    Royal United Services Institute for Defence and Security Studies Australia

    Met with and presented to industry and defense leaders at the Australian Defence College in Canberra, Australia. Shared insights on the present and emerging cyber threat, observations on geopolitical concerns in the Asia Pacific region and the importance of the public and private sector partnership. This audience of great leaders is at the forefront of shaping today's cyber security strategies and devising a comprehensive response to tomorrow's emerging cyber threats. Achieving strong defensive…

    Met with and presented to industry and defense leaders at the Australian Defence College in Canberra, Australia. Shared insights on the present and emerging cyber threat, observations on geopolitical concerns in the Asia Pacific region and the importance of the public and private sector partnership. This audience of great leaders is at the forefront of shaping today's cyber security strategies and devising a comprehensive response to tomorrow's emerging cyber threats. Achieving strong defensive and offensive cyber capability starts with clear direction of mission, executing through trusted partnerships and informing current and future decision makers with the right data points to deliver outcome success on the cyber battlefield.

    See publication
  • Into the New Decade: Regional and Global Threat Landscape Evolution

    RSA Conference APJ 2020 - Executive Security Action Forum

    Deep dive into Verizon's 2020 DBIR trends and emerging cyber threats that will be front & center in boardroom conversations as businesses embark into a new decade of disruptive digital transformation.

    Other authors
  • From the war room to the boardroom

    Verizon News

    Victims of cybercrime are not random, therefore security controls should not be random. If you're making a business or purchasing decision, then you not only need access to intelligence that is relevant to your industry, you also need to know how to operationalize the data and to make it pertinent to your business.

    See publication
  • Operationalized Risk Modeling Using The Data Breach Repository

    RSA Conference 2018 Singapore

    Delivered an informative discussion during a Learning Lab on how organizations can apply real-life data breach insights to their existing cybersecurity strategy – and in doing so, improve their chances of keeping cybercriminals at bay.

    Other authors
    See publication
  • Understanding the Cyber Threat Landscape Across Asia Pacific

    RSA Conference 2018 Singapore - Executive Security Action Forum

    In a session to business and security leaders and executives, Kris presented a data-centric approach to gaining a better understanding of the Global and Asia Pacific regional cyber threat landscape, as well as YoY trending, and linkage to geopolitical drivers, actors, and policy regulatory implications.

  • Interview: RSAC TV - RSA Conference 2017 Asia Pacific & Japan.

    RSAC TV

    Britta Glade, Senior Content Manager at RSA Conference, speaks with Kristof Philipsen, Managing Executive, Verizon about his engagement with senior business leaders at RSA Conference 2017 Asia Pacific & Japan.

    See publication
  • Panel: Getting the Board On-Board: Ransomware’s Impact on your Business

    RSA Conference 2017 Singapore - Ransomware Seminar

    Participated in and provided perspectives during a panel on how to tackle the challenge of gaining Senior Leadership support and obtaining buy in for cybersecurity expenditures to address the Ransomware threat.

    Panelists:
    - Kris Philipsen, Managing Executive, Verizon
    - Jonathan Trull, Global Chief Cybersecurity Advisor, Microsoft
    - Joyce Chua, Assistant Vice President, Singapore Post Ltd

    See publication
  • Panel: Perspectives on the Cyber Threat Landscape

    RSA Conference 2017 Singapore - Executive Security Action Forum

    Participated in and provided perspectives during a panel at the RSA Executive Security Action Forum to discuss various perspectives on the Cyber Threat Landscape.

    Panelists:
    - Hon Dan Tehan MP, Minister Assisting Prime Minister on Cyber Security, Commonwealth of Australia
    - Kris Philipsen, Managing Executive, Verizon
    - Bryce Boland, CTO for Asia Pacific, FireEye
    - Christian Karam, Director - Head of Cyber Threat Intelligence, UBS AG

  • Understanding the Threat Landscape - Geopolitical Drivers, Actors, and Policy/Regulatory Implications

    RSA Conference 2017 Singapore - Executive Security Action Forum

    Selected as number one rated presentation at RSA Conference 2017 Singapore - Executive Security Action Forum.

    In a session to business and security leaders and executives, Kris presented a data-centric approach to gaining a better understanding of the Global and Asia Pacific regional cyber threat landscape, as well as linkage to geopolitical drivers, actors, and policy regulatory implications.

    - Offered a global picture of the Cyber Threat Landscape, as well as a deep dive into…

    Selected as number one rated presentation at RSA Conference 2017 Singapore - Executive Security Action Forum.

    In a session to business and security leaders and executives, Kris presented a data-centric approach to gaining a better understanding of the Global and Asia Pacific regional cyber threat landscape, as well as linkage to geopolitical drivers, actors, and policy regulatory implications.

    - Offered a global picture of the Cyber Threat Landscape, as well as a deep dive into the APAC regional landscape.
    - Delved deeper into "What keeps the C-Suite up at night".
    - Discussed the balancing act organizations face in dealing with today's and tomorrow's adversaries, weighing the risks, while navigating legislation, regulation, and other challenges that may impact cyber security controls.

  • WebCast: Beyond the Code - Holistic Application Security

    BrightTalk - Application Security Summit 2013

    The growing nature of online business and transactions has resulted in an exponential need for integrated and distributed application architectures. The paradigm of application security over many years has focused on much-needed fixing of common vulnerabilities in application code, without actually understanding their impact on the application’s overall security posture.

    In “Beyond the Code – Holistic Application Security”, we will run through several scenarios, based on real-world case…

    The growing nature of online business and transactions has resulted in an exponential need for integrated and distributed application architectures. The paradigm of application security over many years has focused on much-needed fixing of common vulnerabilities in application code, without actually understanding their impact on the application’s overall security posture.

    In “Beyond the Code – Holistic Application Security”, we will run through several scenarios, based on real-world case studies, where security was compromised by not looking at application security in a holistic way. The goal of this session is to understand a number of factors to be taken into account when securing the application architecture as a whole, understanding the impact integrated solutions, cloud based Content Delivery Networks and other design choices can have on the application’s overall security. The key takeaway from this talk should be increased awareness, allowing you to cast a wider net and look at the security of an application architecture in a broader and more holistic manner.

    See publication
  • Speaker Event: How Holistic Enterprise and Application Security Solutions can save you from being a statistic in the Verizon Data Breach Report

    Cyber Security in the Middle East (Dubai Summit)

  • Speaker Event: Security in the Solution Development Lifecycle

    SecureWorld Expo

    This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority…

    This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority threats, and (3) adapting to agile development.

    Other authors
    See publication
  • Webcast: Implementing and Monitoring Application Security with Essential Controls

    BrightTalk - Application Security Summit 2012

    As applications become more prevalent in today's world, there's an increasing threat of attacks targeting web-based and mobile applications. Often times, quick fixes are added to the applications or additional components are introduced to minimize the impact of these vulnerabilities, but these are no longer scalable approaches as applications are getting more sophisticated, providing even great integration, functionality and requiring ease of use. It is more important than ever to implement…

    As applications become more prevalent in today's world, there's an increasing threat of attacks targeting web-based and mobile applications. Often times, quick fixes are added to the applications or additional components are introduced to minimize the impact of these vulnerabilities, but these are no longer scalable approaches as applications are getting more sophisticated, providing even great integration, functionality and requiring ease of use. It is more important than ever to implement application security from the ground up as part of the software development lifecycle by ensuring there are sound policies at the base of every development project and proper procedures and processes are in place for the design, inception, development, testing and implementation of applications.

    Kris Philipsen will discuss the essential controls necessary to ensure an effective application security strategy is being followed and how these essential controls improve the overall security of the application.

    See publication
  • Speaker Event: “What the Eyes See and the Ears Hear, the Mind believes” – An overview of common Internet attacks targeting end users’ personal information and ways to tackle these threats.

    DTCC Security Summit 2009

    As Corporations, Financial Institutions and Governments around the world have increased their security postures over the last few years, criminal organizations and malicious groups have shifted their efforts towards end users. End users in the digital world are becoming victims of attacks such as phishing, client side scripting, spamming and similar threats which are aimed at tricking end users into unwillingly disclose personal information, such as e-banking credentials, credit card numbers…

    As Corporations, Financial Institutions and Governments around the world have increased their security postures over the last few years, criminal organizations and malicious groups have shifted their efforts towards end users. End users in the digital world are becoming victims of attacks such as phishing, client side scripting, spamming and similar threats which are aimed at tricking end users into unwillingly disclose personal information, such as e-banking credentials, credit card numbers, e-mail logon information, corporate credentials. We will look at methods used by organized crime and malicious groups to trick users into providing their personal information by showing the lengths and level of detail these black hat users go to in order to achieve this objective. Furthermore, we will look at how to more easily identify these types of threats, how to stop them before they reach your end users as well as what end users can do to thwart these threats when they do appear in your inbox or web browser.

    See publication
  • Security Software: PIX Logging Architecture

    Kris Philipsen

    PIX Logging Architecture is a project allowing for correlation of Cisco PIX Firewall traffic, IDS, and informational logs. It parses Cisco PIX logs from syslog files, then pushes the parsed data to a database. It contains a Web-based front end for displaying and searching the Cisco PIX Firewall logs.

    Third Party Write Up / Review of PIX Logging Architecture: http://practical.wordpress.com/2007/10/22/pix-parsing-usable-logs/

    Other authors
    See publication
  • Magazine Article: Nouveau livre blanc de Cybertrust sur les menaces concernant les applications Web

    Mags Security (French Information Security Magazine)

    Ce White Paper décrit en détail les risques et problèmes auxquels sont confrontées les applications web actuelles et la manière d´effectuer les bons diagnostics afin de les identifier et d´y apporter les meilleures solutions possibles (d´y remédier).

    See publication
  • Speaker Event: Web Application Vulnerability Assessment Discovering and Mitigating Vulnerabilities in Web Applications

    Hack.LU 2005 Security Conference

    The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This lecture discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security…

    The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This lecture discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security issues.

    See publication
  • Security Software: issPolicy

    Kris Philipsen

    issPolicy is a free open-source utility for converting an ISS RealSecure Network Sensor and ISS Proventia Inline Appliance Policy to a static HTML file.

    Written in Perl, issPolicy allows for granular parsing of ISS RSNS and ISS Proventia policies (also refer to the "support" section), and supports a wide variety of features (see "features" section) allowing the HTML generation to be customized based on different policy parameters.

    See publication
  • Security Advisory: Computalynx CProxy Denial-of-Service Vulnerability (CVE-2005-0657) (SA14461)

    Secunia

    Discovered a Denial-of-Service vulnerability in Computalynx CProxy Server

    See publication
  • Security Advisory: Computalynx CProxy Directory Traversal Vulnerability

    Bugtrack

    Discovered an arbitrary access control vulnerability in Computalynx Proxy Server

    See publication
  • Book Coverage: Security Warrior (O'Reilly)

    O'Reilly

    Some of my work and research on Remote Operating System Fingerprinting and Detection has been covered within O'Reilly's "Security Warrior" book.

    See publication
  • University Courseware: "The Art of (Application) Fingerprinting"

    University of Technology Aachen - Germany

    Some of my work and research on Remote Operating System Fingerprinting and Detection has been covered within the summer course on Application Fingerprinting at the University of Technology Aachen.

  • Paper: Web Application Vulnerability Assessment - Discovering and Mitigating Security Issues in Web Applications

    Hack.LU 2005 Security Conference

    The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This paper discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security…

    The growing rise of the Internet community and accessibility to information has prompted companies to deploy e-business solutions, many of which are accessible through the use of a web browser. These web applications are oftentimes susceptible to various security issues allowing an attacker to compromise sensitive and confidential data. This paper discusses several of the security threats posed to web application infrastructures and looks in closer detail at ways to mitigate these security issues.

    See publication
  • Paper: The theory and practice of hijacking TCP connections throughout an Internet-wide environment.

    SANS / GIAC

    This paper aims to describe multiple vulnerabilities, which exist in the TCP/IP protocol suite, in relation to Initial Sequence Number generation and predictability. The Symantec Raptor Weak Initial Sequence Number Vulnerability had been used as a basis for this paper and its research. The foundation for this paper stems from personal experience. The vulnerability, as well as different
    avenues of attack, and a possible incident handling process will be described in detail throughout the…

    This paper aims to describe multiple vulnerabilities, which exist in the TCP/IP protocol suite, in relation to Initial Sequence Number generation and predictability. The Symantec Raptor Weak Initial Sequence Number Vulnerability had been used as a basis for this paper and its research. The foundation for this paper stems from personal experience. The vulnerability, as well as different
    avenues of attack, and a possible incident handling process will be described in detail throughout the course of this paper.

    See publication
  • Security Advisory: Multiple Symantec Product Weak TCP Initial Sequence Number Vulnerability (CVE-2002-1463)

    Symantec

    Discovered a security issue regarding TCP Initial Sequence Numbers on Symantec's Raptor Firewall

    See publication
  • Magazine Article: Flaw discovered in Symantec firewall

    ZDNet

    Summary: A weakness in the way new connections are handled could allow an attacker to hijack any session, according to researchers

    See publication

Honors & Awards

  • Capture The Flag Contest - HackMiami 2014

    HackMiami

    Our 2 man team finished in 2nd place out of 10 teams at the Capture The Flag Hacking Challenge at HackMiami 2014.

  • Verizon 2013 President's Club

    Verizon Enterprise Solutions

    Granted Verizon 2013 President's Club award by Verizon Enterprise Solutions President in honor of outstanding achievement.

  • Capture The Flag Contest - Hack.lu 2005

    Hack.lu

    Our 3 man team ("Ubiteam") won the Capture The Flag Hacking Challenge at Hack.LU 2005.

Languages

  • English

    Native or bilingual proficiency

  • French

    Full professional proficiency

  • Dutch

    Native or bilingual proficiency

  • German

    Professional working proficiency

  • Portuguese

    Professional working proficiency

Recommendations received

More activity by Kris

View Kris’ full profile

  • See who you know in common
  • Get introduced
  • Contact Kris directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Kris Philipsen