Boca Raton, Florida, United States Contact Info
2K followers 500+ connections

Join to view profile

About

As the Transitional C(I)SO at Security Privateers, I help organizations fill the gap in…

Services

Articles by Michael

Contributions

Activity

Join now to see all activity

Experience & Education

  • Axcient

View Michael’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Grey Team Graphic

    Mentor and Trainer

    Grey Team

    - Present 4 years 10 months

    i18n_veterans

    Teaching and mentoring veterans in entry level IT, helpdesk, service desk, and field service engineer.
    Assisting them in transitioning from 'in country' back to civilian life.
    Created a division (Teamone.Support) as a way to give them real life internships.

Publications

  • Undocumented OSI Layers

    Various

    Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack. Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist. When it comes to navigating the executive suite and undocumented layers of the OSI model, you need to know how to deal with the…

    Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack. Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist. When it comes to navigating the executive suite and undocumented layers of the OSI model, you need to know how to deal with the corner office.

    Other authors
    • Gail Blount
    See publication

Patents

  • Intrusion detection system

    Issued US 7603711

    An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer network's vulnerability to attacks…

    An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer network's vulnerability to attacks detected on the other monitored hosts.

    See patent
  • Intrusion detection system

    Filed US 20100100961

    continuation of original patent:
    An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer…

    continuation of original patent:
    An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer network's vulnerability to attacks detected on the other monitored hosts.

    See patent

Projects

  • FreeBSD Development Team, Ports Committer

    -

    As part of the FreeBSD Development team, my responsibilities include reviewing new open source projects for FreeBSD, making sure they can be included in FreeBSD's official third party ports, assisting other third party porters, and committing new ports and changes to the FreeBSD ports source repository.

    See project
  • Official Maintainer, FreeBSD port of SpamAssassin

    -

    SpamAssassin is a mail filter which attempts to identify spam using text analysis and several internet-based realtime blacklists.

    Using its rule base, it uses a wide range of heuristic tests on mail
    headers and body text to identify "spam", also known as unsolicited commercial email.

    Once identified, the mail can then be optionally tagged as spam for later filtering using the user's own mail user-agent application.

    I am currently the official port maintainer of the…

    SpamAssassin is a mail filter which attempts to identify spam using text analysis and several internet-based realtime blacklists.

    Using its rule base, it uses a wide range of heuristic tests on mail
    headers and body text to identify "spam", also known as unsolicited commercial email.

    Once identified, the mail can then be optionally tagged as spam for later filtering using the user's own mail user-agent application.

    I am currently the official port maintainer of the FreeBSD port of SpamAssassin (under FreeBSD: mail/p5-Mail-SpamAssassin)

    See project
  • Official SpamAssassin Update Mirror

    -

    One of three official SpamAssassin Update mirrors. These three mirrors serve the official updates for the SpamAssassin Open Source anti-spam engine. That engine that is at the core of (many? most?) of the commercial anti-spam systems in production today.

    The update servers host the latest rule updates for all supported versions of SpamAssassin, and are pgp signed to prevent issues with man in the middle attacks, dns hijacking, or compromise of the slave or master servers.

    Each…

    One of three official SpamAssassin Update mirrors. These three mirrors serve the official updates for the SpamAssassin Open Source anti-spam engine. That engine that is at the core of (many? most?) of the commercial anti-spam systems in production today.

    The update servers host the latest rule updates for all supported versions of SpamAssassin, and are pgp signed to prevent issues with man in the middle attacks, dns hijacking, or compromise of the slave or master servers.

    Each official server gets near real time updates from a master server and, via the sa-update command in SpamAssassin, users and systems administrators can periodically receive updates (see url above)

    Unique to this project is the use of a virtualized FreeBSD server, and an embedded web server rather than a full Apache web server.

    This project was an experiment in adding a lightweight webserver, trying to see how little resources could be allocated to a public server. (We did 10 times as much with the same cpu/ram resources as a traditional server).

    The results of this experiment allowed SECNAP to apply what it learned to their HackerTrap/CloudJacket Managed IPS service, as well as their SpammerTrap email security appliance.

    Additionally, the virtualization and resource results allowed SECNAP to reduce the resource requirements for their IONSPAM VPS system that server fault tolerant/clustered versions of their SpoammerTrap email security appliance.

    See project
  • Enterprise VOIP Communications Server

    -

    Selected, developed and maintained software, SIP Trunk providers and platform for SECNAP's in house communications and collaboration server.* (sipx, asterisk)

    System included capacity for 23 simultaneous inbound or outbound local calls to the PSTN 80 simultaneous inbound Toll free calls, and 20 outbound international calls, all via SIP Trunking though multiple SIP Trunk Providers.

    System supported up to 43 simultaneous conference calls, individual private conference rooms for…

    Selected, developed and maintained software, SIP Trunk providers and platform for SECNAP's in house communications and collaboration server.* (sipx, asterisk)

    System included capacity for 23 simultaneous inbound or outbound local calls to the PSTN 80 simultaneous inbound Toll free calls, and 20 outbound international calls, all via SIP Trunking though multiple SIP Trunk Providers.

    System supported up to 43 simultaneous conference calls, individual private conference rooms for users, voicemail to email, call forwarding, call forwarding find me, hunt groups, ACD. Individual users could upload and select their own music on hold, or use default MOH media device or shared file directory.

    Additionally, a freeswitch based secondary server was located in SECNAP's DR site to accept and route calls to selected managers in case of primary server or service outage.

    System supported multiple SIP based telephones, as well as softphones and SIP clients for Android and Iphone.

    Modifications to the provided software included a .wav to .mp3 conversion program that allowed for smaller voicemails. This was especially important to mobile users who received voicemail in their email.

    System was placed behind its own dedicated firewall and internal network. This was necessary for two reasons: Security and performance. Isolating the internal SIP traffic from the internal network via physically isolated network drops kept any internal bandwidth usage from degrading voice quality. Additionally, the default sip trunking ports needed to be changed, and specific QOS tags added.

    See project
  • IONSPAM Cloud based email security

    -

    IONSPAM is a virtualized, geographically disperse set of clustered high availability servers designed to logically and physically isolate performance and downtime issues.

    With its initial release, the SpammerTrap was given a 4* rating by SC magazine who called it 'The King of Spam Filters'. https://www.scmagazine.com/review/secnap-spammertrap/


    Built on FreeBSD, SpamAssassin, Mysql, clamav and amavisd, it uses no commercial virtualization products.

    Due to the zero…

    IONSPAM is a virtualized, geographically disperse set of clustered high availability servers designed to logically and physically isolate performance and downtime issues.

    With its initial release, the SpammerTrap was given a 4* rating by SC magazine who called it 'The King of Spam Filters'. https://www.scmagazine.com/review/secnap-spammertrap/


    Built on FreeBSD, SpamAssassin, Mysql, clamav and amavisd, it uses no commercial virtualization products.

    Due to the zero virtual task switching costs, it can host more users per cpu than traditional cloud based solutions.

    High availability servers at each data center ensure 99.999% uptime at each location. Two geographic locations, clustered together ensures virtually 100% data availability.

    Client isolation, inherent in virtualization technologies allow each client the ability of full control over their email security environment while enhancing the security.

    Other creators
  • SpammerTrap/Rule18. Email Security and Encryption

    -

    I was chief scientist and inventor of SECNAP's SpammerTrap award winning email security and anti-spam appliance, as well as the Rule18 email encryption engine for it.

    5 star ratings from third party reviewers, accuracy above 99.96%. Included 4 real time reputation databases, 4 times the number of spam/virus checks. Quarantined zero day attachments.

    Other creators
  • Hackertrap

    -

    HackerTrap (currently marketed as 'Cloudjacket' and has been used to protect US State Department SCIF / SAP Top Secret emails) integrates a patented Edge Attack Sensor Network and Smart Alert Filter, an extensive and robust database of rules and signatures.

    At the core is SourceFire's SNORT attack detection engine, customized rulesets.

    It is a Hybrid IDS/IPS with zero latency. I was able to achieve zero latency due to my background in real time/ robotics and factory…

    HackerTrap (currently marketed as 'Cloudjacket' and has been used to protect US State Department SCIF / SAP Top Secret emails) integrates a patented Edge Attack Sensor Network and Smart Alert Filter, an extensive and robust database of rules and signatures.

    At the core is SourceFire's SNORT attack detection engine, customized rulesets.

    It is a Hybrid IDS/IPS with zero latency. I was able to achieve zero latency due to my background in real time/ robotics and factory automation.

    Coupled with my earlier work at Florida Datamation on robotics, artificial intelligence, war and game theory, I was able to build a statistical engine that eliminated up to 98% of the false positives.

    The GUI included customizable dashboard widgets that allow high visibility into network and attack status.

    Other creators
  • Nessus/OpenVas Plugins

    -

    Originally written for Nessus Open Source Vulnerabilities Scanner, but incorporated into the OpenVas scanner when it branched from Nessus.

    29 of my original Nessus Plugins survive in the OpenVas project.

    http://openvas.komma-nix.de/ select [*] Copyright

    16 copyright scheidell and 13 written by me and copyright secnap

    See project

Honors & Awards

  • Security Privateers LLC Receives 2015 Best of Boca Raton Award

    Boca Raton Award Program

    BOCA RATON September 30, 2015 -- Security Privateers LLC has been selected for the 2015 Best of Boca Raton Award in the Management Consulting Services category by the Boca Raton Award Program.

    Each year, the Boca Raton Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community…

    BOCA RATON September 30, 2015 -- Security Privateers LLC has been selected for the 2015 Best of Boca Raton Award in the Management Consulting Services category by the Boca Raton Award Program.

    Each year, the Boca Raton Award Program identifies companies that we believe have achieved exceptional marketing success in their local community and business category. These are local companies that enhance the positive image of small business through service to their customers and our community. These exceptional companies help make the Boca Raton area a great place to live, work and play.

    http://bocaraton.bocaraton.local-best.com/PressReleaseub.aspx?cc=DE3G-RBFG-Y8QQ

  • Senior Member ISSA

    ISSA

    ISSA created Senior Membership to recognize, as well as tap into, the wealth of experiences their members bring to the association and the information security community.

    ISSA looks to their Senior Members to be ambassadors for the ISSA and to provide insights and guidance in a range of areas:

    · Technical, academic and research excellence
    · Managerial and program/project excellence

  • Senior Member IEEE Computer Society

    IEEE.org

    The IEEE is the world's largest professional association for the advancement of technology, only 8% of it's over 430,000 members have achieved senior grade. Senior Member is the highest grade for which IEEE members can apply.

  • Golden Bridge Awards: 2008-2009 Executive Award Winner

    Golden Bridge Award

    Golden Bridge Awards are an annual industry and peers recognition program honoring Best Companies of all types and sizes in North America, Europe, Middle-East, Africa, Asia-Pacific, and Latin-America, Best Products, Innovations, Management and Teams, Women in Business and the Professions, and PR and Marketing Campaigns from all over the world. Learn more about The Golden Bridge Awards at www.goldenbridgeawards.com.

    The Golden Bridge Business awards were created to honor and generate…

    Golden Bridge Awards are an annual industry and peers recognition program honoring Best Companies of all types and sizes in North America, Europe, Middle-East, Africa, Asia-Pacific, and Latin-America, Best Products, Innovations, Management and Teams, Women in Business and the Professions, and PR and Marketing Campaigns from all over the world. Learn more about The Golden Bridge Awards at www.goldenbridgeawards.com.

    The Golden Bridge Business awards were created to honor and generate industry wide recognition of the achievements and positive contributions of organizations and businesses worldwide in every area.
    http://theglobee.com/world/2010/index.html

  • Finalist, EETimes ACE Award, Innovators of the Year

    EE Times Magazine

    One of five international Finalists,
    http://www.eetimes.com/document.asp?doc_id=1269210

  • MVP Award for Technology Leadership, CTO

    Network Products Guide

    Industry's Most Valuable Players, Chief Technology Officer
    http://www.networkproductsguide.com/MVP/2008/index.html

  • Shaping Information Security Award

    Information Security Products Guide

  • Technology Award in Internet-Based Technology

    South Florida Business Journal

Languages

  • English

    Native or bilingual proficiency

  • NewSpeak

    Full professional proficiency

Organizations

  • Federalist Society

    Member

    - Present

    The Federalist Society for Law and Public Policy Studies is a group of conservatives and libertarians interested in the current state of the legal order. It is founded on the principles that the state exists to preserve freedom, that the separation of governmental powers is central to our Constitution, and that it is emphatically the province and duty of the judiciary to say what the law is, not what it should be. The Society seeks both to promote an awareness of these principles and to…

    The Federalist Society for Law and Public Policy Studies is a group of conservatives and libertarians interested in the current state of the legal order. It is founded on the principles that the state exists to preserve freedom, that the separation of governmental powers is central to our Constitution, and that it is emphatically the province and duty of the judiciary to say what the law is, not what it should be. The Society seeks both to promote an awareness of these principles and to further their application through its activities.

  • Miami Electronic Crime Task Force (MECTF)

    Member

    - Present

    United States Secret Service Miami Electronic Crimes Task Force investigates cyber crime, computer crimes, network intrusions, online enticements, hacking cases, web site defacements and identity theft relative to the security of financial and personal information. Members of the MECTF include the federal and local law enforcement community, as well as financial institutions, academia and members of the private sector involved in computer…

    United States Secret Service Miami Electronic Crimes Task Force investigates cyber crime, computer crimes, network intrusions, online enticements, hacking cases, web site defacements and identity theft relative to the security of financial and personal information. Members of the MECTF include the federal and local law enforcement community, as well as financial institutions, academia and members of the private sector involved in computer security. http://www.secretservice.gov/ectf_miami.shtml

  • FBI InfraGard

    Member/Former Board Member FBI InfraGard South Florida Chapter

    - Present

    InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. Each InfraGard Chapter has an FBI Special Agent Coordinator assigned to it, and the FBI Coordinator works closely with Supervisory Special Agent Program Managers in the Cyber Division at FBI Headquarters in Washington, D.C.

  • ISACA

    Platinum Member, South Florida Chapter

    - Present

    Information Systems Audit and Control Association (ISACA) provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. The COBIT, Val IT and Risk IT governance frameworks and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals…

    Information Systems Audit and Control Association (ISACA) provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide. The COBIT, Val IT and Risk IT governance frameworks and the CISA, CISM, CGEIT and CRISC certifications are ISACA brands respected and used by these professionals for the benefit of their enterprises.

  • ISSA

    Senior Member and Speaker, South Florida Chapter

    -

    Was a senior member, they refused to stop sending sponsored spam unless I remove my membership that I pay for. I asked they delete me information. Shame on you ISSA. The goal of the Information Systems Security Association, Inc. is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources. The ISSA is dedicated to providing resources to such people and organizations, as well as to generally raising the level of…

    Was a senior member, they refused to stop sending sponsored spam unless I remove my membership that I pay for. I asked they delete me information. Shame on you ISSA. The goal of the Information Systems Security Association, Inc. is to promote management practices that will ensure the confidentiality, integrity and availability of organizational information resources. The ISSA is dedicated to providing resources to such people and organizations, as well as to generally raising the level of security and data privacy consciousness among information systems personnel in all organizations.

  • Cloud Security Alliance, South Florida Chapter

    President, South Florida Chapter

    -

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. http://cloudsecurityalliance.org

  • ASIS International

    Member

    -

    ASIS International is a global community of security practitioners, each of whom has a role in the protection of assets - people, property, and/or information. Our members represent virtually every industry in the public and private sectors, and organizations of all sizes. From entry-level managers to CSOs to CEOs, from security veterans to consultants and those transitioning from law enforcement or the military, the ASIS community is global and diverse.

  • FISA, the Financial Institution Security Association

    Member

    -

    Formed in 1980 to combat crimes perpetrated against our members. We serve as a vital communications link for financial institutions of all sizes in the South Florida region, developing and distributing security information to our members and to law enforcement agencies. *We maintain a comprehensive member directory. *We provide training and networking opportunities. Through strength in numbers, common vigilance and the sharing of information, FISA empowers our members to prevent losses as well…

    Formed in 1980 to combat crimes perpetrated against our members. We serve as a vital communications link for financial institutions of all sizes in the South Florida region, developing and distributing security information to our members and to law enforcement agencies. *We maintain a comprehensive member directory. *We provide training and networking opportunities. Through strength in numbers, common vigilance and the sharing of information, FISA empowers our members to prevent losses as well as improve the strength of our businesses and the financial industry in general. Join today and enjoy the peace-of-mind of being informed by the leading authorities in our industry

  • IAPP

    Member

    -

    The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge.

  • IEEE

    Senior Member, Palm Beach Section, Computer Society

    Institute of Electrical and Electronics Engineers (IEEE) is the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards, and professional and educational activities.

  • SFTA

    Member

    The South Florida Technology Alliance (SFTA) promotes the growth, success and awareness of the regional technology community. Through events, networking, programs and education, we provide south Florida’s technology-related companies, academic institutions, entrepreneurs, governments and related organizations with an active forum to grow the business of technology in our region.

Recommendations received

More activity by Michael

View Michael’s full profile

  • See who you know in common
  • Get introduced
  • Contact Michael directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Michael Scheidell

Add new skills with these courses