Difference between revisions of "User:Mchalmers"

From OWASP
Jump to: navigation, search
m
m
 
(14 intermediate revisions by the same user not shown)
Line 1: Line 1:
<div align="left" style="float: left; margin: 0 4px 0 0; padding: 4px; border: 1px solid #aaa;">[[File:Chalmers,_Matthew.jpg|174px]]</div>Matthew Chalmers specializes in assurance, audit, compliance, control, governance, oversight, risk assessment/management, and security of information, information technology, and technology process. Matthew holds over a dozen professional certifications as well as a master of science in cybersecurity. He has over 20 years of experience spanning government, public, private, for-profit, and non-profit organizations in defense, industrial automation, healthcare, and finance. Matthew started his career at the National Security Agency in Ft. Meade, Maryland and is currently based in the Minneapolis-St. Paul area with US Bancorp where he facilitates global second line of defense independent compliance, maturity, risk, and vulnerability assessments. Matthew has written, spoken, and provided training publicly and privately, both classified and unclassified, on a range of topics including cryptography, penetration testing, IT audit, and GRC. He is adept at illuminating the technical details of a topic or technology for a non-technical audience.
+
<div align="left" style="float: left; margin: 0 4px 0 0; padding: 4px; border: 1px solid #aaa;">[[File:Chalmers,_Matthew.jpg|174px]]</div>I lead second line of defense assessment, credible challenge, governance, and oversight of technology programs, processes, and issue remediation relating to application programming interfaces; authentication, identity & access management; and encryption & key management for all of U.S. Bank.
  
Matthew is available for vendor-neutral public and private speaking and training engagements. He can be reached at matthew ''dot'' chalmers ''at'' owasp ''dot'' org.
+
I have written, spoken, and provided training (publicly and privately, classified and unclassified) on myriad subjects including cryptography, GRC, IT audit, penetration testing, and web/application vulnerability assessment.
 +
 
 +
I am a doctoral degree candidate at Capitol Technology University expecting to defend my dissertation in December 2019. My research involves a new approach to end-to-end email encryption and its usability.
 +
 
 +
I can be reached at matthew ''dot'' chalmers ''at'' owasp ''dot'' org.
  
 
<br style="clear: both;">
 
<br style="clear: both;">
Line 45: Line 49:
 
* [http://www.eff.org/ EFF] (Electronic Frontier Foundation)
 
* [http://www.eff.org/ EFF] (Electronic Frontier Foundation)
 
** [https://www.eff.org/about/opportunities/volunteer Cooperating Tech]
 
** [https://www.eff.org/about/opportunities/volunteer Cooperating Tech]
 +
* [https://www.fsisac.com/ FS-ISAC] (Financial Services Information Sharing and Analysis Center)
 +
** [https://www.fsisac.com/about/committees Research Survey Committee]
 
* [http://www.iacr.org/ IACR] (International Association for Cryptologic Research)
 
* [http://www.iacr.org/ IACR] (International Association for Cryptologic Research)
 
* [http://csrc.nist.gov/nissc/1999/program/isso/sld077.htm IATFF] (Information Assurance Technical Framework Forum)
 
* [http://csrc.nist.gov/nissc/1999/program/isso/sld077.htm IATFF] (Information Assurance Technical Framework Forum)
Line 95: Line 101:
  
 
===Training===
 
===Training===
 +
* CoalFire - Adaptive Penetration Testing (5/2018)
 
* CITI - Human Subjects Research (10/2014)
 
* CITI - Human Subjects Research (10/2014)
 
* IIA - Risk-Based, Process-Oriented & Performance-Driven Operational Auditing (6/2013)
 
* IIA - Risk-Based, Process-Oriented & Performance-Driven Operational Auditing (6/2013)
Line 117: Line 124:
  
 
===Education===
 
===Education===
* Doctor of Science (ABD), Cybersecurity, [http://capitol.technology.university/ Capitol Technology University]
+
* Doctor of Science (Candidate for the Degree), Cybersecurity, [http://capitol.technology.university/ Capitol Technology University]
** Dissertation (WIP): Utility limitations as barriers to adoption of extant end-to-end encrypted email solutions
+
** Dissertation (WIP): User Perception of Utility Constraints in End-to-End Email Encryption Solutions
* Master of Science, Information Assurance & Cybersecurity, [http://capitol.technology.university/ Capitol Technology University]
+
* Master of Science, Information Assurance, [http://capitol.technology.university/ Capitol Technology University]
 
* Bachelor of Arts, Psychology & Philosophy, [http://www.mst.edu/ Missouri University of Science & Technology]
 
* Bachelor of Arts, Psychology & Philosophy, [http://www.mst.edu/ Missouri University of Science & Technology]
 
* Associate of Arts, Russian, [http://www.dliflc.edu/ Defense Language Institute]
 
* Associate of Arts, Russian, [http://www.dliflc.edu/ Defense Language Institute]

Latest revision as of 16:48, 9 May 2019

Chalmers, Matthew.jpg
I lead second line of defense assessment, credible challenge, governance, and oversight of technology programs, processes, and issue remediation relating to application programming interfaces; authentication, identity & access management; and encryption & key management for all of U.S. Bank.

I have written, spoken, and provided training (publicly and privately, classified and unclassified) on myriad subjects including cryptography, GRC, IT audit, penetration testing, and web/application vulnerability assessment.

I am a doctoral degree candidate at Capitol Technology University expecting to defend my dissertation in December 2019. My research involves a new approach to end-to-end email encryption and its usability.

I can be reached at matthew dot chalmers at owasp dot org.


OWASP Involvement

OWASP Wiki

OWASP Projects

OWASP Chapters

  • Founding member of the original DC Local Chapter (which became the DC-Maryland chapter, then the Washington DC chapter)
    • Active member 2004-2005
    • Recorded meeting minutes and maintained chapter web pages (pre-wiki)
  • Founder and former chapter leader of the original Milwaukee chapter
  • "Member-at-Large"

Non-OWASP Involvement

"Credentials"

Certifications

  • CDP - Certified in Data Protection
  • CIAM - Certified Identity and Access Manager
  • CIRM - Certified Identity Risk Manager
  • ACE - AccessData Certified Examiner
  • CCISO - Certified Chief Information Security Officer
  • CISM - Certified Information Security Manager
  • CCSK - Certified in Cloud Security Knowledge
  • CRMA - Certified in Risk Management Assurance
  • GCFA - GIAC Certified Forensic Analyst
  • ITIL Foundation Certified
  • CISA - Certified Information Systems Auditor
  • CHS - Certified in Homeland Security
  • CEH - Certified Ethical Hacker
  • GSNA - GIAC-certified Systems and Network Auditor
  • MCP - Microsoft Certified Professional

Training

  • CoalFire - Adaptive Penetration Testing (5/2018)
  • CITI - Human Subjects Research (10/2014)
  • IIA - Risk-Based, Process-Oriented & Performance-Driven Operational Auditing (6/2013)
  • IIA - Antifraud Controls using Data Mining and Continuous Monitoring Techniques (8/2011)
  • ISACA - Auditing & Securing Cloud-Based Services (1/2011)
  • ISACA - Information Security Management & Strategies for Implementing IT Governance (12/2010)
  • PDS/SOScorp - ITIL v3 Foundation Course (9/2008)
  • SANS - Computer Forensics, Investigation, and Response (4/2008)
  • Entellus Technology Group - SAP ERP Basis Auditing & Security Risks (12/2007)
  • SAP America - Virsa Compliance Calibrator Training (10/2006)
  • IIA - SAP ERP Technical Audit (8/2006)
  • SPI Dynamics - Web Application Security Assessment with WebInspect (11/2005)
  • SANS - Hacker Techniques, Exploits and Incident Handling (10/2005)
  • Infosec Institute - Advanced Ethical Hacking: Expert Penetration Testing (1/2005)
  • Mile2 - Certified Ethical Hacker Training (7/2004)
  • Foundstone - Ultimate Web Hacking (9/2003)
  • Siegeworks - Advanced AppAuditor Training (12/2002)
  • SANS - Auditing Networks, Perimeters, and Systems (4/2002)
  • Sanctum - AppScan AppAuditor Training (5/2001)
  • National Cryptologic School - Information Systems Security Engineering (2/2000)
  • National Cryptologic School - Operational Information Systems Security (11/1998)

Education