Ismael Valenzuela

As Sr. Principal Engineer, Ismael Valenzuela (@aboutsecurity) is part of McAfee's senior technical leadership team, leading research on Security Operations and Threat Hunting using machine-learning and expert-system driven investigations. Author and contributor of numerous technical articles and open source tools, Ismael is also a regular speaker at International conferences and is one of the few Certified SANS Instructor for the Cyberdefense and Digital Forensics tracks.

Prior to his current role at McAfee, Ismael led the delivery of SOC, IR & Forensics services for the Foundstone Services team within Intel globally. A top cybersecurity expert with strong technical background and deep knowledge of security architectures and continuous monitoring as well as advanced attack and defense techniques, Ismael has provided security consultancy, advice and guidance to large government and private organizations, including major EU Institutions and US Government Agencies. Previously, Ismael worked as Global IT Security Manager for iSOFT Group Ltd. and founded one of the first security consultancies in Spain in 2000.

Ismael holds a Bachelor's degree in Computer Science from the University of Malaga (Spain), as well as numerous professional certifications, including the highly regarded GIAC Security Expert (GSE #132) and many others from GIAC, ISC2 and ISACA.

Twitter: https://twitter.com/aboutsecurity
SANS: https://www.sans.org/instructors/ismael-valenzuela
McAfee: https://securingtomorrow.mcafee.com/author/ismael-valenzuela/

Subscribe to Ismael Valenzuela Blogs

More from Ismael Valenzuela

Endpoint Security

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a ...

Security Operations

McAfee Leads the Charge to Embrace and Expand the MITRE ATT&CK Framework

In October, I was privileged to attend the two-day MITRE ATT&CK™ conference, where participants and attendees voiced their support for the ATT&CK framework. The event, sponsored by McAfee, served as a forum for sharing insights and best practices for using ATT&CK as a way to describe and demystify the complexities ...

Enterprise

A Model for Human and Machine Interaction: Human-Machine Teaming Grows up

Security operation centers (SOCs) are struggling to keep up with attackers, and artificial intelligence (AI) has failed to deliver significant improvements. The industry has been successful at applying AI to malware detection and user and entity behavior analytics (UEBA) using deep neural networks and anomaly detection. But other core SOC ...

Enterprise

How Thinking Like an Attacker Makes You a Better Threat Hunter

In the race against cybercrime, like in a chess game, threat hunters are constantly trying to get one step ahead of the opponent, trying to predict what the next movement will be. Evidence suggests, however, that most organizations struggle to catch up with the pace, with their defenders (also commonly ...

Enterprise

Helping Overburdened SOC Analysts Become More Effective Threat Hunters

Security operations center analysts confront a tough paradox almost daily. In a perfect world, every SOC would have the resources to 1) proactively hunt or search for the presence of adversaries in the network, and 2) for analysts tasked with incident response activities, to profile the types of threats that ...

Enterprise

Continuous Monitoring Can Help You Stop the Bad Guys in Their Tracks

Most security organizations have historically been focused on the prevention portion of the prevent-detect-correct threat defense lifecycle. The proliferation of some high-profile security breaches in the past few years, however, has demonstrated the weakness in that strategy. Cracks exist in even the most formidable security defenses. Attackers have become ever ...

Subscribe to McAfee Securing Tomorrow Blogs