Michael served formerly as the CTO at NitroSecurity bringing over 20 years of senior leadership to the company. He was responsible for developing and implementing NitroSecurity's overall technology vision and roadmap.
 
Michael has held senior technical management positions at Eziaz, Cabletron and Avaya. At Avaya, a global telecommunications equipment and services vendor, he served as CTO where he led the company in its strategic efforts for converged data/voice development initiatives.

Michael studied Computer and Electrical Engineering at the Georgia Institute of Technology and received an honorary MBA from Bentley University where he helped create the Information Age MBA curriculum. He is also an adjunct professor teaching cybersecurity courses at Rochester Institute of Technology in New York and Norwich University in Vermont.
Leland received a B.S. in computer and electrical engineering from the Georgia Institute of Technology and an honorary MBA from Bentley, where he helped create the information age MBA curriculum.

Michael Leland Blog Feed

More from Michael Leland

Security Operations

6 Best Practices for SecOps in the Wake of the Sunburst Threat Campaign

1. Attackers have a plan, with clear objectives and outcomes in mind. Do you have one? Clearly this was a...

Security Operations

SOCwise Series: Practical Considerations on SUNBURST

This blog is part of our SOCwise series where we’ll be digging into all things related to SecOps from a practitioner’s point...

Security Operations

SOCwise: A Security Operation Center (SOC) Resource to Bookmark

Core to any organization is managing cyber risk with a security operations function whether it be in-house or outsourced. McAfee...

Endpoint Security Security Operations

When You’re Overwhelmed With Alerts, It’s Time to Automate

In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team...

Security Operations

Fastpass to SIEM ROI via Pre-built content for analysts and responders

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result,...

Security Operations

Is Your SIEM ‘Ready To Go?’

The massive amount of log, event and flow data within the SIEM offers security analysts answers to essential security questions...

Subscribe to McAfee Securing Tomorrow Blogs