Michael Leland

Michael served formerly as the CTO at NitroSecurity bringing over 20 years of senior leadership to the company. He was responsible for developing and implementing NitroSecurity's overall technology vision and roadmap.
 
Michael has held senior technical management positions at Eziaz, Cabletron and Avaya. At Avaya, a global telecommunications equipment and services vendor, he served as CTO where he led the company in its strategic efforts for converged data/voice development initiatives.

Michael studied Computer and Electrical Engineering at the Georgia Institute of Technology and received an honorary MBA from Bentley University where he helped create the Information Age MBA curriculum. He is also an adjunct professor teaching cybersecurity courses at Rochester Institute of Technology in New York and Norwich University in Vermont.
Leland received a B.S. in computer and electrical engineering from the Georgia Institute of Technology and an honorary MBA from Bentley, where he helped create the information age MBA curriculum.

Subscribe to Michael Leland Blogs

More from Michael Leland

Endpoint Security Security Operations

When You’re Overwhelmed With Alerts, It’s Time to Automate

In a number of recently publicized breaches, and probably many other attacks, information that could have enabled the security team to catch and contain the attack were lost in the sheer volume of alerts. Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential ...

Security Operations

Fastpass to SIEM ROI via Pre-built content for analysts and responders

In our previous Blog, we covered how customizing SIEM for threat management requires both resources and expertise.  As a result, McAfee created “ready to go” content packs based on Gartner’s Top Use cases.  targeting aspiring users to expand their SIEM detection and response use cases without spending countless hours and ...

Security Operations

Is Your SIEM ‘Ready To Go?’

The massive amount of log, event and flow data within the SIEM offers security analysts answers to essential security questions such as “who is accessing critical business systems,” or, more importantly, “was there any anomalous activity before, during or after the connection?” To get all these answers, though, users need ...

Subscribe to McAfee Securing Tomorrow Blogs