About
Senior management professional with more than 27 years experience in operations…
Articles by Paul
Contributions
-
You’re not sure if your company is protected against cyber attacks. How can you find out?
Asset management is paramount as cyber threats are evolving and becoming increasingly sophisticated. Each untracked asset represents a potential weakness for malicious actors. Asset management closes these gaps, enabling IT teams to apply targeted security measures, promptly patch software, and retire obsolete systems that might otherwise serve as hidden conduits for cyberattacks. Keep in mind assets and threat mitigation extend beyond systems, to personnel as well. Phishing is the threat vector chosen 98% of the time, 36% of the time the Phishing exploit is effective against the human target. A comprehensive program can lead to the reduction in likelihood of an event, or the reduction in the impact of an event.
Activity
-
The National Security Agency (NSA), in collaboration with the Federal Bureau of Investigation (FBI), the U.S. Cyber Command’s Cyber National Mission…
The National Security Agency (NSA), in collaboration with the Federal Bureau of Investigation (FBI), the U.S. Cyber Command’s Cyber National Mission…
Liked by Paul Veeneman
-
Israel's operation against Hezbollah involved embedding explosives in Taiwanese-made pagers imported into Lebanon. Hezbollah ordered the devices from…
Israel's operation against Hezbollah involved embedding explosives in Taiwanese-made pagers imported into Lebanon. Hezbollah ordered the devices from…
Shared by Paul Veeneman
-
⚠️ Scammers target Facebook users with fake funeral streaming services, tricking people into giving up their credit card info—be cautious! More…
⚠️ Scammers target Facebook users with fake funeral streaming services, tricking people into giving up their credit card info—be cautious! More…
Liked by Paul Veeneman
Experience
Education
Licenses & Certifications
Recommendations received
6 people have recommended Paul
Join now to viewMore activity by Paul
-
It was such a pleasure to be a part of yesterday's Women in CyberSecurity (WiCyS) panel discussion alongside Roya Gordon and Quratulann (Annie)…
It was such a pleasure to be a part of yesterday's Women in CyberSecurity (WiCyS) panel discussion alongside Roya Gordon and Quratulann (Annie)…
Liked by Paul Veeneman
-
Meet me and my team at HOU SEC CON next week. I GUARANTEE you will see me walking around the pavilion 😉 🚦
Meet me and my team at HOU SEC CON next week. I GUARANTEE you will see me walking around the pavilion 😉 🚦
Liked by Paul Veeneman
-
My Top 5 Sources for ICS/OT (& IT) Cyber Security Vulnerabilities 1. Cybersecurity & Infrastructure Security Agency (CISA) https://lnkd.in/g9RMzXdB…
My Top 5 Sources for ICS/OT (& IT) Cyber Security Vulnerabilities 1. Cybersecurity & Infrastructure Security Agency (CISA) https://lnkd.in/g9RMzXdB…
Liked by Paul Veeneman
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Paul Veeneman
1 other named Paul Veeneman is on LinkedIn
See others named Paul Veeneman