Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Alyssa Miller

Hacker and Security Evangelist at Alyssa In-Security

Milwaukee, WI, United States

25902 Followers

Alyssa Miller is a hacker/researcher, security evangelist, and security professional. With over two decades of experience in IT, first as a programmer and then as a penetration tester and security consultant, Alyssa has earned a reputation for being able to credibly operate on both sides of the fence between technical experts and high-level business executives.

A naturally curious lover of technology, Alyssa has always had a passion for deconstructing technology to learn how it functions and improve upon it. Computers, in particular, have fascinated her since she was in pre-school when her father would bring home a computer from work. At the age of 12 she saved up enough money to buy her first computer on which she taught herself BASIC programming, operating systems and even asynchronous communications protocols. Still it wasn’t until after three semesters of pre-med studies at Marquette University that Alyssa finally found her career calling and switched to the Computer Science program.

Alyssa’s professional track record includes leading the security testing and vulnerability management program for a Fortune 500 Financial Technologies firm, leading the application security program practice for highly respected boutique consulting firm, and most recently serving as an Application Security Advocate for London-based Snyk Ltd.

Alyssa speaks internationally at industry, vendor, and leadership conferences on topics ranging from technical security vulnerabilities, to high-level security program strategies, to issues within the security community itself. She is a member of the Board of Directors for Women of Security (WoSEC) and engages with the community through her blogs, video content, podcast appearances, and social media presence.

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Milwaukee, WI
Speaking Topics: Application Security, Cyber Security Strategy, Emerging threats and trends

Speaking Fee $5,000

Alyssa MillerPoints
Academic0
Author17
Influencer277
Speaker40
Entrepreneur70
Total404

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Individual
Business Unit: None
Theatre: North America
Media Experience: 4 Years
Last Media Interview: 12/20/2019

Areas of Expertise

Big Data 35.59
Business Strategy 30.09
Cybersecurity 44.41
Data Center 30.28
Design Thinking
Digital Disruption 30.63
Emerging Technology 32.63
Govtech 30.58
HR 30.34
Leadership 32.52
Management 39.42
Privacy 32.13
Risk Management 31.37
Startups 30.46
Diversity and Inclusion 32.02
Social 30.17

Industry Experience

Consumer Products
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Hospitality
Other
Pharmaceuticals
Professional Services
Retail
Travel & Transportation
Utilities

Please signin or signup to view publication section.

Publications

1 Advisory Board Membership
Advisory Board Member
Blue Team Con
December 09, 2019
Member of the Advisory board and CFP Review Panel for Blue Team Con

See publication

Tags: Big Data, Cybersecurity, Emerging Technology

17 Article/Blogs
Reflecting on Transgender Day of Visibility
LinkedIn
March 31, 2020
March 31 each year is marked as Transgender Day of Visibility. According to the Human Rights Campaign, it is a day to commemorate “the courage it takes to live openly and authentically”. For those that live in silence, hiding their authentic selves, the day can serve as motivation to share their true selves with the world, if only for that one day a year. For others it’s a day to publicly recognize their journey to authenticity and be bold in bringing awareness to the world that transgender people are human beings like everyone else.

See publication

Tags: Social, Diversity and Inclusion

Don’t Tap That Mic
Import from wordpress feed
February 28, 2020
Top 1o tips for working with production crews as a speaker A colleague and I were recently talking about the bad habits we’ve seen from speakers at various conferences. This led to a deeper discussion on the importance of the production teams at these events. I think for many speakers the prod

See publication

Tags: Cybersecurity

A Promotions Gap
alyssasec.com
February 09, 2020
Are expectations in promotion helping fuel the “Skills Gap”
Search job postings and you’ll find there are plenty of companies bragging about how they invest in their people. Internally, organizations like to boast about having a culture of promoting from within. Indeed, there are no shortage of articles touting the value of internal promotions processes. Yet, I must wonder if these words translate into action. While I’m still gathering the data in my surveys, some respondents have also reached out to me directly to share their stories. Quite a few tell me about how difficult it is to transition internally into security-related roles.

See publication

Tags: Leadership, Privacy, Diversity and Inclusion

RSA Conference Schedule
Import from wordpress feed
February 07, 2020
Where to find me at RSA As I’ve announced previously through social media, I’ve received the great honor of being accepted to speak at the RSA Conference in San Francisco this year. One thing has become very apparent thus far, this is a huge networking event and everyone wants to meet up

See publication

Tags: Cybersecurity

It Shouldn’t Be This Hard
Import from wordpress feed
January 30, 2020
There are seemingly conflicting messages about a cyber security skills gap and security professionals who can't find jobs. Why is this happening and how can we fix it?
The post It Shouldn’t Be This Hard appeared first on Alyssa Miller.

See publication

Tags: Cybersecurity

An Exciting Start to 2020
Import from wordpress feed
December 31, 2019
In a previous post I announced that I would be leaving my current role shortly after the new year. On New Year's Eve it seems appropriate to announce where I'm going and what I'll be doing.
The post An Exciting Start to 2020 appeared first on Alyssa Miller.

See publication

Tags: Cybersecurity

Closing Out 2019 and Looking Ahead
Import from wordpress feed
December 21, 2019
Announcing a new development as 2020 approaches Looking back at 2019, it has been a tremendous year for me from a personal and career development perspective. I’ve been very fortunate to elevate my involvement in the security community. I’ve documented much of it in this video I made in

See publication

Tags: Cybersecurity

Leaders Inspire, Bosses Demand
LinkedIn
December 03, 2019
A short article authored by Alyssa on the difference between being a boss and being a leader. Alyssa leverages her own lessons learned to focus on three key characteristics that make for inspiring leaders.

See publication

Tags: Management, Leadership, HR

What Is a Hacker?
Import from wordpress feed
September 20, 2019
What makes me a hacker is my unfettered, at times almost obsessive need to understand the inner workings of technology.
The post What Is a Hacker? appeared first on Alyssa Miller.

See publication

Tags: Cybersecurity

What Is a Hacker
Alyssasec
September 20, 2019
In this blog, Alyssa discusses the media and societal biases around the term hacker. She provides a greater understanding of who hackers truly are and the difference between hackers and cyber criminals.

See publication

Tags: Business Strategy, Cybersecurity, Data Center

Talent Shortage, Really?
Alyssasec
September 06, 2019
In this blog, Alyssa discusses the cyber security talent shortages and points out realities that suggest the shortage is more a result of unrealistic expectations and missed connections. She specifically targets the need for organizations to do better in crafting job descriptions for cyber security roles and to reach out in new ways are part of their recruiting efforts.

See publication

Tags: Cybersecurity, HR, Management

Deep Fakes in 2020
Import from wordpress feed
August 29, 2019
Deep fakes have entered the political arena. While the technology continues to advance, it still has some important limitations that may help mitigate it's impact.
The post Deep Fakes in 2020 appeared first on Alyssa Miller.

See publication

Tags: Cybersecurity

You Can’t Do Anything, Why Haven’t You Done Something?
Import from wordpress feed
August 22, 2019
The conflicting messages Security Professionals give Business Leaders It’s not if you’ll get hacked, it’s when. This is a statement every security professional has probably heard. In fact, most of us have probably used it at one time or another. A slightly different version is, if

See publication

Tags: Cybersecurity

Inside the Backdoor Backlash
Import from wordpress feed
July 24, 2019
Taking a more tangible view of encryption backdoors US Attorney General William Barr gave a speech Tuesday morning in which he approached the topic of what he called “warrant-proof” encryption. His argument revives discussion about establishing encryption that can be broken or bypassed b

See publication

Tags: Cybersecurity

Get a Chair At the Big Table
Import from wordpress feed
July 22, 2019
Cyber security is increasingly becoming a top business concern for executives. However, at a board level, security discussions with the CISO are relatively rare.
The post Get a Chair At the Big Table appeared first on Alyssa Miller.

See publication

Tags: Cybersecurity

Conquering Impostor Syndrome
Import from wordpress feed
July 14, 2019
Seeing the massive contributions of others invokes a level of anxiety when seeking to establish they're own contributions. The infamous impostor syndrome rears its ugly head and hold people back from getting involved.
The post Conquering Impostor Syndrome appeared first on Alyssa Miller.

See publication

Tags: Cybersecurity

The Oxymoron of “Smart” Devices
Import from wordpress feed
July 13, 2019
What a hair straightener can teach us about IoT Security A recent article on Threat Posts provides details of a vulnerability in the Glamoriser Bluetooth Smart Straightener. The vulnerability is pretty significant. An attacker can fairly easily gain control of the hair straightener, turn the he

See publication

Tags: Cybersecurity

1 Board Membership
Treasurer, Board of Directors
Women of Security
November 17, 2019
Treasurer and Board of Directors

See publication

Tags: Cybersecurity, Leadership, Management

1 Industry Certification
Certified Information Security Manager
ISACA
March 15, 2010
Certified Information Security Manager (CISM) from ISACA

See publication

Tags: Cybersecurity, Leadership, Management

4 Keynotes
STEALING REALITY – DEEPFAKES USHERING IN A NEW PARADIGM OF ATTACKS
CypherCon
April 02, 2020
As a result of continuing advancements in neural networks, deep fake media has become increasingly convincing and easy to produce. Experts have warned of the impact this could have on elections and personal security. Additionally, deepfakes also pose very real threats to businesses and global markets, although these threats receive far less attention.

Hacker and Security evangelist Alyssa Miller will analyze the technology behind creating deep fake media, showing how Generative Adversarial Networks (GAN) create convincing fake videos and audio from very limited samples. She will examine research into both low-tech and AI/ML based detection methods and counter measures, including leveraging the same neural network approaches being used to create deep fakes to help detect them. She’ll continue by discussing the theory and research behind countermeasures such as Adversarial Perturbations and show how they can defeat facial recognition algorithms that deepfake generation relies on. Finally, Alyssa will present methods being developed to help certify the authenticity of real media.

See publication

Tags: Cybersecurity, Digital Disruption, Emerging Technology

Breaking and Entering: A Hacker’s Guide to Restoring Consumer Trust
SIM Wisconsin Chapter
October 08, 2019
As organizations seek to better monetize their business capabilities, requirements for data and privacy protection can seem inhibitive. How can technology be applied to uphold consumer trust and satisfaction while simultaneously supporting continued business evolution? Join real-world hacker and security evangelist Alyssa Miller as she identifies critical issues that have prevented businesses from adequately meeting the standards of security and privacy their customers have come to expect. Likewise, she will use her unique perspective to share a new strategic framework for designing cybersecurity defenses that ensure the protection of all forms of critical assets and enables new growth opportunities.

See publication

Tags: Big Data, Cybersecurity, Privacy

Inside-Out Security: Why We Should Build Castles Instead of Warehouses
CDW Protect SummIT - Philadelphia
August 19, 2019
Medieval castle builders made effective use of simple design principles to defend the most valuable assets inside. Centuries later, we’ve forgotten those valuable lessons as we defend our IT assets. From the moment we began enabling multi-user systems, we’ve approached how we defend our information in all the wrong ways. Join us for this session as we look at a completely different approach to designing security in our systems. We’ll explore new ways to understand what assets are, what threats they face, and how to leverage three basic types of defense mechanisms to effectively protect what we hold most dear. To add context to this new approach, we’ll draw on trends and lessons learned from thousands of security assessments and deployments across a vast portfolio of security technologies. All of this will show why it’s time to defend your crown jewels inside a fortified castle rather than a thinly constructed warehouse.

See publication

Tags: Cybersecurity, Leadership, Management

CDW Protect SummIT - February 2019
CDW Executive Summit Series
February 25, 2019
Delivered keynote on shifting the cyber security mindset from perimeter security strategies that have failed us for 60 years to an asset centric approach referred to as Inside-Out Security. Delivery was to an audience of executive business and security leaders.

See publication

Tags: Big Data, Cybersecurity, Leadership

6 Media Interviews
Secure Insights Highlighting Data Breaches And The Best Approach To Handle It
Sennovate
December 27, 2019
Unsure of why #databreach happens so often? Listen to my podcast with Alyssa Miller, Head of Information Security Solutions at CDW emphasizing her insights in data breaches and the way to handle it.

See publication

Tags: Cybersecurity, Management, Leadership

For SMBs, Cybersecurity Challenges Range from the Basic to the Sophisticated
BizTech Magazine
December 01, 2019
System misconfigurations are among the top cyberthreats facing small businesses. The cybersecurity risk that businesses face today is complex, and it demands a response that’s both sophisticated and fundamentally sound. Unfortunately, businesses are struggling on multiple fronts. The start of the new year is a good time to commit to getting it right.

See publication

Tags: Cybersecurity, Risk Management, Startups

From Hacking Toys To Threat Hunter And Soccer Ref
CyberCrime Magazine
October 13, 2019
CyberCrime Magazine published a feature article on Alyssa Miller in October of 2019. In this article, Alyssa discusses her passion for technology, how she got started in security and how her childhood curiosities turned into a lucrative cyber security career.

See publication

Tags: Cybersecurity, Entrepreneurship, Leadership

DtSR Episode 359 - Mind the Diversity Gap
Down The Security Rabbithole
August 20, 2019
This week, in the 2nd of two installments recorded live at Black Hat 2019, Alyssa Miller joins Rafal live to talk about some of the talks she's giving, and takes us back in time.

Highlights from this week's show include...

Rafal and Alyssa discuss the very real problems the lack of diversity in technology creates
A jab is taken at the TSA ...because it's just too easy
Alyssa revisits the 'castle analogy' for InfoSec and why it's so tough to get right
Much more fun... you'll have to listen in!

See publication

Tags: Cybersecurity, HR, Diversity and Inclusion

Earning a Place at the Table, Bringing Security to the Board Room
BrightTalk
August 06, 2019
As cyber security continues to evolve into a business priority, having conversations at the highest levels about how to address security threats becomes crucial. Hear from CDW’s Alyssa Miller as we discuss why it is so important for the CISO to have a place in the board room and ways the CISO can encourage this interaction and improve their effectiveness in working with the Board of Directors.

We’ll discuss common challenges and new ways to address those challenges ensuring the CISO is positioned to become that trusted advisor for the organization.

Join us as we discuss:
- The importance of discussing cyber security strategies at a board level
- What challenges prevent cyber security from being a regular topic for the board
- Approaches that CISOs may employ to help gain visibility with the board and more!

See publication

Tags: Cybersecurity, Leadership, Management

Human Factor Podcast - Episode 102
Human Factor Security
July 19, 2019
Jenny Radcliffe discusses getting started in cyber security, and a whole slew of other topics with Alyssa Miller

See publication

Tags: Cybersecurity, Leadership, Management

2 Panels
CISO's Toolbox: Strategies for Success
Bright Talk
August 06, 2019
What do CISOs need to be successful at their job? Discover the challenges CISOs are facing and the ways they are solving them.

Join security experts as they discuss the strategies, processes and technologies CISOs use to protect their organizations in the age of breaches:
- What keeps CISOs up at night
- Strategies for breach prevention
- Strategies for making the most of AI technology and human talent
- Coping with analyst fatigue
- Threats on the horizon
- Recommendations for strengthening security

See publication

Tags: Cybersecurity, Leadership, Management

Global Security: Combating Cyber Threats
NaplesNEXT
March 18, 2019
At NaplesNEXT Ideas Festival in 2019, Alyssa Miller appeared alongside former CIA Director John Brennan to discuss the state of global Cyber Security. It was a panel discussion moderated by Natasha Bertrand of The Atlantic. Alyssa and Mr. Brennan discussed strategies for cyber security defense as well as the pitfalls of offensive strategies around Cyber Security.

See publication

Tags: Business Strategy, Cybersecurity, Govtech

5 Speaking Engagements
Putting the Sec in DevOps
RESTCON
August 29, 2020
Putting the Sec in DevOps

See publication

Tags: Cybersecurity, Privacy, Risk Management

Losing Our Reality: How Deepfakes Threaten Businesses and Global Markets
RSA Conference 2020
February 26, 2020
As a result of continuing advancements in AI, deepfake media has become increasingly convincing and easy to produce. Experts have warned of the impact this could have on elections and personal security. However, the threats that deepfakes pose to businesses and global markets are often overlooked. This session will analyze those threats and present defense strategies business must consider.

See publication

Tags: Cybersecurity, Digital Disruption, Emerging Technology

THE DEATH OF TRUST: EXPLORING THE DEEPFAKE THREAT
BSides Vancouver Island
August 26, 2019
Deepfake media is becoming more common and easy to produce and it is expected to have a major impact on public discourse in upcoming elections. The use of Generative Adversarial Networks (GANs) has enabled the creation of incredibly lifelike artificial media. As a result, researchers and commercial organizations are scrambling to develop detection capabilities that can identify even the most convincing fakes.

In this session, we’ll describe the technical application of GANs when generating this media and highlight some of the most recent advances. We’ll also examine how the current limitations of this technology can be exploited by both low-tech and high order machine learning capabilities to detect deepfake media. Building upon limited published research, we’ll analyze the relative effectiveness of these techniques and explore how creators of false content could adapt in order to evade detection.

Additionally, we’ll consider those situations when detection may not always be enough. For instance, when the subject of a video claims it to be a fake or when there are national security concerns requiring us to confirm, with the highest degree of certainty, the veracity of the media. We will evaluate current technologies that seek to provide positive confirmation of digital media authenticity. Finally, we will propose further potential solutions and scrutinize their feasibility in helping maintain a high level of trust in digital media.

See publication

Tags: Cybersecurity, Emerging Technology, Leadership

Inside Out Security - Building Castles not Warehouses
Circle City Con
June 02, 2019
Medieval castle builders made effective use of simple design principles to defend the most valuable assets in their castles. Centuries later there are clearly lessons we’ve forgotten that could help when it comes to how we defend our IT assets. From the moment we started to enable multi-user systems, we’ve gone about defending our information in all the wrong ways. In this session we’ll look at a completely different approach to designing security into our systems. We’ll look at new ways to understand what assets are, what threats those assets face, and how to leverage three basic types of defense mechanisms to effectively protect what we hold most dear. Ultimately you’ll learn how to bring technology and offensive security practices together into a cohesive defense approach that works. It’s time to defend your crown jewels inside a fortified castle rather than a thinly constructed warehouse.

See publication

Tags: Cybersecurity, Leadership, Management

Breaking and Entering: A Hacker’s Guide to Restoring Consumer Trust
SIM Connect Live
May 16, 2019
As organizations seek to better monetize their business capabilities, requirements for data and privacy protection can seem inhibitive. How can technology be applied to uphold consumer trust and satisfaction while simultaneously supporting continued business evolution? Join real-world hacker and security evangelist Alyssa Miller as she identifies critical issues that have prevented businesses from adequately meeting the standards of security and privacy their customers have come to expect. Likewise, she will use her unique perspective to share a new strategic framework for designing cybersecurity defenses that ensure the protection of all forms of critical assets and enables new growth opportunities.

See publication

Tags: Big Data, Cybersecurity, Privacy

1 Webinar
A Day In The Life of a Pentester
BugCrowd
August 01, 2019
In this discussion hosted by Phillip Wylie of Bug Crowd, Alyssa Miller, Bryan McAninch and Wirefall discuss various aspects of Penetration Testing to help both beginning pen testers as well as business leaders understand the strategies and methodologies involved.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Radar

Blog

Opportunities

1 Keynote
Open: Cyber Security/Privacy Related Content

Location: Any City    Date Available: January 01st, 2020    Fees: 3,500 + Travel Expenses

Submission Date: January 03rd, 2020    Service Type: Service Offered

Alyssa is able to deliver engaging keynotes on a variety of Cyber Security related content. Everything from high level future analysis to detailed strategy discussions to addressing organizational issues such as talent or diversity challenges. Alyssa is an experienced speaker addressing audiences ranging from executive to extremely technical. She brings a unique mix of executive presence and technical acumen to craft a message that will resonate with your audience. Her speaking engagements span all manner of industry, thought leadership and entrepreneurial events.

Respond to this opportunity

Contact Alyssa Miller

Media Kit

Share Profile

Contact Info

  Profile

Alyssa Miller