Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Bob Carver, CISM, CISSP, MS

Grapevine, United States

Cybersecurity Management | Cyber Resiliency | Strategy | Threat Hunting | Incident Management | Threat Intelligence | Creatively Find and Solve Problems

Bob Carver, CISM, CISSP, MS Points
Academic 0
Author 8
Influencer 672
Speaker 31
Entrepreneur 0
Total 711

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Areas of Expertise

AI
Analytics
Blockchain
Business Strategy 31.22
Cybersecurity 31.46
Emerging Technology 30.05
FinTech 30.06
Future of Work
Innovation
IoT
Privacy
Risk Management 33.14
Security 30.07
Supply Chain 30.03

Industry Experience

Financial Services & Banking
Telecommunications

Publications

5 Article/Blogs
Cybersecurity Predictions and a Wishlist for 2023
LinkedIn
December 31, 2022
2022 has been a year of continued cybercrime and nation state activity. What can we expect in the future and what would we like to make happen in the future to help counter these trends.

See publication

Tags: Cybersecurity, Security, Supply Chain

Cybersecurity Predictions and a Wish List for 2020 by Bob Carver
LinkedIn, Peerlyst
December 23, 2019
Cybersecurity Predictions and Wish List

See publication

Tags: Cybersecurity, Emerging Technology, Risk Management

IMF Spring Meeting 2019 Cybersecurity: Now and In the Future. Are We Ready?
linkedin
April 16, 2019
"Click on paragraph above to launch URL that has Video."

See publication

Tags: Cybersecurity, FinTech, Risk Management

Cybersecurity Predictions and a Wish List for 2019
linkedin
December 28, 2018
As in recent times, the cyber threats will continue to get worse before they get better. Those that think “good enough” security or risk management will be sorely disappointed in the large gaps they will leave open for the cybercriminals and nation-state actors to easily breach and compromise their enterprise.

See publication

Tags: Cybersecurity, Risk Management

Cybersecurity: The Need for SPEED
LinkedIn, Peerlyst
July 20, 2017
If you look at a range of recent security industry reports, you’ll see varying times quoted for how long it takes criminals and bad actors to exploit your network and exfiltrate data, and how long it takes to discover and remediate a breach.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

3 Keynotes
IMF - Opening Keynote Speaker on Cybersecurity & Expert Panel - "Approaches to Building Cyber Resilience"
International Monetary Fund
December 04, 2019
International Monetary Fund - Opening Keynote speaking in front of banking governors (Federal Reserve Equivalents)

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Keynote Speaker Cybersecurity IMF Spring 2019 Meeting - 190 Countries
IMF International Monetary Fund
April 11, 2019
Presentation “Cybersecurity: Now and in the Future. Are We Ready?” Presentation tailored for bankers, fintech, regulators and bank governors.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Keynote Presenter, Expert Panel - EU Cyber Summit Dublin, Ireland
EU Cyber Summit 2018
October 24, 2018
Presentation - Cybersecurity Now and in the Future. Are We Ready?

Expert Panel - How Do You Be Prepared for the Inevitable - Cyber Resilience
Tailored for cybersecurity leaders, practioners, decision makers.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

1 Panel
CES2020 Las Vegas - Focusing on Security in Product Innovation - Expert Panel
CES 2020/CTA Consumer Electronic Show/Consumer Technology Association
January 09, 2020
Other people on the panel:
Moderator Mike Bergman VP - CTA
Dave Konetski - VP/Fellow Dell
Wendi Whitmore - VP IBM Security

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

1 Video
Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild
youtube
September 29, 2018
Brief Discussion on the new persistent malware seen in the wild that infects the UEFI (previous known as BIOS) that can survive a re-image and full disk wipe. APT Advanced Persistent Threat

See publication

Tags: Cybersecurity

Thinkers360 Credentials

2 Badges

Blog

Opportunities

Contact Bob Carver, CISM, CISSP, MS

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Bob Carver, CISM, CISSP, MS