Connor D. Mckenzie
Orlando, Florida, United States
6K followers
500+ connections
View mutual connections with Connor D.
Connor D. can introduce you to 10+ people at Cyderes
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Connor D.
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Accomplished cyber security executive with a track record of continued above market…
Articles by Connor D.
-
The Reset - Plumbing in an Agentic World
The Reset - Plumbing in an Agentic World
The Great Security Operations Reset. For the past two decades, the Security Operations Center (SOC) has been operating…
50
6 Comments
Activity
6K followers
-
Connor D. Mckenzie shared thisReposting for visibility 🚀- Ryan Luo Cy Khormaee - best in the business !Connor D. Mckenzie shared this🛡️ Seeking AI-Native Operator 🛡️ Aegis AI Security has gone from 2 to 20+ over the last year by hiring the best talent from Google, Meta, Amazon, and top AI labs. We're now looking for an AI-native operator to join us to take us to 200+. The Role: Run operations/finance for AegisAI as we scale into hundreds of employees and millions of revenue The Challenge: Do everything 10x faster with AI while the tech scales at AI-native speed The Vibe: Top talent org. Smart + mission driven teammates who work hard. Top of band comp. Location: SF/NYC/Remote If you love using all the latest AI tools, have a strong operations/finance background, and care about protecting users then I'd love to meet you. Apply here or DM me directly. #AINATIVE #FAANG #StartupHiring #SFTech #NYCTech
-
Connor D. Mckenzie reposted thisConnor D. Mckenzie reposted thisMy kids like playing a game called "Would You Rather..." It starts with a question like "Would you rather hop everywhere or skip everywhere?" and quickly devolves to the outrageous and hilarious as each child takes a turn. Here's a real-life "would you rather" question straight out of a Cyderes Meridian demo I attended last week. Tell me what you would choose. Would you rather . . . 1) Blindly address 80% of your low-risk users with MFA misconfigurations to meet a randomly determined metric OR 2) Stop what your doing right now to address your RISKIEST user who, by the way, works in legal, has privacy data, access to 5 risky assets and DOESN'T have MFA correctly configured Real life client answer: "We're need to take care of that user TODAY. Thanks for bringing that to our attention." Do you have that kind of visibility? Merdian does . . . let us show you! #entityfabric #cyderes #MFA #identity #IAM
-
Connor D. Mckenzie shared thisGreat ready by Joel Fulton, Ph.D. - could not agree more. Back to the basics!Explain it to me like I’m ten years old: what cutting edge researchers think about AI and CybersecurityExplain it to me like I’m ten years old: what cutting edge researchers think about AI and CybersecurityJoel Fulton, Ph.D.
-
Connor D. Mckenzie reposted thisI will be at ViVe - hope to see you there!Connor D. Mckenzie reposted thisJoin us next week in Los Angeles at ViVE to learn how Cyderes and CyberArk help healthcare organizations secure privileged access for regulated, high-impact environments, where uptime, patient safety, and compliance aren’t optional. They’re critical. When patient care is on the line, privileged access can’t be generic. We'll see you there!
-
Connor D. Mckenzie shared thisCrazy. Should not be surprising - but what does this set for precedent for all future legal cases? Especially in our space (cyber) , we will see the first major fine or critical flaw caused by Agents or LLMs, and everything will change, again… 🤠Connor D. Mckenzie shared thisA federal judge just delivered a wake up call for anyone using AI for sensitive work ⏰⏰⏰ In **United States v. Heppner** (delivered early February)Judge Jed Rakoff ruled that documents and chat transcripts generated using Anthropic’s Claude are **not protected by attorney-client privilege or work-product doctrine** - even when created to prepare for conversations with lawyers. 📄The case In United States v. Heppner, a defendant generated strategy documents with an AI assistant after receiving a subpoena and later shared them with his lawyers. The court said the materials were discoverable because they were created outside a confidential attorney-client relationship, and disclosure to the AI broke privilege. ‼️Why this is a big moment • Prompts can be evidence • Preparing for your lawyer ≠ privileged • “Feels private” doesn’t matter legally • Consumer AI ≠ confidential environment • AI governance is now legal risk 👨⚖️Will it reach SCOTUS? Not soon. But once courts start splitting on whether AI interactions can ever be privileged, it likely will. ⤵️The shift is simple: Your prompts are becoming records.
-
Connor D. Mckenzie reposted thisConnor D. Mckenzie reposted thisUnification creates clarity. Context drives execution. We’re developing the next phase of our offerings with Lucidum's entity fabric as the foundation. It closes a critical gap, bringing fragmented data together and turning it into clear, actionable execution. By stitching together what security teams can and can’t see into a single pane of glass, they break down silos and reduce manual work that pulls them away from real security outcomes. Connected understanding makes imminent risk unmistakable and action unavoidable. Our CEO, Chris Schueler, shares how entity fabric improves the way we support clients and stop threats.
-
Connor D. Mckenzie shared thisResharing for visibility - Cy Khormaee 👌Connor D. Mckenzie shared thisAmazing book alert! If you want to understand how to win in the AI economy, check out Cy Khormaee’s book, The AI Mandate: Winning in the New Economy. Cy lived through this revolution at companies like Microsoft, Google, Lightspeed and Aegis AI Security. Here are some of the topics he covers: -In the early stages of this AI revolution, there are still clear limitations. -A new category of AI gatekeepers will emerge to control the flow and access of information. -Companies must carefully navigate the classic build vs. buy vs. hire decision. -There’s still a strong need for smart creatives. -We’re entering a new frontier of the AI economy, where only specific use cases will ultimately prevail. Loved that he even tossed in a few surf analogies 🌊 I have a couple copies. If you're a CIO or CISO, DM me and I'll send over a copy. It's also available on Amazon: https://lnkd.in/g4VXqEaW #AIMandate #AIEconomy #AIRevolution #AILeadership #FutureOfWork #BuildVsBuy #TechStrategy #DigitalTransformation #SmartCreatives #AIInnovation #BusinessLeadership #EnterpriseAI #AIFuture #TechTrends #DataDriven #AIPlaybook #ExecutiveReading #MustReadBooks #SurfAndStrategy #TechAndTides Aegis AI Security Ryan Luo Foundation Capital David Reese Tim Dawson Margarita Rivera Jalen Byford Albert Oriol Nick Reva Brad C. Jesse Jones Eric Firer Lock Langdon Shyam Bhojwani Daniel Lew Hayden Delgado Michael Camp, Bentley Dan Holland Badr Salmi Adam R. Accel
-
Connor D. Mckenzie shared thisEvery day, conversations with CISOs and security practitioners reveal the similarities in our challenges and the common threads that unite us. Our team, including Lana Knop, Joel Fulton, Ph.D., Rory Shannon, John Kuhn, Steve Meckl, Spencer Ingram, Andy Walker CISM, CISA, CRISC, ITIL & Chris Schueler, along with many others, is dedicated to building a shared future. We will achieve this alongside our customers and partners by maintaining a core theme in our development: be the plumbers. 🚀The Reset - Plumbing in an Agentic WorldThe Reset - Plumbing in an Agentic WorldConnor D. Mckenzie
-
Connor D. Mckenzie shared thisLooking to hire a strong leader in our strategy division to run technical alliances and partnerships. Sharing for my network, please feel free to reach out direct or apply. 🚀
-
Connor D. Mckenzie liked thisConnor D. Mckenzie liked thisAMERICAN BINARY welcomes ACM Turing Award winner Whitfield Diffie to our advisory board of cryptographers. Whitfield is recognized as a pioneer of modern cryptography and a co-inventor of public-key cryptography and the Diffie-Hellman key exchange. His work is ubiquitous with the security of the Internet itself. With the end of Classical Encryption arriving as soon as 2029 based on recent statements from Google, the transition period to post-quantum encryption is being compressed to 4 years instead of 10. Within this shortened transition period, American Binary is leading in the transition to non-hybrid full PQC encrypted network security. If your organization cannot afford to be wrong about cybersecurity, ask us about our fully post-quantum VPN that conforms to National Security Agency (NSA) CNSA 2.0 requirements for National Security Systems, a market-first-and-only. https://lnkd.in/gZwXx_aVWhitfield Diffie Joins American Binary's Advisory BoardWhitfield Diffie Joins American Binary's Advisory Board
-
Connor D. Mckenzie liked thisConnor D. Mckenzie liked thisWhy the middle class stays broke! I interviewed the $50 million man in Chicago, John Cerasani, and I asked him: - How he became wealthy. I also asked him - What keeps people broke in today’s world And how someone can make the leap from 9 to 5 to becoming a business owner.
-
Connor D. Mckenzie liked thisConnor D. Mckenzie liked thisHad the chance to connect with a number of top CrowdStrike partners this week in Miami- these are my biggest takeaways about AI, platforms and the coming pile-up of vulnerabilities: https://lnkd.in/eMY8kUcP with great insights from Jim Finn - Mark Grassmann - William Fryberger - John Hurley - Ryan Morris - Christopher Ebley - Connor D. Mckenzie - Mark Thornberry - Justin Tibbs Great to connect with Daniel Bernard & Amanda Adams this week too. Full coverage from CrowdStrike’s Americas Partner Symposium on CRNCrowdStrike Partners: AI Vulnerability Surge Means It’s Time To ‘Pick A Platform’ In SecurityCrowdStrike Partners: AI Vulnerability Surge Means It’s Time To ‘Pick A Platform’ In Security
-
Connor D. Mckenzie liked thisConnor D. Mckenzie liked thisI'm proud to announce Amanda Adams’ promotion to SVP of Global Alliances at CrowdStrike. I met Amanda shortly after joining CrowdStrike. She was leading Americas Alliances. Within months I understood: Amanda doesn't manage partnerships. She builds them into businesses. Since then I've watched her: - Close major deals with EY, Kroll, Accenture, HCLTech, Wipro and more - Build the leadership bench behind our fastest-growing alliances teams - Drive program realignment across sourcing, margins, and new logo incentives - Grow, lead, and inspire others to be their very best Congratulations, Amanda! You've earned every bit of this, and it's an honor to work with you.
-
Connor D. Mckenzie liked thisWe need someone to help us with $ :) Please reach out if you have a strong background in finance and want to be a part of an early stage startup in the AI era!Connor D. Mckenzie liked this🛡️ Seeking AI-Native Operator 🛡️ Aegis AI Security has gone from 2 to 20+ over the last year by hiring the best talent from Google, Meta, Amazon, and top AI labs. We're now looking for an AI-native operator to join us to take us to 200+. The Role: Run operations/finance for AegisAI as we scale into hundreds of employees and millions of revenue The Challenge: Do everything 10x faster with AI while the tech scales at AI-native speed The Vibe: Top talent org. Smart + mission driven teammates who work hard. Top of band comp. Location: SF/NYC/Remote If you love using all the latest AI tools, have a strong operations/finance background, and care about protecting users then I'd love to meet you. Apply here or DM me directly. #AINATIVE #FAANG #StartupHiring #SFTech #NYCTech
Experience
Recommendations received
9 people have recommended Connor D.
Join now to viewView Connor D.’s full profile
-
See who you know in common
-
Get introduced
-
Contact Connor D. directly
Other similar profiles
Explore more posts
-
Peter Schawacker
Project Aramis • 42K followers
🔥 The Margin Crisis is Real Margins across MSSPs and MDRs are collapsing. Labor costs are rising 15–25% YoY, while client fees stay flat. Every extra hour of analyst overtime erodes profitability 📉. Every departure costs 1.5–2x salary in replacement costs. This is not sustainable. Nearshore staffing offers a way out — 40–60% savings on Tier 1/2 roles while keeping SLAs intact. Read how:
7
3 Comments -
Randall Hettinger
Horizon3.ai • 5K followers
According to SentinelOne’s 50+ Cloud Security Statistics for 2025: - 45% of data breaches now happen in the cloud - 68% of organizations cite cloud account takeovers as one of their biggest risks - More than 80% of breaches involve compromised credentials, misconfigurations, or insider misuse At Permiso, we’ve reported extensively on how threat actors are exploiting these gaps—using valid human and non-human credentials to move laterally, escalate privileges, and operate undetected across cloud, SaaS, and IAM environments. What’s being missed: - Role assumptions across accounts - Privilege escalations in SaaS platforms - Abuse of service accounts and automation tokens - Lateral movement across federated and cloud-native identities Identity has become the most targeted and least monitored layer of the modern enterprise. And attackers know it. If you’re thinking about how to strengthen visibility and detection across your identity surface, take a look at the Permiso platform. It’s built to provide real-time insight into identity behavior across all environments—cloud, SaaS, and CI/CD—for both human and non-human identities. 👉 https://lnkd.in/g7iRM47M Feel free to DM me if you’d like a demo or a private threat briefing on what we’ve been seeing.
5
-
Stephen Thomas
Center for Internet Security • 13K followers
U.S. SLTT organizations are working hard to strengthen their cybersecurity posture, even with limited resources. The MS-ISAC plays a critical role by giving under‑resourced communities access to threat intelligence, 24x7x365 U.S.-based SOC monitoring, and affordable tools that support operational resilience. Read more about how these services help close resilience gaps across the country. #MSISAC #SLTTCyber #CyberDefense
6
-
Carmine Corridore
Underdog Cyber Defense • 2K followers
Too many businesses assume their IT provider is handling cybersecurity until it’s too late. Cybersecurity today is far too complex to be treated as an “add-on.” What you need is a partner who proactively combines IT with a security-first approach. Learn how one business discovered the hard way why a trusted cybersecurity partner makes all the difference. Read the full story here: https://lnkd.in/eBUSiYZy
2
-
Raph Soeiro
ScaleOps • 9K followers
🚨 Vulnerabilities don’t take holiday breaks, nor does Axonius. MongoBleed (CVE-2025-14847) is a harsh reminder: the real risk isn’t the CVE, it’s not knowing where you’re exposed. This flaw lets unauthenticated attackers leak sensitive data straight from MongoDB memory. That’s exactly where Axonius comes in 💪🏻 🔍 Find every MongoDB instance across cloud, on-prem, and shadow environments 🚦 See which ones are vulnerable and exposed 📊 Prioritize and track remediation with real context CVEs come and go. Unknown assets are forever. Read the full breakdown + how Axonius helps 👇(link in comments)
1
1 Comment -
Sanjiv Cherian
Microminder Cyber Security • 22K followers
$4.88M per breach. 258 days to contain. 62% of alerts ignored. “Which 5% of alerts carry 95% of your business risk?” If your team can’t answer that, you're not protecting your organization You’re just hoping your luck holds. After two decades in cybersecurity from OT networks to financial systems, one truth keeps surfacing: The problem isn’t visibility. It’s clarity. Your stack can have it all: ✅ SIEM. ✅ EDR. ✅ NDR. ✅ UEBA. ✅ Threat intel. And still miss the one signal that costs you millions. 📊 The hard numbers: Average breach cost (2024): $4.88M Time to detect + contain: 258 days 62% of alerts ignored due to fatigue SOCs juggle 90+ tools, but lack true insight Turnover > 25% annually from burnout We keep investing in controls but judgment remains the missing control. 🧠 What the best teams do differently: 🔍 Risk-Based Triage – Prioritize based on revenue, safety, compliance 🔗 OT/IT Correlation – Eliminate silos; attackers don’t respect architecture 📌 Asset Criticality Mapping – What’s truly business-critical guides the queue 🧠 AI Signal Extraction – Use automation to reduce noise, not create more 🎯 Kill Chain Scoring – Understand intent, not just indicators 💼 What that unlocks: A global energy provider shifted from reactive to real-time by deploying: Contextual enrichment Asset mapping AI triage The result? ✅ 78% alert volume reduction ✅ 46% faster MTTD ✅ $3.1M saved annually in cost of response + analyst efficiency 🧭 Ask yourself again: “Which 5% of alerts carry 95% of your risk?” If you don’t know, you’re not in control. You’re reacting hoping today isn’t the day. Cybersecurity isn’t about collecting alerts. It’s about knowing what to do when they light up. That’s the kind of leadership modern SOCs demand. #CyberSecurity #CISO #SecurityLeadership #SOC #RiskBasedAlerting #AIInSecurity #OTSecurity #SignalOverNoise #MITREATTACK #IncidentResponse #CyberResilience #CyberROI
261
31 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content