Ismail Guneydas

Ismail Guneydas

Dallas-Fort Worth Metroplex
5K followers 500+ connections

About

I’m a global cybersecurity executive focused on shaping resilient, intelligent, and…

Experience

  • Tesla Graphic
  • -

  • -

    Dallas/Fort Worth Area

  • -

  • -

    Dallas/Fort Worth Area

  • -

    Dallas/Fort Worth Area

  • -

    Dallas/Fort Worth Area

  • -

Education

Licenses & Certifications

Join now to see all certifications

Volunteer Experience

  • Mosaic Counselling + Family Services Graphic

    Volunteer

    Mosaic Counselling + Family Services

    - 3 years 1 month

    Human Rights

  • The University of Dallas Graphic

    Cybersecurity Advisory Board

    The University of Dallas

    - Present 5 years 5 months

    Education

  • Texas A&M University-Commerce Graphic

    Industry Advisory Board Member

    Texas A&M University-Commerce

    - Present 1 year 9 months

    Education

    As a member of the Texas A&M Commerce Industrial Advisory Board, I will provide strategic guidance on industry trends and help align academic programs with real-world needs in industrial security.

Publications

  • Top 2016 Security Resolutions and Initiatives

    Watch our panel of security experts discuss the answers to hard questions like:
    What should we be striving to achieve over the next couple years?
    What are the resolutions and top initiatives for security professionals in 2016?

    Speakers: Ismail Guneydas, IT Security Vulnerability Manager, Kimberly-Clark; Trey Ford, Global Security Strategist, Rapid7; Scott Meyer, Sr. Systems Engineer, US Government; and Jack Voth, Sr. Director of Information Technology, Algenol Biotech Inc.

    Other authors
    See publication
  • Vulnerability Management As A Business Process

    Secure World Conference, Dallas, USA

    Being the victim of a security breach is the worst nightmare of most corporations and their security teams. Implementing an effective vulnerability management program is an important step toward reducing the potential for successful exploitation of vulnerabilities that exist within an organization’s IT infrastructure. In this presentation we cover building and managing an effective vulnerability management program that your executives will love.

  • Manage Mobile Security Incidents Like A Boss

    North Texas ISSA Conference, Dallas, USA

    In this talk we will go over the differences between traditional incident response process and mobile security incident response process. We then go into the details and provide answer for various challenges in mobile security incidents. We will give right methodologies that are already proven to work in mobile security incidents. Additionally we will go over right tools and processes to handle those incidents with examples. And the best thing is the tools are free... After this talk audience…

    In this talk we will go over the differences between traditional incident response process and mobile security incident response process. We then go into the details and provide answer for various challenges in mobile security incidents. We will give right methodologies that are already proven to work in mobile security incidents. Additionally we will go over right tools and processes to handle those incidents with examples. And the best thing is the tools are free... After this talk audience will have clear understanding of mobile security incidents, and processes and tools that could be used during those incidents.

  • Operation Sunrise: A Successful Battle Against Fake Customer Care Centers

    Bank of America Corporation Global Financial Crimes and Corruption 5th Annual Forum, Charlotte, USA

  • Incident Reponse In Large Complex Business Enviroments

    24th Annual FIRST Conference, Malta

  • Protecting Your Company's Brand

    Yahoo! Security Week, Sunnyvalle, USA

Honors & Awards

  • Best Security Team-2019 SC Awards

    SC Magazine

    The $18 billion consumer product goods company founded its Cyber Security & Assurance (CS&A) global information security program in 2015 after hiring its very first CISO. Since then, the team has been following NIST guidelines as it builds out its security ecosystem while developing a culture of cyber awareness.

    A lot is at stake. KC must protect more than 1,200 branded websites and mobile apps, over 90 mill locations, 56,000 employees and hundreds of thousands of devices.

  • IDEA Award

    Kimberly Clark

    IDEA Awards honor excellence in demonstrated innovative expertise

    Since 1982, the IDEA awards program has recognized the contributions of those whose work has resulted in a U.S.-issued patent, utility patent and patent applications. It also recognizes those ideas and inventions that aren’t patented. Some great ideas are turned into publications, while others are kept as trade secrets – those processes kept within our walls to maintain our competitive advantage in the marketplace.

  • ITS Honorable Mention Award

    Kimberly Clark

    Won the award (in the innovation category) "A Step Change in K-C Security" by increasing K-C data protection through improved vulnerability scans and threat detection as well as increased ITS security talent and security awareness.

  • Yahoo! Excellence Award

    Yahoo!

    Excellence is an award program that recognizes individuals for their contributions to the company. I received this award after series of successful operations I lead that eliminated very important threats against the company.

  • Yahoo! Hackovation Award

    Yahoo!

    Hackovation is an award program that recognizes people for their innovative ideas and intelligent risk taking. I received this award after an successful operation I lead that helped the biggest take down in Internet history against fake antivirus websites.

Recommendations received

8 people have recommended Ismail

Join now to view

View Ismail’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ismail directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content