“Peter is a dedicated and talented security professional. He is thorough, driven and results-oriented. The quality of the work that he delivers is exceptional and he drives those around him to deliver at that same level of quality.”
About
Peter Tran is a former NCIS Special Agent and globally recognized cyber security, breach…
Activity
-
Big news (and very well deserved!) 👏 Vineeta Puranik, Chief Product & Technology Officer at SmartBear, has been named a finalist for the AI…
Big news (and very well deserved!) 👏 Vineeta Puranik, Chief Product & Technology Officer at SmartBear, has been named a finalist for the AI…
Liked by Peter Tran
-
What an incredible day at the Society for Information Management (SIM) Central CT conference - Direction of the Industry: Leading in the Age of…
What an incredible day at the Society for Information Management (SIM) Central CT conference - Direction of the Industry: Leading in the Age of…
Liked by Peter Tran
-
Breakout sessions brought the conversation from strategy to execution. From AI security and risk management to practical applications across…
Breakout sessions brought the conversation from strategy to execution. From AI security and risk management to practical applications across…
Liked by Peter Tran
Experience
Education
-
Harvard Kennedy School
-
-
Executive graduate program in international and domestic cyber security and resilience of critical infrastructure and private sector integration of technology for strategy, policy, and management.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Licenses & Certifications
-
-
Cryptocurrency/Blockchain Applications
Massachusetts Institute of Technology
IssuedCredential ID 14609775 -
-
Volunteer Experience
-
Cyber Security Awareness
National Cyber Security Alliance
- 7 years 4 months
Science and Technology
NSCA partners with industry leaders such as EMC, Cisco, Verizon, VISA and Lockheed Martin and public sector partners such as the U.S. Department of Homeland Security as primary drivers of NCSAM, now in its eighth year. Each year, NCSAM is a multi-faceted effort to disseminate security messages and information through grassroots, traditional and social media channels.
-
Mentor
Outside Counsel
- 6 years
Science and Technology
Outside Counsel helps the world’s most progressive organizations empower their top performers by matching them with the right mentors and providing tools to optimize these relationships. Based on our members’ specific objectives, we carefully select a good match from our hand-screened network of world-class mentors. We then provide both protégé and mentor with the support they need to get the most out of their six month partnership.
-
National Cyber Security Excellence Partner (NCEP) (RSA)
National Cyber Security Center of Excellence (NCCoE)
- 4 years 10 months
Science and Technology
Established in 2012 through a partnership between NIST, the State of Maryland and Montgomery County, the National Cybersecurity Center of Excellence (NCCoE) is dedicated to furthering innovation through the rapid identification, integration and adoption of practical cybersecurity solutions.
The mission of the NCCoE is to collaborate with innovators to provide real-world cybersecurity capabilities that address business needs. An NCEP partner’s investment may take the form of physical…Established in 2012 through a partnership between NIST, the State of Maryland and Montgomery County, the National Cybersecurity Center of Excellence (NCCoE) is dedicated to furthering innovation through the rapid identification, integration and adoption of practical cybersecurity solutions.
The mission of the NCCoE is to collaborate with innovators to provide real-world cybersecurity capabilities that address business needs. An NCEP partner’s investment may take the form of physical infrastructure such as hardware and software components, intellectual knowledge including best practices and lessons learned, or physically or logically colocated personnel who work side by side with federal staff. -
Advisor & Mentor
Syracuse Student Sandbox
- 6 years
Science and Technology
The Syracuse Student Sandbox is a unique business incubator that gives aspiring student entrepreneurs the resources to make their visions a reality. The objective of the Sandbox is to accelerate the process of ideation, development and deployment through mentoring and coaching.
-
RSA Student Internship Program
Senator Leahy Center for Digital Investigation
- 4 years 11 months
Science and Technology
The Senator Leahy Center for Digital Investigation (LCDI) is a world-class laboratory designed to international standards, focused on establishing and assisting with public and private sector initiatives surrounding cybercrime, digital forensics and information assurance.
As a leader in the Digital Forensic higher education arena, Champlain College offers students an opportunity to learn by participating in professional-level lab work at both the undergraduate and graduate levels. -
Executive Member -Cyber Resilience Think Tank
Mimecast
- Present 7 years 5 months
Science and Technology
The Cyber Resilience Think Tank is an independent group of industry experts dedicated to understanding the cyber resilience challenges that organizations across the globe face, and together, providing guidance on possible solutions.
-
mWISE Program Committee
Mandiant
- Present 4 years 3 months
Science and Technology
Mandiant Worldwide Information Security Exchange (mWISE) – a new portfolio of event programming. As Cyber Defense Summit has done for 11 years, mWISE will bring leaders from industry, government, and academia together from across the security community to address the challenges of today’s threat landscape. mWISE will be open to the security community at large and not just Mandiant customers. We will gather to share knowledge and collaborate with one another unbounded by vendor influences.
Publications
-
Privileged Account Exploits Shift the Front Lines of Cyber Security
CyberArk Software, Ltd.
CyberArk’s threat report provides an expert’s vantage point into targeted cyber attacks by tapping into the experiences of seasoned threat investigators at five firms including RSA -The Security Division of EMC renowned for detecting, analyzing and remediating serious cyber security incidents.
Other authors -
-
10 Tips To Improve Your Security Incident Readiness & Response
RSA - The Security Division of EMC
Organizations’ incident readiness and response often falls short in ten areas that span people, processes and technology. By tackling these shortcomings, security professionals can reduce risk by providing early warnings of potential problems, rather than scrambling to chase the latest threat.
Other authors -
-
Building an Intelligence-driven Security Operations Center
RSA - The Security Division of EMC
A technology revolution is underway in security to help information security teams combat advanced cyber threats more effectively, despite resource constraints. A new generation of security tools uses innovative techniques to collect and analyze massive amounts of data: data from computers, mobile devices and servers; data from internal networks, including the composition and contents of transmitted packets; and data from external sources about attacks on other organizations and the methods…
A technology revolution is underway in security to help information security teams combat advanced cyber threats more effectively, despite resource constraints. A new generation of security tools uses innovative techniques to collect and analyze massive amounts of data: data from computers, mobile devices and servers; data from internal networks, including the composition and contents of transmitted packets; and data from external sources about attacks on other organizations and the methods used.
Other authorsSee publication -
Taking Charge of Security in a Hyperconnected World
RSA - The Security Division of EMC
The boundaries have blurred between internal and external networks. Employees increasingly use their own devices, home networks and public Wi-Fi to log into work. Partners, customers and vendors have greater access to corporate-run IT resources, and the integration of private networks with public clouds has culminated in hybrid clouds with dynamic and complex boundaries. In a world where digital boundaries are ever-changing and hard to define, building higher walls and stronger perimeter…
The boundaries have blurred between internal and external networks. Employees increasingly use their own devices, home networks and public Wi-Fi to log into work. Partners, customers and vendors have greater access to corporate-run IT resources, and the integration of private networks with public clouds has culminated in hybrid clouds with dynamic and complex boundaries. In a world where digital boundaries are ever-changing and hard to define, building higher walls and stronger perimeter defenses, while still necessary, are inadequate to ensure security.
Other authorsSee publication -
Cyber Security Legal Business Known Unknowns
Legal Business with Kroll
Combating cyberattacks on law firms is complicated by the lack of hard information and the shadowy nature of perpetrators. But, reports Legal Business, law firm tech chiefs and security specialists agree the threat is rapidly growing
Other authors -
-
Preparing for the Inevitabe - New RSA Services Help Customers Defend Against Advanced Threats
RSA - The Security Division of EMC
See publicationToday is a realization of an evolution that has been long past due since the days of the “Moonlight Maze” attacks in the late 1990s. What the security community has come to realize over the past decade is that the advanced threat is not just isolated to critical government systems, nor is it simply a matter of “one and done” attacks that have a single intent. This is why we’ve created RSA Next Generation Security Operations Center (SOC) design and implementation services approach.
-
RSA Speaking of Security Advanced Security Operations & Cyber Defense
RSA - The Security Division of EMC
RSA's Advanced Cyber Defense (ACD) Practice helps organizations successfully implement high-value advanced security solutions leveraging RSA's agility in technology innovation and world class security practitioners to develop comprehensive information security operations and programs. Our chatter blog is a collection of thought provoking dialogue on advanced threats, incident response, forensic analysis, attack techniques, tactics and exploitation methods as well as active cyber defense topics…
RSA's Advanced Cyber Defense (ACD) Practice helps organizations successfully implement high-value advanced security solutions leveraging RSA's agility in technology innovation and world class security practitioners to develop comprehensive information security operations and programs. Our chatter blog is a collection of thought provoking dialogue on advanced threats, incident response, forensic analysis, attack techniques, tactics and exploitation methods as well as active cyber defense topics of interest to the cyber community.
Other authors -
-
Introducing RSA Advanced Cyber Defense Services – Podcast #239
RSA Speaking of Security Blogs/Podcasts
RSA’s Peter Tran talks to Speaking of Security about new Advanced Cyber Defense Services being offered to help orgnanizations in North America and Europe create proactive strategies for defending their digital assets against a wide range of threats, and provide incident response expertise designed to help customers react aggressively to active attacks and critical incidents.
Other authors -
-
Breaking Down Barriers to Collaboration in the Fight Against Advanced Threats
RSA - The Security Division of EMC
Determined cyber adversaries have proven over the past couple of years that they can defeat the protections of even the world’s most sophisticated security organizations. They’re compiling custom malware to evade signature-based detection tools such as antivirus scanners. They’re using social engineering techniques on unsuspecting employees to circumvent organizations’ perimeter defenses. They’re covering their tracks within systems and leveraging techniques they have perfected across multiple…
Determined cyber adversaries have proven over the past couple of years that they can defeat the protections of even the world’s most sophisticated security organizations. They’re compiling custom malware to evade signature-based detection tools such as antivirus scanners. They’re using social engineering techniques on unsuspecting employees to circumvent organizations’ perimeter defenses. They’re covering their tracks within systems and leveraging techniques they have perfected across multiple targets.
Other authorsSee publication -
Technology Today - Highlighting Raytheon's Technology
Raytheon Company
INFORMATION TECHNOLOGY
The Raytheon Excellence in Engineering and Technology (EiET) Awards took place at The Smithsonian’s National Air and Space Museum in Washington, D.C., in March, 2010. The awards are Raytheon’s highest technical honor. They recognize individuals and teams whose innovations, processes or products have or will have a substantial impact on the company’s success, and the success of Raytheon customers.
Award recipients included the Raytheon's Computer Emergency…INFORMATION TECHNOLOGY
The Raytheon Excellence in Engineering and Technology (EiET) Awards took place at The Smithsonian’s National Air and Space Museum in Washington, D.C., in March, 2010. The awards are Raytheon’s highest technical honor. They recognize individuals and teams whose innovations, processes or products have or will have a substantial impact on the company’s success, and the success of Raytheon customers.
Award recipients included the Raytheon's Computer Emergency Response Team (RayCERT) led by Peter Tran for developing an innovative, industry-leading approach to minimize the risk and impact of cyberattackers on providers of national critical infrastructure.
Other authors -
Patents
-
Smart Authentication (Trademark)
Issued US Trademark Registration # 2533110 Serial # 75825244
See patentIC 009. US 021 023 026 036 038. G & S:Computer hardware and computer software for providing network security which utilizes biometric identification verification technology, computer encryption, and wireless cellular digital packet data CDPD hardware and software to provide end users secured telecommunications, identity protection, secured electronic commerce, and physical access control.
Projects
-
Port of Los Angeles Cyber Security Operations Center
- Present
See projectThe Port of Los Angeles received the American Association of Port Authority (AAPA) 2014 Information Technology Award for its innovative Cyber Security Operations Center (CSOC). As a primary cyber security design and implementation partner, this was a complete "green field" project comprised of state of the art security operations technologies, logical/physical design, process, compliance, work flow and staffing architecture and implementation designed to protect harbor critical information and…
The Port of Los Angeles received the American Association of Port Authority (AAPA) 2014 Information Technology Award for its innovative Cyber Security Operations Center (CSOC). As a primary cyber security design and implementation partner, this was a complete "green field" project comprised of state of the art security operations technologies, logical/physical design, process, compliance, work flow and staffing architecture and implementation designed to protect harbor critical information and logistics systems against advanced cyber threats.
Recommendations received
18 people have recommended Peter
Join now to viewMore activity by Peter
-
As geopolitical tensions escalated, wiper attacks emerged and evolved into one of the most destructive cyber threats—particularly as APT groups…
As geopolitical tensions escalated, wiper attacks emerged and evolved into one of the most destructive cyber threats—particularly as APT groups…
Liked by Peter Tran
-
“Shift left” worked...until it didn’t. AI is speeding up software development – and exposing cracks in how we approach quality. Dan Faulkner, CEO…
“Shift left” worked...until it didn’t. AI is speeding up software development – and exposing cracks in how we approach quality. Dan Faulkner, CEO…
Liked by Peter Tran
-
We are partnering with Apidays for a live webinar, Wednesday, April 22 to explore how teams can adopt AI-driven workflows while maintaining control…
We are partnering with Apidays for a live webinar, Wednesday, April 22 to explore how teams can adopt AI-driven workflows while maintaining control…
Liked by Peter Tran
-
Get ready for the latest release of CCaR™. Available in May 2026, CCaR™ AI brings decision intelligence, intelligent assistance, and proactive…
Get ready for the latest release of CCaR™. Available in May 2026, CCaR™ AI brings decision intelligence, intelligent assistance, and proactive…
Liked by Peter Tran
-
SUCH a great update to Swagger. If you care about API governance, check it out
SUCH a great update to Swagger. If you care about API governance, check it out
Liked by Peter Tran
-
I remember seeing this beautiful hallway that leads to a series of meeting rooms (including the room that hosted a G8 Summit so long ago that Russia…
I remember seeing this beautiful hallway that leads to a series of meeting rooms (including the room that hosted a G8 Summit so long ago that Russia…
Liked by Peter Tran
-
Yesterday’s Vistage Worldwide, Inc. DMV Executive Summit was a powerful reminder that leadership is never a solo journey but rather built through…
Yesterday’s Vistage Worldwide, Inc. DMV Executive Summit was a powerful reminder that leadership is never a solo journey but rather built through…
Liked by Peter Tran
-
Excited to share that I’ve joined Miggo Security to lead our Go-To-Market as VP of Sales. One thing has become clear recently: the way we’ve…
Excited to share that I’ve joined Miggo Security to lead our Go-To-Market as VP of Sales. One thing has become clear recently: the way we’ve…
Liked by Peter Tran
-
With the deepest gratitude to Microsoft for 10+ years working at a world-class organization surrounded by some of the most talented people in the…
With the deepest gratitude to Microsoft for 10+ years working at a world-class organization surrounded by some of the most talented people in the…
Liked by Peter Tran
-
We are partnering with Apidays for a live webinar, Wednesday, April 22 to explore how teams can adopt AI-driven workflows while maintaining control…
We are partnering with Apidays for a live webinar, Wednesday, April 22 to explore how teams can adopt AI-driven workflows while maintaining control…
Liked by Peter Tran
-
Great stuff from Vineeta Puranik on the quality crisis quietly unfolding in the AI SDLC - and what to do about it! https://lnkd.in/eUJvCQ_r
Great stuff from Vineeta Puranik on the quality crisis quietly unfolding in the AI SDLC - and what to do about it! https://lnkd.in/eUJvCQ_r
Liked by Peter Tran
-
As teams scale automation, test data doesn't always keep up. Results end up spread across CI/CD pipelines, tools, and reports, making it harder to…
As teams scale automation, test data doesn't always keep up. Results end up spread across CI/CD pipelines, tools, and reports, making it harder to…
Liked by Peter Tran
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Peter Tran in United States
712 others named Peter Tran in United States are on LinkedIn
See others named Peter Tran