Peter Tran

Peter Tran

Boston, Massachusetts, United States
17K followers 500+ connections

About

Peter Tran is a former NCIS Special Agent and globally recognized cyber security, breach…

Activity

Join now to see all activity

Experience

  • InferSight LLC Graphic

    InferSight LLC

    Greater Boston Area

  • -

    Greater Chicago Area

  • -

    Atlanta Metropolitan Area

  • -

    Greater Boston

  • -

    Washington, District of Columbia, United States

  • -

    Greater Boston

  • -

    Wellesley, Massachusetts, United States

  • -

    Boston, Massachusetts, United States

  • -

    Greater Boston

  • -

    Greater Philadelphia

  • -

    Greater Boston Area

  • -

    Greater Boston Area

  • -

    Greater Boston Area

  • -

    Greater Boston Area

  • -

    Northern Virgina

  • -

    Northern Virginia

  • -

    Washington Field Office - District of Columbia

  • -

    Northern Virginia

  • -

    Washington District of Columbia/Northern Virginia

Education

  • Harvard Kennedy School Graphic

    Harvard Kennedy School

    -

    -

    Executive graduate program in international and domestic cyber security and resilience of critical infrastructure and private sector integration of technology for strategy, policy, and management.

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

  • -

    -

Licenses & Certifications

Volunteer Experience

  • National Cyber Security Alliance Graphic

    Cyber Security Awareness

    National Cyber Security Alliance

    - 7 years 4 months

    Science and Technology

    NSCA partners with industry leaders such as EMC, Cisco, Verizon, VISA and Lockheed Martin and public sector partners such as the U.S. Department of Homeland Security as primary drivers of NCSAM, now in its eighth year. Each year, NCSAM is a multi-faceted effort to disseminate security messages and information through grassroots, traditional and social media channels.

  • Outside Counsel Graphic

    Mentor

    Outside Counsel

    - 6 years

    Science and Technology

    Outside Counsel helps the world’s most progressive organizations empower their top performers by matching them with the right mentors and providing tools to optimize these relationships. Based on our members’ specific objectives, we carefully select a good match from our hand-screened network of world-class mentors. We then provide both protégé and mentor with the support they need to get the most out of their six month partnership.

  • National Cyber Security Excellence Partner (NCEP) (RSA)

    National Cyber Security Center of Excellence (NCCoE)

    - 4 years 10 months

    Science and Technology

    Established in 2012 through a partnership between NIST, the State of Maryland and Montgomery County, the National Cybersecurity Center of Excellence (NCCoE) is dedicated to furthering innovation through the rapid identification, integration and adoption of practical cybersecurity solutions.

    The mission of the NCCoE is to collaborate with innovators to provide real-world cybersecurity capabilities that address business needs. An NCEP partner’s investment may take the form of physical…

    Established in 2012 through a partnership between NIST, the State of Maryland and Montgomery County, the National Cybersecurity Center of Excellence (NCCoE) is dedicated to furthering innovation through the rapid identification, integration and adoption of practical cybersecurity solutions.

    The mission of the NCCoE is to collaborate with innovators to provide real-world cybersecurity capabilities that address business needs. An NCEP partner’s investment may take the form of physical infrastructure such as hardware and software components, intellectual knowledge including best practices and lessons learned, or physically or logically colocated personnel who work side by side with federal staff.

  • Advisor & Mentor

    Syracuse Student Sandbox

    - 6 years

    Science and Technology

    The Syracuse Student Sandbox is a unique business incubator that gives aspiring student entrepreneurs the resources to make their visions a reality. The objective of the Sandbox is to accelerate the process of ideation, development and deployment through mentoring and coaching.

  • RSA Student Internship Program

    Senator Leahy Center for Digital Investigation

    - 4 years 11 months

    Science and Technology

    The Senator Leahy Center for Digital Investigation (LCDI) is a world-class laboratory designed to international standards, focused on establishing and assisting with public and private sector initiatives surrounding cybercrime, digital forensics and information assurance.

    As a leader in the Digital Forensic higher education arena, Champlain College offers students an opportunity to learn by participating in professional-level lab work at both the undergraduate and graduate levels.

  • Mimecast Graphic

    Executive Member -Cyber Resilience Think Tank

    Mimecast

    - Present 7 years 5 months

    Science and Technology

    The Cyber Resilience Think Tank is an independent group of industry experts dedicated to understanding the cyber resilience challenges that organizations across the globe face, and together, providing guidance on possible solutions.

  • Mandiant Graphic

    mWISE Program Committee

    Mandiant

    - Present 4 years 3 months

    Science and Technology

    Mandiant Worldwide Information Security Exchange (mWISE) – a new portfolio of event programming. As Cyber Defense Summit has done for 11 years, mWISE will bring leaders from industry, government, and academia together from across the security community to address the challenges of today’s threat landscape. mWISE will be open to the security community at large and not just Mandiant customers. We will gather to share knowledge and collaborate with one another unbounded by vendor influences.

Publications

  • Privileged Account Exploits Shift the Front Lines of Cyber Security

    CyberArk Software, Ltd.

    CyberArk’s threat report provides an expert’s vantage point into targeted cyber attacks by tapping into the experiences of seasoned threat investigators at five firms including RSA -The Security Division of EMC renowned for detecting, analyzing and remediating serious cyber security incidents.

    Other authors
    • et al.
    See publication
  • 10 Tips To Improve Your Security Incident Readiness & Response

    RSA - The Security Division of EMC

    Organizations’ incident readiness and response often falls short in ten areas that span people, processes and technology. By tackling these shortcomings, security professionals can reduce risk by providing early warnings of potential problems, rather than scrambling to chase the latest threat.

    Other authors
    • et al.
    See publication
  • Building an Intelligence-driven Security Operations Center

    RSA - The Security Division of EMC

    A technology revolution is underway in security to help information security teams combat advanced cyber threats more effectively, despite resource constraints. A new generation of security tools uses innovative techniques to collect and analyze massive amounts of data: data from computers, mobile devices and servers; data from internal networks, including the composition and contents of transmitted packets; and data from external sources about attacks on other organizations and the methods…

    A technology revolution is underway in security to help information security teams combat advanced cyber threats more effectively, despite resource constraints. A new generation of security tools uses innovative techniques to collect and analyze massive amounts of data: data from computers, mobile devices and servers; data from internal networks, including the composition and contents of transmitted packets; and data from external sources about attacks on other organizations and the methods used.

    Other authors
    See publication
  • Taking Charge of Security in a Hyperconnected World

    RSA - The Security Division of EMC

    The boundaries have blurred between internal and external networks. Employees increasingly use their own devices, home networks and public Wi-Fi to log into work. Partners, customers and vendors have greater access to corporate-run IT resources, and the integration of private networks with public clouds has culminated in hybrid clouds with dynamic and complex boundaries. In a world where digital boundaries are ever-changing and hard to define, building higher walls and stronger perimeter…

    The boundaries have blurred between internal and external networks. Employees increasingly use their own devices, home networks and public Wi-Fi to log into work. Partners, customers and vendors have greater access to corporate-run IT resources, and the integration of private networks with public clouds has culminated in hybrid clouds with dynamic and complex boundaries. In a world where digital boundaries are ever-changing and hard to define, building higher walls and stronger perimeter defenses, while still necessary, are inadequate to ensure security.

    Other authors
    See publication
  • Cyber Security Legal Business Known Unknowns

    Legal Business with Kroll

    Combating cyberattacks on law firms is complicated by the lack of hard information and the shadowy nature of perpetrators. But, reports Legal Business, law firm tech chiefs and security specialists agree the threat is rapidly growing

    Other authors
    • JaIshree KalIa
    • Legalease Ltd
    • Kroll, Inc.
    See publication
  • Preparing for the Inevitabe - New RSA Services Help Customers Defend Against Advanced Threats

    RSA - The Security Division of EMC

    Today is a realization of an evolution that has been long past due since the days of the “Moonlight Maze” attacks in the late 1990s. What the security community has come to realize over the past decade is that the advanced threat is not just isolated to critical government systems, nor is it simply a matter of “one and done” attacks that have a single intent. This is why we’ve created RSA Next Generation Security Operations Center (SOC) design and implementation services approach.

    See publication
  • RSA Speaking of Security Advanced Security Operations & Cyber Defense

    RSA - The Security Division of EMC

    RSA's Advanced Cyber Defense (ACD) Practice helps organizations successfully implement high-value advanced security solutions leveraging RSA's agility in technology innovation and world class security practitioners to develop comprehensive information security operations and programs. Our chatter blog is a collection of thought provoking dialogue on advanced threats, incident response, forensic analysis, attack techniques, tactics and exploitation methods as well as active cyber defense topics…

    RSA's Advanced Cyber Defense (ACD) Practice helps organizations successfully implement high-value advanced security solutions leveraging RSA's agility in technology innovation and world class security practitioners to develop comprehensive information security operations and programs. Our chatter blog is a collection of thought provoking dialogue on advanced threats, incident response, forensic analysis, attack techniques, tactics and exploitation methods as well as active cyber defense topics of interest to the cyber community.

    Other authors
    • et al.
    See publication
  • Introducing RSA Advanced Cyber Defense Services – Podcast #239

    RSA Speaking of Security Blogs/Podcasts

    RSA’s Peter Tran talks to Speaking of Security about new Advanced Cyber Defense Services being offered to help orgnanizations in North America and Europe create proactive strategies for defending their digital assets against a wide range of threats, and provide incident response expertise designed to help customers react aggressively to active attacks and critical incidents.

    Other authors
    • RSA - The Security Division of EMC
    See publication
  • Breaking Down Barriers to Collaboration in the Fight Against Advanced Threats

    RSA - The Security Division of EMC

    Determined cyber adversaries have proven over the past couple of years that they can defeat the protections of even the world’s most sophisticated security organizations. They’re compiling custom malware to evade signature-based detection tools such as antivirus scanners. They’re using social engineering techniques on unsuspecting employees to circumvent organizations’ perimeter defenses. They’re covering their tracks within systems and leveraging techniques they have perfected across multiple…

    Determined cyber adversaries have proven over the past couple of years that they can defeat the protections of even the world’s most sophisticated security organizations. They’re compiling custom malware to evade signature-based detection tools such as antivirus scanners. They’re using social engineering techniques on unsuspecting employees to circumvent organizations’ perimeter defenses. They’re covering their tracks within systems and leveraging techniques they have perfected across multiple targets.

    Other authors
    See publication
  • Technology Today - Highlighting Raytheon's Technology

    Raytheon Company

    INFORMATION TECHNOLOGY

    The Raytheon Excellence in Engineering and Technology (EiET) Awards took place at The Smithsonian’s National Air and Space Museum in Washington, D.C., in March, 2010. The awards are Raytheon’s highest technical honor. They recognize individuals and teams whose innovations, processes or products have or will have a substantial impact on the company’s success, and the success of Raytheon customers.

    Award recipients included the Raytheon's Computer Emergency…

    INFORMATION TECHNOLOGY

    The Raytheon Excellence in Engineering and Technology (EiET) Awards took place at The Smithsonian’s National Air and Space Museum in Washington, D.C., in March, 2010. The awards are Raytheon’s highest technical honor. They recognize individuals and teams whose innovations, processes or products have or will have a substantial impact on the company’s success, and the success of Raytheon customers.

    Award recipients included the Raytheon's Computer Emergency Response Team (RayCERT) led by Peter Tran for developing an innovative, industry-leading approach to minimize the risk and impact of cyberattackers on providers of national critical infrastructure.

    Other authors
    • Raytheon Company
    See publication
Join now to see all publications

Patents

  • Smart Authentication (Trademark)

    Issued US Trademark Registration # 2533110 Serial # 75825244

    IC 009. US 021 023 026 036 038. G & S:Computer hardware and computer software for providing network security which utilizes biometric identification verification technology, computer encryption, and wireless cellular digital packet data CDPD hardware and software to provide end users secured telecommunications, identity protection, secured electronic commerce, and physical access control.

    See patent

Projects

  • Port of Los Angeles Cyber Security Operations Center

    - Present

    The Port of Los Angeles received the American Association of Port Authority (AAPA) 2014 Information Technology Award for its innovative Cyber Security Operations Center (CSOC). As a primary cyber security design and implementation partner, this was a complete "green field" project comprised of state of the art security operations technologies, logical/physical design, process, compliance, work flow and staffing architecture and implementation designed to protect harbor critical information and…

    The Port of Los Angeles received the American Association of Port Authority (AAPA) 2014 Information Technology Award for its innovative Cyber Security Operations Center (CSOC). As a primary cyber security design and implementation partner, this was a complete "green field" project comprised of state of the art security operations technologies, logical/physical design, process, compliance, work flow and staffing architecture and implementation designed to protect harbor critical information and logistics systems against advanced cyber threats.

    See project

Recommendations received

More activity by Peter

View Peter’s full profile

  • See who you know in common
  • Get introduced
  • Contact Peter directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Peter Tran in United States

Add new skills with these courses