Ismael Valenzuela

As Principal Engineer, Ismael Valenzuela (@aboutsecurity) is part of McAfee's senior technical leadership team, leading research on Security Operations and Threat Hunting using machine-learning and expert-system driven investigations. Author and contributor of numerous technical articles and open source tools, Ismael is also a regular speaker at International conferences and is one of the few Certified SANS Instructor for the Cyberdefense and Digital Forensics tracks.

Prior to his current role at McAfee, Ismael led the delivery of SOC, IR & Forensics services for the Foundstone Services team within Intel globally. A top cybersecurity expert with strong technical background and deep knowledge of security architectures and continuous monitoring as well as advanced attack and defense techniques, Ismael has provided security consultancy, advice and guidance to large government and private organizations, including major EU Institutions and US Government Agencies. Previously, Ismael worked as Global IT Security Manager for iSOFT Group Ltd. and founded one of the first security consultancies in Spain in 2000.

Ismael holds a Bachelor's degree in Computer Science from the University of Malaga (Spain), as well as numerous professional certifications, including the highly regarded GIAC Security Expert (GSE #132) and many others from GIAC, ISC2 and ISACA.

Twitter: https://twitter.com/aboutsecurity
SANS: https://www.sans.org/instructors/ismael-valenzuela
McAfee: https://securingtomorrow.mcafee.com/author/ismael-valenzuela/
Security operation centers (SOCs) are struggling to keep up with attackers, and artificial intelligence (AI) has failed to deliver significant improvements. The industry has been successful at applying AI to malware detection and user and entity behavior analytics (UEBA) using deep neural networks and anomaly detection. But other core SOC jobs such as monitoring, triage, ...
Read Blog
Most security organizations have historically been focused on the prevention portion of the prevent-detect-correct threat defense lifecycle. The proliferation of some high-profile security breaches in the past few years, however, has demonstrated the weakness in that strategy. Cracks exist in even the most formidable security defenses. Attackers have become ever more sophisticated and persistent. And ...
Read Blog