About Mike Wylie

Michael Wylie, MBA, CISSP is a seasoned cybersecurity leader and the head of a global managed threat hunting team at Zscaler. With a career spanning strategic threat hunting, digital forensics, and incident response, Michael has built and scaled elite threat detection programs for organizations worldwide. He previously served as Director of Threat Hunting at CrowdStrike and Director of Cybersecurity Services at a top 100 accounting firm, where he developed and led DFIR engagements and threat hunting operations.

An early adopter and innovator in applying AI to cybersecurity, Michael is passionate about helping organizations harness artificial intelligence to accelerate threat detection, automate analysis, and stay ahead of evolving threats.

An experienced educator, Michael has delivered cybersecurity and AI training for the U.S. Department of Defense, LinkedIn Learning, DEFCON, California State Universities, and international clients across industries. His passion lies in bridging the gap between theory and real-world application, helping organizations detect, respond to, and outmaneuver modern threats.

To dive deeper into AI or threat hunting strategies, schedule a consulting call or connect with Michael Wylie on LinkedIn

Training Courses:

Videos:

Recordings of prior talks, workshops, interviews, and events can be found on YouTube.

Teaching & Workshops:

  • Moorpark College: Intro to Pen Testing
  • Moorpark College: CEH
  • Moorpark College Blue Team & Threat Hunting
  • ISSA: Using NMAP for network scanning and penetration testing
  • ISACA: Using NMAP for network scanning and penetration testing
  • BsidesLV: Using NMAP for network scanning and penetration testing
  • California State University, Northridge: Information Security & Information Assurance
  • ISSA: Using Wireshark for Incident Response and Threat Hunting
  • Moorpark College: CCNA R&S
  • Department of Defense: Certified Ethical Hacker
  • Department of Defense: Security+
  • Department of Defense: CCNA R&S
  • ShellCon: Wireshark for Incident Response and Threat Hunting
  • DEFCON 27: Wireshark for Incident Response and Threat Hunting
  • BSidesLV: Wireshark for Incident Response and Threat Hunting
  • ISSA: Fundamental of Malware Analysis
  • ISACA: Preparing for the Event – Best Practices for Incident Response and Root-Cause Forensics
  • Cloud Security Alliance (CSA): Examining Cloud File Storage Incidents
  • OWASP: Wireshark for IR & Threat Hunting
  • WSC: Linux for Cybersecurity
  • ISSA NAC – Wireshark for IR & Threat Hunting
  • ISSA Grand Traverse – Wireshark for IR & Threat Hunting
  • ISSA Chattanooga – Wireshark for IR & Threat Hunting
  • CSA LA: Intro to Linux for InfoSec
  • DEFCON 28: Wireshark for Incident Response & Threat Hunting
  • DEFCON 28: Fundamentals of Malware Analysis

Talks:

Publications:

News & Media: