Michael Wylie, MBA, CISSP is a seasoned cybersecurity leader and the head of a global managed threat hunting team at Zscaler. With a career spanning strategic threat hunting, digital forensics, and incident response, Michael has built and scaled elite threat detection programs for organizations worldwide. He previously served as Director of Threat Hunting at CrowdStrike and Director of Cybersecurity Services at a top 100 accounting firm, where he developed and led DFIR engagements and threat hunting operations.
An early adopter and innovator in applying AI to cybersecurity, Michael is passionate about helping organizations harness artificial intelligence to accelerate threat detection, automate analysis, and stay ahead of evolving threats.
An experienced educator, Michael has delivered cybersecurity and AI training for the U.S. Department of Defense, LinkedIn Learning, DEFCON, California State Universities, and international clients across industries. His passion lies in bridging the gap between theory and real-world application, helping organizations detect, respond to, and outmaneuver modern threats.
To dive deeper into AI or threat hunting strategies, schedule a consulting call or connect with Michael Wylie on LinkedIn.
Training Courses:
- Deep Dive into Open-Source Intelligence
- Threat Hunting Essential Training
- AI in Cybersecurity: The Future of Red Teaming and Blue Teaming
- Threat Hunting: Network Data
- Insider Threat Hunting: Detecting and Responding to Internal Security Risks
- The AI-Driven Cybersecurity Analyst
- Security Operations (SecOps) Essentials: Detecting and Responding to Security Threats
Videos:
Recordings of prior talks, workshops, interviews, and events can be found on YouTube.
Teaching & Workshops:
- Moorpark College: Intro to Pen Testing
- Moorpark College: CEH
- Moorpark College Blue Team & Threat Hunting
- ISSA: Using NMAP for network scanning and penetration testing
- ISACA: Using NMAP for network scanning and penetration testing
- BsidesLV: Using NMAP for network scanning and penetration testing
- California State University, Northridge: Information Security & Information Assurance
- ISSA: Using Wireshark for Incident Response and Threat Hunting
- Moorpark College: CCNA R&S
- Department of Defense: Certified Ethical Hacker
- Department of Defense: Security+
- Department of Defense: CCNA R&S
- ShellCon: Wireshark for Incident Response and Threat Hunting
- DEFCON 27: Wireshark for Incident Response and Threat Hunting
- BSidesLV: Wireshark for Incident Response and Threat Hunting
- ISSA: Fundamental of Malware Analysis
- ISACA: Preparing for the Event – Best Practices for Incident Response and Root-Cause Forensics
- Cloud Security Alliance (CSA): Examining Cloud File Storage Incidents
- OWASP: Wireshark for IR & Threat Hunting
- WSC: Linux for Cybersecurity
- ISSA NAC – Wireshark for IR & Threat Hunting
- ISSA Grand Traverse – Wireshark for IR & Threat Hunting
- ISSA Chattanooga – Wireshark for IR & Threat Hunting
- CSA LA: Intro to Linux for InfoSec
- DEFCON 28: Wireshark for Incident Response & Threat Hunting
- DEFCON 28: Fundamentals of Malware Analysis
Talks:
- DEFCON28: Discovering Cloud File Storage Artifacts
- DEFCON 28: Enumerating Cloud File Storage Gems
- ISSA VC: Fundamentals of Malware Analysis & Response
- ISSA: Shooting Puny Phish in a Barrel
- ISSA Thought Leadership Series: Is Your Organization Ready for Automation?
- ISSA Thought Leadership Series: Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle
- CISO Forum: Decentralized Workforce
- BSidesLV: Your tax data is being leaked
- ISACA: The costly Mistakes of Being Unprepared
- ISACA: AWS Cloud Security on the Dollar Menu
- BSides Augusta: The Costly Mistakes of Being Unprepared
- MSP Expo: The Costly Mistakes of Being Unprepared
- MSP Expo Panel: Panel: Locking up Your Data, Not Your Access is Key to Customer Success
- ToorCon: Shooting Puny Phish in a Barrel
- ToorCon: You’re not alone in your hotel room
- ToorCon: My Little AWS IR Sandbox
- RMISC: Cloud Security on the Dollar Menu
- MBA Regional Panel: The Latest In Cybersecurity
- DEFCON 27: Using Wireshark for Incident Response & Threat Hunting
- DEFCON 27: Phishing with Puny Bait
- ISACA: Counterhacking Websites
- ISACA: Continuous Cloud Security Monitoring
- AppSec California: Continuous Cloud Security Monitoring (CCSM)
- ISACA: Fundamentals of Malware Analysis & Response
- Content Protection Summit: Security Implication of ‘Work from Home’: The Year of Breaches
- OWASP 24 Hour Global Conference – Your Taxes are Still Being Leaked
- ISSA Denver – Continuous Cloud Security Monitoring for Enterprises
- ISSA Capital of Texas – Puny Phishing
Publications:
- Tripwire: State of Security: Your Taxes are Being Leaked
- Loan Vision: Your Role in Keeping Company Data Safe
- Packt (Technical Editor): CISSP in 21 Days
- Tripwire: Staving Off the Monetary Consequences of a Data Breach
- Best Company: What You Need to Know About Disney Plus Compared to Other Streaming Services
- Punycode Phishing: How to Prevent Attacks
- Men’s Journal: Is It Safe to Charge Your Phone At a Public USB Port? Here’s What Experts Say
- SANS: Learn from the Best Cyber Security Practitioners in the World
- SSLstore: The Top Cyber Security Certifications Hiring Managers Will Look For in 2020
- MESA Alliance: CPS 2019: SHIFT, Richey May Technology to Address Security Challenges
- Best Company: What You Need to Know About Disney Plus Compared to Other Streaming Services
- TechTarget: Enterprises betting on SOAR tools to fill security gaps
- Dark Reading: In the Market for a MSSP? Ask These Questions First
- M&E Daily: Important Updates to MPA Best Practices You Don’t Want To Miss
- M&E Daily: Richey May Tech: Remote Working a Daunting Security Challenge
News & Media: