U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.

TLP:WHITE

Ken van Wyk

Kenneth R. van Wyk is an internationally recognized information security expert and author of the O'Reilly and Associates books Incident Response and Secure Coding. In addition to providing consulting and training services through his company, KRvW Associates, LLC, (http://www.KRvW.com), he currently holds numerous positions: the Director of Cigital's (http://www.cigital.com) Research Labs, monthly columnist for online security portal eSecurityPlanet (http://www.eSecurityPlanet.com), and Visiting Scientist at Carnegie Mellon University's Software Engineering Institute (http://www.sei.cmu.edu).

Ken has 20+ years experience as an IT Security practitioner in the academic, military, and commercial sectors. He has held senior and executive technologist positions at Tekmark, Para-Protect, and Science Applications International Corporation (SAIC), in addition to the U.S. Department of Defense and Carnegie Mellon and Lehigh Universities.

Ken also served a two-year elected position as a member of the Steering Committee and a one-year elected position as the Chairman of the Steering Committee for the Forum of Incident Response and Security Teams (FIRST) organization. At the Software Engineering Institute, Ken was one of the founders of the Computer Emergency Response Team (CERT®). He holds an engineering degree from Lehigh University. He is a frequent speaker at technical conferences and has presented papers and speeches for CSI, ISF, USENIX, FIRST, and others. Ken is also a CERT® Certified Computer Security Incident Handler.

Articles

Namesort descending Content Areas
Adapting Penetration Testing for Software Development Purposes Best Practices/Penetration Testing
Application Firewalls and Proxies - Introduction and Concept of Operations Best Practices/Assembly, Integration, and Evolution
Black Box Security Testing Tools Tools/Black Box Testing
Penetration Testing Tools Tools/Penetration Testing Tools
Risk-Based and Functional Security Testing Best Practices/Security Testing
Training and Awareness Best Practices/Training and Awareness
White Box Testing Best Practices/White Box Testing
Back to Top