Sign in to view Justin’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Webster, Texas, United States
Contact Info
Sign in to view Justin’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
291 followers
278 connections
Sign in to view Justin’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Justin
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Justin
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Sign in to view Justin’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
Sign in to view Justin’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
-
Our comprehensive total rewards package goes far beyond a paycheck. It includes benefits that provide for your total wellbeing! ☑️ Paid parental…
Our comprehensive total rewards package goes far beyond a paycheck. It includes benefits that provide for your total wellbeing! ☑️ Paid parental…
Liked by Justin Rank
-
What an amazing place I get to work at! ConocoPhillips hosted a “Girls Tech Talk” today where 60+ High School students had the pleasure of meeting…
What an amazing place I get to work at! ConocoPhillips hosted a “Girls Tech Talk” today where 60+ High School students had the pleasure of meeting…
Liked by Justin Rank
View Justin’s full profile
Sign in
Stay updated on your professional world
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
People also viewed
-
Kyle Ngo, PCIP, CISA, CRISC, CRMA
Houston, TXConnect -
Rick Ray
Houston, TXConnect -
Annessa McKenzie
Houston, TXConnect -
Janice Cigainero
--
United StatesConnect -
SHERRELL GILMORE
Where Service Doesn't end With the Sell
Roseville, CAConnect -
JR Tolleson
Greater HoustonConnect -
Jacob Wilhelm
Virginia Beach, VAConnect -
Spencer Ayala
Information Security Advisor
San Antonio, Texas Metropolitan AreaConnect -
James Bryant
Houston, TXConnect -
Rosetta Carr
Information Security Advisor at Caremark
Lewisville, TXConnect -
Denise Vessels
Manager at Calpine
Greater HoustonConnect -
Adam McKinski
Information Security Advisor at USAA
San Antonio, TXConnect -
Jerry Purdon, PMP
Enterprise Planning Manager at Calpine
Pearland, TXConnect -
David Peyton
Civil Servant
Washington, DCConnect -
Kirk S.
Always questioning Why/How/What
Houston, TXConnect -
Anthony Phan
Dir Information Services
Houston, TXConnect -
Margaret Chilton, MBA
Director Central AP at Calpine Corp
Katy, TXConnect -
Awas Shah
Sterling, VAConnect -
William Wooten
Jarrell, TXConnect -
Tierre Rankin
Dallas-Fort Worth MetroplexConnect
Explore more posts
-
Tammy Anthony Baker
Cembell, a Louisiana manufacturing and fabrication company, is one of the newest victims of the Qilin ransomware group. Qilin mainly targets critical sector companies but deviates to find small businesses that are sector adjacent to utilize them as a foothold into critical sector organizations. Qilin posted news of the breach on its dark web leak site. As part of the proof of compromise, Qilin posted images of what appeared to be a file directory and two spreadsheets. Qilin has an affiliate model that offers Ransomware as a Service (RaaS), and it recruits affiliates to assist in infecting its victims for a share of the ransoms collected. A call to Cembell confirmed they are open, operational, and have taken the measures necessary to evict the threat actors from their systems. They are working through the recovery process with the assistance of a security response team. #CyberSecurity #Breach #Louisiana
3
-
Michael Cannady, MBA, CISSP
Attention North Eastern Oklahoma Professionals: Are you interested in a seminar on creating or maturing your cybersecurity, privacy, risk, or compliance programs? I'm planning to host a series of free workshops, offering springboard documentation and discussions on effective approaches. Contact me directly if you're interested! #PositiveDisruptor #PosDisruptor #DigitalDucks #ThinkDifferently #ProgramBuilding #Cybersecurity #TechnicalDocumentation #OrgChange #OrgCulture
2
-
Nadeem Munshey
https://lnkd.in/ghe5GFDm The days of Mayberry are long gone. Nowadays, simple cyber attacks can be carried out with basic tools available on the internet. As professional organizations, we should have systems in place to stop these mischevious but disruptive acts. This incident at Klein ISD (a Texas school district with a $590 million annual budget and 53,000 students) reminds us that children have ways of testing our vulnerabilities. (thats saying it nicely...) This event highlights the importance of staying up to date in our understandings of cyber defenses. Regularly testing your cyber security configurations for strength and stability should be a routine management task. This kind of network disruption exposes basic gaps and the the lack of routine audit and testing. CIO level guidance can prevent larger, more significant issues in the future. (Yes, DDos testing is an easily accessible paid service online.. this is very common knowledge) Heads up, the elementary age kids armed with Raspberry Pi's are not far behind folks.... Let's all keep ourselves updated! 🤨 Are we getting old? 😂 #CyberSecurity #CyberAttackPrevention #STAARTesting #KLEINISD #Texas #TechnologyPreparedness
2
-
Stacey Champagne
I was surprised to receive this in the mail! A token of celebration for my nearly year-long journey to becoming an iPEC Coaching Certified Professional Coach. Thank you 🏳️🌈 Maril Vernon, CEH, MSCSIA for the thoughtful gift 💜 If you’re a woman in cybersecurity interested in experiencing the power of quality coaching, join me inside the Hacker in Heels community. Group coaching is included in the monthly membership. 1:1 coaching is available at an additional cost only to Hacker in Heels Insiders—and you have to apply. Why? Because I strongly believe we have plenty of resources as part of Insiders that can help women in cybersecurity with many of the common challenges they seek career coaching for. To send people straight towards my highest-ticket offer when I know they can benefit from what I’ve already created at a lower price-point would be out of integrity for me. Trust me, I’d love to sign some 1:1 coaching clients and get quickly on my way to earning back my investment. But I will not prioritize my wallet when I know you don’t need or aren’t ready for 1:1 coaching. So come dip your toes in Insiders! I’d love to help you with your big, bold cybersecurity career goals. #womenincybersecurity #cybersecurity #careercoaching
73
14 Comments -
Roman Steszewski
Tired of tossing and turning over the security of your business? By tirelessly working to safeguard your endpoints, EDR allows you to rest easy knowing everything is secure. It’s not just security — it’s peace of mind. Reach out to us to see how we can help. info@tbtsllc.com 281-916-1101 #EDR #Cybesecurity
-
Lliam Holmes
Could you imagine something like this happening to your business? The city of Wichita Kansas had to shutdown their IT systems on Sunday 5/5/24 due to a Ransomware attack. The city says that first responders are still providing services, with police and fire departments having to switch to business continuity measures where necessary. As for online payment systems for things like water, court citations and tickets - these services are all offline. If you are stressing over what you would do if this happened to your business then give MIS Solutions, Inc. a call. We have a team of experts that can assess your situation and help ensure that your business is well protected. Don't stress call MIS - 770-945-5487
6
-
Murat Guvenc
Protecting Patient Data in the Digital Age: A Call for Vigilance A recent cyberattack on a Las Cruces rehabilitation center highlights the critical need for robust cybersecurity measures in the healthcare industry. Full report: https://lnkd.in/gHj3cnU2 Follow us on LinkedIn - https://lnkd.in/ggi_8FPq #healthcare #cybersecurity #dataprivacy #patientdata #databreach
10
1 Comment -
Richard (Dick) Brooks
The Verizon DBIR states “On the flip side, the median time for detecting the first scan for a CISA KEV vulnerability is five days from publication in the Common Vulnerabilities and Exposures (CVE) database (not from the patch being available).” Watch out for those CISA KEVs, they can ruin your day! With SAG-PM (TM) a Company can complete a CISA KEV scan for a product in seconds, not days - and the evidence of this scan being performed can be saved in a tamper-proof evidence locker as proof the work was performed, in the event of any lawsuits. This shrinks the window of hacker exploitation from days to hours - enabling a company to take mitigating action ASAP after becoming aware of a CISA KEV in their ecosystem. Never trust software, always verify and report! (TM) https://lnkd.in/eevUZH9
-
Chris Nicolaou, CISM CCISO
To quote Peter Drucker, "Culture eats strategy for breakfast". This means that no matter how good and well-defined your business strategy is, your plan will most surely fail without a company culture that empowers people to implement it. @CloudSpace has collectively "bought in" to the notion of a cybersecurity culture working towards "perfecting" the systems we build and the processes to which we adhere. Again, like greatness, perfection is a journey...not a destination. #continuousimprovement #cloud #cloudinfrastructure We're ready!
3
-
Fernanda Casillas
📢 5/21th Dallas CISO Executive Boardroom Session Announcement: Organizational Risk Mitigation — Protecting Humans from Themselves 📢 The Dallas CISO community loves unique sessions and so does Brian Reed, and KC Condit. Sometimes it's hard to see a future beyond ransomware, BEC and data loss. But how do we not only ensure our cyber defense teams and the workforce they protect stay afloat in the current risk landscape, while simultaneously building toward future consolidation and risk mitigation scenarios? Join this insightful session with Erik and KC to learn about and discuss: 📈 Developing a human risk framework 📈 Moving human-centric security controls from reactive and manual to proactive and automated 📈 Leveraging AI to protect humans from themselves Huge shoutout to our trusted partner, Proofpoint, for supporting this amazing community around an important and timely topic. ✅ Did you attend an Evanta gathering in 2023-2024? You are a Member! Log into your MyEvanta App or my.evanta.com and register with your credentials! ✅ Not an Evanta Community Member yet? Click below to apply to participate, book an appointment with me, or send me a direct message. I will personally reach out! ✨ Registration is complimentary for qualifying Executives ✨ Evanta, a Gartner Company
6
-
Don C. Weber
Cybersecurity assessments of safety equipment and communications are extremely important. I’ve tried to align detailed requirements from ISA/IEC 62443 with the SANS ICS 5 Cybersecurity Critical Controls. Please let me know your thoughts and insights on this topic. https://lnkd.in/gyezspbv
29
3 Comments -
Giancarlo V. Marchesi
The notorious LockBit cybercrime group has taken credit for the recent ransomware attack that forced the City of Wichita, Kansas, to shut down many of its systems. If you want to protect yourself from this happening to your business (or to your personal files), check out Darktrace ‘s Advanced Artificial Intelligence (AI) Platform with Self-Learning capabilities. #Darktrace #Cybersecurity #SelfLearningAI #CybersecurityAwareness #CyberAttack #DataBreach
7
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Justin Rank in United States
-
Justin Rank
Appleton, WI -
Justin Rank
Innovating a Smarter Path to Construction: Pioneering a Better Way to Build
Woodinville, WA -
Justin rank
inventory specialist at rough country suspension systems
United States -
Justin Rank
Student at Colorado Christian University
Arvada, CO
5 others named Justin Rank in United States are on LinkedIn
See others named Justin Rank