J. Michael Butler
Details
Theology
Southwestern Baptist Theological Seminary
1970 : 1974
BA
Speech, Psychology
Henderson State University
1967 : 1970
ICE Mortgage Technology
Information Security Consultant
Mike serves as a contributor to the SANS community. He has written for the SANS Forensics blog site, assisted with SANS curriculum, and participated in the development of the GIAC certification exams. He has authored and co-authored many SANS White Papers (WP) and has been a featured speaker for several SANS Webcasts (WC). Examples of his more recent work include :
• JumpStart Guide for Security Information and Event Management in AWS (WP & WC, August 2019)
• Finding Hidden Threats by Decrypting SSL (WP & WC, November 2013)
• Meeting the Need for Speed (and Resiliency) in Security Management Systems (WP & WC, June 2013)
• SANS Security Laboratory “Defense-in-Depth” article Can You Build a Defense-in-Depth Architecture without an Architect (December 2012)
• Privileged Password Sharing : “Root” of all Evil (WP, February 2012)
• SANS “Ask the Expert” Webcast : Security Access to the IT Infrastructure : Predictions for 2012 that Every IT Security Pro Should Know (WC, February 2012)
• Adding Enterprise Management to Identity Management (WP, October 2011)
• Benchmarking SIEM (Security Information Event Management) Systems (WP & WC, February 2009)
Additional subject matter addressed to date includes :
- Microsoft Remote Access Server
- PKI Components
- Incident Analysis and Forensics
- War Driving
- Log Monitoring
- Subnetting
- Single and Double Side Certificates
- Account Management
- Proxy Servers
- Google Hacking
- Scrubbing Test Data
- Securing Virtualization
- Data Retention/Management
2008 :
The SANS Institute
Author
Mike has been an Information Security Consultant at Black Knight Financial Services since 2001. He established and implemented Enterprise-wide ISO 17799- based security policies and procedures for the 7,000+ employee corporation ($1.7B annual revenue) whose IT systems process and carry more $1.6T in US residential real estate transactions and debt. He led the effort to introduce mainframe encryption hardware into the corporation to help protect residential lending data. He is responsible for forensic examinations of systems on behalf of the LPS legal team and has worked with outside counsel on major efforts as a forensics Subject Matter Expert. He developed software to track and manage development projects for adherence to security policies and he has actively worked with the Chief Technology and Chief Information Officers and their staffs to identify and mitigate security risks. He was responsible for introducing an Incident Management Plan to the corporation and periodically led Enterprise-wide Incident Response exercises.
2008 : 2023
Black Knight Financial Services
Information Security Consultant
At FIS (Formerly ALLTEL Information Services) responsible for enterprise wide Information Security Consulting, Computer Forensics, authoring and maintaining enterprise wide Information Security Policies (aligned to ISO 17799 and addressing federal and state disclosure laws), author of the enterprise Security Incident Management Plan, lead Security Incident Management Exercises, and supervised the automation of on-line Security Awareness exercises.
2001 : 2008
Fidelity National Information Services
Information Security Consultant
Responsibilities at ALLTEL included four years of Internal Audit of Information Systems and infrastructure (98-2001), one year as Service Delivery Account Manager (97), and two years as Senior Distributed Systems Analyst (95-96). Served as project manager over the network support group in the roll out of a new Point of Sale system for ALLTEL in the Springfield, Missouri market in 1996.
Transferred to ALLTEL Information Services in Jacksonville, Florida, in 2001.
1995 : 2001
ALLTEL Communications
Senior Information Systems Auditor
Skills
Business Continuity, Business Continuity Planning, CEH, Checkpoint, CISA, CISSP, Computer Forensics, Computer Security, Cybercrime, Data Security, Disaster Recovery, Encryption, Firewalls, Identity Management, Incident Management, Incident Response, Information Assurance, Information Security, Information Security Management, Information Technology, Internet Security, Intrusion Detection, IPS, ISO 27001, IT Audit, IT Management, IT Operations, Malware Analysis, Network Architecture, Networking, Network Security, PCI DSS, Penetration Testing, Risk Management, Security, Security Audits, Security Awareness, Security Management, Security Policy, Troubleshooting, Virtualization, VMware, VPN, Vulnerability Assessment, Vulnerability Management
About
Certifications: GCIH, EnCE, GCFA (Gold), CISA, GSEC (Gold), CDPSE, SSP-CNSA
Specialties: Conducting Computer Forensics, authoring Information Security Policies, automating Security Awareness, IT Audit, Privacy, and authoring technical documents and articles related to security.