“I have had the privilege of working closely with Mr. Nowak for 2.5+ years, where he have consistently demonstrated exceptional skills, leadership qualities, and a profound commitment to the field of cyber defense. During the years of our collaboration, Mr. Nowak, demonstrated combination of technical expertise, strategic thinking, and strong leadership abilities in the Cyber Defense Manager role. His technical skills include a deep understanding of network security, detection, intrusion detection systems, and threat hunting. He is constantly up-to-date with the latest trends and threats in the cybersecurity landscape, ensuring that the organization's defenses are always at the cutting edge. Mr. Nowak has the ability to translate the technical knowledge into actionable and cost-effective strategies while being an exceptional leader who can inspire and lead a team effectively. As a Cyber Defense manager, Mr. Nowak has consistently demonstrated his dedication to personal and professional growth. He is not only committed to keeping his own skills sharp but also invest time in mentoring and training team members, ensuring that the entire team stays ahead of the curve in the ever-evolving field of cyber defense. In summary, Mr. Nowak is a dedicated, knowledgeable, and effective Cyber Defense Manager with a proven record of success. I am confident that he will bring the same level of expertise and commitment to any organization and make a significant impact.”
Activité
-
The 1/60 rule. Do you know it? In aviation, they call it the rule of 1 in 60. ✈️ If your heading is off by just 1 degree, after 60 nautical miles…
The 1/60 rule. Do you know it? In aviation, they call it the rule of 1 in 60. ✈️ If your heading is off by just 1 degree, after 60 nautical miles…
Aimé par Filip Nowak, MBA
-
I had the opportunity to clearly explain why accidents and breaches occur and why they seem to be rather deterministic. Luck was on my side again…
I had the opportunity to clearly explain why accidents and breaches occur and why they seem to be rather deterministic. Luck was on my side again…
Partagé par Filip Nowak, MBA
Expérience
Formation
Licences et certifications
-
-
-
ITIL Foundation Certificate in IT Service Management
-
Délivrance le -
Computer Forensics Academy - expert
Mediarecovery
Délivrance le -
Computer Forensics Academy - professional
Mediarecovery
Délivrance le -
IT Security Professional
IT Security Academy
Délivrance le -
Computer Forensics Academy - specialist
Mediarecovery
Délivrance le
Publications
-
Ultimate Commanders - The self-destructive security imperative
speaker at the SEMAFOR 2016 Conference
Voir la publicationTogether with the research partner Blazej Boczula, the authors presented two possible strategic scenarios and visions of future security. The existing security is a "security "of technology, where technology is designed to defend technology. This first vision is catastrophic in nature and is self-destructive. It is supported by automation, orchestration, autonomous systems and artificial intelligence. On the other hand, there is a optimistic vision, where we - as humanity - start solving…
Together with the research partner Blazej Boczula, the authors presented two possible strategic scenarios and visions of future security. The existing security is a "security "of technology, where technology is designed to defend technology. This first vision is catastrophic in nature and is self-destructive. It is supported by automation, orchestration, autonomous systems and artificial intelligence. On the other hand, there is a optimistic vision, where we - as humanity - start solving problems not puzzles. The presentation goes through number of domains like economy, technology, security, IS&A, human factors, management, military and ethos. Both authors represent the interdisciplinary approach. The discussion ends with the sentence; "Now you know, and knowing is half the battle". The lecture was presented in a form of discussion between authors.
-
Cyber Security Management Studies
lecturer at the University of Economics
Voir la publicationThe author introduced the problems of security monitoring, incident response and concept of centralized security management. The lecture was divided into three parts: a brief history of security, technical deck and non-technical deck, where the author provided number of recommendations for security leaders and management principles. In presentation the connection between security and economy was shown and discussed. During a lecture students have been ask for ideas on how to protect and defend…
The author introduced the problems of security monitoring, incident response and concept of centralized security management. The lecture was divided into three parts: a brief history of security, technical deck and non-technical deck, where the author provided number of recommendations for security leaders and management principles. In presentation the connection between security and economy was shown and discussed. During a lecture students have been ask for ideas on how to protect and defend against every day threats like a diseases, leaking taps as well as those critical ones like insiders, corrupted power plant or plane crashes.
-
Computer Network Defense (Computer Science Degree)
lecturer at the Wrocław University of Technology
This introductory lecture for Computer Science students on University of Technology started with argument, that IS&A is not a problem of technology. The lecturer explained the interdisciplinary nature of security and it's definition and understanding. The main part of the presentation focused on the CND missions and SOC/SIC role. The author presented the CJA methodology, facts and current state of the art in the security industry. Later, the author explained why the prevention always fails and…
This introductory lecture for Computer Science students on University of Technology started with argument, that IS&A is not a problem of technology. The lecturer explained the interdisciplinary nature of security and it's definition and understanding. The main part of the presentation focused on the CND missions and SOC/SIC role. The author presented the CJA methodology, facts and current state of the art in the security industry. Later, the author explained why the prevention always fails and why modern defenses lose. The lecture ended with a short note about security domain conferences and future perspectives.
-
Cyber Security Studies (Computer Science Degree)
lecturer at the School of Higher Vocational Education in Nysa
Voir la publicationThe lecture was designed to introduce the subject of Information Security (IS) and Information Assurance (IA) to Computer Science students. The lecturer presented the "short history of security" going through understanding of this domain, the interdisciplinary approach and examples. As an introductory presentation, the author described trends in IS&A, current problems and relations to other domains. Through the presentation the lecturer showed security cases studies, essential practices…
The lecture was designed to introduce the subject of Information Security (IS) and Information Assurance (IA) to Computer Science students. The lecturer presented the "short history of security" going through understanding of this domain, the interdisciplinary approach and examples. As an introductory presentation, the author described trends in IS&A, current problems and relations to other domains. Through the presentation the lecturer showed security cases studies, essential practices, current approaches to intrusion detection, monitoring and forensics. The presentation ended with Q&A session, where the author presented his view and suggestions regarding secure code programming and industry itself.
-
Operational level of defense
eForensics Magazine
Voir la publicationSecurity operations is subject to constraints, limitations and constant task reprioritization. This is especially true when developing Security Operations Center (SOC), shifting between initial levels of maturity and finding out what really slows down the effectiveness of the primary objectives. There is a common belief, that the technology and the “new version of software” will solve all such issues once and for all, closing the dilemma between security capabilities and processing power. The…
Security operations is subject to constraints, limitations and constant task reprioritization. This is especially true when developing Security Operations Center (SOC), shifting between initial levels of maturity and finding out what really slows down the effectiveness of the primary objectives. There is a common belief, that the technology and the “new version of software” will solve all such issues once and for all, closing the dilemma between security capabilities and processing power. The next generation of a security appliance may address some types of new emerging threats and defense methodology appears to be a game changer. Some believe that having a team of talented SOC analysts operating under a defined process may be the force multiplier, while others try to research the perfect detection rule to catch the targeted attacks. Like the name ‘security operations center’ or more broadly ‘central control room operations’ suggests, these operations units suffer from ‘operations’’ diseases. The question remains: are we operational, and good enough in operations?
-
Cyber Security Management Studies
lecturer at the University of Economics
Voir la publicationDuring a lecture prepared for postgraduate studies "Cyber Security Management" at the University of Economics the author introduced the problems of security monitoring, incident response and concept of centralized security management. The lecture was divided into three parts: a brief history of security, technical deck and non-technical deck, where the author provided number of recommendations for security leaders and management principles. In presentation the connection between security and…
During a lecture prepared for postgraduate studies "Cyber Security Management" at the University of Economics the author introduced the problems of security monitoring, incident response and concept of centralized security management. The lecture was divided into three parts: a brief history of security, technical deck and non-technical deck, where the author provided number of recommendations for security leaders and management principles. In presentation the connection between security and economy was shown and discussed. During a lecture students have been ask for ideas on how to protect and defend against every day threats like a diseases, leaking taps as well as those critical ones like insiders, corrupted power plant or plane crashes.
-
The evolutionary approach to defense
eForensics Magazine/InfoSec Institute
Voir la publicationThe evolutionary approach to IT security seems to be the most natural and efficient way to resist cyber-attacks. The Red Queen Effect describes the relationship between the attacker and the defender – the never-ending story of cyber battles, but can we minimize the ‘mean time to identify’ and respond on time to any security intrusion? Integrated solutions, collaboration, and ‘shiny toys’ are still not enough – presented SIEM-based incident response methodology and intrusion life-cycle can bring…
The evolutionary approach to IT security seems to be the most natural and efficient way to resist cyber-attacks. The Red Queen Effect describes the relationship between the attacker and the defender – the never-ending story of cyber battles, but can we minimize the ‘mean time to identify’ and respond on time to any security intrusion? Integrated solutions, collaboration, and ‘shiny toys’ are still not enough – presented SIEM-based incident response methodology and intrusion life-cycle can bring relief to any computer security incident handler, and help those, who struggle with SIEM deployment and incident response process. Having seen the intrusion chain’s feedback loop and framework itself, it is time to combine known practices and use them in the corporation environments to create a more active and defensive security posture.
-
Threat Hunting and Corporate Investigations with SIEM Technology
eForensics Magazine
Voir la publicationThe article presentes methods and concepts, how to understand SIEM, what does threat hunting mean and how to implement security rules. Author describes the most important definitions, processes, technology and examples. Full scenario from detection, investigation and tuning phases is presented. Qradar’s SIEM and Fireeye have been shown, shortly discussing main features and capabilities. In the end – author shares news from SIEM’s technology world. Threat hunting process seems to be a great…
The article presentes methods and concepts, how to understand SIEM, what does threat hunting mean and how to implement security rules. Author describes the most important definitions, processes, technology and examples. Full scenario from detection, investigation and tuning phases is presented. Qradar’s SIEM and Fireeye have been shown, shortly discussing main features and capabilities. In the end – author shares news from SIEM’s technology world. Threat hunting process seems to be a great approach for early stages of SIEM deployment (tuning phase), supports threat detection also at the earliest stages of attack (compromise-chain) and gives methodology for proactive monitoring.
-
The Incident Edge research
speaker at the Security Case Study Conference 2014
Voir la publicationThe author presented a project titled "The Incident Edge", showing findings and conclusions after conducting own research into security event and incident analysis. The output - methodology - provides holistic view on security posture, gives visibility over security events tracking, intrusion progression and dynamics of defended environment. Organization that is using systematic and formalized methodology is able to find dependencies between events, decrease mean-time-to-detect and use…
The author presented a project titled "The Incident Edge", showing findings and conclusions after conducting own research into security event and incident analysis. The output - methodology - provides holistic view on security posture, gives visibility over security events tracking, intrusion progression and dynamics of defended environment. Organization that is using systematic and formalized methodology is able to find dependencies between events, decrease mean-time-to-detect and use historical knowledge. During research, the author used retrospective and 'as it goes' analysis to reconstruct and track targeted attacks, blue teaming, smash-and-grab like breaches, malware outbreaks and hundreds of other events. New concept of the 'event horizon' was introduced as well as multiple recommendations for incident investigation.
Cours
-
Advanced Network Security Monitoring and Incident Response
-
-
CERT GAMES - cyber defense exercises for ICT infrastructure (ComCERT)
-
-
CompTIA Security+ course
-
-
Computer Forensics Academy - expert
-
-
Computer Forensics Academy - professional
-
-
Computer Forensics Academy - specialist
-
-
Confidence 2016 Conference
-
-
C|HFI Computer Hacking Forensic Investigator training
-
-
EnCase® v7 Computer Forensics training
-
-
FireEye – Monitor/Admin user training
-
-
Giving feedback and appraisal interviews
-
-
IBM Security QRadar SIEM 7.1 Advanced
-
-
IBM Security QRadar SIEM 7.1 Foundations
-
-
IBM/Qradar Administrator training
-
-
IBM/Qradar Developer Introduction
-
-
IT Security Professional
-
-
ITIL Foundation Certificate in IT Service Management
-
-
Identifying and handling electronic evidence workshop (ENISA)
-
-
Insights Discovery - professional development and communication training, teambuilding
-
-
Malware discovery and indicators of compromise (CERT)
-
-
Mobile threats incident handling workshop (ENISA)
-
-
SEC 504: Hacker Techniques, Exploits & Incident Handling
-
-
SEMAFOR 2016 Conference
-
-
The George Washington University School of Business - Project Planning, Analysis and Control
-
-
Understanding and Mitigating Botnets (The Honeynet Project Workshop)
-
Projets
Prix et distinctions
-
Service Excellence Award
IBM
In recognition of the achieving professional excellence and dedication to every client's success in 2014
Langues
-
angielski
Capacité professionnelle complète
-
niemiecki
Notions
-
polski
Bilingue ou langue natale
Organisations
-
Computer Forensics Institute
member
- aujourd’huiwww.siis.org.pl
-
Financial Services Information Sharing and Analysis Center (FS-ISAC)
Threat Intelligence analyst
-
Recommandations reçues
12 personnes ont recommandé Filip
Inscrivez-vous pour y accéderPlus d’activités de Filip
-
10 months of preparation are coming to an end. In just two days, we’ll be welcoming leaders and experts from over 30 countries! With true Swiss…
10 months of preparation are coming to an end. In just two days, we’ll be welcoming leaders and experts from over 30 countries! With true Swiss…
Aimé par Filip Nowak, MBA
-
5 years at Pentera 🚀 What a ride. When I joined Pentera, there was no France Benelux region, only a vision and a challenge: build it from scratch.…
5 years at Pentera 🚀 What a ride. When I joined Pentera, there was no France Benelux region, only a vision and a challenge: build it from scratch.…
Aimé par Filip Nowak, MBA
-
It is with great pleasure that I will deliver my inaugural presentation, titled Securing the Future: A Journey of Data-Driven Research in Safety and…
It is with great pleasure that I will deliver my inaugural presentation, titled Securing the Future: A Journey of Data-Driven Research in Safety and…
Aimé par Filip Nowak, MBA