Jerod Brennen

Founder and Principal Consultant Brennen Consulting

  • South Charleston OH

I help clients protect their businesses by building effective, efficient, forward-thinking cybersecurity programs.

Contact

Biography

By day, I'm a strategic advisor, virtual CISO, public speaker, & storyteller.

By night, I'm a husband, father, writer, filmmaker, martial artist, musician, and gamer. I've earned every gray hair in my beard, having spent my career serving as a cybersecurity leader in public utilities, retail, higher education, consulting, and technology.

I love to share what I've learned over the years every chance I get: at local and regional professional meetings, at larger conferences, and online via blogs and podcasts. I've published multiple online information security courses with Pluralsight and LinkedIn Learning, and I teach courses in person, both domestically and internationally.

I bring a unique combination of perspective and experience to the table when helping organizations improve their cybersecurity programs, and I'd love to help you make those same improvements, focusing on the business value of an effective, efficient, forward-thinking cybersecurity program.

At the end of the day, I just want to help folks get one step closer to doing what they want to do securely.

Industry Expertise

Security
Computer/Network Security
Information Technology and Services

Areas of Expertise

Cyber Security
Information Security
Identity and Access Management
Web Application Security

Education

Franklin University

Post-Secondary Study

Computer Science

Capital University

Bachelor of Music

Music Education

Affiliations

  • ISSA
  • (ISC)2

Languages

  • English

Media Appearances

Experts give advice on how to prevent baby monitor hacking

10TV  tv

2019-07-15

Interviewed regarding security advice for consumer-based technology

View More

What it takes to be a security architect

CSO Online  online

2019-06-10

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.

View More

A Practical Approach to OSINT Gathering

PenTest Magazine  print

2019-09-01

Social engineering is (and will continue to be) an excellent technique to use during your pentests. If social engineering attacks are in-scope, then knowing the names and titles of your targets will help you craft more effective phishing campaigns. If social engineering isn’t in-scope, you can still use this OSINT to collect valid email addresses (for login usernames), to build out possible password lists, and to answer secret questions in password management portals.

View More

Event Appearances

Enterprise Log Management

Central Ohio InfoSec Forum  Columbus, OH

2006-05-17

Sustainable PCI Compliance

Central Ohio InfoSec Summit  Columbus, OH

2008-05-13

How to Pwn the Data Center

Ohio Information Security Conference  Dayton, OH

2009-03-12

Show All +

Sample Talks

Information Security Management 101: The Fundamentals

Information security professionals interact with every facet of the business, and the information security manager is expected to demonstrate the proverbial “mile wide, inch deep” understanding of all things security-related. We can do more with less by implementing and maintaining an ISO-based information security program. This presentation will give you the tools and knowledge you need to be successful in any organization.

Style

Availability

  • Keynote
  • Panelist
  • Workshop Leader

Fees

$0 to $5000*Will consider certain engagements for no fee

Courses

Security Testing Essential Training

To provide your organization with confidence, you need to perform testing to prove it's secure. However, not all security testing is the same. A risk assessment is not a vulnerability assessment; a penetration test won't measure compliance. For a successful career, a security analyst needs to have an understanding of the many different types of security testing and know when and how to implement them. This course provides the resources you need to set up a testing environment, plan assessments, identify targets, and begin executing security tests. Instructor Jerod Brennen also helps you analyze test results and draft a report of your findings. Plus, see popular testing frameworks tools in action, include Nmap, Nessus, Wireshark, Lynis, OWASP ZAP, Aircrack-ng, and hashcat, as run on a Kali Linux virtual machine.

View more

Online Application Security Testing

Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on online testing, using security scanning, penetration testing, and vulnerability testing to validate code and uncover vulnerabilities. He explains the difference between positive and negative, manual and automated, and production and non-production testing, so you can choose the right kind for your workflow. The hands-on sections—with demos of popular tools such as Fiddler, Burp Suite, and OWASP OWTF—prepare you to apply the lessons in the real world.

View more

Offline Application Security Testing

Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on offline testing activities: preparing test plans, policies, and other documentation and conducting offline source code reviews. He also explains how to conduct offline testing for the OWASP Top Ten vulnerabilities. Along the way, you can become familiar with best practices around security in the SDLC. The hands-on sections—with demos of popular tools such as Codacy and SonarQube—prepare you to apply the lessons in the real world.

View more

Show All +

Articles

The Curse of the Information Security Professional

Medium

Jerod Brennen

2018-04-04

Insights into some of challenges we face as information security professionals.

View more

It’s time for a common sense security framework

Help Net Security

Jerod Brennen

2017-06-05

An introduction to the Common Sense Security Framework (CSSF)

View more