About
I have over 15 years of experience consisting of a mixture of technical and leadership…
Articles by Jacob
-
Microsoft Intune "Available" Targeting and Win32 Patch Management Nightmares
Microsoft Intune "Available" Targeting and Win32 Patch Management Nightmares
By Jacob Hill
Contributions
-
How do you use data to make project decisions?
One of the best bosses I've ever had taught me this: tailor your presentation to your audience. It sounds very simple, but it is truly profound. Just think about how many issues in the workplace are caused by unclear communications - as perceived by the audience. What was clear to the engineer speaking wasn't understood by the CEO for example. If your audience is technical, then they may appreciate "in the weeds" data. But if you are presenting to the C-suite, focus on presenting higher level representations of the data and keep "in the weeds" slides as backups.
-
How do you use data to make project decisions?
Information governance is the key here. Laws, contractual requirements, and best practices will inform your information governance strategy. Your strategy needs to be future proofed so you aren't having to constantly make changes. If you're using Microsoft Teams, should you create separate Teams for each customer, or one large Team that holds data for multiple customers? The latter approach may not meet legal and contractual requirements because people who aren't supporting the project will likely be able to access that customer's data. And then there are data retention requirements! The bottom line is It's important that PM staff coordinate with governance, risk, and compliance (GRC) staff to account for legal and contractual risks.
Activity
-
At least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets…
At least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets…
Liked by Jacob Hill
-
Woo-Hoo!!! This is going to be incredible to hear from Stacy Bostjanick about #DIB Cybersecurity at CUI-CON | Seattle!!! CUI-CON | Seattle…
Woo-Hoo!!! This is going to be incredible to hear from Stacy Bostjanick about #DIB Cybersecurity at CUI-CON | Seattle!!! CUI-CON | Seattle…
Liked by Jacob Hill
-
Good Afternoon Team Ramstein. Stop by the #Hypori booth at the #NCSIGermanySummerSeries2024 located at #RamsteinAirbaseOfficersClub and learn about…
Good Afternoon Team Ramstein. Stop by the #Hypori booth at the #NCSIGermanySummerSeries2024 located at #RamsteinAirbaseOfficersClub and learn about…
Liked by Jacob Hill
Experience
Education
Licenses & Certifications
-
Certified Project Officer
Institute of Project Management
Issued -
-
CNSS 4016: National Training Standards for Risk Analyst
CNSS • Committee on National Security Systems
Issued -
-
-
-
-
-
-
-
-
Zscaler Internet Access Administrator (ZIA Administrator)
Zscaler
Issued ExpiresCredential ID ae97971f-e991-4fd0-ad73-3c02b2d58188 -
-
-
-
-
Courses
-
Growth Institute Scaling Up Master Business Course
-
-
Marine Corps Validator Course
-
-
Navy RMF Validator Course
ILT-NQV-201
Projects
-
CMMC Overview Course
I created this course to educate small and medium businesses and enable them to make informed decisions about the DoD's Cybersecurity Maturity Model Certification (CMMC).
The course also covers DFARS contractual requirements, NIST 800-171, FedRAMP, and more. -
(ISC)2 MFA Bypass Vulnerability Report
-
I discovered and reported a MFA bypass on (ISC)2's website isc2.org. I received media coverage from Brian Krebs and Infosecurity Magazine.
-
Publication of CVE-2021-42748 & CVE-2021-42749
-
Responsibly disclosed and coordinated with the vendor to resolve sensitive information disclosure vulnerabilities of a WordPress plugin that is installed on 200,000+ WordPress websites, and published the CVEs through MITRE.
These vulnerabilities allowed unauthenticated users to access sensitive protected information via WordPress's REST API. -
Udemy Course - "Build Beautiful Icon Based Web Designs with Font Awesome"
-
Do you want to learn how to easily create icon based web designs? Are you tired of using raster based icons (.bmp, .jpg, .png) that degrade when you resize them? Then this course is for you! This course demonstrates how to use and customize the icon based font library Font Awesome! Font Awesome can be used in web applications, web sites, and even in office products like Microsoft PowerPoint and Microsoft Word!
-
Chrome Extension - Content Filter
-
I developed a Chrome Extension which uses JavaScript Regular Expressions to locate and censor offensive text content within web pages.
Recommendations received
4 people have recommended Jacob
Join now to viewMore activity by Jacob
-
This just in from a CMMC advisory client that wrapped up last week: "the (CMMC) team was one of the best I’ve had the pleasure of partnering with"…
This just in from a CMMC advisory client that wrapped up last week: "the (CMMC) team was one of the best I’ve had the pleasure of partnering with"…
Liked by Jacob Hill
-
I am pleased to announce that I will be part of a cybersecurity panel for the SAME Space Coast Post July Monthly Meeting with David A. Africano…
I am pleased to announce that I will be part of a cybersecurity panel for the SAME Space Coast Post July Monthly Meeting with David A. Africano…
Liked by Jacob Hill
-
The Federal News Network Thomas Temin did a great podcast with Dave Hinchman the Director of IT and Cybersecurity Issues at the US Government…
The Federal News Network Thomas Temin did a great podcast with Dave Hinchman the Director of IT and Cybersecurity Issues at the US Government…
Liked by Jacob Hill
-
It's that time again. Time to network with folks in my connections. I want you to network with my connections and followers: I have 86,000…
It's that time again. Time to network with folks in my connections. I want you to network with my connections and followers: I have 86,000…
Liked by Jacob Hill
-
Are you still looking for a job in Cybersecurity?🔥 I have 105,637 folks in my network to share with you. Every weekend, I host a networking event…
Are you still looking for a job in Cybersecurity?🔥 I have 105,637 folks in my network to share with you. Every weekend, I host a networking event…
Liked by Jacob Hill
-
Congrats to all of these excellent whistleblower attorneys and their brave client. A hard fought victory in declined litigation!
Congrats to all of these excellent whistleblower attorneys and their brave client. A hard fought victory in declined litigation!
Liked by Jacob Hill
-
AT&T filed an 8-K yesterday for a material cybersecurity incident. This is the first time an 8-K has mentioned that the U.S. Department of Justice…
AT&T filed an 8-K yesterday for a material cybersecurity incident. This is the first time an 8-K has mentioned that the U.S. Department of Justice…
Liked by Jacob Hill
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jacob Hill in United States
729 others named Jacob Hill in United States are on LinkedIn
See others named Jacob Hill