“Lester was an excellent partner to work with. He knew how to manage the different resources and take full advantage of CDW resources to find the best solutions. He also gave clear and timely communication which made it easier to give him better discounts.”
About
I have a holistic approach to enterprise-wide computer and information security that…
Contributions
Activity
-
Join me for the Online Session at GirlScript Summer of Code on 28th July 2024 7 PM IST as i uncover how we can apply the Fin-ops concept to Devops…
Join me for the Online Session at GirlScript Summer of Code on 28th July 2024 7 PM IST as i uncover how we can apply the Fin-ops concept to Devops…
Liked by Lester Nichols
-
Honoured and humbled to be named "Influencer Titan in Cybersecurity" in the inaugural CF100 India 2024 edition. To be featured alongside top 100…
Honoured and humbled to be named "Influencer Titan in Cybersecurity" in the inaugural CF100 India 2024 edition. To be featured alongside top 100…
Liked by Lester Nichols
-
Hi, Black Hat! It’s been an excellent morning in the CISO Summit. I’m looking forward to more great sessions and conversations all through this…
Hi, Black Hat! It’s been an excellent morning in the CISO Summit. I’m looking forward to more great sessions and conversations all through this…
Liked by Lester Nichols
Experience
Education
Licenses & Certifications
-
Certified Information Systems Security Professional - (CISSP®)
(ISC)2
Issued ExpiresCredential ID 108376 -
Certified Perimeter Protection Analyst (GPPA)
GCIA
Issued ExpiresCredential ID 3775 -
Certified Enterprise Defender - (GCED)
GIAC
Issued ExpiresCredential ID 716 -
Security Essentials - (GSEC)
GIAC
Issued ExpiresCredential ID 31718 -
MS Certified Professional – (MCP)
Microsoft
Credential ID 1308205 -
MS Certified Systems Administrator 2003 – (MCSA)
Microsoft
Credential ID 1308205 -
Security+
CompTIA
Credential ID COMP001006079180
Publications
-
Cybersecurity Architect’s handbook
Packt Publishing (Birmingham, U.K.)
Cyber threats pose ever-growing risks, yet security measures often lag behind. As organizations increasingly rely on interconnected technologies, the need for robust yet flexible cybersecurity architecture becomes imperative. This book equips you to meet that need. It provides IT and security professionals with a comprehensive guide to becoming proficient cybersecurity architects capable of designing and evolving strategic defenses tailored to unique environments.
Spanning foundations…Cyber threats pose ever-growing risks, yet security measures often lag behind. As organizations increasingly rely on interconnected technologies, the need for robust yet flexible cybersecurity architecture becomes imperative. This book equips you to meet that need. It provides IT and security professionals with a comprehensive guide to becoming proficient cybersecurity architects capable of designing and evolving strategic defenses tailored to unique environments.
Spanning foundations, career pathways, and advancements, the book explores core tenets of security alongside real-world implementation. Early chapters establish critical baseline knowledge regarding key concepts such as confidentiality, networking, risk management, and compliance. The discussion then progresses to navigating career growth as an architect, highlighting crucial skills such as documentation, vendor management, and team collaboration. Advanced sections detail processes for selecting and implementing controls, aligning security with business objectives, and cultivating personal adaptability amid constant change.
Throughout, the emphasis remains practical and actionable. Theories come alive through concrete examples drawn from diverse organizational settings. Labs, diagrams, and exercises immerse you in applying concepts firsthand. Those new to cybersecurity gain indispensable orientation while current professionals discover fresh perspectives. -
Computer Security Handbook 6th Edition
Wiley
Bosworth, S., Kabay, M. E., & Whyne, E. Editors
Chapter 38: Writing Secure Code (Co-Authored with M. E. Kabay and Timothy Braithwaite) - This updated chapter discusses the fundamentals in writing secure code. -
Computer Security Handbook 5th Edition
Wiley
Bosworth, S., Kabay, M. E., & Whyne, E. Editors
Chapter 38: Writing Secure Code (Co-Authored with M. E. Kabay and Timothy Braithwaite) - This Chapter discusses the fundamentals in writing secure code.
Recommendations received
8 people have recommended Lester
Join now to viewMore activity by Lester
-
Latest article from Sniper Central https://lnkd.in/gF9H76Kx
Latest article from Sniper Central https://lnkd.in/gF9H76Kx
Liked by Lester Nichols
-
Topping Talks Ep40 is out! Also Tech for Tint Promo! Tune in to hear part 2 of David Chukhman's story of tinting cars as a kid to building his own…
Topping Talks Ep40 is out! Also Tech for Tint Promo! Tune in to hear part 2 of David Chukhman's story of tinting cars as a kid to building his own…
Liked by Lester Nichols
-
All good things must end, but its been an absolute pleasure to teach at #blackhatusa! I can't wait to see what exciting and new opportunities to…
All good things must end, but its been an absolute pleasure to teach at #blackhatusa! I can't wait to see what exciting and new opportunities to…
Liked by Lester Nichols
-
System updates are a necessary part of maintaining a secure and efficient IT infrastructure. While they can introduce challenges, particularly in…
System updates are a necessary part of maintaining a secure and efficient IT infrastructure. While they can introduce challenges, particularly in…
Shared by Lester Nichols
-
Here we go! #blackhatusa #bhusa Black Hat Applied Technology Academy OffSec Informa
Here we go! #blackhatusa #bhusa Black Hat Applied Technology Academy OffSec Informa
Liked by Lester Nichols
-
I use several different firewalls within my home network, from different vendors and for different requirements. With this in mind, OPNsense just…
I use several different firewalls within my home network, from different vendors and for different requirements. With this in mind, OPNsense just…
Shared by Lester Nichols
-
I use several different firewalls within my home network, from different vendors and for different requirements. They all have pros and cons and part…
I use several different firewalls within my home network, from different vendors and for different requirements. They all have pros and cons and part…
Shared by Lester Nichols
-
I return to work in a few days from paternity leave after welcoming our sixth child, overwhelmed with gratitude and appreciation. This time away has…
I return to work in a few days from paternity leave after welcoming our sixth child, overwhelmed with gratitude and appreciation. This time away has…
Liked by Lester Nichols
-
Excited to share that I was awarded the Star Performer of the Month for May! Receiving this news on my birthday (it’s not today) made it even more…
Excited to share that I was awarded the Star Performer of the Month for May! Receiving this news on my birthday (it’s not today) made it even more…
Liked by Lester Nichols
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Lester Nichols in United States
-
Lester Nichols III
Managing Attorney at the Nichols Law Group
-
Lester Nichols
Inventory Management Spc. at Department of Veterans Affairs
-
Les Nichols
-
Lester Nichols
Independent Contractor
32 others named Lester Nichols in United States are on LinkedIn
See others named Lester Nichols