Mitch Mayne

Mitch Mayne

San Francisco, California, United States
2K followers 500+ connections

Articles by Mitch

See all articles

Contributions

Activity

Join now to see all activity

Volunteer Experience

  • San Francisco Human Rights Commission Graphic

    Lesbian, Gay, Bisexual and Transgender (LGBT) Advisory Committee

    San Francisco Human Rights Commission

    - Present 11 years 9 months

    Civil Rights and Social Action

    The Lesbian Gay Bisexual Transgender Advisory Committee (LGBTAC), established in 1975, provides assistance and advice to the Commission regarding discrimination against the LGBT communities, advocates for the civil rights of persons with AIDS/HIV, and educates the LGBT communities about a diverse range of issues that impact their communities.

  • Goodwill Industries International Graphic

    Volunteer | SF SPCA; Holiday Food Drive (Mormons)

    Goodwill Industries International

  • The Church of Jesus Christ of Latter-day Saints Graphic

    Bishopric of San Francsico Bay Ward

    The Church of Jesus Christ of Latter-day Saints

  • San Francisco Pride Graphic

    Volunteer Counselor | LGBT Mormons; Leader of Mormon contingent

    San Francisco Pride

    Pride Annual Brunch (Attendee)
    Lead and organize the Mormon Contingent SFO pride parade (yearly)

  • San Francisco Human Rights Commission Graphic

    Volunteer | LGBT Task Force Committee

    San Francisco Human Rights Commission

Publications

  • How to Stack Your Resiliency Dominos (and what to do if they fall)

    -

    𝗜𝘁’𝘀 𝗮𝗻 𝗶𝗹𝗹𝘂𝘀𝗶𝗼𝗻 𝘁𝗼 𝗯𝗲𝗹𝗶𝗲𝘃𝗲 𝗱𝗲𝗽𝗹𝗲𝘁𝗶𝗻𝗴 𝗺𝘆𝘀𝗲𝗹𝗳 𝗯𝗲𝗻𝗲𝗳𝗶𝘁𝘀 𝗮𝗻𝘆𝗼𝗻𝗲 𝗼𝗿 𝗮𝗻𝘆𝘁𝗵𝗶𝗻𝗴.

    We’ve been hearing a lot lately about mental health in cybersecurity—and with good reason. In fact, cyber marketing leaders Anna Seacat and Kate Reed posted on this same phenomena a few days ago. And last year I worked with IBM Security X-Force on a study of incident responders who stated that while a deep-seated sense of duty to help and protect others…

    𝗜𝘁’𝘀 𝗮𝗻 𝗶𝗹𝗹𝘂𝘀𝗶𝗼𝗻 𝘁𝗼 𝗯𝗲𝗹𝗶𝗲𝘃𝗲 𝗱𝗲𝗽𝗹𝗲𝘁𝗶𝗻𝗴 𝗺𝘆𝘀𝗲𝗹𝗳 𝗯𝗲𝗻𝗲𝗳𝗶𝘁𝘀 𝗮𝗻𝘆𝗼𝗻𝗲 𝗼𝗿 𝗮𝗻𝘆𝘁𝗵𝗶𝗻𝗴.

    We’ve been hearing a lot lately about mental health in cybersecurity—and with good reason. In fact, cyber marketing leaders Anna Seacat and Kate Reed posted on this same phenomena a few days ago. And last year I worked with IBM Security X-Force on a study of incident responders who stated that while a deep-seated sense of duty to help and protect others was cornerstone to why we do what we do (definitely true for me), it can come at a cost.

    That study revealed 67% of responders experience anxiety in their daily lives, and nearly 65% of have sought mental health assistance.

    I’m not immune to that anxiety, either. On September 13, I join Orriant to talk about how anxiety manifests in my professional life, and more importantly—the tools I use to keep my balance.



    https://lnkd.in/g_jXVPTv

    See publication
  • Security Podcast Host: Into the Breach

    -

    Into the Breach: I focus on real-world cyber issues we face today--and I do it in a way everyone can understand. I feature variety of cybersecurity professionals to help you better understand the world of cyber. You’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty.

    See publication
  • Security Podcast Host: Into the Breach | 2023 Cybersecurity Predictions

    -

    In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is Dan Lohrmann, a well-known voice in cybersecurity whose resume boasts an impressive list of positions in cyber leadership in both the public and private sector, in addition to authorship of three books on cybersecurity.

    Dan publishes an annual review of top cyber organization predictions (check out Part One and Part Two). Think of them like a content analysis of over two dozen…

    In this episode, we’ll use 2022 as a lens to foretell what this year may have in store for us. Joining me is Dan Lohrmann, a well-known voice in cybersecurity whose resume boasts an impressive list of positions in cyber leadership in both the public and private sector, in addition to authorship of three books on cybersecurity.

    Dan publishes an annual review of top cyber organization predictions (check out Part One and Part Two). Think of them like a content analysis of over two dozen industry leading reports. Among those surveyed is the 2022 IBM Security X-Force Threat Intelligence Index and our annual predictions blog published just last month. And of course, I’d miss the chance to humble-brag if I didn’t tease the fact that we’ll be releasing our 2023 Threat Intelligence Index in early February, too, so stay tuned for that one.

    Given the hours he’s devoted to analyzing the market predictions, Dan’s view is both broad and deep. We’re going to utilize his expertise to focus on a few hot topics for 2023:

    · Ransomware: How it will evolve, and who may be targeted

    ·Social engineering: How increased sophistication (including attempts to bypass MFA) may impact business

    ·Cyber insurance: Will it become more difficult to get in 2023

    ·The Ukraine war: What fallout we might expect this year

    ·Crypto and social media: Given the tumult in 2022, what we might see changing both on a market and a policy front.

    Join us, and together we’ll venture Into the Breach.

    See publication
  • Security Podcast Host: Into the Breach | Curse of Cassandra or Hype of Chicken Little? Sorting Out Fact From Fiction On Operational Technology Security Risks

    -

    Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting…

    Attacks on operational technology (OT)--gas pipelines, electrical grids, banking services—are on the rise. In this episode, we speak with Chris Kubecka about how these incidents can affect economies and public safety in every geography, and how we might defend against them. Chris is the Chair of the Cyber Program at the Middle East Institute (MEI) and has brought Operational Technology safety front and center across the globe. She details how these incidents can be a serious breach affecting economies around the world.

    See publication
  • Security Podcast Host: Into the Breach | Cybersecurity Superheroes Next Gen: How Higher-Ed Helps Them Find Their Crime-Fighting Niche

    -

    Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota State University professor Chris Veltsos has more than two decades of teaching and mentoring the next generation of cybersecurity professionals. He unpacks what he teaches in the classroom, what he wishes could be taught, and what higher ed can do to…

    Criminals don’t seek degrees in cybercrime from universities. So where do they learn their skills? And what is the role of higher ed in helping keep smart minds on the right side of the law and preparing them to defend against attacks? Minnesota State University professor Chris Veltsos has more than two decades of teaching and mentoring the next generation of cybersecurity professionals. He unpacks what he teaches in the classroom, what he wishes could be taught, and what higher ed can do to help keep bright minds on the right track.

    See publication
  • Security Podcast Host: Into the Breach | I'd Like to Buy a Vowel: The Price of Poor Communication During a Data Breach

    -

    When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, brands can erode, and corporate names can become synonymous with high-profile attacks. Loren Dealy Mahler has built a career on creating organization-wide communication plans, and talks about the importance of having the right people using the right…

    When there is a cyber incident, the focus is often the technical side of the attack and remediation. Another important aspect of breach management—communication—often takes a back seat. When communication is done badly, consumers can lose trust, brands can erode, and corporate names can become synonymous with high-profile attacks. Loren Dealy Mahler has built a career on creating organization-wide communication plans, and talks about the importance of having the right people using the right words at the right time.

    See publication
  • Security Podcast Host: Into the Breach | Into the Breach - Trailer

    -

    Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really?

    On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you…

    Whether you are an individual who is always on your phone, an IT professional who lives through your laptop, or an organization that manages a vast amount of clients and services, a security breach can happen at any moment. Many of us think that we are prepared, but are we really?

    On this podcast, you’ll hear from a variety of cybersecurity professionals to better understand the underground world of cyber and you’ll walk away better prepared with tales, tools, and support to help you thrive in the face of uncertainty…

    See publication
  • Security Podcast Host: Into the Breach | Lured To The Dark Side The Criminal Hacker Journey Pt. 2

    -

    Part 2 of this two-part episode looks at the flip side of criminal hacks —the defense. Law enforcement and private security teams work diligently to defend against cyber threats. And they often work better together. We speak with Nick Rossmann, former head of IBM X-Force with a background in both the CIA and FBI. He explains how threat intelligence is evolving to keep pace with the booming cybercrime industry, and how the dark side of the industry is becoming a full-service economy.

    See publication
  • Security Podcast Host: Into the Breach | Lured To The Dark Side: The Criminal Hacker Journey Pt. 1

    -

    In Part 1 of this two-part episode, we dive into the mind of the criminal hacker —what motivates them, how they get started, who they target, and whether they deserve a second chance. Former BBC journalist, Chris Quevetra, sits down with us to discuss an organization he investigated that takes young criminal threat actors and turns them into contributing members of society —and turns them into valuable security assets for companies.

    See publication
  • Security Podcast Host: Into the Breach | Now You See Me, Now You Don't: How Cryptocurrency Regulation Can Make it Harder For Cybercriminals to Escape

    -

    Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn’t disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to…

    Cryptocurrency has become the favored tender for ransomware groups. Because of the intricacies of blockchain technology, it is often difficult for law enforcement to trace criminals who demand cryptocurrency payments. But is there a way to regulate cryptocurrency in a way that provides fewer hiding places for criminals—but doesn’t disrupt the market? We speak with Megan Stifel, Policy Officer at the Global Cyber Alliance, who as part of the Ransomware Task Force, issued the recommendation to closely regulate cryptocurrency—but still preserve the market.

    See publication
  • Security Podcast Host: Into the Breach | Operational Technology: The evolving threats that might shift regulatory policy

    -

    Host Mitch Mayne speaks with Roya Gordon of Nozomi Networks about the shifting operational technology (OT) threat landscape and how that is affecting regulatory policy. Using Nozomi Networks recent OT/IoT Security Report as a linchpin, they dive deeper into evolving attack types on critical infrastructure, how cyber insurance might change for this sector, and what we may see from a policy perspective in response to more aggressive threats.

    See publication
  • Security Podcast Host: Into the Breach | The threat landscape 2023: Top targets, top attack types, top geographies

    -

    Every year, the IBM Security X-Force team of cyber experts mine billions of data points to reveal today's biggest attack trends and patterns. In this episode, host Mitch Mayne is joined by Michael Worley, one of this year’s primary authors, and digs into the guts of the X-Force Threat Intelligence Index 2023 to uncover the continuously changing cybersecurity landscape and understand how to defend against the latest threats. Join us as we journey into 2023 — and Into the Breach.

    See publication

Courses

  • Course: Preparing the Organization: Security by Design

    -

  • Course: Producing Secure Software: Defending Containers - Introduction to Containers and Microservices

    -

  • Course: Producing Secure Software: OWASP Top 10 - Broken Access Control

    -

  • Course: Producing Secure Software: OWASP Top 10 - Insecure Design

    -

  • Course: Producing Secure Software: OWASP Top 10 - Vulnerable and Outdated Components

    -

  • Course: Protecting the Software and Producing Secure Software

    -

  • Course: Security and Privacy by Design for Software Development 101

    -

  • Crisis and continuity: New ERP strategies to help mitigate geopolitical risk

    -

  • Forrester Research Seminar: Predictions 2023 For Technology Leaders

    -

  • IBM Institute for Business Value Course: What is in store for banks and financial markets in 2023?

    -

  • IBV Online Seminar: 5 trends for 2023: Embracing chaos, taking charge

    -

  • IBV Online Seminar: The post-pandemic overconfidence trap: Five myths business leaders need to debunk

    -

  • IBV Seminar: IBV Quantum Decade: First, Second and Third edition

    -

  • IBV Seminar: Prosper in the Cyber Economy: Rethinking cyber risk for business transformation

    -

  • IBV Webinar – Sustainability: What you need to know to be successful in 2023

    -

  • Microsoft Office

    -

  • Online Seminar: Security, the cost of data breaches, and AI for Banking and Financial Markets

    -

  • Resilient

    -

  • Trello

    -

  • World Economic Forum Panel: Technology for a More Resilient World

    -

Projects

  • RSA 2023 Conference

    -

  • Accomplishments by the numbers

    -

    ➤ 211,300: Number of page views achieved by X-Force articles on SecurityIntelligence.com—the highest of any contributing organization—after implementation of strategic editorial calendar

    ➤ 300%: Annual download growth rate of the Definitive Guide to Ransomware, a technical thought leadership paper I conceptualized, coauthored and refresh annually

    ➤ 5-7K: Average number of downloads of Into the Breach, a popular podcast I conceptualized and delivered, available on Spotify and…

    ➤ 211,300: Number of page views achieved by X-Force articles on SecurityIntelligence.com—the highest of any contributing organization—after implementation of strategic editorial calendar

    ➤ 300%: Annual download growth rate of the Definitive Guide to Ransomware, a technical thought leadership paper I conceptualized, coauthored and refresh annually

    ➤ 5-7K: Average number of downloads of Into the Breach, a popular podcast I conceptualized and delivered, available on Spotify and Apple Podcasts. Features renowned guests discussing complex cybersecurity topics in simple terms.

    ➤ 100%: The increase in webcast attendance garnered after transforming them from static slideware presentations to engaging roundtable forums that fostered discussions on critical topics.

    ➤ 292,440: The number of downloads achieved by the X-Force Threat Intelligence Index, a comprehensive annual intelligence report I overhauled, coauthored and design directed.

    ➤ 110,575: The number of downloads of the Cloud Threat Landscape Report, an in-depth intelligence report I conceptualized, coauthored and design directed.

    ➤ 20+: The number of contributing writers I guide for SecurityIntelligence.com, utilizing candid feedback to help them enhance their communication skills.

  • Cybersecurity Columnist: SecurityIntellignce

    -

  • Host of Multiple Podcast Series

    -

  • Huffington Post Contributing Columnist

    -

  • IBM Films Presents: Hacked

    -

    Film short we did as part of the IBM Security Team. Find out how quickly a little bit of data can cause a whole lot of trouble when it falls into the wrong hands.

  • Mitch Mayne current resume

    -

    IBM Security X-Force | July 2017 – Present
    Editor in Chief/X-Force Content and Thought Leadership
    Assembled a comprehensive editorial strategy for X-Force, aligning threat intelligence, incident response, red teams, and cyber range teams, leading 12+ competency leaders.
    Demonstrate hands-on leadership in the development of major technical reports, such as the X-Force Threat Intelligence Index, Cost of a Data Breach Report and Cloud Threat Landscape Report…

    IBM Security X-Force | July 2017 – Present
    Editor in Chief/X-Force Content and Thought Leadership
    Assembled a comprehensive editorial strategy for X-Force, aligning threat intelligence, incident response, red teams, and cyber range teams, leading 12+ competency leaders.
    Demonstrate hands-on leadership in the development of major technical reports, such as the X-Force Threat Intelligence Index, Cost of a Data Breach Report and Cloud Threat Landscape Report. Applied expertise in up-levelling reports, accurately translating deep technical data into compelling story lines in a way that made data accessible and interesting to a broad audience.
    Guide 20+ contributing writers for SecurityIntelligence.com.
    Revitalized all X-Force content, resulting in significant increases in web page views, downloads, and revenue opportunities.
    Transformed external webcasts from static slideware presentations to engaging roundtable forums that fostered discussions on critical topics, resulting in over 100% increase in attendance.
    Individually produce and publish numerous thought leadership articles covering a wide range of cybersecurity topics.

    Senior Cyber Crisis Communication Consultant
    Develop proactive and reactive cyber crisis communication plans that address all phases of incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity.
    Develop and execute tabletop exercises and cyber range exercises focused on communications processes as well as part of an organization-wide incident response plan.
    Write and edit a variety of communications materials such as holding statements, blog posts, press releases, employee communications, and media statements.
    Deliver reactive crisis communications to IBM Consulting clients in the aftermath of cybersecurity incidents, working alongside technical teams to assess risks as events unfold.

  • Personal Interests

    -

    Current Affairs, Cybersecurity, Health & Fitness

  • Personal Interests

    -

    Weight Lifting, Health & Fitness, Clean Organic Food, Reading, San Francisco 49ers Football, San Francisco Giants Baseball, LGBTQ Advocacy.

  • RSA 2022 Conference

    -

  • Selected accomplishments and areas of expertise

    -

    Selected Accomplishments
    -Developed X-Force Incident Command Cyber Crisis Response Program, defining how IBM identifies, communicates, and orchestrates a response to pandemic-level cyberattacks.
    -Worked directly with clients to create best practices proactive and reactive crisis communication templates and playbooks, enabling them to deliver an organization-wide orchestrated response to cyberattacks.
    -Serve as the acting Chief of Staff and senior leadership advisor. Prioritize overall…

    Selected Accomplishments
    -Developed X-Force Incident Command Cyber Crisis Response Program, defining how IBM identifies, communicates, and orchestrates a response to pandemic-level cyberattacks.
    -Worked directly with clients to create best practices proactive and reactive crisis communication templates and playbooks, enabling them to deliver an organization-wide orchestrated response to cyberattacks.
    -Serve as the acting Chief of Staff and senior leadership advisor. Prioritize overall team performance by providing strong leadership skills. Collaborate closely with executive team and staff to create and execute a people-centric vision, including retention strategies, talent acquisition, and employee engagement initiatives.
    -Serve as the Editor in Chief for X-Force content and publications, resulting in X-Force content becoming a top performer with the most volume and highest performing content of the Security Business Unit.
    -Conceptualized and delivered multiple high-reach podcast series, reports and other content, establishing X-Force as a differentiated thought leader in threat intelligence, incident response, and red teaming.

    Skills & Areas of Expertise
    Cyber Crisis Communication | Threat Intelligence | Cyber Incident Response | Brand Strategy | Creative Content Strategy | Senior Leadership Advisor | Crisis Communications Playbooks | Written and Verbal Communication | Thought Leadership | Client Consulting

Honors & Awards

  • Member of “IBM Top Talent”

    IBM

    Recognized by IBM Top Talent for consistently being a top contributor.

  • Successive Leadership Roles

    IBM

    Consistently Rated among the top performers in the IBM organization.

Languages

  • English

    Native or bilingual proficiency

Organizations

  • BigFix Enthusiasts

    Member

    A group for BigFix Enthusiasts. This is people who like BigFix, use BigFix, or would like to know more about BigFix.

  • Face-to-face business networking | Network After Work | SFO

    Member

    Network After Work is America’s premier face-to-face business networking company with monthly mixer events in over 80+ cities catering to over 4 million members.

  • IBM Business Partners

    Member

    Group for everyone who is connected to IBM through the Business Partner program

  • IBM SWG

    Member

    Group for current and past IBMrs in IBM Software Group.

  • Maturity Models and Cybersecurity Frameworks

    Member

  • Sales & Marketing Best Practices

    Member

    An info hub for sales people to share ideas, best practices, case studies and more on how to make the sales process faster and more efficient. Talk about how sales tools like Adobe EchoSign can help in that process.

  • SF IABC

    Member

    The San Francisco chapter of the International Association of Business Communicators offers a wide variety of resources to Bay Area members. The resources include professional development events, networking opportunities and other programs for corporate, nonprofit and independent communicators.

  • Software Channels

    Member

    A networking and discussion forum for software channel industry leaders.

  • Stanford Alumni

    Member

    The official Stanford Alumni LinkedIn group is open to verified Stanford alumni and current students. This group is a resource to help make professional connections, and share and find job opportunities, career events and advice. The group is generally alumni-led and self-moderated; your participation is important and appreciated. Commercial solicitation and funding requests are prohibited

Recommendations received

6 people have recommended Mitch

Join now to view

More activity by Mitch

View Mitch’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mitch directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Mitch Mayne

Add new skills with these courses