• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Author / Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)

Ed Cabrera

Chief Cybersecurity Officer

Eduardo Cabrera is responsible for analyzing emerging cyber threats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran and former CISO of the United States Secret Service with experience leading information security, cyber investigative, and protective programs in support of the Secret Service integrated mission. He started his career investigating transnational cyber criminal groups targeting the financial and retail sectors. He proudly served on the Presidential Protective Division for President George W. Bush before transitioning to lead cyber forensic operations in support of Secret Service large-scale data breach investigations. He served as the Secret Service Strategic Advisor to the DHS National Cybersecurity & Communications Integration Center (NCCIC) where he led an interagency effort to share real-time actionable threat intelligence with Information Sharing and Analysis Organizations (ISAO) and critical infrastructure partners. He is a guest lecturer at New York University Polytechnic Institute, Computer Science and Engineering Department and was a contributing subject matter expert on law enforcement; cyber security strategy and policy; and computer forensics and network intrusion incident response for the 2014 Risk and Responsibility in a Hyperconnected World; 2012 Homeland Security Advisory Council Task Force on Cyber Skills Report; and 2012 Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Auditor (CISA). Twitter: @Ed_E_Cabrera

Exploits as a Service: How the Exploit Kit + Ransomware Tandem Affects a Company’s Bottom Line

  • Posted on:October 12, 2016
  • Posted in:Ransomware, Security, Vulnerabilities & Exploits
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0
Email may not be as secure as many people might think.

Blackhole Exploit Kit introduced the lucrative but hazardous exploit-kit-ransomware combo with CryptoLocker back in 2013. Soon after, other exploit kits, like Angler, Neutrino, Magnitude, and Rig, followed suit. At least 18 percent of known ransomware families now arrive via exploit kits. Note, though, that exploit kits have been distributing a plethora of threats since as…

Read More

BEC Scams – An Exploitation of Trust

  • Posted on:September 15, 2016
  • Posted in:Business, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Business Email Compromise (BEC) schemes have been growing exponentially since 2013. Since January 2015 alone, according to a June 2016 public service announcement from the FBI Internet Crime Complaint Center (IC3), there has been a 1,300 percent increase in losses. These schemes are quite simple in execution and are all focused on one thing –…

Read More

Protecting Your Enterprise against a New Generation of Cybercriminals

  • Posted on:September 7, 2016
  • Posted in:Business, Ransomware, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Cybercrime as a Service (CaaS) has been a growing trend throughout Deep Web forums for several years. Inexperienced and, quite frankly, lazy cybercriminals can purchase CaaS tools and services from more advanced operators to launch their own malware, spam, phishing and other malicious campaigns at the click of a button. These ready-made tool kits require…

Read More

Federal Agencies’ Compliance & Security Streamlined with AWS Quick Start and Deep Security

  • Posted on:June 20, 2016
  • Posted in:AWS, Cloud Computing, Cloud Security, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

We’ve heard for some time how each year is going to be the “Year of Cloud Computing,” but only in 2015 did we really see the momentum start to build in the public sector since the Cloud First Strategy was announced in 2011. We expect cloud adoption to grow exponentially over the next five years…

Read More

Understanding Ransomware and Exploring Solutions

  • Posted on:June 1, 2016
  • Posted in:Ransomware, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0
Ransomware strikes Macs for the first time.

Cyber extortion attacks on enterprises have grown exponentially in the last year and the ransomware families behind them have grown at a similar pace. We have blocked more than 100 million since October 2015. New families alone have grown 100% in the first six months of 2016, and we have detected and blocked more than 50 new…

Read More

DISA approves Deep Security – Federal CISOs need to be hunters, not the hunted

  • Posted on:April 7, 2016
  • Posted in:Business, Cloud, Compliance & Regulations
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0
The government is taking a more involved role in cyber security.

Governments around the world are facing an increasing challenge to contain the threat from  cyberspace. This is especially the case in the U.S.. Director of National Intelligence, James Clapper, is now claiming that cyber attacks have surpassed terrorism to become the number one challenge to national security. With this backdrop, it’s important that the U.S….

Read More

Protect your Supply Chain with a Third-Party Risk Management Program

  • Posted on:March 15, 2016
  • Posted in:Business, Cybercrime, Executive Insight
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Over the last 20 years, technology advancements, globalization and the Internet have revolutionized business practices and efficiency. Supply chain management is one of the areas that has benefitted most, as companies can now work with suppliers and business partners around the world. The bad news is the same holds true for cybercriminals and their networks…

Read More

RSA 2016: Top Four Takeaways

  • Posted on:March 10, 2016
  • Posted in:Internet of Everything, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Attracting the best and brightest in the field, the annual RSA Conference plays an important role in keeping security professionals across the globe connected and educated. Last week, we witnessed several cybersecurity trends and developments including the federal government’s involvement with security, the ease of automotive hacking in modern vehicles, potential threats targeting connected medical…

Read More

Critical Infrastructure Under Attack: The Vulnerability of Converged IT-ICS Networks

  • Posted on:January 22, 2016
  • Posted in:Critical Infrastructure, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0
The electrical gird is a growing target of cyber attacks.

Successful cyber attacks against critical infrastructure have been steadily increasing in frequency and complexity over the last ten years. In our 2015 “Cyber Security of Critical Infrastructures in Americas” report, more than 575 public and private owner operators from 20 countries were surveyed, and the results were beyond eye-opening. Fifty-three percent said critical infrastructure (CI)…

Read More

Knowledge is Power: The societal and business impact of big data

  • Posted on:December 15, 2015
  • Posted in:Business, Security, Vulnerabilities & Exploits
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Data. It has become the true currency that nations, businesses and now consumers depend on daily. After all, this is not new. Information is power and always has been. Timely and accurate information has been sought and attained by nations to become powerful both economically and militarily, and by businesses to profit and succeed. Historically,…

Read More
Page 4 of 5 « ‹ 345 ›

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.