Skip to main content
  • Conferences
  • Speakers
  • Skillcamp
Notifications
  • Strategies for Online and Offline Success
    ×
  • That Will Get You Speaking Engagements in 2024
    ×
  • For a Meeting or Talk
    ×
  • SpeakerHub's commitment to innovation and user-centric design.
    ×
  • How to Make Your Public Speech Professional and Memorable
    ×
  • SIGN UP
  • SIGN IN
  1. Home
  2. Find a speaker
  3. Jerod Brennen
Jerod Brennen's cover banner
Jerod Brennen's picture

Jerod Brennen

Director Of Education
Central Ohio ISSA
Country or state 
United States
Available to 
Global
City 
Columbus
Fee 
Ask for pricing
Languages 
English
Volunteer
Yes

Personal Details

Bio

By day, I'm a security architect, advisor, speaker, and teacher.

By night, I'm a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it's fair to say that I've earned every gray hair in my beard, having spent my career fulfilling information security leadership roles in consulting, higher education, retail, and public utilities.

I like to share what I've learned over the years with local and regional information security professional organizations, at larger information security conferences, and online via blogs and podcasts. I also teach information security courses, online and in person, domestically and internationally.

At the end of the day, I just want to help folks get one step closer to doing what they want to do securely.

Current position (3)

Director Of Education

Central Ohio ISSA

Senior Advisor

The Cybersecurity Leadership Forum

Security Solutions Architect

One Identity

Degrees (2)
Computer Science
Franklin University
2002 to 2004
Music Education
Capital University
1993 to 1997

Presentations

Presentations (5)
Hacking Identity: A Penetration Tester's Guide to IAM

Know your opponent and know yourself. It held true for Sun Tzu 2500 years ago, and it holds true for pen testers today. A pen tester who has worked in sec ops role has a distinct advantage, especially if that pen tester has a solid grasp of the good, the bad, and the ugly of identity and access management (IAM) in an enterprise setting. For red teams, this presentation will cover pen testing tips and tricks to circumvent weak or missing IAM controls. For blue teams, we'll also cover the steps you can take to shore up your IAM controls and catch pen testers in the act.

A Common Sense Approach to Information Security

PCI. HIPAA. CFPB. We're KILLING small businesses with over-regulation in the name of security, while turning a blind eye to the fact that the cost of over-regulation is doing more harm than good, distracting business owners from realistically focusing on the risks that apply to their companies. It's time to have an open, honest conversation about a "common sense" security framework.

What You Need to Know about Open Source Intelligence Gathering (OSINT)

Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even know they are there. This presentation provides an introduction to many OSINT tools and techniques, as well as methods you can use to minimize your exposure.

Information Security Management 101: The Fundamentals

Information security professionals interact with every facet of the business, and the information security manager is expected to demonstrate the proverbial “mile wide, inch deep” understanding of all things security-related. We can do more with less by implementing and maintaining an ISO-based information security program. This presentation will give you the tools and knowledge you need to be successful in any organization.

Implementing an Effective Third Party Risk Management Program

How many third parties have access to your network, your apps, your data? How well do their security controls stack up against yours? As our reliance on third party service providers continues to increase, our ability to monitor and manage those relationships needs to keep pace. This presentation will provide you with tips, tricks, and tools you can use to implement an effective third party risk management program.

  • All (2)
  • Videos
  • Photos
  • Slides (1)
  • Press information (1)
This speaker hasn't uploaded any videos yet.
This speaker hasn't uploaded any photos yet.
Jerod Brennen
This speaker hasn't uploaded any one sheet yet.
What it takes to be a security architect

Books & Articles (1)

It's time for a common sense framework

Expertise (3)

Technology
Leadership
Information Technology and Services
Recommendations
Why choose me? 

If you're looking for a seasoned speaker who's both passionate and engaging, you just found him.

Similar to Jerod
  • Stefan Andréasson's picture
    Stefan
    Andréasson
    Management Consultant / Owner
    Salve Vitae HB
  • George Gkouvousis's picture
    George
    Gkouvousis
    CTO
    8web Interactive
  • Doug Thompson's picture
    Doug
    Thompson
    Professional Speaker
    The Doug Thompson LLC
  • Derval Cromie's picture
    Derval
    Cromie
    Certificate in Digital Marketing QQI Level 7, Sept
    Dublin Business School
  • Sean Farmar's picture
    Sean
    Farmar
    Director and Independent Consultant
    Indy Code Software Consultants Ltd
  • Speakers
  • Agencies
  • Events
  • How it works
  • Blog
  • Upgrade
  • Podcast
  • About us
  • Organizers
  • Terms of use
  • Privacy policy
  • FAQ
  • API
  • Contact
  • Corporate Speakers Bureau & CRM
  • Motivational speakers
  • Leadership speakers
  • Business speakers
  • Inspirational speakers
  • Keynote speakers
  • Corporate speakers
  • Celebrity speakers
  • Top 50 Business Speakers
  • Top 50 Leadership Speakers
  • Top 50 Motivational Speakers
  • Top 50 Technology Speakers

Get speaking tips & so much more!

Twice a month we send you speaking tips, training ideas and lots of useful updates.

© 2026 SpeakerHub
All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
  • SoundCloud