Brian Ventura
Certified InstructorPartner at Cyverity
Specialities
Cybersecurity Leadership
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCybersecurity Leadership
Brian Ventura, a Partner at Cyverity, an information security consulting firm specializing in governance, focuses on enterprise information security governance, risk, and compliance. He has more than 30 years of industry experience with a diverse background, including working in large, international organizations, small-medium businesses, government and private sector; advising, architecting, and assessing secure solutions. Brian has taught various SANS courses over the years, is the author of SEC566: Implementing and Auditing CIS Controls and SEC366: CIS Implementation Group 1.
Sometimes you might think we're getting behind schedule, but that's not the case: Brian knows where to spend his time. He has a good balance between covering the material and providing extra background or anecdotes.
Brian is an excellent instructor and mentor. I feel confident speaking about the CIS Controls, while before this course I did not have that confidence. Now it's up to me to continue to develop my skills. Thank you, Brian.
Brian was very knowledgeable, and it was obvious he has a great deal of experience. His insight has broadened my thinking as to ways to address the Critical Security Controls. The different scenarios covered in SEC566 were valuable.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
An organized, full-coverage risk register can maximize your cybersecurity resources while improving organizational security. Without including third-party risks, however, even the best risk register can fail to stop security incidents. Your risk framework needs to map to internal and external gaps to identify weaknesses and ensure complete coverage.
The Information Security industry has a large variety of solutions to stop attackers in their tracks! They claim to have tools to address every type of attack, and solutions that are silver bullets against all attackers. The current trends say machine learning and AI will solve our latest problems.
In this webcast, we will review the attack at Achilles Systems, their previous security capabilities, and why their existing controls were insufficient to help them resist the attack. Then we will dive deep into what could have been done to better tailor and augment those controls to reduce or eliminate the impacts from the attack.
A 90-minute, interactive, gamified leadership exerciseEnhance your proficiency in operational cybersecurity decision-making through immersive team-based simulations with Cyber42. Practice agile decision-making and information synthesis, key skills required for success in leadership roles. Engage in thought-provoking discussions and gain practical insights to improve your cybersecurity competencies.