Douglas McKee
Certified Instructor CandidateExecutive Director of Threat Research at SonicWall
Specialities
Offensive Operations
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsOffensive Operations
Douglas McKee is the Executive Director of Threat Research at SonicWall where he and his team focus on identifying, analyzing, and mitigating critical vulnerabilities through daily product content. He is also the lead author and instructor for SANS SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk. Doug is a regular speaker at industry conferences such as DEF CON, Blackhat, Hardware.IO and RSA, and in his career has provided software exploitation training to many audiences, including law enforcement. His research is regularly featured in publications with broad readership including Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
Supply chain attacks go unnoticed on average for 235 days and do more damage as a result of us not having a deep understanding of the products being used on a network. Product security testing helps obtain a comprehensive understanding of how choosing to use a particular product in your organization can affect your threat model and risk posture.
Join SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk course author Douglas McKee for an insightful webcast presentation as he walks through the work flow of product security assessment depicted in the Overall Product Security Assessment Process poster.
Recent news of vulnerabilities in hardware appliances firmware such as Ivanti and Fortinet highlight the difficulty of securing complex digital supply chains. Having an in-depth understanding of what you put on your network is vital to implementing a zero-trust approach and managing risk appropriately.
As cyber threats grow in sophistication and scale, organizations must rely on actionable, contextualized Cyber Threat Intelligence (CTI) to secure operations, mitigate risks, and meet evolving business or mission objectives. Yet, CTI professionals face significant challenges, from filtering actionable insights from overwhelming volumes of data to countering rapidly evolving threat tactics like AI-driven attacks and fileless malware. Limited skilled resources, siloed systems, and the increasing sophistication of threat actors further compound the complexities of building effective CTI programs. The CTI Summit Solutions Track 2025 will address these pressing issues. Through expert-led sessions and real-world case studies, the summit will explore solutions for overcoming common obstacles, such as integrating CTI into existing security infrastructures, ensuring timely dissemination of intelligence, and fostering collaboration through standardized frameworks. Presentations will also highlight strategies for bridging the skills gap, aligning CTI outputs with business objectives, and combating adversaries’ use of advanced automation. Whether you are a CISO, SOC manager, threat hunter, or analyst, this summit offers the tools, knowledge, and strategies to turn CTI challenges into opportunities for a stronger, more adaptive cybersecurity posture. Join us for part one of this virtual event to learn how cutting-edge solutions and collaborative approaches transform CTI into a critical enabler of cyber resilience.
As cyber threats grow in sophistication and scale, organizations must rely on actionable, contextualized Cyber Threat Intelligence (CTI) to secure operations, mitigate risks, and meet evolving business or mission objectives. Yet, CTI professionals face significant challenges, from filtering actionable insights from overwhelming volumes of data to countering rapidly evolving threat tactics like AI-driven attacks and fileless malware. Limited skilled resources, siloed systems, and the increasing sophistication of threat actors further compound the complexities of building effective CTI programs.The CTI Summit Solutions Track 2025 will address these pressing issues. Through expert-led sessions and real-world case studies, the summit will explore solutions for overcoming common obstacles, such as integrating CTI into existing security infrastructures, ensuring timely dissemination of intelligence, and fostering collaboration through standardized frameworks. Presentations will also highlight strategies for bridging the skills gap, aligning CTI outputs with business objectives, and combating adversaries’ use of advanced automation.Whether you are a CISO, SOC manager, threat hunter, or analyst, this summit offers the tools, knowledge, and strategies to turn CTI challenges into opportunities for a stronger, more adaptive cybersecurity posture. Join us to learn how cutting-edge solutions and collaborative approaches transform CTI into a critical enabler of cyber resilience.
As software and hardware supply chains grow more complex and globally interconnected, they have also become prime targets for attackers.
Review relevant educational resources made with contribution from this instructor.