www.rsaconference.com Open in urlscan Pro
2606:4700:4400::6812:2338  Public Scan

Submitted URL: https://links.e.rsaconference.com/els/v2/er9etwa6VmsX/Zko3QWJsUXpOV3dqcWFUSFBLL00vMGVlQkU5VjhEMWY5NlUvZWlpUXU0dWRHcDRSSjRTU1krNFdm...
Effective URL: https://www.rsaconference.com/experts/ira-winkler?utm_source=inhouse&utm_medium=email&utm_content=RSAC365-newsletter-edition4-...
Submission: On May 26 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Cookie Policy
RSAC's websites, online services, interactive applications, email messages, and
advertisements may use cookies and similar technologies to help us tailor your
experience, better understand your preferences, tell us which parts of our
websites you have visited, facilitate and measure the effectiveness of our
interest-based advertisements and web searches. Learn more by visiting our
Privacy Policy
Allow cookiesDismiss Cookie Preferences

×

EVENTS

 * 2022 USA
 * Unplugged
 * Virtual Series

LIBRARY

 * RSAC 365
 * Featured
 * Monthly Focus
 * Explore All Topics
 * Analytics, Intelligence & Response
 * Anti-Fraud
 * Application Security & DevOps
 * Business Perspectives
 * C-Suite View
 * Hackers & Threats
 * Identity
 * Mobile & IoT
 * Policy & Government
 * Privacy
 * Professional Development & Personnel Management
 * Protecting Data & Applied Crypto
 * RSAC Insights
 * Risk Management & Governance
 * Security Strategy & Architecture
 * Technology Operations & Infrastructure

EXPERTS

 * Find an Expert
 * Become a Contributor

MARKETPLACE

 * About Marketplace
 * Explore Marketplace

RSAC PROGRAMS

 * CISO Forum & CISO Boot Camp
 * CPE Credits & Partners
 * RSAC Gives Back
 * Innovation
 * Security Scholar
 * College Day
 * LoyaltyPlus
 * eFraud Global Forum
 * International Cybersecurity Forum
 * Executive Security Action Forum

ABOUT

 * Advisory Board
 * Code of Conduct
 * Community Resources
 * Diversity & Inclusion
 * Editorial Calendar
 * Press Releases
 * Sponsorship Opportunities
 * Themes
 * Contact Us

 * Events
 * Library
 * Experts
 * Marketplace
 * RSAC Programs
 * About
 * 

Where the world
talks security



EVENTS

×
2022 USA Unplugged Virtual Series


LIBRARY

×
RSAC 365 Featured Monthly Focus Explore All Topics Analytics, Intelligence &
Response Anti-Fraud Application Security & DevOps Business Perspectives C-Suite
View Hackers & Threats Identity Mobile & IoT Policy & Government Privacy
Professional Development & Personnel Management Protecting Data & Applied Crypto
RSAC Insights Risk Management & Governance Security Strategy & Architecture
Technology Operations & Infrastructure


EXPERTS

×
Find an Expert Become a Contributor


MARKETPLACE

×
About Marketplace Explore Marketplace


RSAC PROGRAMS

×
CISO Forum & CISO Boot Camp CPE Credits & Partners RSAC Gives Back Innovation
Security Scholar College Day LoyaltyPlus eFraud Global Forum International
Cybersecurity Forum Executive Security Action Forum


ABOUT

×
Advisory Board Code of Conduct Community Resources Diversity & Inclusion
Editorial Calendar Press Releases Sponsorship Opportunities Themes Contact Us
 1. Home
    >
 2. Experts
    >


IRA WINKLER

Chief Security Architect, Walmart

Biography Past Contributions 20 Presentations 11 Blogs 6 Podcasts 1 Webcasts 2

Ira Winkler, CISSP, is the Chief Security Architect for Walmart and author of
the books, You Can Stop Stupid and Security Awareness for Dummies. He is
considered one of the world’s most influential security professionals and was
named “The Awareness Crusader” by CSO magazine in receiving their CSO COMPASS
Award. Most recently, he was named 2021 Top Cybersecurity Leader by Security
Magazine. He has designed and implemented and supported security awareness
programs at organizations of all sizes, in all industries, around the world. Ira
began his career at the National Security Agency, where he served in various
roles as an Intelligence and Computer Systems Analyst. He has since served in
other positions supporting the cybersecurity programs in organizations of all
sizes.

View Ira's Profile on Twitter



UPCOMING CONTRIBUTIONS

US 22 Session

HUMAN SECURITY ENGINEERING: STOPPING USER INITIATED LOSS

On Jun 08, 2022

US 22 Session

CREATING AND MANAGING AN INTEGRATED BEHAVIORAL CYBERSECURITY PROGRAM

On Jun 09, 2022

Webcast

May 12, 2022 at 12 00 AM

THE METAVERSE OF VULNERABILITY

Read more >>

blog

THE SUPER BOWL OF CYBERSECURITY OUTRAGE

By on Feb 16, 2022

blog

THE ONLY REAL VALUE OF CERTIFICATIONS

By on Aug 03, 2021

presentation

HUMAN SECURITY ENGINEERING: STOPPING USER INITIATED LOSS

On May 20, 2021

blog

THE QUEEN’S GAMBIT AND THE SCIENCE OF HACKING

By on Nov 12, 2020

Webcast

Oct 05, 2020 at 12 00 AM

SECURITY AWARENESS: HOW EFFECTIVE IS THE HUMAN FIREWALL?

Read more >>

blog

ANALYZING TWITTER’S LATEST UPDATE: A “PROBLEM OF LEADERSHIP”

By on Aug 06, 2020

blog

IS SECURITY AWARENESS BECOMING THE LATEST CYBERSECURITY SNAKE OIL?

By on Jul 21, 2020

blog

THE TWITTER HACK IS A SECURITY SYSTEM FAILING, NOT AN AWARENESS FAILING

By on Jul 17, 2020

presentation

YOU CAN STOP STUPID

On Feb 28, 2020

presentation

30+ YEARS OF SECURITY AWARENESS EFFORTS: WHAT HAVE WE LEARNED?

On Jul 18, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Jul 16, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Mar 06, 2019

presentation

LESSONS LEARNED FROM 30+ YEARS OF SECURITY AWARENESS EFFORTS

On Mar 05, 2019

podcast

OUR OWN WORST ENEMY: TACKLING THE SOCIAL ENGINEERING PROBLEM




presentation

INCORPORATING SECURITY PRACTICES INTO BUSINESS PROCESSES

On Apr 19, 2018

presentation

AGE OF THE MACHINES IN CYBER—MACHINE LEARNING AND AI, THE NEXT FRONTIER

On Apr 19, 2018

presentation

HACKING CLOSED NETWORKS

On Apr 17, 2018

presentation

HACKING CLOSED NETWORKS (OVERFLOW)

On Apr 17, 2018

presentation

THE HUMAN EXPLOITATION KILL CHAIN

On Feb 15, 2017

Webcast

May 12, 2022 at 12 00 AM

THE METAVERSE OF VULNERABILITY

Read more >>

blog

THE SUPER BOWL OF CYBERSECURITY OUTRAGE

By on Feb 16, 2022

blog

THE ONLY REAL VALUE OF CERTIFICATIONS

By on Aug 03, 2021

presentation

HUMAN SECURITY ENGINEERING: STOPPING USER INITIATED LOSS

On May 20, 2021

blog

THE QUEEN’S GAMBIT AND THE SCIENCE OF HACKING

By on Nov 12, 2020

Webcast

Oct 05, 2020 at 12 00 AM

SECURITY AWARENESS: HOW EFFECTIVE IS THE HUMAN FIREWALL?

Read more >>

blog

ANALYZING TWITTER’S LATEST UPDATE: A “PROBLEM OF LEADERSHIP”

By on Aug 06, 2020

blog

IS SECURITY AWARENESS BECOMING THE LATEST CYBERSECURITY SNAKE OIL?

By on Jul 21, 2020

blog

THE TWITTER HACK IS A SECURITY SYSTEM FAILING, NOT AN AWARENESS FAILING

By on Jul 17, 2020

presentation

YOU CAN STOP STUPID

On Feb 28, 2020

presentation

30+ YEARS OF SECURITY AWARENESS EFFORTS: WHAT HAVE WE LEARNED?

On Jul 18, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Jul 16, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Mar 06, 2019

presentation

LESSONS LEARNED FROM 30+ YEARS OF SECURITY AWARENESS EFFORTS

On Mar 05, 2019

podcast

OUR OWN WORST ENEMY: TACKLING THE SOCIAL ENGINEERING PROBLEM




presentation

INCORPORATING SECURITY PRACTICES INTO BUSINESS PROCESSES

On Apr 19, 2018

presentation

AGE OF THE MACHINES IN CYBER—MACHINE LEARNING AND AI, THE NEXT FRONTIER

On Apr 19, 2018

presentation

HACKING CLOSED NETWORKS

On Apr 17, 2018

presentation

HACKING CLOSED NETWORKS (OVERFLOW)

On Apr 17, 2018

presentation

THE HUMAN EXPLOITATION KILL CHAIN

On Feb 15, 2017

Webcast

May 12, 2022 at 12 00 AM

THE METAVERSE OF VULNERABILITY

Read more >>

blog

THE SUPER BOWL OF CYBERSECURITY OUTRAGE

By on Feb 16, 2022

blog

THE ONLY REAL VALUE OF CERTIFICATIONS

By on Aug 03, 2021

presentation

HUMAN SECURITY ENGINEERING: STOPPING USER INITIATED LOSS

On May 20, 2021

blog

THE QUEEN’S GAMBIT AND THE SCIENCE OF HACKING

By on Nov 12, 2020

Webcast

Oct 05, 2020 at 12 00 AM

SECURITY AWARENESS: HOW EFFECTIVE IS THE HUMAN FIREWALL?

Read more >>

blog

ANALYZING TWITTER’S LATEST UPDATE: A “PROBLEM OF LEADERSHIP”

By on Aug 06, 2020

blog

IS SECURITY AWARENESS BECOMING THE LATEST CYBERSECURITY SNAKE OIL?

By on Jul 21, 2020

blog

THE TWITTER HACK IS A SECURITY SYSTEM FAILING, NOT AN AWARENESS FAILING

By on Jul 17, 2020

presentation

YOU CAN STOP STUPID

On Feb 28, 2020

presentation

30+ YEARS OF SECURITY AWARENESS EFFORTS: WHAT HAVE WE LEARNED?

On Jul 18, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Jul 16, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Mar 06, 2019

presentation

LESSONS LEARNED FROM 30+ YEARS OF SECURITY AWARENESS EFFORTS

On Mar 05, 2019

podcast

OUR OWN WORST ENEMY: TACKLING THE SOCIAL ENGINEERING PROBLEM




presentation

INCORPORATING SECURITY PRACTICES INTO BUSINESS PROCESSES

On Apr 19, 2018

presentation

AGE OF THE MACHINES IN CYBER—MACHINE LEARNING AND AI, THE NEXT FRONTIER

On Apr 19, 2018

presentation

HACKING CLOSED NETWORKS

On Apr 17, 2018

presentation

HACKING CLOSED NETWORKS (OVERFLOW)

On Apr 17, 2018

presentation

THE HUMAN EXPLOITATION KILL CHAIN

On Feb 15, 2017

Webcast

May 12, 2022 at 12 00 AM

THE METAVERSE OF VULNERABILITY

Read more >>

blog

THE SUPER BOWL OF CYBERSECURITY OUTRAGE

By on Feb 16, 2022

blog

THE ONLY REAL VALUE OF CERTIFICATIONS

By on Aug 03, 2021

presentation

HUMAN SECURITY ENGINEERING: STOPPING USER INITIATED LOSS

On May 20, 2021

blog

THE QUEEN’S GAMBIT AND THE SCIENCE OF HACKING

By on Nov 12, 2020

Webcast

Oct 05, 2020 at 12 00 AM

SECURITY AWARENESS: HOW EFFECTIVE IS THE HUMAN FIREWALL?

Read more >>

blog

ANALYZING TWITTER’S LATEST UPDATE: A “PROBLEM OF LEADERSHIP”

By on Aug 06, 2020

blog

IS SECURITY AWARENESS BECOMING THE LATEST CYBERSECURITY SNAKE OIL?

By on Jul 21, 2020

blog

THE TWITTER HACK IS A SECURITY SYSTEM FAILING, NOT AN AWARENESS FAILING

By on Jul 17, 2020

presentation

YOU CAN STOP STUPID

On Feb 28, 2020

presentation

30+ YEARS OF SECURITY AWARENESS EFFORTS: WHAT HAVE WE LEARNED?

On Jul 18, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Jul 16, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Mar 06, 2019

presentation

LESSONS LEARNED FROM 30+ YEARS OF SECURITY AWARENESS EFFORTS

On Mar 05, 2019

podcast

OUR OWN WORST ENEMY: TACKLING THE SOCIAL ENGINEERING PROBLEM




presentation

INCORPORATING SECURITY PRACTICES INTO BUSINESS PROCESSES

On Apr 19, 2018

presentation

AGE OF THE MACHINES IN CYBER—MACHINE LEARNING AND AI, THE NEXT FRONTIER

On Apr 19, 2018

presentation

HACKING CLOSED NETWORKS

On Apr 17, 2018

presentation

HACKING CLOSED NETWORKS (OVERFLOW)

On Apr 17, 2018

presentation

THE HUMAN EXPLOITATION KILL CHAIN

On Feb 15, 2017

Webcast

May 12, 2022 at 12 00 AM

THE METAVERSE OF VULNERABILITY

Read more >>

blog

THE SUPER BOWL OF CYBERSECURITY OUTRAGE

By on Feb 16, 2022

blog

THE ONLY REAL VALUE OF CERTIFICATIONS

By on Aug 03, 2021

presentation

HUMAN SECURITY ENGINEERING: STOPPING USER INITIATED LOSS

On May 20, 2021

blog

THE QUEEN’S GAMBIT AND THE SCIENCE OF HACKING

By on Nov 12, 2020

Webcast

Oct 05, 2020 at 12 00 AM

SECURITY AWARENESS: HOW EFFECTIVE IS THE HUMAN FIREWALL?

Read more >>

blog

ANALYZING TWITTER’S LATEST UPDATE: A “PROBLEM OF LEADERSHIP”

By on Aug 06, 2020

blog

IS SECURITY AWARENESS BECOMING THE LATEST CYBERSECURITY SNAKE OIL?

By on Jul 21, 2020

blog

THE TWITTER HACK IS A SECURITY SYSTEM FAILING, NOT AN AWARENESS FAILING

By on Jul 17, 2020

presentation

YOU CAN STOP STUPID

On Feb 28, 2020

presentation

30+ YEARS OF SECURITY AWARENESS EFFORTS: WHAT HAVE WE LEARNED?

On Jul 18, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Jul 16, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Mar 06, 2019

presentation

LESSONS LEARNED FROM 30+ YEARS OF SECURITY AWARENESS EFFORTS

On Mar 05, 2019

podcast

OUR OWN WORST ENEMY: TACKLING THE SOCIAL ENGINEERING PROBLEM




presentation

INCORPORATING SECURITY PRACTICES INTO BUSINESS PROCESSES

On Apr 19, 2018

presentation

AGE OF THE MACHINES IN CYBER—MACHINE LEARNING AND AI, THE NEXT FRONTIER

On Apr 19, 2018

presentation

HACKING CLOSED NETWORKS

On Apr 17, 2018

presentation

HACKING CLOSED NETWORKS (OVERFLOW)

On Apr 17, 2018

presentation

THE HUMAN EXPLOITATION KILL CHAIN

On Feb 15, 2017

Webcast

May 12, 2022 at 12 00 AM

THE METAVERSE OF VULNERABILITY

Read more >>

blog

THE SUPER BOWL OF CYBERSECURITY OUTRAGE

By on Feb 16, 2022

blog

THE ONLY REAL VALUE OF CERTIFICATIONS

By on Aug 03, 2021

presentation

HUMAN SECURITY ENGINEERING: STOPPING USER INITIATED LOSS

On May 20, 2021

blog

THE QUEEN’S GAMBIT AND THE SCIENCE OF HACKING

By on Nov 12, 2020

Webcast

Oct 05, 2020 at 12 00 AM

SECURITY AWARENESS: HOW EFFECTIVE IS THE HUMAN FIREWALL?

Read more >>

blog

ANALYZING TWITTER’S LATEST UPDATE: A “PROBLEM OF LEADERSHIP”

By on Aug 06, 2020

blog

IS SECURITY AWARENESS BECOMING THE LATEST CYBERSECURITY SNAKE OIL?

By on Jul 21, 2020

blog

THE TWITTER HACK IS A SECURITY SYSTEM FAILING, NOT AN AWARENESS FAILING

By on Jul 17, 2020

presentation

YOU CAN STOP STUPID

On Feb 28, 2020

presentation

30+ YEARS OF SECURITY AWARENESS EFFORTS: WHAT HAVE WE LEARNED?

On Jul 18, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Jul 16, 2019

presentation

HOLISTICALLY MITIGATING HUMAN VULNERABILITIES AND ATTACKS

On Mar 06, 2019

presentation

LESSONS LEARNED FROM 30+ YEARS OF SECURITY AWARENESS EFFORTS

On Mar 05, 2019

podcast

OUR OWN WORST ENEMY: TACKLING THE SOCIAL ENGINEERING PROBLEM




presentation

INCORPORATING SECURITY PRACTICES INTO BUSINESS PROCESSES

On Apr 19, 2018

presentation

AGE OF THE MACHINES IN CYBER—MACHINE LEARNING AND AI, THE NEXT FRONTIER

On Apr 19, 2018

presentation

HACKING CLOSED NETWORKS

On Apr 17, 2018

presentation

HACKING CLOSED NETWORKS (OVERFLOW)

On Apr 17, 2018

presentation

THE HUMAN EXPLOITATION KILL CHAIN

On Feb 15, 2017

 * About RSA Conference
 * Become a Contributor
 * Community Resources
 * Sponsorship Opportunities
 * Advisory Board
 * FAQ
 * Press Releases
 * Editorial Calendar
 * RSAC Logos & Usage Guidelines
 * Contact Us

Join our community
Sign Up
Manage Email Preferences
Manage Cookie Consent
Where the world
talks security

--------------------------------------------------------------------------------

Legal Notices
Privacy Statement
CCPA: Do Not Sell My Personal Info



©2022 RSA Conference LLC or its affiliates. The RSA Conference logo and other
trademarks are proprietary. All rights reserved.