Tom Le — CEO
I see the world through a hacker's mindset. Follow me and I might surprise you with some unconventional security wisdom. # About me - work stuff: The engineer in me believes every Kobayashi Maru scenario has a winnable outcome. As a technical CISO, I have worn many hats - from exponentially evolving complex cyber maturity programs to large-scale IT infrastructure transformations. As an engineering leader, I’ve built industry re-defining security products. I’ve always led with the philosophy of continuously maturing security culture. I like solving hard, complex problems. I build security engineering teams with a practitioner-first philosophy - lifelong engineers (or hackers) who can rapidly assimilate new technology, tools, and techniques and intrinsically enjoy continuous skill expansion. I identify as an OG hacker, where ASM was table stakes and "detection engineering” meant decoding tcpdump and orchestrating custom Snort rules in real-time. Back in the day, we didn't have Splunk or Elastic but built our own log search and event correlation with Lucene. If I was stuck on a deserted island and could only bring one programming language with me, I'd choose Perl - the most under-appreciated & under-estimated IT supertool of all time. # About me - fun facts: • I was a professional gamer ranked #1 in the world in Command & Conquer. • I protected the Dubya Bush White House from cyber threats. • I was "doing AI" before it was cool. • I've written over 1 million PCRE threat signatures using Perl and tcpreplay (with a collection of malicious pcaps, of course). • My favorite secular possession is my Klingon Bat'leth forged from 1040 carbon steel. It proudly hangs in my background on Zoom calls. # Fighting words - prove me wrong: • My expert log analysis queries are still better than your AI/ML anything. • My tuned IDS provides more accurate signals than your anomaly detection platform. • My lowbrow SIEM with OG correlation rules is more effective than your SOC/SOAR/XDR AI-driven product. # Current topics of focus: • Modern detection engineering (the real stuff) • Detection evasion (top right MQ EDR bypass) • Failure modes in becoming anti-fragile • Reverse-engineering AI intent
Stackforce AI infers this person is a cybersecurity expert with a strong focus on detection engineering and security product development.
Location: San Francisco, California, United States
Experience: 10 yrs 11 mos
Career Highlights
- Expert in modern detection engineering and evasion techniques.
- Built industry-defining security products and teams.
- Recognized with multiple cybersecurity awards and accolades.
Work Experience
Security Advisory Council (3 mos)
BayAreaCISO
Member of the Board of Advisors (6 mos)
University of San Francisco
Program Advisor, Stratrgic AI Program (6 mos)
Delinea
Member of the Board of Advisors (8 mos)
Gap
CISO (10 mos)
Box
Trust Advisory Board (1 yr 6 mos)
Semperis
Customer Advisory Board (1 yr 6 mos)
Rubrik
CISO Advisory Board (1 yr 11 mos)
Abnormal Security
Strategic Advisor (3 yrs 9 mos)
SlashNext
Advisory Board (3 yrs 10 mos)
CrowdStrike
Strategic Board of Advisors (4 yrs 7 mos)
Palo Alto Networks
Manufacturing Industry Council (1 yr 8 mos)
Mattel, Inc.
CISO (4 yrs 11 mos)
Cognizant
CTO, Cognizant Security (2 yrs 6 mos)
GE Digital
Executive Director, Cyber (2 yrs 6 mos)
Education
Cognitive Science & AI for real-time Time Series analysis at University of California, Berkeley