Skip to Main Content

Art Cooper

Principal Security Consultant

EXPERIENCE
Coop has 45 years of experience in Information Technology, with the last 20 years focused on the security of payment systems and architectures. Along the way, Coop has helped organizations with eCommerce security, application assessments, forensic investigations, compliance security assessments, development of secure network architectures, risk management programs, security governance initiatives, and regulatory compliance.

Coop was a member of the U.S. Air Force for most of his young adult life and had direct experience with the original ARPANET and ARPANET 1822 Protocols. He was directly involved with the original DoD X.25 networks, the Defense Data Network (DDN), and the Automatic Digital Information Network (AUTODIN). He managed and operated one of the original BBN Packet Switch Node (PSN) systems and has witnessed every major IT “leap” or development since that time.

EDUCATION & CERTIFICATIONS

  • Associate of Applied Science in Electronic Systems Technology, Community College of the Air Force
  • Associate in Arts in Computer Science, University of Maryland
  • Bachelor of Science in Management, Colorado Christian University
  • Master of Arts in Education, Colorado Christian University
  • Security +
  • Certified Ethical Hacker (CEH)
  • Certified Information Systems Auditor (CISA)
  • Certified Data Privacy Solutions Engineer (CDPSE)
  • Certified Information Systems Security Professional (CISSP)
  • PCI Professional (PCIP)
  • Qualified Security Assessor (QSA)

PROFESSIONAL AFFILIATIONS

  • International Information Systems Security Certification Consortium (ISC2)
  • Information Systems Security Association (ISSA)
  • Information Systems Audit and Control Association (ISACA)
  • International Council of Electronic Commerce Consultants (EC Council)
  • The American Legion
  • Veterans of Foreign Wars (VFW)

INDUSTRY CONTRIBUTIONS
Coop was the Standards Trainer for the Payment Card Industry Security Standards Council (PCI SSC) from 2010-2013.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog July 13 2021

Reducing Merchant Scope to Ease the Compliance Burden

Merchants should spend more time doing what they are good at—i.e., selling and merchandising—versus trying to keep up with validating and maintaining PCI…

Read about this article
Webinars October 24 2023

Virtual Q&A With The PCI Dream Team: What to Expect in 2024

Get the inside track on PCI DSS Version 4 as the PCI Dream Team takes the virtual stage. They will cover a variety of topics centered around v4 from both…

Read about this article
Webinars June 23 2021

TrustedSec Presents: PCI Dream Team Q&A Panel

Join Art “Coop” Cooper (TrustedSec), Ben Rothke (Tapad), Jeff Hall (Auditwerx, LLC), and David Mundhenk (Herjavec Group), also known as the PCI Dream Team, for…

Read about this article
Webinars December 08 2021

TrustedSec Presents: PCI Dream Team Holiday Edition Panel

Join the PCI Dream Team of Art “Coop” Cooper (TrustedSec), Ben Rothke (Tapad), Jeff Hall (Truvantis), and David Mundhenk (Herjavec Group) for a special Holiday…

Read about this article
Webinars April 28 2022

Getting the Answers You Need About PCI DSS Version 4

Join Art “Coop” Cooper (TrustedSec), Ben Rothke (Tapad), Jeff Hall (Truvantis), and David Mundhenk (Herjavec Group), also known as the PCI Dream Team, for a…

Read about this article
Webinars July 20 2023

PCI Dream Team: PCI 4.0 and New Book Release

Join the incredible PCI Dream Team, featuring the dynamic Art “Coop” Cooper from TrustedSec, the brilliant Ben Rothke from Tapad, the audacious Jeff Hall from…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Join Senior Security Consultant Steven Erwin and Security Consultant Caroline Fenstermacher as they cover the basics of BEC analysis, providing participants…

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Like most red teamers, I spend quite a lot of time looking for novel vulnerabilities that could be used for initial access or lateral movement. Recently, my…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.