Skip to Main Content

Mike Owens

Senior Security Consultant

EXPERIENCE
With a background in risk management, Mike Owens works on the Remediation Team at TrustedSec to help clients resolve complex challenges and implement security best practices across cloud and on-premises technologies. Mike has a wide range of expertise, including hardening Microsoft 365 and Azure environments, securing backup systems against ransomware attacks, building foundational security program capabilities, and devising customized strategies to address unique client situations.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, International Politics, Georgetown University
  • Certificate in Applied Cybersecurity, SANS Technology Institute
  • GIAC Cloud Security Essentials (GCSE)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Security Essentials (GSEC)
  • The Open Group Open FAIR certification for risk quantification

PASSION FOR SECURITY
Mike is passionate about solving problems and helping people protect themselves and their organizations from cyber threats.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog December 20 2022

Building a Strong Foundation With the Information Security Accelerator

TrustedSec's Information Security Accelerator creates a tailored 12-18 month roadmap, practical guidance, and hands-on implementation to protect against 77% of…

Read about this article
Blog September 29 2022

Hardening Backups Against Ransomware

Recover from ransomware attacks with hardened, accessible, and scalable backups, essential for saving your organization from catastrophic financial and…

Read about this article
Webinars April 21 2021

Data Loss Prevention in a Remote-Work World

Maximize Microsoft Office 365 data protection and prevent confidential data leaks with expert guidance from Remediation Security Consultants Phil Rowland and…

Read about this article
Webinars January 19 2022

Defending Backups Against Ransomware

Learn how to defend backups against ransomware, a unique threat targeting backup systems, and discover hands-on best practices to harden your backup…

Read about this article
Webinars April 15 2026

You Had Us at the First Alert: A Guide to Finding Frequently Missed Detections

Join us for this webinar to get a clearer picture of where your detection coverage has blind spots and a practical roadmap for closing them before a real…

Read about this article
Events April 09 2026

TrustedSec Livestream - AMA: Detection Engineering in 2026 and Beyond with John Dwyer

Come prepared with your questions and walk away with actionable knowledge to sharpen your detection capabilities.

Read about this article
Blog April 09 2026

IAM the Captain Now – Hijacking Azure Identity Access

I decided to spend some research time diving in depth into Identity and Access Management (IAM) within Microsoft Azure. I am going to show you within this blog…

Read about this article
Blog April 07 2026

Building a Detection Foundation: Part 5 - Correlation in Practice

From Data Sources to DetectionWe've covered a lot of ground in this series: Windows Security events for logon tracking and process execution; PowerShell…

Read about this article
Podcasts April 06 2026

Security Noise - A Goblin, a Ghost, and a Ninja Walk into the Azure Bar

On this episode, Geoff and Skyler are joined by NyxGeek to discuss his suite of Azure bypass techniques. Since these techniques leave no trace, what does it…

Read about this article
Blog April 02 2026

Reduce Repetition and Free up Time With Mobile File Extractor

If you do the same thing three times, automate it. Introducing Mobile Data Extractor, a Python tool that handles the repetitive work of mobile app data…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.