Skip to Main Content

Thomas Millar

Senior Security Consultant

EXPERIENCE
Thomas Millar joined the TrustedSec Incident Response team with 20 years of system security and digital forensics experience. His areas of focus have been Network Intrusion and Incident Response. Prior to joining the TrustedSec Incident Response team, he began his work in IT field support for PC and Apple Mac platforms and was employed to support the IT needs for a small private university in Northern California. More recently, Thomas also worked as an Incident Response consultant for RSA NetWitness and IBM Emergency Response Services.

EDUCATION & CERTIFICATIONS
Thomas attended Forensics Response training provided by Carnegie Mellon University (CMU) and the U.S. Defense Cyber Investigations Training Academy (DCITA). He has had additional education in cyber operations from the U.S. Army for both offensive and defensive efforts at the Cyber Center of Excellence (CCOE) in Fort Gordon, GA. He is also a graduate of the Cyberspace Operations Planners Course (COPC), where senior military leaders devise and formulate real-world mission planning, from initial tasking and concept to execution.

PROFESSIONAL AFFILIATIONS

  • Military Cyber Professionals Association (MCPA)
  • South Bay Amateur Radio Society (SOBARS)
  • American Radio Relay League (ARRL)

INDUSTRY CONTRIBUTIONS
Thomas’ work has been published in two (2) IBM X-Force Threat Intelligence Quarterly journal articles. He was also a contributing author to the Cisco Router and Switch Forensics book by Syngress Publishing. Since joining TrustedSec, Thomas has posted several blog articles on Incident Response and computer forensic subjects and was a co-host for a webinar on business email compromises.

PASSION FOR SECURITY
Thomas has been driven by curiosity from an early age about anything that was locked or obscured. This developed into a keen interest in finding all that can be revealed in computer intrusion examinations and security breaches. Thomas especially enjoys situations that involve Linux host analysis but always leaves room to learn about other systems and platforms.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars December 13 2023

Guarding Your Inbox: Navigating Business Email Compromises

Join our experts as they dive into the world of Business Email Compromises (BECs) to equip you with the knowledge to fortify your organization's inboxes.

Read about this article
Blog June 20 2023

Incident Response: Bring Out the Body File

An Incident Response (IR) examiner faced with a case or asked whether something 'funny' or 'bad' happened on a host will wonder if a comprehensive file listing…

Read about this article
Blog March 07 2023

Getting Analysis Practice from Windows Event Log Sample Attacks

Throughout my career as an Incident Responder, one of the most invaluable skillsets I have had to draw on has been analysis of Windows event logs. These event…

Read about this article
Blog February 07 2023

ESXiArgs: What you need to know and how to protect your data

Threat Overview Around February 03, 2023, a ransomware campaign called “ESXiArgs” emerged that targeted Internet-facing VMware ESXi servers running versions…

Read about this article
Blog November 15 2022

The Benefits of Enabling Timestamps in Your Command-Line History

While working at TrustedSec, I was issued a new company-furnished laptop to work from. While the Mac OS environment was useful, I found it useful to also setup…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars October 16 2024

Calculating Business Impact

In today’s digital landscape, gaining a deep understanding of how cybersecurity threats can affect business-critical systems is crucial for maintaining…

Read about this article
Events Deadwood, SD | October 09 2024

Wild West Hackin' Fest 2024

TrustedSec is happy to return as a sponsor for Wild West Hackin' Fest in 2024! Visit us at our booth at the Deadwood Mountain Grand. Principal Security…

Read about this article
News October 09 2024

Miami Herald - Why are pro-Trump posts popping on a Haitian-American Facebook page? It’s been hacked

A Haitian-American Facebook page with nearly 500k followers was hacked using a sophisticated phishing scam which began with an invitation to a podcast…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.