Welcome! This is the Personal Web Site of Marco Casassa Mont,
Principal Cyber Security Consultant and Manager.
Multi-year experience in cyber
security, architectures and solutions. Worked at technological,
business, innovation, management and strategic levels, in Enterprise,
Defence, CTO and R&D organisations. Lead of cyber security and
technology programs. Project & team management. Business development.
Expert in cyber security solutions, cloud, big data, solution
architectures, threat intelligence, defensive monitoring, SIEM/UEBA, security
analytics, vulnerability management, threat & risk analysis. Expertise
in AI / ML. Use of agile methodologies. Innovator (31 granted patents,
50+ patents filed). (ISC)2 CISSP
Security Professional, MSc Computer Science,
IEEE Senior Member, IISP/CIISec Member.
BMT Focus Magazine, July 2020,
Delivering Successful Digital Transformation Programmes
5 new US Patents Granted No.: 10,764,393 - 10,749,895 - 10,686,814 -
10,666,672 - 10,536,483
3 new US Patents Granted No.: 10,325,092 - 10,262,132 - 10,250,627
JUMP: Tactical Cyber Mission Planning - NATO STO
4 new US Patents Granted No.: 10,913,892 - 10,192,066 -
10,027,632 - 9,798,888
Security Challenges in Hybrid Cloud: Threat
Detection and Remediation
Big Data for Security: 1MEPS Kafka processing
Pipeline and Beyond
Threat Analytics and Visualization Solutions
for Big Security Data
Big Data for Security: Usable DNS Data
Analytics at Scale
Security within Organisations: A Sneak Peak at
Current Status, Trends, Challenges and Opportunities
Big Data for Security
- CREST & IISP Congress
Achievements and CV
is accessible online.
up-to-date profile is also available
Led and delivered multi-million-dollar projects. Lead of strategic cyber
security projects/programmes in key cyber security areas, including:
user & entity behaviour analytics (UEBA), SIEM, big data for
security, cyber threat detection & management, security analytics,
security risk analysis, situational awareness, IAM & privacy
15+ years consulting experience at strategic, business and technical
levels, in Enterprise, Government/Defence, Telco, Financial/Banking,
Energy and Manufacturing sectors.
Experienced communicator at senior (CTO, VP, Director) level,
leading interactions with business organizations, customers and
Directed multiparty, interdisciplinary and international
security projects including UK TSB EnCoRe and EU PRIME projects.
Experienced in delivering to complex organisations, SOC & cyber
security defence teams.
depth understanding of cyber security, cyber-attacks, kill chain,
APT threats, security risk assessment, security controls and
incident management processes.
Experienced in using cyber security standards, including:
ISO27001-3, NIST Cyber Security Framework, NIST SP 800-53,37, etc.
Experienced Software Solution Architect, design and development
Experienced Security Solutions Architect, design and
development lead for enterprises and hybrid clouds (virtualization,
big data and security technologies).
Innovator, lead technologist in corporate R&D (HP Labs/CTO
Office). Filed more than 50 patents (31 granted).
Experienced presenter: public events, industrial trade shows,
conferences. Published 60+ referred articles & papers.
MSc, CISSP, IEEE Senior Member, Chartered Institute of
Information Security (CIISec) Associate.
Skills and Expertise
Analysis of complex problems; delivery of projects and solutions; Agile
methodology; business development; identification of R&D opportunities;
project management; consulting; architecture, solution & system design.
presentation skills, client relations, decision-making, negotiation,
customer engagement, problem solving, conflict management
- Cyber Security
- Big Data, Cyber Security Analytics, Threat Detection, Threat
- Cloud Computing
- UEBA, SIEM, Event Management, SOAR, Situational
Awareness, Cyber Threat Intelligence
- Security Risk Assessment, Decision Support
Solutions, Simulations, What-if Analysis
- AI, Machine Learning and Data Mining
- Web-based and enterprise
technologies/solutions, Identity and Access Management (IAM), PKI,
Privacy & Policy Management
- Software Design & Development
- Use of cryptography
Additional information and contacts are available