Phil Rowland

Practice Lead, Remediation Services


Phil started his career in IT over 15 years ago as a software engineer customizing Customer Relationship Management (CRM) and accounting systems. He then moved into IT operations, focusing on writing custom integrations and automating systems administration. After that, he spent several years in IT technical leadership positions building security practices into IT operations. He eventually brought that security mindedness into a Managed Services Provider (MSP), where he could make a larger impact on the security of SMBs, eventually leading to full-time security consulting work. Phil’s diverse skills range from networking and coding to IT operations and leadership, giving him the holistic view needed to solve the security challenges facing businesses today.

Education & Certifications

  • ITIL Foundation
  • Certified Information Systems Security Professional (CISSP)
  • CompTIA Advanced Security Practitioner (CASP)
  • GIAC Network Forensic Analyst (GNFA)

Professional Affiliations

  • ISC2
  • West Michigan Cyber Security Consortium
  • Information Systems Security Association

Industry Contributions

Phil volunteers as an incident responder for Michigan Cyber Civilian Corps (MiC3)

Passion for Security

Phil’s passion for security started during his time with a youth travel organization in which protecting information about children was his top priority. That passion has grown to include all forms of privacy concerns. For personal projects, Phil enjoys playing with detection and attack tools in a home lab and writing open source integration tools.

Recent Blog Posts

Windows LAPS: Closing a Gap for Cloud-Native Device Management

1 TLDR; Microsoft is releasing an Azure AD integrated, built-in LAPS agent to Windows 10 and Windows 11 that can be controlled by Intune. 1.1      Problem Statement Migrating Windows endpoints to Intune-only management left gaps in controllable settings. An alternative for traditional Local Administrator Password Solution (LAPS) in an on-premises domain has been a primary...

Azure Automation – Getting Started With Desired State Configurations

Azure brings a lot of new tools and capabilities to the IT and Information Security toolbox. In fact, there are so many features that it can be overwhelming and difficult to understand when or how to use them. I believe that the revamp of Desired State Configuration (DSC) within Azure is one of these overlooked...
View all posts from Phil

Recent Webinars

Who's winning the Red Vs. Blue Arms Race? TrustedSec webinar

Who’s Winning the Red vs. Blue Team Arms Race

When it comes to attackers and organizations that are trying to defend themselves, there’s always an arms race between the two over who can get the upper hand. An Ebb and Flow There are times when a particular attack almost...

Adding Value to a Traditional Penetration Test

Another Penetration Test? Penetration testing your environment is one of the most important tasks an organization can perform. It is part of every regulation and industry security standard for good reason. However, there are times when performing a penetration test...

Data Loss Prevention in a Remote-Work World

With more employees working from home and public places, often on less secure networks, it has become vitally important to ensure confidential data is not being leaked or exfiltrated in this hyper-connected world. Data Loss Prevention (DLP) solutions promise to...
View all webinars from Phil

Recent Podcasts

TrustedSec Security Podcasts

6.1 - Head in the Clouds

September 23, 2023

Want to work with Phil Rowland or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us