Phil Rowland

Practice Lead, Remediation Services


Phil started his career in IT over 15 years ago as a software engineer customizing Customer Relationship Management (CRM) and accounting systems. He then moved into IT operations, focusing on writing custom integrations and automating systems administration. After that, he spent several years in IT technical leadership positions building security practices into IT operations. He eventually brought that security mindedness into a Managed Services Provider (MSP), where he could make a larger impact on the security of SMBs, eventually leading to full-time security consulting work. Phil’s diverse skills range from networking and coding to IT operations and leadership, giving him the holistic view needed to solve the security challenges facing businesses today.

Education & Certifications

ITIL Foundation
Certified Information Systems Security Professional (CISSP)
CompTIA Advanced Security Practitioner (CASP)
GIAC Network Forensic Analyst (GNFA)

Professional Affiliations

West Michigan Cyber Security Consortium
Information Systems Security Association

Industry Contributions

Phil volunteers as an incident responder for Michigan Cyber Civilian Corps (MiC3)

Passion for Security

Phil’s passion for security started during his time with a youth travel organization in which protecting information about children was his top priority. That passion has grown to include all forms of privacy concerns. For personal projects, Phil enjoys playing with detection and attack tools in a home lab and writing open source integration tools.

Recent Blog Posts

Azure Automation – Getting Started With Desired State Configurations

Azure brings a lot of new tools and capabilities to the IT and Information Security toolbox. In fact, there are so many features that it can be overwhelming and difficult to understand when or how to use them. I believe that the revamp of Desired State Configuration (DSC) within Azure is one of these overlooked...
View all posts from Phil

Recent Webinars

Adding Value to a Traditional Penetration Test

Another Penetration Test? Penetration testing your environment is one of the most important tasks an organization can perform. It is part of every regulation and industry security standard for good reason. However, there are times when performing a penetration test...

Data Loss Prevention in a Remote-Work World

With more employees working from home and public places, often on less secure networks, it has become vitally important to ensure confidential data is not being leaked or exfiltrated in this hyper-connected world. Data Loss Prevention (DLP) solutions promise to...

Advancing Office 365 Security: Troubleshooting Conditional Access Policies and Gaining Insights into Azure AD

Going Deeper Building on our previous webinar, Office 365 Security: What You Didn’t Know You Didn’t Know, our upcoming webinar will drill into next-level functionality as you continue to build security into your Office 365 operational plan.  It’s Surprisingly Easy...
View all webinars from Phil

Want to work with Phil Rowland or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us