Phil Rowland
Practice Lead, Remediation Services
Experience
Phil started his career in IT over 15 years ago as a software engineer customizing Customer Relationship Management (CRM) and accounting systems. He then moved into IT operations, focusing on writing custom integrations and automating systems administration. After that, he spent several years in IT technical leadership positions building security practices into IT operations. He eventually brought that security mindedness into a Managed Services Provider (MSP), where he could make a larger impact on the security of SMBs, eventually leading to full-time security consulting work. Phil’s diverse skills range from networking and coding to IT operations and leadership, giving him the holistic view needed to solve the security challenges facing businesses today.
Education & Certifications
- ITIL Foundation
- Certified Information Systems Security Professional (CISSP)
- CompTIA Advanced Security Practitioner (CASP)
- GIAC Network Forensic Analyst (GNFA)
Professional Affiliations
- ISC2
- West Michigan Cyber Security Consortium
- Information Systems Security Association
Industry Contributions
Phil volunteers as an incident responder for Michigan Cyber Civilian Corps (MiC3)
Passion for Security
Phil’s passion for security started during his time with a youth travel organization in which protecting information about children was his top priority. That passion has grown to include all forms of privacy concerns. For personal projects, Phil enjoys playing with detection and attack tools in a home lab and writing open source integration tools.
Recent Blog Posts
1 TLDR; Microsoft is releasing an Azure AD integrated, built-in LAPS agent to Windows 10 and Windows 11 that can be controlled by Intune. 1.1 Problem Statement Migrating Windows endpoints to Intune-only management left gaps in controllable settings. An alternative for traditional Local Administrator Password Solution (LAPS) in an on-premises domain has been a primary...
Read
Azure brings a lot of new tools and capabilities to the IT and Information Security toolbox. In fact, there are so many features that it can be overwhelming and difficult to understand when or how to use them. I believe that the revamp of Desired State Configuration (DSC) within Azure is one of these overlooked...
Read
Recent Webinars
When it comes to attackers and organizations that are trying to defend themselves, there’s always an arms race between the two over who can get the upper hand. An Ebb and Flow There are times when a particular attack almost...
Another Penetration Test? Penetration testing your environment is one of the most important tasks an organization can perform. It is part of every regulation and industry security standard for good reason. However, there are times when performing a penetration test...
With more employees working from home and public places, often on less secure networks, it has become vitally important to ensure confidential data is not being leaked or exfiltrated in this hyper-connected world. Data Loss Prevention (DLP) solutions promise to...