Michael Barbine

Michael Barbine

Reston, Virginia, United States
30K followers 500 connections

About

At CDW, our team is recognized for pioneering DevOps initiatives, enhancing digital…

Articles by Michael

See all articles

Contributions

Activity

Experience

  • CDW Graphic

    CDW

    United States

  • -

    San Antonio, TX, United States

  • -

    New York, New York, United States

  • -

    Washington, District of Columbia, United States

  • -

    Austin, Texas Metropolitan Area

  • -

    Washington D.C. Metro Area

  • -

    Washington D.C. Metro Area

  • -

    Alexandria, Virginia

  • -

    Washington D.C. Metro Area

  • -

    Washington D.C. Metro Area

  • -

    San Francisco Bay Area

  • -

    Washington D.C. Metro Area

  • -

    San Francisco Bay Area

  • -

    San Francisco Bay Area

  • -

    Houston, Texas Area

  • -

    Houston, Texas Area

  • -

    Houston, Texas Area

  • -

    Houston, Texas Area

  • -

    Raleigh-Durham, North Carolina Area

Education

  • George Mason University Graphic

    George Mason University

    -

    Business Administration

  • -

    Activities and Societies: Phi Beta Kappa

    Earned an Associates Degree in Management, Information Systems

  • -

    Activities and Societies: Mandarin Chinese

    Completed Mandarin Chinese Program

  • -

    Activities and Societies: Phi Beta Kappa

    Founded in 1970, Lord Fairfax Community College (LFCC) is a comprehensive, multi-campus public institution of higher education. Through its four locations — the Middletown and Fauquier Campuses, the Luray-Page County Center, and Vint Hill — the College serves eight localities in the Shenandoah Valley and Piedmont regions. The localities are the counties of Clarke, Fauquier, Frederick, Page, Rappahannock, Shenandoah and Warren and the City of Winchester.

Licenses & Certifications

Volunteer Experience

  • PH3AR - A Community of Ethical Hackers, Problem Solvers, Makers, Gamers & Curious Learners. Graphic

    Founder

    PH3AR - A Community of Ethical Hackers, Problem Solvers, Makers, Gamers & Curious Learners.

    - Present 23 years

    Science and Technology

    PH3AR (pronounced fear) is a community of gamers,hackers, designers, engineers and lifelong learners.

  • Nova Labs Graphic

    Key Member

    Nova Labs

    - Present 8 years 7 months

    Science and Technology

    NOVA Labs is a membership-driven all-volunteer makerspace based in Reston, Virginia that was founded in 2011 with the purpose of empowering everyone to Rediscover the Joy of Making Things!

  • MAGFest, Inc Graphic

    Community Manager

    MAGFest, Inc

    - Present 9 years 3 months

    Arts and Culture

  • MACH37 Cyber Accelerator Graphic

    Entrepreneur In Residence

    MACH37 Cyber Accelerator

    - Present 8 years 5 months

    Science and Technology

    MACH37 refers to “escape velocity,” the minimum velocity needed to escape earth’s gravitational field. We felt that this was an apt name for our accelerator, because newly launched technology companies must push past forces that inherently prevent their growth. MACH37™ is designed to facilitate the creation of the next generation of cyber product companies.

  • Refraction Graphic

    Entrepreneur In Residence

    Refraction

    - 5 years 1 month

    Science and Technology

    Refraction is a vibrant and collaborative community of entrepreneurs, investors, partners, and mentors helping startups and high-growth companies thrive in an innovative environment. Refraction mentors connect companies to potential customers, investors, and partners and take their business to the next level.

  • Entrepreneur In Residence

    Inova Personalized Health Accelerator

    - 2 years 4 months

    Health

    The IPHA team has a documented track record of starting, building, commercializing, growing, investing in and exiting medical technology companies. We have delivered superior returns to our investors and strategic partners. We also have extensive experience in recruiting and mentoring exceptional, impact-oriented management teams.

  • Toastmasters International Graphic

    Vice President of Membership

    Toastmasters International

    - 2 years 1 month

    Education

    A member of the executive team and charter member of the Tech Toastmasters located in Reston, Va. Tech Toastmasters is a group of cyber security industry leaders working to develop their public speaking, networking and leadership skills.

    I wanted to improve my communication and speaking skillset so I helped start up this group. Great experience!

  • Event Organizer

    Extra-Life

    - 3 years 1 month

    Children

    Extra Life unites thousands of players around the world in a 24 hour gaming marathon to support Children's Miracle Network Hospitals. Since its inception in 2008, Extra Life has raised more than $14 million for local CMN hospitals.

  • Warren County Chamber of Business & Industry Graphic

    Volunteer Staff - Parks and Recreation

    Warren County Chamber of Business & Industry

    - 2 years 1 month

    Arts and Culture

    Spearheaded the fundraising efforts to to help raise money for various park improvement projects. Particularly a million dollar outdoor cement skate park facility.

    Organized fund raisers
    Supervised events
    Attended regular meetings

Publications

  • High Security DevOps (HSDO)

    Excella Insights

    Flawless prevention of security issues at some point is truly impossible, but controlling how quickly we react is very possible. Software development and delivery processes should be long past the days of assigning low priority to security design and implementation. We have all heard horror stories about what happens when development projects fail to include security planning at the earliest stages. Still, zero-day and other security disasters occur at an alarming rate, and post-hoc…

    Flawless prevention of security issues at some point is truly impossible, but controlling how quickly we react is very possible. Software development and delivery processes should be long past the days of assigning low priority to security design and implementation. We have all heard horror stories about what happens when development projects fail to include security planning at the earliest stages. Still, zero-day and other security disasters occur at an alarming rate, and post-hoc investigations of such incidents clearly shows when Engineering teams ignored or paid only minimal attention to security considerations during development and delivery processes. This will be a multi-part discussion on High Security DevOps (HSDO) and how it can be achieved.

    See publication
  • Continuous Testing the WRONG way!

    Michael Barbine

    This is a presentation given on CTTD using Jenkins to orchestrate computing intensive test operations. We truly used Jenkins in a way that many have never imagined. It is impressive. This presentation was at a late stage, but the final product was very, VERY cool! Watch the video and enjoy!

    https://www.youtube.com/watch?v=et99kOUo970

    See publication
  • How to build a Jenkins DB the WRONG way!

    Jenkins User Conference

    The Jenkins DB is an extension of the Jenkins CI tool to archive artifacts and store project data in a clean, retrievable fashion through GUI navigation or API. It is also designed with metrics in mind to give you the ability to understand bottlenecks in your build and deployment pipeline.

    *Currently working on a new version built on top of Zornix OS

    See publication

Patents

Courses

  • Agile Software Development

    Bootcamp

  • Amazon Web Services

    Bootcamp

  • ChristmasCon 2012 - Mandiant Security Conference

    -

  • ChristmasCon 2013 - Mandiant Security Conference

    -

  • Defcon 2010 - Network Security Conference

    -

  • Defcon 2012 - Network Security Conference

    -

  • FireEye Science Fair - 2015

    -

  • Global Knowledge - Cisco Unfiied Communications Professional Certification

    -

  • MIRcon 2013 - Incident Response Conference

    -

  • Mandiant - Enterprise Incident Response

    -

  • SIU - Business Communications Level 1

    -

  • SIU - Business Communications Level 2

    -

  • SIU - Coaching Certification

    -

  • SIU - Configuring and Managing MS Exchange Server

    -

  • SIU - Management Level 1 Certification

    -

  • SIU - Management Level 2 Certification

    -

  • SIU - Microsoft Access Expert Certification

    -

  • SIU - Microsoft Office Master Certification

    -

  • SIU - VMware Professional Certification

    -

  • Shmoocon 2011- Network Security Conference

    -

  • Surge 2013 - Scalability Conference

    -

  • VMware World Forum 2010

    -

  • VMware World Forum 2011

    -

Projects

  • LogSlash

    Other creators
  • PHEAR

  • FireEye HX (xAgent)

    -

    Most deployed endpoint systems use traditional security that relies on signature-based defenses. Skilled attackers can readily bypass these defenses. Organizations need to address this security gap. FireEye now offers its industry-leading threat detection capabilities from the network core to the endpoint with FireEye Endpoint Security (HX Series). With this solution, you can enhance endpoint visibility and enable a flexible and adaptive defense against known and unknown threats.

    Other creators
    See project
  • Mandiant for Security Operations

    -

    Mandiant for Security Operations is an appliance-based solution that helps security teams connect the dots between what is happening on their network and what is happening on their endpoints. It actively sweeps your endpoints for signs that advanced attackers, including the Advanced Persistent Threat (APT), are in your environment using Mandiant’s Indicators of Compromise (IOC). When other security solutions, such as SIEM, network security and log management tools alert you to a potential…

    Mandiant for Security Operations is an appliance-based solution that helps security teams connect the dots between what is happening on their network and what is happening on their endpoints. It actively sweeps your endpoints for signs that advanced attackers, including the Advanced Persistent Threat (APT), are in your environment using Mandiant’s Indicators of Compromise (IOC). When other security solutions, such as SIEM, network security and log management tools alert you to a potential incident, Mandiant for Security Operations can verify what devices have been impacted so you can contain compromised devices and resolve the incident.

    Other creators
    See project
  • LogSlash

    -

    LogSlash is a new standard method that doubles the efficiency and value of existing log platforms by doubling capacity or cutting logging costs in half. It does this by performing a time-window-based, intelligent reduction of logs in transit. LogSlash was created by John Althouse, who led the creation of standard methods like JA3/S and JARM that are built into many vendor products, including AWS, Google, Azure, and used by the Fortune 500.

    Other creators
  • Truestats

    -

    Analytics

    See project
  • Shevirah

    -

  • General Skills

    -

    Community Engagement, Community Management, Community Outreach, Community Development, Member Retention, Community Growth, Volunteer Coordination, Community Strategy, User Community, Community Leadership, Community Advocacy, Member Onboarding, Community Partnerships, Community Moderation, Engagement Strategies, Feedback Management, Community Metrics, Forum Management, User Groups, Community Platforms, Community Collaboration, Ambassador Programs, Community Influencers, Content Moderation…

    Community Engagement, Community Management, Community Outreach, Community Development, Member Retention, Community Growth, Volunteer Coordination, Community Strategy, User Community, Community Leadership, Community Advocacy, Member Onboarding, Community Partnerships, Community Moderation, Engagement Strategies, Feedback Management, Community Metrics, Forum Management, User Groups, Community Platforms, Community Collaboration, Ambassador Programs, Community Influencers, Content Moderation, Community Health, Networking Events, Community Incentives, Community Programs, Community Contributions, Peer Support Networks, Community Trends Analysis, Community Best Practices, Cloud-Native Development, SDLC Management, Developer Advocacy, Systems Engineering, Business Analysis, Pre-Sales, Consulting, Infrastructure Management, Systems Automation, Digital Transformation, Process Improvement, Continuous Delivery, Requirements Analysis, Staff Coaching, Security Operations, Application Architecture, Open Source Evangelism, Agile Engineering

  • LogSlash

    -

    LogSlash is a new standard method that doubles the efficiency and value of existing log platforms by doubling capacity or cutting logging costs in half. It does this by performing a time-window-based, intelligent reduction of logs in transit. LogSlash was created by John Althouse, who led the creation of standard methods like JA3/S and JARM that are built into many vendor products, including AWS, Google, Azure, and used by the Fortune 500.

Honors & Awards

  • Certified Scrum Master

    Scrum Alliance

Test Scores

  • Certified Scrum Master

    Score: 98

  • Enterprise Incident Response

    Score: 100

    Enterprise Incident Response

Languages

  • English

    Native or bilingual proficiency

  • Chinese

    Elementary proficiency

  • Spanish

    Elementary proficiency

Organizations

  • DevOpsDays

    Organizer

    - Present
  • Tech Toastmasters

    Vice President of Membership

    - Present

    A internationally recognized leadership program focused on communication and public speaking.

  • Nova Hackers

    Member

    - Present

Recommendations received

View Michael’s full profile

  • See who you know in common
  • Get introduced
  • Contact Michael directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Michael Barbine

Add new skills with these courses