Author

 Andrew Williams
LinkedIn
RSS
E-Mail

Profile of Andrew Williams

Product Director, Cyber Risk Advisory and FedRAMP Assessment Services, Coalfire
Member Since: 9/17/2018
Author
News & Commentary Posts: 2
Comments: 0

Andrew Williams is the product director for the Cyber Risk Advisory and FedRAMP Assessment Services teams at Coalfire.  As product director, Andrew oversees Coalfire's sales, delivery, and professional development strategy for all advisory and assessment personnel delivering services to cloud computing customers. Andrew works closely with delivery personnel and executive management across Coalfire to ensure Coalfire maintains its position as a thought leader in cloud compliance, and to ensure customers are receiving the best support available.

Since joining Coalfire in 2014, his primary focus has been providing guidance around AWS, Microsoft Cloud and hybrid cloud enterprise level environments in relation to federal, state, and private sector industry best practices. He functions as a subject matter expert for cloud compliance, cloud network architecture, cloud administrator and cloud customer access control, and secure code development. He has extensive experience with the NIST 800-53 framework and the NIST IT security landscape; FedRAMP, FISMA, DISA, and DOD program development and security architecture design; and general controls client advisory. Andrew has supported engagements at more than 40 different cloud service providers.

Andrew holds a business M.A. from Seattle Pacific University and a B.A. in political science from Western Washington University.

Articles by Andrew Williams
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9962
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to VCRUNTIME140!memcpy.
CVE-2019-9963
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlFreeHeap.
CVE-2019-9964
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlpNtMakeTemporaryKey.
CVE-2019-9965
PUBLISHED: 2019-03-24
XnView MP 0.93.1 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlReAllocateHeap.
CVE-2019-9966
PUBLISHED: 2019-03-24
XnView Classic 2.48 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to xnview+0x38536c.