Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

6/9/2021
04:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cybrary Announces Kevin Hanes as New CEO

COLLEGE PARK, Md., June 9, 2021 /PRNewswire/ -- Cybrary, the world's leading online cybersecurity workforce development platform, today announced that Kevin Hanes will join the company as CEO. In his new role, Hanes plans to grow, operationalize and further expand Cybrary's mission to solidify the company as the leading platform for individuals and teams to develop their cybersecurity skills.

Companies need help transforming the skillsets of their workforce and enabling those who have the drive to become skilled cybersecurity professionals. Cybrary positively impacts lives and helps companies solve a consequential pain point and minimize their risk. In his new role, Hanes is squarely focused on Cybrary's continued growth and development.

"Ryan and Ralph have done a tremendous job taking Cybrary from an idea to an industry leader. I am honored to join such a strong, purpose-driven company that I know can make a difference in the cybersecurity community," said Hanes. "The demand for cybersecurity professionals is exploding, and the skills gap keeps increasing. Our growth trajectory and an opportunistic landscape puts Cybrary in a tremendous position to become the de facto standard for cybersecurity skill development."

Hanes, a seasoned technology veteran of more than 20 years, comes to Cybrary from Secureworks where he served as Chief Operating Officer (COO) since March 2013. While at Secureworks, he led the company from a hyper-growth stage through an IPO and built one of the world's strongest, most respected cybersecurity operations teams, with Secureworks being consistently recognized by industry analysts as a market leader. Hanes also served as an executive sponsor for the company's Women in Action initiatives, and helped champion leadership training, professional development, and networking opportunities for women in the industry.

Hanes will replace Ryan Corey, who served as CEO since co-founding the company in 2015. Corey will serve as Advisor to the CEO and will continue to serve on the Cybrary Board of Directors.

"The leadership team is very excited to have Kevin join Cybrary. His deep technical, business and leadership experience, as well as his passion for culture and people are what will take Cybrary to the next level," said Corey. "Our team has grown significantly in the last year, and I'm excited for what's in store for Cybrary in this new era of leadership."

For more details on this leadership appointment, as well as Hanes vision for Cybrary's continued growth, please visit https://www.cybrary.it/blog/cybrary-poised-for-growth-with-hanes-at-the-helm/

About Cybrary

Cybrary is the leading cybersecurity workforce development platform, putting the collective knowledge of the industry's top experts at your fingertips. Cybrary combines courses on the most in-demand cybersecurity skills with real, hands-on learning experiences and guidance from a community of dedicated cybersecurity professionals. Cybrary enables its more than 3 million learners, small businesses, and Fortune 1000 organizations to earn industry certifications, work with cutting-edge tools and technologies, and advance their cybersecurity goals. Learn how Cybrary is helping to build a cybersecurity-enabled workforce at www.cybrary.it.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2005-0394
PUBLISHED: 2021-06-18
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2007-3733
PUBLISHED: 2021-06-18
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2021-21997
PUBLISHED: 2021-06-18
VMware Tools for Windows (11.x.y prior to 11.3.0) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest operating system, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-serv...
CVE-2021-26834
PUBLISHED: 2021-06-18
A cross-site scripting (XSS) vulnerability exists in Znote 0.5.2. An attacker can insert payloads, and the code execution will happen immediately on markdown view mode.
CVE-2021-26835
PUBLISHED: 2021-06-18
No filtering of cross-site scripting (XSS) payloads in the markdown-editor in Zettlr 1.8.7 allows attackers to perform remote code execution via a crafted file.