Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:10 PM
Dark Reading
Dark Reading
Products and Releases

Former Deputy Assistant Director Of The FBI's Cyber Crime Division Joins MANDIANT

Scott O'Neal will be responsible for growing MANDIANT's federal practice

Alexandria, Va., Dec. 9, 2010 - MANDIANT, the leader in incident response and computer forensics solutions and services, today announced that Scott O'Neal, a 24-year veteran of the Federal Bureau of Investigation (FBI), has joined MANDIANT as a director based in Alexandria.

O'Neal, who most recently served as Deputy Assistant Director of the FBI's Cyber Crime Division, will be responsible for expanding MANDIANT's existing federal practice, as well as gain access to new opportunities through longtime relationships in law enforcement and corporate America.

"Scott O'Neal brings tremendous federal and law enforcement experience to MANDIANT," said MANDIANT President Travis Reese. "We welcome Scott to the team and wish him well as he starts the next chapter of his storied career."

O'Neal began his FBI career as a special agent investigating national security, financial and government fraud, public corruption, and violent crime investigations in Norfolk, New York, and Chicago from 1985 to 1998. He went on to serve as Assistant Special Agent in Charge at the FBI's Albuquerque bureau, and in 2007, was appointed Chief of the Computer Intrusion Section of the FBI's Cyber Division. He was named Deputy Assistant Director of the FBI's Cyber Division in 2008, and served in this capacity until his retirement in August 2009.

"MANDIANT has been tackling the most sophisticated malware threats on a daily basis for more than six years and no one does it better," O'Neal said. "I look forward to making a difference and to helping fuel MANDIANT's continued growth and market leadership."

O'Neal earned a Juris Doctorate degree from the Southern Illinois University School of Law, and a Bachelor of Science degree from Western Illinois University. He is a member of the Illinois Bar, and holds Top Secret security clearances.


MANDIANT is the information security industry's leading provider of incident response and computer forensics solutions and services. Headquartered in Alexandria, Va., with offices in New York, Los Angeles and San Francisco, MANDIANT provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments, and leading U.S. law firms. MANDIANT comprises one of the industry's largest incident response and forensics forces. The authors of nine books, MANDIANT security consultants and engineers hold top government security clearances and certifications, and advanced degrees from some of the most prestigious computer science universities. To learn more about MANDIANT visit www.mandiant.com, read M-Unition, the company blog: http://blog.mandiant.com, or follow on Twitter @MANDIANT.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.