About Craig


A computer scientist, a businessman, and an inventor.
2019
International Conference on Economics Accounting and Finance Chair
International Conference on Economics Accounting and Finance Chair
MAY 22, 2019
2014
Certificate of Appreciation - Hastings Family Support Services
Certificate of Appreciation - Hastings Family Support Services
OCT 31, 2014
2012
Academic Record - SANS Institute
Academic Record - SANS Institute
JUN 28, 2012
2011
ICBIFE 2011 - Who Pays for a Security Violation
ICBIFE 2011 - Who Pays for a Security Violation
DEC 13, 2011
Cisco Certified Network Associate
Cisco Certified Network Associate
AUG 14, 2011
GIAC Secure Software Programmer .Net - GSSP - .Net
GIAC Secure Software Programmer .Net - GSSP - .Net
FEB 12, 2011
GIAC Information Security Professional - GISP
GIAC Information Security Professional - GISP
FEB 5, 2011
GIAC Information Security Fundamentals - GISF
GIAC Information Security Fundamentals - GISF
JAN 22, 2011
GIAC Web Application Penetration Tester - GWAPT
GIAC Web Application Penetration Tester - GWAPT
JAN 1, 2011
GIAC Penetration Tester - GPEN
GIAC Penetration Tester - GPEN
JUL 24, 2011
2010
Certified Professional
Certified Professional
SEP 27, 2010
5 Years Membership of the ACS
5 Years Membership of the ACS
APR 2010
CompTIA Security+ Certified Professional - skills and knowledge
CompTIA Security+ Certified Professional - skills and knowledge
Granted 2003-2010
2009
SANS Network Forensics
SANS Network Forensics
SEP 18, 2009
GIAC Platinum Security Expert - GSE
GIAC Platinum Security Expert - GSE
SEP 15, 2009
Certified Information Systems Security Professional
Certified Information Systems Security Professional
JUN 01, 2009
CISSP Information Systems Security Architecture Professional
CISSP Information Systems Security Architecture Professional
JUN 01, 2009
CISSP Information Systems Security Management Professional
CISSP Information Systems Security Management Professional
JUN 01, 2009
GIAC Certified Project Manager - GCPM
GIAC Certified Project Manager - GCPM
MAY 24, 2009
2008
GIAC Gold: Current Issues in DNS
GIAC Gold: Current Issues in DNS
DEC 08, 2008
SANS Legal Issues in Information Technology and Information Security
SANS Legal Issues in Information Technology and Information Security
OCT 03, 2008
SANS Comprehensive Packet Analysis
SANS Comprehensive Packet Analysis
SEP 28, 2008
GIAC Gold: Hydration Detection
GIAC Gold: Hydration Detection
JUN 24, 2008
GIAC.NET - GNET
GIAC.NET - GNET
JUN 02, 2008
Certificate of Appreciation - UnitingCare Burnside
Certificate of Appreciation - UnitingCare Burnside
MAY 18, 2008
GIAC Security Leadership - GSLC
GIAC Security Leadership - GSLC
APR 24, 2008
GIAC Certified Windows Security Administrator - GCWN
GIAC Certified Windows Security Administrator - GCWN
JAN 30, 2008
GIAC Gold - Electronic Contracting in a Secure World
GIAC Gold - Electronic Contracting in a Secure World
JAN 15, 2008
GIAC Gold Electronic Contracting in an Insecure World
GIAC Gold Electronic Contracting in an Insecure World
JAN 15, 2008
GIAC Gold: Requirements for Record Keeping and Document Destruction in a Digital World
GIAC Gold: Requirements for Record Keeping and Document Destruction in a Digital World
JAN 12, 2008
GIAC Certified Intrusion Analyst - GCIA
GIAC Certified Intrusion Analyst - GCIA
JAN 08, 2008
GIAC Platinum Cutting Edge Hacking Techniques - GHTQ
GIAC Platinum Cutting Edge Hacking Techniques - GHTQ
JAN 04, 2008
2007
GIAC Certified Firewall Analyst - GCFW
GIAC Certified Firewall Analyst - GCFW
DEC 31, 2007
GIAC Auditing Wireless Networks - GAWN
GIAC Auditing Wireless Networks - GAWN
DEC 31, 2007
GIAC Assessing and Auditing Wireless Networks -GAWN
GIAC Assessing and Auditing Wireless Networks -GAWN
DEC 21, 2007
GIAC Stay Sharp: Defeating Rogue Access Points
GIAC Stay Sharp: Defeating Rogue Access Points
DEC 03, 2007
GIAC Certified Incident Handler - GCIH
GIAC Certified Incident Handler - GCIH
NOV 30, 2007
GIAC Certified Unix Security Administrator - GCUX
GIAC Certified Unix Security Administrator - GCUX
OCT 31, 2007
GIAC Security Audit Essentials - GSAE
GIAC Security Audit Essentials - GSAE
SEP 30, 2007
SANS Next Evolution in Digital Forensics - Hands on
SANS Next Evolution in Digital Forensics - Hands on
SEP 29, 2007
GIAC Platinum Security Compliance - GSC
GIAC Platinum Security Compliance - GSC
SEP 27, 2007
Australian Computer Society - Senior Member
Australian Computer Society - Senior Member
SEP 17, 2007
GIAC Legal Issues in Information Technology and Information Security - GLEG
GIAC Legal Issues in Information Technology and Information Security - GLEG
AUG 31, 2007
GIAC Intrusion Prevention
GIAC Intrusion Prevention
JUL 18, 2007
GIAC Web Application Security
GIAC Web Application Security
JUL 04, 2007
GIAC Security Essentials - GSEC
GIAC Security Essentials - GSEC
JUL 3, 2007
GIAC Legal Issues in Information Technology and Security - GLEG
GIAC Legal Issues in Information Technology and Security - GLEG
JUN 28, 2007
GIAC Leadership Management
GIAC Leadership Management
JUN 26, 2007
IEEE Defining the Principles of Object-Oriented Programming
IEEE Defining the Principles of Object-Oriented Programming
Jun 24, 2007
GIAC Law of Fraud
GIAC Law of Fraud
JUN 23, 2007
GIAC Security Policy and Awareness
GIAC Security Policy and Awareness
JUN 20, 2007
SANS OnDemand MGT524: Security Policy and Awareness +Certificate
SANS OnDemand MGT524: Security Policy and Awareness +Certificate
JUN 20, 2007
SANS Stay Sharp Master Packet Analysis
SANS Stay Sharp Master Packet Analysis
JUN 19, 2007
GIAC Reverse Engineering Malware
GIAC Reverse Engineering Malware
June 16, 2007
GIAC Gold: A Taxonomy of Audits Assessments and Reviews
GIAC Gold: A Taxonomy of Audits Assessments and Reviews
JUN 15, 2007
SANS Analyst Paper Supporting Webcast: Using SIM in your PCI Compliance Program
SANS Analyst Paper Supporting Webcast: Using SIM in your PCI Compliance Program
JUN 14, 2007
SANS Internet Storm Center: Threat Update
SANS Internet Storm Center: Threat Update
JUN 13, 2007
GIAC Payment Card Industry
GIAC Payment Card Industry
JUN 8, 2007
SANS Encryption Procurement: Setting a Standard
SANS Encryption Procurement: Setting a Standard
JUN 07, 2007
SANS Analyst Paper Supporting Webcast: The SANS 2007 Log Management Market Report
SANS Analyst Paper Supporting Webcast: The SANS 2007 Log Management Market Report
JUN 06, 2007
SANS Maximising the Value of your Log Management Solution
SANS Maximising the Value of your Log Management Solution
MAY 30, 2007
SANS PCI Compliance Made Easier: The Value of Security Information and Event Management
SANS PCI Compliance Made Easier: The Value of Security Information and Event Management
MAY 24, 2007
SANS Getting Back to Basics Principles of System Lockdown
SANS Getting Back to Basics Principles of System Lockdown
May 22, 2007
SANS What Works in Vulnerability Management and Penetration Testing: Building Better Bridges to meet SOX Requirements
SANS What Works in Vulnerability Management and Penetration Testing: Building Better Bridges to meet SOX Requirements
MAY 08, 2007
SANS Making Effective Use of Vulnerability Scan Results and Fine-Tuning Security Infrastructure
SANS Making Effective Use of Vulnerability Scan Results and Fine-Tuning Security Infrastructure
May 02, 0227
SANS Penetration Testing with Confidence: 10 Keys to Success
SANS Penetration Testing with Confidence: 10 Keys to Success
APR 17, 2007
SANS SQL Injection: The Hackers Gold Mine
SANS SQL Injection: The Hackers Gold Mine
APR 11, 2007
SANS If I'd Only Known: Benefits of Advanced Correlation
SANS If I'd Only Known: Benefits of Advanced Correlation
Mar 07, 2007
SANS Vista Security in a Nutshell What You Need to Know Now
SANS Vista Security in a Nutshell What You Need to Know Now
FEB 27, 2007
2006
SANS The Convergence of Malware and the Future of Integrated Threat Management
SANS The Convergence of Malware and the Future of Integrated Threat Management
NOV 28, 2006
SANS Using Application Firewalls to Comply with the PCI 1.1 Data Security Standard
SANS Using Application Firewalls to Comply with the PCI 1.1 Data Security Standard
NOV 21, 2006
SANS Hacking the Sun Tzu Way: Applying the great master's ideas to penetration testing and defending your systems
SANS Hacking the Sun Tzu Way: Applying the great master's ideas to penetration testing and defending your systems
OCT 25, 2006
Course in OHS Consultation - WorkCover New South Wales
Course in OHS Consultation - WorkCover New South Wales
OCT 19, 2006
Fundamentals of Automotive Mechanics - Thomson Education Direct
Fundamentals of Automotive Mechanics - Thomson Education Direct
OCT 13, 2006
SANS Protecting Information & Managing Risk
SANS Protecting Information & Managing Risk
OCT 4, 2006
SANS Virtual Machine Detection: Keeping Attackers inside the Matrix, By Ed Skoudis
SANS Virtual Machine Detection: Keeping Attackers inside the Matrix, By Ed Skoudis
SEP 27, 2006
GIAC Systems and Network Auditor - GSNA
GIAC Systems and Network Auditor - GSNA
SEP 16, 2006
SANS Gooey GUIs to Concrete Clients: Hardening your Network from the Inside Out
SANS Gooey GUIs to Concrete Clients: Hardening your Network from the Inside Out
AUG 16, 2006
GIAC Gold: Analysis of a Serial Based Digital Voice Recorder
GIAC Gold: Analysis of a Serial Based Digital Voice Recorder
JUN 08, 2006
Certified Information Systems Security Professional
Certified Information Systems Security Professional
JUN 2006
Information Systems Security Architecture Professional (ISSAP) Concentration
Information Systems Security Architecture Professional (ISSAP) Concentration
JUN 2006
Information Systems Security Management Professional
Information Systems Security Management Professional
JUN 2006
Information Systems Security Management Professional 
Information Systems Security Management Professional 
JUN 2006
CISSP Information Systems Security Architecture Professional
CISSP Information Systems Security Architecture Professional
JUN 2006
CISSP Certified Information Systems Security Professional
CISSP Certified Information Systems Security Professional
JUN 01, 2006
Certified Computer Examiner
Certified Computer Examiner
MAY 03, 2006
CompTIA Security+ Certified Professional
CompTIA Security+ Certified Professional
MAR 21, 2006
2005
International Systems Security Engineering Association Systems Security Professional - Practitioner
International Systems Security Engineering Association Systems Security Professional - Practitioner
NOV 04, 2005
ISACA Certified Information Systems Auditor - CISA
ISACA Certified Information Systems Auditor - CISA
OCT 3, 2005
GIAC Certified Forensics Analyst - GCFA
GIAC Certified Forensics Analyst - GCFA
SEP 30, 2005
GIAC Certified Forensics Analyst - GCFA
GIAC Certified Forensics Analyst - GCFA
SEP 6, 2005
SANS Internet Storm Center: Threat Update
SANS Internet Storm Center: Threat Update
AUG 10, 2005
SANS Network Security for Small-Midsized Companies
SANS Network Security for Small-Midsized Companies
AUG 03, 2005
SANS Secure Software Webcast Series
SANS Secure Software Webcast Series
AUG 25, 2005
SANS Secure Software Webcast Series
SANS Secure Software Webcast Series
JUL 28, 2005
SANS What Works in Strong Authentication
SANS What Works in Strong Authentication
JUL 26, 2005
SANS Security Essentials - How to make email good again
SANS Security Essentials - How to make email good again
JUL 14, 2005
SANS Stabilizing Information Protection with Regulatory Compliance & Managing Online Compliance Risks
SANS Stabilizing Information Protection with Regulatory Compliance & Managing Online Compliance Risks
JUL 6, 2005
SANS What Works in Intrusion Detection and Prevention
SANS What Works in Intrusion Detection and Prevention
JUN 28, 2005
GIAC Certified ISO-17799 Specialist - G7799
GIAC Certified ISO-17799 Specialist - G7799
APR 30, 2005
GIAC Certified ISO-17799 Specialist - G7799
GIAC Certified ISO-17799 Specialist - G7799
APR 25, 2005
Provisional Member
Provisional Member
MAR 04, 2005
SANS 17799 Security and Audit Framework
SANS 17799 Security and Audit Framework
FEB 26, 2005
2004
Australian Institute of Management (AIM) Member
Australian Institute of Management (AIM) Member
NOV 26, 2004
Australian Institute of Management (AIM) Associate Fellow
Australian Institute of Management (AIM) Associate Fellow
NOV 26, 2004
IASCA (Information Systems Audit and Control Association) Member
IASCA (Information Systems Audit and Control Association) Member
NOV 22, 2004
2003
CISM Certified Information Security Manager
CISM Certified Information Security Manager
JUN 17, 2003
ISACA Certified Information Security Manager
ISACA Certified Information Security Manager
JUN 17, 2003
1992
National Security Training Academy - Security Industry Course and Firerarm Certificate of Achievement
National Security Training Academy - Security Industry Course and Firerarm Certificate of Achievement
JUN 01, 1992
1988
Brisbane YMCA Youth Club - Best Military Tactics
Brisbane YMCA Youth Club - Best Military Tactics
JUL 01, 1988

Never miss a story from Craig Wright (Bitcoin SV is the original Bitcoin)