{"id":393,"date":"2024-11-05T18:28:32","date_gmt":"2024-11-05T18:28:32","guid":{"rendered":"https:\/\/www.enterprisemanagement.com\/?post_type=es_team&#038;p=393"},"modified":"2025-08-12T18:58:37","modified_gmt":"2025-08-12T18:58:37","slug":"ken-buckler","status":"publish","type":"es_team","link":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/","title":{"rendered":"Ken Buckler"},"content":{"rendered":"\n<p>Ken has over 15 years of industry experience as a noted information and cybersecurity engineer, software developer, author, and presenter, focusing on big security data analytics and Federal Information Security Management Act (FISMA) and NIST 800-53 compliance. Focusing on strict federal security standards, Ken has consulted with numerous federal organizations, including Defense Information Systems Agency (DISA), Department of Veterans Affairs, and the Census Bureau.&nbsp;<\/p>\n\n\n\n<p>He was previously board chair of The Mars Generation\u2019s Student Space Ambassador Leadership Program, an advisory board made up of students and professional mentors focused on STEAM learning and advocacy. His technical career started in the defense sector as a quality assurance and information assurance engineer contracted with the DISA Defense Message System (DMS), eventually designing the top-level architecture of the Host-Based Security System (HBSS) integration for the DMS global messaging backbone. Ken has presented at industry conferences with his research on early warning of cyber-attacks based on open-source intelligence (OSINT).<\/p>\n\n\n\n<p>Ken loves history and the outdoors and spends his spare time metal detecting and magnet fishing throughout the United States, working to find lost pieces of history for future generations to enjoy.<\/p>\n\n\n\n<p>B.S., Computer Science, Mount Saint Mary\u2019s University<\/p>\n\n\n\n<p><strong>Certifications<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CompTIA Advanced Security Practitioner (CASP)<\/li>\n\n\n\n<li>CompTIA Security+<\/li>\n\n\n\n<li>Proofpoint Certified AI\/ML Specialist<\/li>\n\n\n\n<li>Proofpoint Certified Security Awareness Specialist<\/li>\n\n\n\n<li>Lakera 101 AI Security<\/li>\n\n\n\n<li>CodeFresh GitOps Fundamentals<\/li>\n\n\n\n<li>ASSA ABLOY Certificates for Electronic Security and Electronic Access Control Systems<\/li>\n<\/ul>\n\n\n<div class=\"gb-container gb-container-4879c867 section-my alignwide\">\n<div class=\"gb-container gb-container-1a17387d\">\n\n<p class=\"has-text-align-center h6 has-white-color has-text-color has-link-color wp-elements-6c4d85b5c774f7cf331479b58f89a595\"><strong>Primary Coverage<\/strong>:<\/p>\n\n\n\n<p class=\"has-text-align-center h6 has-white-color has-text-color has-link-color wp-elements-1c0455d3e1ad978c2e616583b998ceb7\" style=\"padding-right:40px;padding-left:40px\"><a href=\"https:\/\/www.enterprisemanagement.com\/coverage-area\/#security\">Information Security (in general), Data Security \/ DSPM, Risk \/ Compliance Management, Zero Trust, API Security, Cloud Security, Regulatory \/ Vendor Due Diligence Considerations, Observability \/ SIEM \/ SOAR, Detection and Response Solutions<\/a><\/p>\n\n\n<div class=\"gb-container gb-container-308f1ab3\">\n\n<p class=\"has-text-align-center\"><strong>Secondary Coverage<\/strong><\/p>\n\n\n<div class=\"gb-container gb-container-a4934896\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-773415d1\">\n<div class=\"gb-grid-column gb-grid-column-1dced1d7\"><div class=\"gb-container gb-container-1dced1d7\">\n<div class=\"gb-container gb-container-46423f17\">\n\n<ul class=\"wp-block-list\">\n<li>Advanced threat analytics and anomaly detection<\/li>\n\n\n\n<li>Advanced testing attack simulation<\/li>\n\n\n\n<li>Bot detection and protection<\/li>\n\n\n\n<li>Cloud access security broker<\/li>\n\n\n\n<li>Cryptography and key management<\/li>\n\n\n\n<li>Container security<\/li>\n\n\n\n<li>Data leak prevention and data classification<\/li>\n\n\n\n<li>Electronic governance risk and compliance<\/li>\n\n\n\n<li>Hardware security modules<\/li>\n\n\n\n<li>IoT security<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-3901a5ed\"><div class=\"gb-container gb-container-3901a5ed\">\n<div class=\"gb-container gb-container-7a1f2d49\">\n\n<ul class=\"wp-block-list\">\n<li>Information rights management<\/li>\n\n\n\n<li>Managed security service provider<\/li>\n\n\n\n<li>Patch management<\/li>\n\n\n\n<li>Physical Security and Access Control<\/li>\n\n\n\n<li>Runtime application security protection<\/li>\n\n\n\n<li>Remote access<\/li>\n\n\n\n<li>Risk management<\/li>\n\n\n\n<li>Security incident and event management and log management<\/li>\n\n\n\n<li>Security policy orchestration and automation<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-17d43cec\"><div class=\"gb-container gb-container-17d43cec\">\n<div class=\"gb-container gb-container-e041e506\">\n\n<ul class=\"wp-block-list\">\n<li>SSL appliances<\/li>\n\n\n\n<li>Threat intelligence service feeds<\/li>\n\n\n\n<li>Third-party risk management<\/li>\n\n\n\n<li>Anti-phishing<\/li>\n\n\n\n<li>Unified threat management<\/li>\n\n\n\n<li>Vulnerability management<\/li>\n\n\n\n<li>Web application firewall<\/li>\n\n\n\n<li>Workload microsegmentation<\/li>\n\n\n\n<li>Web security gateway&nbsp;<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-22728c99\">\n\n<p class=\"has-text-align-center\"><strong>Tertiary Coverage<\/strong><\/p>\n\n\n<div class=\"gb-container gb-container-69cd99bc\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-289d3f69\">\n<div class=\"gb-grid-column gb-grid-column-0a9984c6\"><div class=\"gb-container gb-container-0a9984c6\">\n<div class=\"gb-container gb-container-75a5e692\">\n\n<ul class=\"wp-block-list\">\n<li>Advanced breach detection<\/li>\n\n\n\n<li>Antivirus<\/li>\n\n\n\n<li>Browser isolation<\/li>\n\n\n\n<li>Consumer identity and access management<\/li>\n\n\n\n<li>Distributed denial of service protection<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-9f7711b8\"><div class=\"gb-container gb-container-9f7711b8\">\n<div class=\"gb-container gb-container-bb10fa93\">\n\n<ul class=\"wp-block-list\">\n<li>Deception technology<\/li>\n\n\n\n<li>Digital threat intelligence management<\/li>\n\n\n\n<li>Intrusion detection\/prevention<\/li>\n\n\n\n<li>Mobile security tools<\/li>\n\n\n\n<li>Network admission control<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-0c900d98\"><div class=\"gb-container gb-container-0c900d98\">\n<div class=\"gb-container gb-container-e2852230\">\n\n<ul class=\"wp-block-list\">\n<li>Network APT detection\/analysis<\/li>\n\n\n\n<li>Next-generation endpoint security<\/li>\n\n\n\n<li>Next-generation firewall\/unified threat management<\/li>\n\n\n\n<li>Secure email gateways and services<\/li>\n\n\n\n<li>Security operations automation and orchestration<\/li>\n<\/ul>\n\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-group section-my is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading h5 has-h-3-font-size\">Coverage Definition<\/h2>\n\n\n\n<div  class=\"es-ema-feature \">\n    <div class=\"es-ema-feature__content\">\n        \n\n<p class=\"mb-0\"><strong>Information security, risk, and compliance management<\/strong> is the process by which organizations predict and manage risk by adhering to boundaries set by a business. The practice area encompasses most of the areas and concepts in information security, risk mitigation, and technology regulatory compliance.<\/p>\n\n\n    <\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ken has over 15 years of industry experience as a noted information and cybersecurity engineer, software developer, author, and presenter, focusing on big security data analytics and Federal Information Security Management Act (FISMA) and NIST 800-53 compliance. Focusing on strict federal security standards, Ken has consulted with numerous federal organizations, including Defense Information Systems Agency (DISA), Department of Veterans Affairs, and the Census Bureau. <\/p>\n","protected":false},"featured_media":15489,"template":"","team_category":[107,109,108],"team_tag":[],"class_list":["post-393","es_team","type-es_team","status-publish","has-post-thumbnail","hentry","team_category-analyst","team_category-contributor","team_category-team","coverage_area-information-security-risk-and-compliance-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ken Buckler - Enterprise Management Associates (EMA)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ken Buckler - Enterprise Management Associates (EMA)\" \/>\n<meta property=\"og:description\" content=\"Ken has over 15 years of industry experience as a noted information and cybersecurity engineer, software developer, author, and presenter, focusing on big security data analytics and Federal Information Security Management Act (FISMA) and NIST 800-53 compliance. Focusing on strict federal security standards, Ken has consulted with numerous federal organizations, including Defense Information Systems Agency (DISA), Department of Veterans Affairs, and the Census Bureau.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/\" \/>\n<meta property=\"og:site_name\" content=\"Enterprise Management Associates (EMA)\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T18:58:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1065\" \/>\n\t<meta property=\"og:image:height\" content=\"1065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/\",\"url\":\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/\",\"name\":\"Ken Buckler - Enterprise Management Associates (EMA)\",\"isPartOf\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg\",\"datePublished\":\"2024-11-05T18:28:32+00:00\",\"dateModified\":\"2025-08-12T18:58:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#primaryimage\",\"url\":\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg\",\"contentUrl\":\"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg\",\"width\":1065,\"height\":1065,\"caption\":\"Ken Buckler\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.enterprisemanagement.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Team\",\"item\":\"https:\/\/www.enterprisemanagement.com\/team\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ken Buckler\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enterprisemanagement.com\/#website\",\"url\":\"https:\/\/www.enterprisemanagement.com\/\",\"name\":\"Enterprise Management Associates (EMA)\",\"description\":\"EMA is a leading IT research and consulting firm dedicated to delivering actionable insights across the evolving technology landscape.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enterprisemanagement.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ken Buckler - Enterprise Management Associates (EMA)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/","og_locale":"en_US","og_type":"article","og_title":"Ken Buckler - Enterprise Management Associates (EMA)","og_description":"Ken has over 15 years of industry experience as a noted information and cybersecurity engineer, software developer, author, and presenter, focusing on big security data analytics and Federal Information Security Management Act (FISMA) and NIST 800-53 compliance. Focusing on strict federal security standards, Ken has consulted with numerous federal organizations, including Defense Information Systems Agency (DISA), Department of Veterans Affairs, and the Census Bureau.","og_url":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/","og_site_name":"Enterprise Management Associates (EMA)","article_modified_time":"2025-08-12T18:58:37+00:00","og_image":[{"width":1065,"height":1065,"url":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/","url":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/","name":"Ken Buckler - Enterprise Management Associates (EMA)","isPartOf":{"@id":"https:\/\/www.enterprisemanagement.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#primaryimage"},"image":{"@id":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#primaryimage"},"thumbnailUrl":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg","datePublished":"2024-11-05T18:28:32+00:00","dateModified":"2025-08-12T18:58:37+00:00","breadcrumb":{"@id":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#primaryimage","url":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg","contentUrl":"https:\/\/www.enterprisemanagement.com\/wp-content\/uploads\/2024\/11\/ken-buckler.jpg","width":1065,"height":1065,"caption":"Ken Buckler"},{"@type":"BreadcrumbList","@id":"https:\/\/www.enterprisemanagement.com\/team\/ken-buckler\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.enterprisemanagement.com\/"},{"@type":"ListItem","position":2,"name":"Team","item":"https:\/\/www.enterprisemanagement.com\/team\/"},{"@type":"ListItem","position":3,"name":"Ken Buckler"}]},{"@type":"WebSite","@id":"https:\/\/www.enterprisemanagement.com\/#website","url":"https:\/\/www.enterprisemanagement.com\/","name":"Enterprise Management Associates (EMA)","description":"EMA is a leading IT research and consulting firm dedicated to delivering actionable insights across the evolving technology landscape.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enterprisemanagement.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/es_team\/393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/es_team"}],"about":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/types\/es_team"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/media\/15489"}],"wp:attachment":[{"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/media?parent=393"}],"wp:term":[{"taxonomy":"team_category","embeddable":true,"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/team_category?post=393"},{"taxonomy":"team_tag","embeddable":true,"href":"https:\/\/www.enterprisemanagement.com\/wp-json\/wp\/v2\/team_tag?post=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}