BIO:  Michael I. Kaplan

Michael I. Kaplan, CISSP
Michael I. Kaplan is a Corporate Information Security Consultant, certified Mile2 Cyber Security Instructor, and a passionate advocate for military veteran issues with 21 years of experience in the security industry.

His technical areas of specialization are Business Continuity Planning, Disaster Recovery Planning, Incident Handling and Response, Threat and Vulnerability Assessment, Penetration Testing, and Digital Forensics.  Michael also possesses a high degree of subject matter expertise regarding conformance to Cyber Security Frameworks (CSF) including HIPAA Compliance (HITECH, GAPP), NIST SP 800 Series, ISO 27000 Series, PCI-DSS, SSAE 16 (SOC1, SOC2), and FedRAMP (moderate, high).

After serving honorably in the US Army’s 11th Special Forces Group (Airborne) as an expert in Soviet Military Operations and Tactics, Michael was recruited as a Trainer and Lead Investigator for an International Fugitive Task Force based in Miami, Florida, with areas of responsibility in the Caribbean and Latin America. 

In 1994, Michael transitioned from international high-risk warrants into domestic corporate security, attended numerous formal training programs and pursued a career as an Executive Protection Specialist, operating in both corporate and high-threat environments. Throughout his experience, Michael was always (informally) designated as the “team technology geek,” a role he officially (and formally) embraced in 2011.

Industry Certifications

In his role as a Mile2 Cyber Security Instructor, Michael is authorized to teach the following courses to students seeking certification:

Certified Information Security Management Systems - Lead Implementer
Certificate:  783700
Expiration:  2021

Certified Information Security Management Systems – Lead Auditor
Certificate:  782800
Expiration:  2021

Information Systems Certification and Accreditation Professional
Certificate:  1032700
Expiration:  2021

Certified Healthcare Information Systems Security Practitioner
Certificate:  748300
Expiration:  2020

Certified Information Systems Security Manager
Certificate:  752100
Expiration:  2020

Certified Information Systems Security Auditor
Certificate:  780200
Expiration:  2021

Certified Information Systems Security Officer
Certificate:  739100
Expiration:  2020

Certified Information Systems Risk Manager
Certificate:  749600
Expiration:  2020

Certified Secure Web Application Engineer
Certificate:  756900
Expiration:  2020

Information Systems 20 Controls (IS20)
Certificate:  741400
Expiration:  2020

Certified Penetration Testing Engineer
Certificate:  763000
Expiration:  2020

Certified Network Forensics Examiner
Certificate:  933600
Expiration:  2021

Certified Professional Ethical Hacker
Certificate:  981700
Expiration:  2021

Certified Disaster Recovery Engineer
Certificate:  725000
Expiration:  2020

Certified Incident Handling Engineer
Certificate:  764100
Expiration:  2020

Certified Security Leadership Officer
Certificate:  743100
Expiration:  2020

Certified Digital Forensics Examiner
Certificate:  898000
Expiration:  2021

Certified Cyber Security Instructor
Certificate:  743500
Expiration:  2020

Certified Vulnerability Assessor
Certificate:  783700
Expiration:  2020

About the Certifying Organization

Mile2 is a developer of proprietary vendor neutral cyber security certifications which are accredited by NSA’s CNSS 4011-4016. Mile2’s courses are approved on Homeland’s Security NICCS training schedule and is on the FBI’s preferred cyber security certification requirements. 

Mile2 courseware has been approved by the Committee on National Security Systems (CNSS) National Training Standards. The Information Assurance Courseware Evaluation (IACE) Program provides consistency in technology training and education for the information assurance industry. 

Mile2 is a globally respected Cyber Security Organization that focuses on cyber security training for governmental and corporate entities who understand the value of “knowing your enemy.” By training businesses and organizations to think like an attacker, their intellectual property and data remains secure.