/* Polymath.exe initialized */

The Renaissance Nerd

Where Da Vinci's curiosity meets the command line. Security architect by trade, perpetual student by nature.

nor@10.10.10.10

$ whoami

Ron Dilley | Distinguished Cybersecurity Innovator

$ cat /etc/motd

"Maximum efficiency, minimum effort"

$ _

Scroll to explore
I.

De Artifice

On the Craftsman

For over two decades, I have walked the corridors between the ancient arts of strategy and the electric frontiers of cyberspace. As a Distinguished Cybersecurity Innovator at AT&T and Principal at ISSQUARED, I architect defenses that would make castle builders envious.

Former CISO at Warner Bros. Entertainment and Amgen, IANS Faculty member, and author of "The Cybersecurity Manager's Guide" published by O'Reilly. My philosophy draws from the martial art of Judo: using an adversary's force against them, finding maximum efficiency with minimum effort.

🛠 CISSP #41535
GCIH Certified
📚 O'Reilly Author
🎓 IANS Faculty

Innovator

Pushing boundaries of what's possible while frustrating adversaries

Architect

Building security programs that stand the test of evolving threats

Teacher

Sharing knowledge through writing, speaking, and mentoring

II.

Armamentarium

The Arsenal

Open-source tools forged in the fires of real-world incident response. Each weapon in this collection has been battle-tested against actual threats.

📄

Log Templater

Transform chaotic logs into structured intelligence

C
📂

DiffTree

Compare directory structures with surgical precision

C
🥇

InfoSec Judo

Complete security toolkit: honeypots, forensics, network monitoring

Arsenal
💡

LED Monitor Daemon

System metrics on Framework Laptop LED panels

C

UberAdmin

Legacy archive of security tools and technical writings

Archive
💻

GitHub Repository

Explore the complete collection of open-source projects

All Projects
III.

Scripta

The Writings

O'REILLY

The Cybersecurity Manager's Guide

The Last Domain

2021

Published Works

Exploring "the art side" of information security - the human elements that technical manuals overlook. Leadership, culture, and the philosophy of defense.

  • "Making Sense of Logs" - USENIX, 2010
  • "Information Security: Learn the Lessons of the Sumo" - ComputerWeekly
  • Log Analysis Research - SLAML 2010
IV.

Imago

The Images

Beyond the terminal, I capture moments through the lens. Photography is another form of pattern recognition - finding beauty in chaos, stories in stillness.

Every photograph is a moment of transitive trust between the observer and the observed.
V.

Connexio

The Connections

Find me across the digital realm. From professional networks to social platforms, every channel is a portal to conversation.

connection.sh

$ echo $PRIMARY_BLOG

www.iamnor.com

$ echo $SECURITY_RESOURCE

www.infosecjudo.com

$ echo $ARCHIVE

www.uberadmin.com