Master's in Applied Intelligence
Phuong Nguyen

04 Feb 12-1pm ET
Master's in Applied Intelligence Webinar  
« Faculty
Phuong Nguyen

Phuong Nguyen is a Senior Manager in the Advisory Cybersecurity & Risk practice of Ernst & Young LLP. He assists the Global Leader for Cyber Threat Management, in working with clients to develop insider threat programs, data protection programs and responding to, investigating, and remediating cyber incidents. Phuong consults with U.S. federal law enforcement agencies, key executives of Fortune 100 companies, Fortune 500 C-Suite officials, and Boards of Directors from across industry sectors on matters of cybersecurity and investigations.

Phuong remains an adjunct faculty member at Georgetown University School of Continuing Studies where he instructs one course in the Master’s in Applied Intelligence and two courses in the Professional Certificate in Cybersecurity Strategy program. His courses focus on information security, managing security, and leadership & strategy in cybersecurity.

Prior to joining EY in 2016, Phuong was responsible for incorporating foreign adversary threats, technical surveillance countermeasures, supply chain, and insider threat capabilities into the Intelligence Community’s cloud platform. In support of the National Counterintelligence Executive, Phuong helped craft national-level policy to enhance counterintelligence and security capabilities in the cyber domain to improve identification of nefarious network activity, network defense activities, and network security posture.

Phuong is a veteran of the United States Air Force and supported specialized intelligence operations around the globe. Upon his honorable discharge, Phuong supported the Air Force Office of Special Investigations as a senior cyber analyst. In that capacity, Phuong supported the development of analytical cyber counterintelligence assessments for executive level audiences. Also, he assisted cyber counterintelligence investigations to evaluate foreign adversary cyber capabilities, collection requirements, significance of compromised information, and disseminated relevant indicators to appropriate intelligence partners.