Information security executive with significant security experience, breadth of knowledge, business acumen and outstanding leadership skills.

Experienced with:
– Access Management
– Application Development and Security
– Audit and Compliance (SOX, PCI DSS, COSO, ISO 27001, NYDFS, CCPA)
– Awareness Training
– Breach Detection Services
– CERT Team Management
– Cleared Room Security Assessments
– Database Security
– DRP/BCP Best Practices
– eDiscovery & Digital Forensics
– Experian, Equifax & TransUnion Compliance
– Expert Witness Cases
– FIPS 199, FIPS 200 Assessments
– GDPR Assessments & Compliance
– GRC toolsets
– HIPAA/HiTECH Assessments
– ICS / SCADA system security
– Incident Response
– IoT Security Best Practices
– ISO 17799/2700X
– Insider Threat Management
– Network & Operational Security
– NIST 800-53 / 800-171 / CSF / CUI
– Meaningful Security Metrics, Dashboards & Executive Reports
– OWASP Top 10 Business Risks
– Penetration Testing (Network, Database & Application)
– Physical and Data Center Security audits similar to SSAE 16 & SSAE 18
– Project Management (PMP equivalent)
– Risk Management, Assessment & Mitigation
– SANS/CIS Critical Security Controls
– SaaS Contracts & Implementation
– Security Architecture
– Security Leadership
– Security Operations Center (SOC) Services
– Security Policy Creation & Management
– Security Program Development
– Security Talent Scouting
– SCIF/DCID 6/9 or ICD 705 Assessments
– U.S. Privacy Risks
– Vulnerability Assessment and Remediation

Constantly working to expand my security knowledge and skill set to provide business leaders the information they need to make solid security decision.

Specialties: Security consultant, public speaking, threat based risk management decisions, data center security audits, ISO 27002 reviews, privacy and protection of confidential and sensitive data.

Skilled at sifting resume’s, and identifying exemplary IT security and engineering talent.

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent news posts

This is a sample blog post title.
Featured Image

Data Connectors Partners Join Multi-Sector Ransomware Task Force – Data Connectors

This is a sample blog post title.
Featured Image

Third Party Risk Assessment Gains Importance Following Log4j – Data Connectors

This is a sample blog post title.
Featured Image

Cybersecurity Industry Leaders Respond to Colonial Pipeline Ransomware Attack – Data Connectors

This is a sample blog post title.
Featured Image

Weekly Partner Roundup: The Data Edition – Data Connectors

This is a sample blog post title.
Featured Image

Virtual Exhibit Booth Improvements: New Features and How to Use Them – Data Connectors

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today