
IT Security Professional. The past 20 years of my IT Security professional development journey have focused on developing a practical IT Security, Risk, and Operations framework that creates a realistic plan for cybersecurity risk reduction. The need for a useful security assessment framework evolved over twenty years of observing security product investment choices made in organizational silos without the whole company picture in mind. Security investments lacked risk and operational improvements as measured key performance outcomes. By incorporating these elements, the prioritization of IT Security investments becomes more impactful. My learning started with ten years of security product development built on working with organizations like the DHS, DOD, DOJ, Yahoo, PayPal, and Microsoft. At the start of an engagement, customers often ask, “why implement this product?” The investments are usually significant and represent an inconvenience to end-users or customers. The next question is often, “how is this project a priority compared to all the other security needs?” Over the next ten years, I collected data points on these problem statements and worked tirelessly to understand how to answer these questions. As practice lead in the development and execution of IT Information, Identity, Security, Risk and Compliance strategies with companies like Microsoft, Mayo Clinic, T-Mobile, United Healthcare Group, Boeing, Providence Health, PeaceHealth, Adventist, and First American Title, we evolved the framework by exploring and developing an effective NIST & ISO-based methodology that maps to regulatory requirements like SOX, CCPA, and HIPAA. The framework methodology starts by gaining a rapid understanding of the current state of companies’ hybrid cybersecurity maturity, followed by developing a future state roadmap based on the priorities of the company’s business and regulatory needs. We then complete the assessment by creating a gap analysis and executive presentation outlining the benefits of executing a multi-year plan, including risk reduction, operational improvement, the total cost of ownership, improvement of the user experience, and its contribution to regulatory compliance. Over the last ten years, I have successfully managed the delivery of complex multi-million-dollar projects in a broad range of complex Cybersecurity topics.
Designing and building houses, Mountain Biking, Learning Surf, International Politics