Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.
|
|
- Emerald Stafford
- 8 years ago
- Views:
Transcription
1 Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.com SUMMARY Amit Garg brings over 17 years of information security consulting, business development, customer relationship management, and program management experience in complex and highly visible projects with senior executive sponsorship. He has worked with clients including large federal civilian agencies, military organizations, and Fortune 500 companies in the banking, insurance and financial services, healthcare, life sciences, consumer products, and retail verticals. Mr. Garg s expertise includes enterprise security program management, enterprise governance, risk management and compliance (egrc), data protection, business resiliency, security culture awareness and training, project management, and cybersecurity due diligence for mergers, acquisitions, and divestitures. He has extensive experience with regulatory requirements including FISMA, HIPAA, NIST, and ISO/IEC 27001, as well as industry best practices across multiple verticals. Mr. Garg has had proven success in engaging with clients, understanding business objectives, identifying and analyzing business issues, laying out tactical and strategic roadmaps, and proposing and executing on those strategies. EDUCATION Certificate, Executive Education, Leadership Development, Yale University - Yale School of Management, 2008 M.S., Information Security Management/Engineering Management, George Washington University School of Engineering & Applied Science, 2006 B.A. Economics, Emory University, 1998 PRESENT EMPLOYMENT Director, Technology Advisory Practice, Berkeley Research Group, Present PREVIOUS POSITIONS Advisory Solutions Principal, RSA Security, the Security Division of EMC,
2 Manager in Security & Privacy Services, Technology Risk, Deloitte & Touché LLP, Information Security Consultant, e-management Consultants, Federal Account Manager, Cyberguard Corporation, 2004 Sales Engineer/Manager, Corsec Security Inc., Business Development Lead/Consultant, f3 Solutions Group, Business Development/Project Manager, Diginexo Inc., Government Account Manager, SCO Inc., SECURITY CLEARANCE 2009 DOD Secret PROFESSIONAL AWARDS 2014 Platinum Award for outstanding performance and service to RSA PROFESSIONAL AFFILIATIONS Present Certified Member, International Information Systems Security Certification Consortium (ISC2) Certified Member, Project Management Institute (PMI) Certified Member, Business Continuity Institute (BCI) Member, International Association of Privacy Professionals (IAPP) Member, Software and Supply Chain Assurance Working Group (SSCAWG) Member, Industrial Control Systems Joint Working Group (ICSJWG) Member, Information Systems Security Association Northern Virginia Chapter Committee Member, Engineer Alumni Association, George Washington University BUSINESS AND NOT-FOR-PROFIT AFFILIATIONS Member, egrc.com Advisory Board - a group of Fortune 500 entities dedicated to training the next generation of governance, risk, and compliance practitioners. Member, Engineer Alumni Association, George Washington University School of Engineering & Applied Science 2
3 Board Member, American Barber Workforces Foundation Volunteer member, American Red Cross, National Capital Region, Vice President of Sponsorship, Network of South Asian Professionals (NetSAP) DC Chapter, 2004 PUBLICATIONS & THOUGHT LEADERSHIP CONTRIBUTIONS Developed an IT Security Due Diligence Framework for assessing risk for acquisition targets for a Fortune 100 retail organization, 2013 Co-developed content and delivered a webinar on Managed Regulatory Compliance Outsourcing to fellow practitioners 2012 Led and served as client service ambassador at Welcome 2 Deloitte, a two day new hire orientation to 200+ new hires, Developed and presented data separation strategy workshops to senior executives of a Fortune 100 consumer retail organization, 2011 Developed a data separation strategy playbook for a Fortune 100 consumer retail organization, 2011 PUBLISHED REVIEWS Led the development of Deloitte whitepaper Meeting Compliance Challenges: Leveraging the Value of Outsourcing in support of launch of new service offering, 2012 SELECTED CONSULTING EXPERIENCE Project 1: M&A IT Security Due Diligence Client Organization: Fortune 100 Retail Organization Role: M&A IT Security Advisor Duration: February 2013 April 2013 Description: Led work stream for IT Security due diligence of potential acquisition targets. Contributions included developing IT Security Due Diligence Risk and Controls framework and playbook. Led the development of remediation plans for pre-sign, pre-close, and postclose activities. Project 2: Governance, Risk, Compliance (GRC) Vendor Evaluation Client Organization: Fortune 200 Financial Services Client Role: Project Manager / Security Lead Duration: September 2012 February 2013 Description: Led engagement to assess and select a GRC vendor for enterprise risk management solution. Facilitated vetting process with over 40 senior executive stakeholders from multiple business units including Finance, Risk, Compliance, BASEL, SOX, IT, 3
4 Technology Risk, Operational Risk, Model Risk Management, etc. Contributions included developing assessment methodology, managing vendor selection process, creating, collecting, and analyzing survey responses, and presenting at executive briefings. Project 3: I&TRM Security Strategy Client Organization: Various Fortune 500 financial services clients Role: Security Advisor Duration: July 2012 September 2012 Description: Led work stream around governance, risk, and compliance. Contributions included drafting security action plans, developing technology risk management transformation process, developing policies and standards aligned to BASEL, SOX and other financial service regulations. Project 4: Managed Regulatory Compliance Outsourcing Initiative Role: Project Manager Duration: October 2011 June 2012 Description: Managed the development of a new service offering targeting the Life Sciences and Financial Services industries. Project 5: Security Program Support Client Organization: Multiple Fortune 100 Financial Services Clients Role: Security Advisor Duration: August 2011 September 2011 Description: Provided support to several engagement teams in the areas of: project planning, risk management, workshop planning, security policy reviews, and risk assessments. Project 6: IT Carve Out Divestiture Planning Client Organization: Fortune 100 Commercial Retail Client Role: Senior M&A and IT Security Advisor for Divestiture Planning Duration: April 2011 June 2011 Description: Provided support to PMO for divestiture planning in the following areas: project planning, risk management, communications, workshop planning. Project 7: Confidential Information Containment Initiative Client Organization: Fortune 100 Telecommunications Client Role: Project Manager / Security Lead Duration: March 2011 April 2011 Description: Identification, assessment, and containment of confidential information (i.e., intellectual property) from being transferred in the divestiture of a business unit. Project 8: GSA ICAM Program Management Client Organization: General Services Administration (GSA), Office of the CIO - Identity, Credentialing, and Access Management (ICAM) Office Role: Project Manager Duration: August 2010 February
5 Description: Provided Project Management Office (PMO) support services to a 20 member team. Responsibilities included program operations, program metrics, quality assurance, communications, project management planning, earned value management, risk management, and reporting to client senior management. Project 9: Certification & Accreditation (C&A), and Risk Management & Compliance Client Organizations: Government National Mortgage Association (Ginnie Mae), US Department of Housing and Urban Development Role: Security Lead Duration: February 2010 April 2010 Description: Provided risk management and compliance support to client. This project included gap assessment, risk analysis of identified gaps and recommendations for risk management, certification and accreditation, and management of third-party vendor providing services to Client. Project 10: Systems Engineering and Information Assurance Program Management Support Client Organization: Military Health System (MHS) - Defense Health Information Management System (DHIMS) Role: Manager / Information Assurance Officer (IAO) / IA Lead Duration: June 2007 February 2010 Description: (DHIMS) provides information management and IT solutions that capture, manage and share healthcare data for the military's Electronic Health Record (EHR). Provided mission support services to DHIMS across a broad range of management and technical functions that support the full System Development Life-Cycle (SDLC) of these systems encompassing systems engineering, technical engineering support, systems security, information assurance (IA), enterprise architecture, and requirements management. SELECTED SPEAKING ENGAGEMENTS Presented Safe and Secure Online sponsored by ISC2 to 100+ high school students in Stafford, VA, 2012 How to be a Farmer: Learn to plant your egrc talent seeds from the ground up, RSA Archer Summit & Charge Conference, 2015 Cybersecurity Litigation, Software and Supply Chain Assurance Forum, December
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationInformation Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
More informationPanel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce
Panel Session: High Impact Workforce Initiatives Redefine the Government Information Security Workforce Moderator: Lynn McNulty, CISSP Director of Government Affairs for (ISC)2 Co-Chair (ISC)2 Government
More informationConducting due diligence and managing cybersecurity in medical technology investments
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
More informationCustomizing Identity Management to fit complex ecosystems
Customizing Identity Management to fit complex ecosystems Advisory Services PwC Security - Identity Management 12 July 2011 Client s challenge One of the world s largest aerospace and defense corporations
More informationISE Northeast Executive Forum and Awards
ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information
More informationCorporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
More informationPrivate Wealth Solutions An exceptional experience for discerning clients
Private Wealth Solutions An exceptional experience for discerning clients The client experience is everything. In today s financial services environment, where services and price can be quickly matched
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationIT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationVendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
More informationKPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com
KPMG Internal Audit: Top 10 considerations in 2015 for technology companies kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Our annual compilation of Internal Audit considerations for technology
More informationDecember 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
More informationCybersecurity Credentials Collaborative (C3) cybersecuritycc.org
Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide
More informationGovernance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
More informationCybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
More informationArchSmart, LLC Capabilities Overview
ArchSmart, LLC Capabilities Overview Victoria Engel-Yamane CEO and Founder www.archsmart.net Introduction ArchSmart, LLC established September 2005 Small, Women-Owned (WO), Service-Disabled Veteran- Owned
More informationEMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
More informationEDWARD G. LEWIS 556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: elewis@etgl.com
556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: elewis@etgl.com PROFESSIONAL EXPERIENCE 2001 - Present Member, Board of Directors, National Veterans Business
More informationISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
More informationWelcome! Scaled Agile Reston, VA
Welcome! Scaled Agile Reston, VA Rally Software Eliassen Group 2012 Agenda 7:30-8:00: Breakfast + Registration 8:00-9:00: Meet local Agilists 9:00-9:15: Opening Remarks 9:15-10:00: Rafaa Abdalla Chief
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationStrategy and Management Services (SAMS), Inc.
Strategy and Management Services (SAMS), Inc. Exceeding Expectations with People Who Make a Difference! Strategy and Management Services (SAMS), Inc. 8117 Lake Park Dr. Alexandria, VA 22309 1 703-969-7949
More informationOur Service Offering to SASOL
Our Service Offering to SASOL MEMBER FIRM ALIGNED WITH LIKE-MINDED FIRMS IN OVER 70 OFFICES ACROSS 25 COUNTRIES Giving our clients a competitive advantage by providing access to best practice. A BRIEF
More informationNIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
More informationInteragency Advisory Board Meeting Agenda, March 5, 2009
Interagency Advisory Board Meeting Agenda, March 5, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy
More informationCorporate Membership. For Solution Providers
Corporate Membership For Solution Providers Introduction Welcome to the Cloud Security Alliance. The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing
More informationISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
More informationThe Digital Identity Ecosystem of the States: Securing the Enterprise
The Digital Identity Ecosystem of the States: Securing the Enterprise Security Industry Alliance September 28, 2011 Doug Robinson, Executive Director National Association of State Chief Information Officers
More informationCyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
More informationSecurity solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
More informationHosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
More informationBuilding Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
More informationRisk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
More informationTESTIMONY OF STEVE COOPER DEPARTMENT OF COMMERCE CHIEF INFORMATION OFFICER BEFORE THE SUBCOMMITTEES ON
TESTIMONY OF STEVE COOPER DEPARTMENT OF COMMERCE CHIEF INFORMATION OFFICER BEFORE THE SUBCOMMITTEES ON INFORMATION TECHNOLOGY AND ON GOVERNMENT OPERATIONS OF THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
More informationiworks healthcare Managed IT services
iworks healthcare Managed IT services SunGard s iworks HEALTHCARE: Managed IT Services Organizations around the globe face an array of critical issues in today s business environment. Economic conditions
More informationKLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT
1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President of KLC Consulting, Inc. Over 20 years in IT and Security Security
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationPillsbury Global Sourcing BETTER DESIGN. BETTER DECISIONS. BETTER RESULTS. Pillsbury Winthrop Shaw Pittman LLP
Pillsbury Global Sourcing BETTER DESIGN. BETTER DECISIONS. BETTER RESULTS. Pillsbury Winthrop Shaw Pittman LLP 2 Better Design. Better Decisions. Better Results. Creating value isn t easy. Creating value
More informationA Blueprint for: Microsoft Dynamics CRM Success
A Blueprint for: Microsoft Dynamics CRM Success An I.B.I.S., Inc. Whitepaper by Clinton Weldon VP, Professional Services Kevin Johnson VP, Professional Services I.B.I.S., Inc. 2015 All Rights Reserved.
More informationInternal audit value optimization for insurance organizations
Internal audit value optimization for insurance organizations Webinar May 13, 2015 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.
More informationA Blueprint for Business Software Implementation Success
A Blueprint for Business Software Implementation Success An I.B.I.S., Inc. Whitepaper by Kevin Johnson VP, Professional Services Clinton Weldon VP, Professional Services I.B.I.S., Inc. 2015 All Rights
More informationThe CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
More informationGRC Program Best Practices & Lessons Learned
GRC Program Best Practices & Lessons Learned Steps to Establishing and Maturing a GRC program Carl Sawicki, American Express Kathleen Randall, RSA Archer 1 Abstract In today s world, few organization s
More informationwww.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
More informationOur Expertise and Commitment Driving your Success MISMO Solutions
Our Expertise and Commitment Driving your Success MISMO Solutions 1 Offices in New York and Northern VA Table of Contents Actualize Consulting Overview MISMO Overview Actualize MISMO Transformation Solution
More informationInternational Sign Associations Vice President, Education & Technical Initiatives
International Sign Associations Vice President, Education & Technical Initiatives International Sign Association is seeking a Vice President, Education & Technical Initiatives for this $6 million budget,
More informationRoberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J.
Presenting a live 90 minute webinar with interactive Q&A Data Privacy and Cybersecurity Due Diligence in M&A Deals Identifying Vulnerabilities, Drafting Data Related Provisions in M&A Agreements, Post
More informationAn RCG White Paper The Data Governance Maturity Model
The Dataa Governance Maturity Model This document is the copyrighted and intellectual property of RCG Global Services (RCG). All rights of use and reproduction are reserved by RCG and any use in full requires
More informationPanel: SwA Practices - Getting to Effectiveness in Implementation
Panel: SwA Practices - Getting to Effectiveness in Implementation (EMC s Evolution of Product Security Assurance) Dan Reddy, CISSP, CSSLP EMC Product Security Office Software Assurance Forum Gaithersburg,
More informationMichael Landry, MBA, PMP Chief Project Controller
Artistry of Project Management The Artistry Michael Landry, MBA, PMP Chief Project Controller Leadership is the art of accomplishing more than the science of management says is possible Colin Powell is
More informationDarden School. Commission/Schools/Darden/November 2007 1
Darden School The Darden School of Business recently celebrated its 50 th anniversary, reflecting the strong base on which to build toward its centennial. While the world in which the School operates has
More informationOpen Group Vulnerability Management Proposal Mike Jerbic, November 16, 2003
Open Group Vulnerability Management Proposal Mike Jerbic, November 16, 2003 Purpose and audience of this paper This proposal is a starting point put forward to the Open Group Security Forum s membership
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
More informationWhat drives the CIO agenda? The Growing Business Contribution of IT
What drives the CIO agenda? The Growing Business Contribution of IT Klaus Thomas Director Executive Programs Microsoft CIO Roundtable München, 21. Juni 2006 Page 1 The Gartner EXP CIO Survey is the largest
More informationCybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards
More informationPeople & Change Strategies for Success
People & Change Strategies for Success 2014 1st Quarter Meeting & Vendor Fair: IHRIM Jasmine Langevine, Senior Associate March 2014 Contents Page Introduction 3 People & Change Overview 4 Change Management
More informationCybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
More informationLNC provides its partners with flexible capital solutions and the strategic support to drive value creation for all stakeholders
LNC provides its partners with flexible capital solutions and the strategic support to drive value creation for all stakeholders LNC Partners is a Northern Virginia based investment firm with over $235
More informationReverse Due Diligence A New Trend In Financial M&A
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Reverse Due Diligence A New Trend In Financial M&A
More informationMANAGEMENT CONSULTING ENTERPRISE SOLUTIONS IT OUTSOURCING. CAPABILITY briefing
MANAGEMENT CONSULTING ENTERPRISE SOLUTIONS IT OUTSOURCING MILESTONES 1999-Present 8(a) / SDB Certified Woman-Owned Certified GSA Schedule 70 GSA STARS II NAICS Codes 541511, 541512, 541519, 541618, 541611,
More informationDr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning
More informationCompetency Requirements for Executive Director Candidates
Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives
More informationBeyond risk identification Evolving provider ERM programs
Beyond risk identification Evolving provider ERM programs March 2016 At a glance PwC conducted research to assess the state of enterprise risk management (ERM) within healthcare providers and found many
More informationJob Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks
Job Description Job Title Branch Business Group Reporting to Location Enterprise Architect Knowledge, Information, Research and Technology Government Technology Services Chief Architect Wellington Salary
More informationIBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
More informationMARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
More informationPrivacy Governance and Compliance Framework Accountability
Privacy Governance and Framework Accountability Agenda Global Data Protection and Privacy (DPP) Organization Structure Privacy The 3 Lines of Defense (LOD) Model: Overview Privacy The 3 Lines of Defense
More informationRSA ARCHER AUDIT MANAGEMENT
RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures
More informationREQUEST FOR INFORMATION
Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325
More informationSTATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
More informationHow to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 warren.udy@hq.doe.gov
More information70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?
SESSION ID: GRC-W04 70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready? Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Senior Security Engineer G2, Inc.
More informationCybersecurity: The Legal, Legislative and Regulatory Outlook
Cybersecurity: The Legal, Legislative and Regulatory Outlook Jamie Barnett Rear Admiral USN (Retired) Co-Chair, Telecommunications Partner in Cybersecurity Practice Cybersecurity Impact and Costs Direct
More information2014 Vendor Risk Management Benchmark Study
2014 Vendor Risk Management Benchmark Study Introduction/Executive Summary You can have all the security in the world inside your company s four walls, but all it takes is a compromise at one third-party
More informationSubj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING
SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities
More informationRising to the Challenge
CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned
More informationDEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
More informationHow to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
More informationEDWARDS PROJECT SOLUTIONS NORTH AMERICAN INDUSTRY CERTIFICATION SYSTEM (NAICS) CODES QUALIFICATIONS WITH FULL DESCRIPTIONS
REVISED: J 5523920 PORTFOLIO MANAGEMENT SIZE STANDARD: $7.0M Edwards Project Solution ( ) provides portfolio management services through building enterprise project management solutions and providing portfolio
More informationHow To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
More informationWritten Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
More informationUsing Organizational Change Management Principles to Create a Scalable OCM Methodology
Using Organizational Change Management Principles to Create a Scalable OCM Methodology Cynthia Onstott John Spurrell May 16, 2016 2 Today s Learning Objectives How to develop a new Organizational Change
More informationIdentity & Access Management new complex so don t start?
IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach
More informationThe Hybrid Cloud Security Professional
The Hybrid Cloud Security Professional As cloud computing continues to evolve, the role of the hybrid cloud security professional provides an interesting study in enterprise operations and individual education
More informationSecurity Testing. Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org. F. Scot Anderson, CISSP scot@securixx.comcom. April 7, 2009 V 1.
Standards Based Security Testing Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org F. Scot Anderson, CISSP scot@securixx.comcom 1 Topics Why use standards? Secure systems component parts (1st level taxonomy)
More informationIT Transformation for Health Care
Health Care strategy consulting to the country s leading hospitals and health systems. OVERVIEW IT Transformation for Health Care Transform IT develops a new target model to promote operational efficiency,
More informationThe Role of Governance, Risk Management & Compliance in Organizations
The Role of Governance, Risk Management & Compliance in Organizations Study of GRC practitioners Sponsored by RSA, The Security Division of EMC Independently conducted by Ponemon Institute LLC Publication
More informationStrategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
More informationDeveloping and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
More informationPosition. Senior Specialist, Global Volunteers & General Recruitment Human Resources SVP of Human Resources Job Grade: 3 Funding Source: Unrestricted
Position Title: Department: Reports To: Senior Specialist, Global Volunteers & General Recruitment Human Resources SVP of Human Resources Job Grade: 3 Funding Source: Unrestricted Full or Parttime: Full
More informationTELECOMMUNICATIONS INDUSTRY ASSOCIATION
April 28, 2014 General Services Administration Regulatory Secretariat Division (MVCB) ATTN: Ms. Flowers 1800 F Street NW, 2nd Floor Washington, DC 20405 Comments of the Telecommunications Industry Association
More informationUsing Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy. June 23, 2015
Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy June 23, 2015 What is egrc? A management system for compliance requirements, policies, risk
More informationTechnology Consulting Services
Technology Consulting Services Building enterprise wide systems that make sense Streamlining your technology... to bring your busin next level 01 Technology Consulting Services 02 Our Leadership Team 03
More informationApril 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
More informationHow To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
More informationSecurity Forensics Training
Security Forensics Training Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber
More information