Chief Information Security Officer (CISO) whose qualifications include a degree in Information Technology and a Master's of Business Administration (MBA); and certifications such as C|CISO, CISM, CRISC, CGEIT, including detailed knowledge of complex security infrastructure and information security management for leading insurance and financial firm that includes security tools, technologies and information security best practices. Over twenty-nine years of information technology experience, and fifteen years of Information Security experience in the management, creation and deployment of solutions protecting networks, systems and information assets for Fortune 500 firm in the roles of Chief Information Security Officer, Director Corporate Information Security Governance (GRC), and IT Security Operations Manager.
Chief Information Security Officer @ Information Security Program Management: Responsible for the development and delivery of a comprehensive information security and privacy program, including policies, standards and procedures; confers with key management, data custodians and business units in the development of such policies; and oversees the corporate information security policies, standards, procedures, including security awareness education efforts across the enterprise. Responsible for providing overall leadership and governance of information technology security processes, policies & procedures, practices & services. Helps IT and Business leaders to identify internal and external risks to the security, confidentiality and integrity of corporate information; evaluates the effectiveness of the current safeguards for controlling these risks; designs and implements ongoing safeguard programs and solutions, monitors and tests those programs and recommends measures for program compliance; develops security and privacy policies that use ISO27001/2 information security practices, COBIT 5 framework, and NIST controls.
Vulnerability Management: Responsible for the management of security vulnerability assessment program that regularly tests the overall security posture of the corporate from both a technical and procedural perspective, including serving as a liaison with internal and external auditing functions
Risk Based Management: Oversees a comprehensive information risk assessment framework; regularly assesses and reports on the Corporate information security risk; maintains and develops information assurance programs to protect the confidentiality, integrity and availability of corporate information, including working with legal department on security contractual provisions with business partners
Incident Response Team: Implemented and oversees an Incident Reporting and Response System to address security incidents (breaches) and responsive to alleged policy violations across enterprise From October 1987 to Present (28 years 3 months) Adjunct Faculty - Network Security @ Teaching Master's level courses at Robert Morris University in the MIS Sequence that are information security related. From September 2012 to Present (3 years 4 months) Peoria, Illinois Area
Masters of Business Administration, Information Technology @ Illinois State University From 2004 to 2007 Bachelor's of Science, Computer Science @ Illinois State University From 1982 to 1985 Bachelor's of Science, Applied Economics @ Illinois State University From 1982 to 1985 Greg Bee is skilled in: Managing Information Security Program, Vulnerability Assessment, Vulnerability Management, Risk Management, Risk Assessment, Risk Mitigation, Security Management, Computer Security, Data Security, Network Security, Managing Employees, Managing Processes, Information Security Management, Information Security Policy, Identity Management