PASSIONATE ABOUT INFORMATION SECURITY
Ask Steve a question or two about info security. There’ll be a split-second pause as his mind shifts into high gear… and he’ll engage you in lively discussion about how improving your security posture requires a holistic approach. With almost twenty years in technology and over ten devoted almost entirely to info security he's worked and consulted in a variety of sectors. Steve performed InfoSec Security Officer duties at a US Embassy overseas and served five years as the CISO for one of the largest colleges in Texas leading a talented info security team. He's knows both security extremes.
HIGHLY QUALIFIED AND SIMPLY SPOKEN
“Steve has more competency certifications than anyone I’ve met. If he listed them all after his name they’d be longer than his full name! He sets the bar extremely high and has helped many of us achieve certifications we never thought possible.” Former Employee
Having technical expertise is extremely helpful and oftentimes necessary to solve a business problem. But let’s face it: BUSINESS needs DRIVE technology and info security, not the other way around. Today's technology leaders must leave the technical jargon at the door and speak simply and effectively with clients and business leaders about solving business needs with technology.
A TRUSTED ADVISOR
Steve is widely relied upon to provide timely guidance and solutions that are effective and aligned with industry best practice. Reputation and trust are earned through hard work. Steve is committed to delivering on everything promised so that doing business together is always convenient and personable.
Steve loves making new professional acquaintances. Reach out if you want to talk technology, info security, or join him for a ride on the bike- he's a road cycling junkie!
Account Executive @ As a public sector account executive for South Texas, Steve serves a variety of Education (K12 and higher-education) as well as State/Local Government customers in the Rio Grande Valley. Steve works alongside a talented team of specialists, engineers, and inside sales reps, to deliver end-to-end Dell solutions that are right-sized, affordable, and easy-to-use. From April 2015 to Present (7 months) South TexasCEO/ Solutions Architect @ LOCAL. SENSIBLE. AFFORDABLE
RioLogic was founded with two goals in mind. Firstly, to serve as a trusted security advisor helping businesses develop and improve their security program- sensibly and affordably using best-in-class solutions. Secondly, and equally important, is to establish a robust enterprise technology and security presence for the Rio Grande Valley. From March 2014 to April 2015 (1 year 2 months) South TexasChief Information Security Officer @ Tasked with establishing an information security program in 2009, Steve introduced policy and drafted a variety of security standards and guidelines to form a governance strategy aligned with regulatory requirements and best practice. Over five years Steve progressively matured a comprehensive security program funded by a dedicated budget and led by a talented security team.
Working together with the VP of information services & planning and the chief information officer, Steve recognized the need early on to pursue a secure-connected approach to achieve improved network visibility and security capabilities.
Steve also recognized the dual roles he must tactfully fulfill in leading an enterprise security program- the expectation from executive management for objective audit and compliance coupled with the need from technology teams to offer assistance and guidance in improving security posture. To accomplish both Steve developed in-house scorecards, assessment tools, and action plan templates to aid staff; provided periodic security updates to the Board of Trustees; and increasingly engaged external consultants to objectively assess, audit, and report on security posture.
Steve worked very closely with college business units, such as the Business Office, Purchasing, Human Resources, and Risk Management to review and assist with rfp’s, contracts, and agreements, particularly for cloud and third-party providers, consultants, and vendors. As data and services are being moved to the cloud or hosted, effective information security is becoming highly contractual. From September 2009 to August 2014 (5 years) Adjunct Faculty- CITP Bachelor Program @ For several years Steve taught both introductory information security, based on the CompTIA Security+ curriculum, as well as advanced network security courses for the Bachelor of Applied Technology program. Instruction was delivered 100% online, face-to-face, and in hybrid format.
Shying from textbook-based learning since oftentimes the material was either outdated or lacking real-world applicability, Steve often developed custom curriculum and hands-on lab work to engage students. Examples included topics in data loss prevention, how to conduct investigations for violations of corporate policy, and penetration testing using BackTrack Linux. Assignments and projects also emphasized technical writing since soft skills in information security are equally important and complementary to technical skills. From September 2009 to August 2011 (2 years) Systems & Operations Manager @ From February 2008 to August 2009 (1 year 7 months) South Texas CollegeInformation Management Specialist @ Ensured that use of classified and unclassified information by embassy personnel was consistent with current Department of State security requirements. Performed Information Systems Security Officer (ISSO) responsibilities. ISSO tasks consisted of: providing information security awareness training, network monitoring, vulnerability assessment and remediation, incident investigation and response, and secure equipment procurement and destruction. Supervised and performed military APO mail and diplomatic pouch/courier activities. From 2006 to January 2008 (2 years) Systems Programmer @ From April 2000 to June 2006 (6 years 3 months)
Master of Science, Computer Information Systems, 4.0 @ Tarleton State University From 2006 to 2008 Bachelor's Degree, Science @ Charter Oak State CollegeDiploma in Biochemical Technology @ Algonquin College of Applied Arts and Technology From 1991 to 1994 Steven Bourdon is skilled in: Information Security, Information Security..., Network Security, Security, SharePoint, Disaster Recovery, IT Management, Penetration Testing, Virtualization, GSNA, Data Center, Computer Forensics, System Administration, Vulnerability Management, Active Directory, Cloud Computing, Linux, E-Learning, Information Systems..., Troubleshooting, GIAC Certified Systems..., GIAC Certified..., Data Loss Prevention, Security Incident..., Information Security..., Risk Assessment, PCI DSS, HIPAA, Sarbanes-Oxley Act, Strategic Planning, Cloud Security, ISO 27001 Lead Auditor, Auditing, Vulnerability Assessment, Vulnerability Scanning, McAfee, SonicWALL, Sourcefire, Threat & Vulnerability..., Unified Threat..., CIO Advisory Services, ITIL, Mobile Security, Data Security, Data Governance, Database Security, Security Consulting, Project Management, Web Application Security, Web Application Firewall