Dave Tyson Profile for CISO Insights


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Dave Tyson Profile for CISO Insights

  1. 1. Dave Tyson , MBA, CPP, CISSP Detailed Security Profile August 2011
  2. 2. Overview <ul><li>27 Years security industry experience </li></ul><ul><li>National and International Security Industry Award Winner </li></ul><ul><li>Internationally Published </li></ul><ul><li>One of the only security professionals in the world to successfully build and lead a fully converged security organization </li></ul>
  3. 3. Physical Security Notables <ul><li>Experiences </li></ul><ul><ul><li>Five years as a bodyguard, both delivering and leading executive protection programs </li></ul></ul><ul><ul><li>Eleven years managing contract security companies including seven years at the executive level </li></ul></ul><ul><ul><li>Built security programs including alarm systems, access control, CCTV, and Audio Countermeasure programs </li></ul></ul><ul><ul><li>Led teams and conducted corporate and private investigations both nationally and internationally in North America, Europe and Asia. </li></ul></ul>
  4. 4. Security Convergence <ul><li>Built and ran effectively for four years one of the first successfully converged security programs in the world </li></ul><ul><ul><li>Program serviced the 2010 Winter Olympic Games </li></ul></ul><ul><li>Built one of the first integrated Identity and Access management systems </li></ul><ul><li>Built industry leading private sector converged security Intelligence Unit </li></ul><ul><li>Industry Firsts </li></ul><ul><ul><li>Converged Investigations methodology </li></ul></ul><ul><ul><li>Converged Risk Assessment methodology </li></ul></ul><ul><ul><li>Converged Management Metrics dashboard </li></ul></ul><ul><ul><li>Converged Security Officer Patrol tactics </li></ul></ul><ul><ul><li>Converged Policy Development and Approval process </li></ul></ul><ul><ul><li>First CCTV storage environment using IT systems </li></ul></ul>
  5. 5. Leading Physical & IT Security Teams <ul><li>Fully conversant and credentialed in both fields </li></ul><ul><li>Built programs to help teams work together with a common language </li></ul><ul><li>Optimized security investment across both programs to reduce management overhead and review time </li></ul><ul><li>Built and delivered training programs to security teams to build new convergence model understanding </li></ul><ul><li>Results </li></ul><ul><li>Reduced Costs to provide units of service </li></ul><ul><li>Reduced real risk for business </li></ul><ul><li>Increased staff morale on physical security teams </li></ul><ul><li>Increased cross team cooperation to optimize efficiency and effectiveness of security results </li></ul>
  6. 6. Security Convergence Text <ul><li>Wrote the first and only Security Convergence “How To” book for the industry </li></ul>Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets.
  7. 7. Speaking Engagements on Convergence <ul><li>37 Domestic Presentations on Convergence –including: </li></ul><ul><li>Secure World Atlanta – Keynote Speaker </li></ul><ul><li>TecSec – Keynote speaker </li></ul><ul><li>ASIS International –Emerging Trends Conference & Annual Seminar </li></ul><ul><li>ISACA - Annual Security Conference </li></ul><ul><li>5 International Presentations on Convergence –Including </li></ul><ul><li>European Union (ENISA) </li></ul><ul><li>Chilean Security Industry </li></ul><ul><li>European Chief Security Officer Roundtable </li></ul>
  8. 8. Information Security Notables <ul><li>Designed, developed and secured patent for new security industry technology for the Smart Grid </li></ul><ul><li>Built and led industry leading information security teams in multiple industry verticals </li></ul><ul><ul><li>E-commerce </li></ul></ul><ul><ul><li>Critical Infrastructure </li></ul></ul><ul><ul><li>Government </li></ul></ul><ul><li>Industry known as a Thought Leader and Innovator </li></ul><ul><ul><li>Security Convergence </li></ul></ul><ul><ul><li>Enterprise Security Risk Management </li></ul></ul><ul><ul><li>Business Continuity & Disaster Recovery </li></ul></ul><ul><ul><li>Threat and Risk Program Management and Prioritization </li></ul></ul>
  9. 9. Sample of Publishing <ul><li>Chief Security Officer Magazine </li></ul><ul><li>ISSA Journal </li></ul><ul><li>Canadian Security Magazine </li></ul><ul><li>Security Technology & Design Magazine </li></ul><ul><li>Security Management Magazine </li></ul><ul><li>SDM Magazine </li></ul><ul><li>Others…….. </li></ul>
  10. 10. Awards & Recognition <ul><li>AESRM Award for Excellence in Security Convergence </li></ul><ul><li>Security Director of the Year </li></ul><ul><li>National Security Pioneer Award </li></ul><ul><li>Nomination for ISE West Security Executive of the Year 2011 </li></ul><ul><li>Listed as one of the Top 10 Movers and Shakers in the Security Industry by ST&D Magazine </li></ul>
  11. 11. Security Consulting <ul><li>Formally trained in consulting methodology by IBM </li></ul><ul><li>Delivered consulting engagements in 14 Countries including the USA, Canada, Russia, the UK, Korea, and China </li></ul>
  12. 12. Degrees & Certifications <ul><li>Masters Degree is Business Administration (MBA) </li></ul><ul><ul><li>Digital Technology Management </li></ul></ul><ul><li>Certified Protection Professional (CPP) </li></ul><ul><ul><li>ASIS International </li></ul></ul><ul><ul><li>Board Certified in Security Management </li></ul></ul><ul><li>Certified Information Systems Security Professional (CISSP) </li></ul><ul><ul><li>ISC2 Certified in Information Security </li></ul></ul>
  13. 13. Associations & Affiliations <ul><li>ASIS International – International Board member – Largest Physical Security Association in the world </li></ul><ul><li>Cloud Security Alliance – IT & Physical Security Body for Cloud Computing </li></ul><ul><li>Alliance for Enterprise Security Risk Management </li></ul><ul><li>International Systems Security Association </li></ul><ul><li>Chief Security Officer Roundtable </li></ul><ul><li>CISO Forum </li></ul><ul><li>Bay Area CSO Council </li></ul><ul><li>CISO Summit </li></ul><ul><li>Advisory Board Henley Putnam University </li></ul>