SlideShare a Scribd company logo
Curriculum
Vitae
Dave Sweigert, M.Sci.
Information Security,
Subject Matter Expert
INDEX
Contents
SUMMARY.......................................................................................................................................3
PARTIAL LIST OF INDUSTRY CERTIFICATIONS..........................................................................4
AREAS OF EXPERTISE....................................................................................................................4
EDUCATION & PARTIAL LISTING OF TRAINING.........................................................................4
PARTIAL LIST OF ARTICLES & PUBLICATIONS..........................................................................5
PARTIAL LIST OF RECENT PROJECTS..........................................................................................6
SUMMARY
Over twenty-five (25) years of experience in issues related to information security, governance, regulatory
oversight, project management and other areas in infrastructure development and operation. This includes
baseline design, implementation and operation of critical infrastructure (server hardening, security
appliances, monitoring, malware protection, etc.), sensitive classified systems, and regulated environments,
etc.
Private sector. Provide technical leadership and oversight in areas related to digital key management and
key issuance for Public Key Infrastructure (PKI) (Lawrence Livermore National Lab (LLN)); use of digital
certificates to authenticate high-value transactions with electronic signatures (EuroSignCard); developing
security architecture for multi-user web-based portals used in the auto financing industry (see Route One,
Chrysler, General Motors and Ford combined portals); provide assessment for healthcare entities (Kaiser-
Permanente) to comply with $800 Million grant funds under the HiTECH-ARRA program, perform,
analyze and certify audit results for federal government auditors; certify assessments for Payment Card
Industry (PCI) compliance of 800 server node network (J2 Global) processing more than $300 million in
subscriber fees authorized by Master Card/VISA/Discover to include infrastructure security,
administrative/operational and technical controls, intrusion monitoring, etc.; consultant to MERCK, LTD
to prototype a document authentication system relying on digital signatures to authenticate New Drug
Applications (NDAs) submitted to the food and drug administration.
Public sector. Served as cryptological technician to perform field-level and depot-level maintenance of
crypto equipment used to secure voice communications for the U.S. Air Force (assigned to A.F.
Cryptological Support Center (AFCSC)); designed secure electronic messaging system relying on the
CCITT (now International Telecommunications Union) X.400 standard to transport crypto keys to active
duty military forces over a SECRET-HIGH network on behalf of AFCSC (while consulting to Group
Technologies, Inc.); managed the commercialization of the U.S. National Security Agency’s (NSA)
Certificate Authority Workstation (CAW) (on behalf of General Dynamics); provided overall design of
directory schema and replication of CCITT (ITU) X.500 servers for the Kennedy Space Center (NASA)
prototype of a secure X.400 e-mail system for use by 15,000 NASA associates; designed, implemented and
operated a work flow system for the U.S. Special Operations Command (USSOCOM) consisting of 15
UNIX servers and 400 secure (classified) workstations to enable SECRET classified support traffic during
DESERT SHIELD and DESERT STORM; represented interests of the NSA National Information
Assurance Partnership (NIAP) at joint federal working committees developing the information security
administrative implementing regulations for the Health Insurance Portability and Accountability Act
(HIPAA) of 1996; served as the Statewide Information Security Policy Officer for the State of Ohio to
develop information security policies that had a direct impact on sixty (60) agencies serving a population
of 15 million citizens; consulted to the California Office of Health Information Integrity (CalOHII) to
develop a 251 question assessment matrix to appraise the HIPAA compliance for forty (40) state agencies
serving a population of 35 million citizens.
PARTIAL LIST OF INDUSTRY CERTIFICATIONS
 Certified Ethical Hacker (CEH)
 Payment Card Industry Professional (PCIP)
 California Emergency Management Specialist (CEMS)
 Certified Information Systems Auditor (CISA)
 Certified Information Systems Security Professional (CISSP)
 Health Care Information Security and Privacy Practitioner (HCISPP)
 Project Management Professional (PMP)
 CompTIA Security+ (SEC+)
AREAS OF EXPERTISE
 Governance and compliance frameworks to reduce risk (HIPAA, PCI, FISMA, COBIT)
 Regulatory certifications and audits to demonstrate compliance with frameworks
 Developing administrative/operational/technical controls pursuant to Sarbanes-Oxley Act
 HIPAA Privacy and Security Rule risk assessments, corrective action plans, etc.
 PCI Data Security Standard (DSS) Reports of Compliance (RoC) for external auditors
 PCI DSS enterprise vulnerability assessments, infrastructure scanning, risk prioritization
 Business Continuity Planning Incident Command System (ICS) response, recovery, etc.
 Continuity of Operations Planning (COOP) for business continued operations
 Technical security: server hardening, administration, network weaknesses, etc.
 Security management of the enterprise (ISO 27001)
 Deployment of Certification Authorities with Public Key Infrastructure (PKI)
 SAS-70 Type I and II and SSAE Type I and II reports and attestations of security controls
 Policy, procedures and standards development to demonstrate compliance
 Anti-phishing, anti-key-loggers, prevention of financial crimes directed at comptrollers
EDUCATION & PARTIAL LISTING OF TRAINING
 51 hours technology, server, security courses, Las Positas College, 2012-2014
 Incident Command System Instructor, Federal Emergency Management Agency, 2013
 Incident Management Team certified, Federal Emergency Management Agency, 2013
 Professional Development Series (PDC), Federal Emergency Management Agency, 2012
 Masters of Science-Information Security, Capella University, 2004
 Masters-Project Management, Florida Institute of Technology, 1992
 Bachelor of Business Administration, Texas A&M University, 1985
 Associate of Applied Science, State University of New York, 1983
PARTIAL LIST OF ARTICLES & PUBLICATIONS
 Ethical Hacker: Field Operations Guide, 10/2015, ISBN: 978-1517763091, 360 pages
 Surviving a HIPAA Audit: Jump Start Guide, 1/2015, ASIN: B00SOXZ5U0, 200 pages
Publicly available white papers by Dave Sweigert on SLIDESHARE.NET
 Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801
(“CADRA”), 8/15, 280 SlideShare.NET views
 SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter, 11/14, 1461
SlideShare.NET views
 What every CEO needs to know about California's new data breach law, 10/14, 646
SlideShare.NET views
 Is 2014 the year for Cyber Militias?, 1/14, SlideShare.NET 641 views
 Are NIST standards clouding the implementation of HIPAA security risk assessments?
9/13, 546 views
 Preparing for the Cyber Pearl Harbor with increased situational awareness, 9/13, 664
SlideShare.NET views
 Introduction of project risk in an information assurance environment, 7/23, 1068
SlideShare.NET views
 Building on incident management metrics to support Executive Order
13636, 7/23, SlideShare.NET 568 views
 Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity
Framework, 7/13, 489 SlideShare.NET views
 Integration of cyber security incident response with IMS -- an approach for E.O. 13636,
6/23, 600 SlideShare.NET views
 Cybersecurity Framework for Executive Order 13636 -- Incident Command System,
6/2013, 675 SlideShare.NET views
PARTIAL LIST OF RECENT PROJECTS
 9/15 to present. Fortune 100 health care insurance company. Senior Information
Technology (I.T.) Security Strategist. Assist senior I.T. security staff with direction
and guidance to manage security operations impacting more than 15,000
stakeholders. Review enterprise vulnerability assessments to plan PCI/HIPAA/NIST
remediation efforts.
 6/15 to 9/15. The MSA Card, LLC. Support PCI and HIPAA compliance efforts for
pre-market self-administration tool. Act as Internal Security Assessor to manage
dialogue with the Payment Card Industry (PCI). Collect operational and design
evidence to demonstrate compliance of MSA Card product for external auditors.
 12/14 to 6/15. California Office of Health Information Integrity. Provide expert
guidance and consultant to the office with administrative responsibility for the
implementation of the HIPAA Privacy and Security Rules at a statewide level.
Conduct audit of CalPERS, state employee retirement fund, for HIPAA compliance.
Prepare audit report package. Develop HIPAA assessment tools to ascertain “audit
readiness” of over forty (40) state agencies.
 3/14 to 12/14. Privately owned Pharmacy Benefit Management organization.
Manage the implementation of security administrative, operational and technical
controls for 150 employees that managed over three (3) million health records.
Work with I.T. technical staff to develop controls that would produce artifacts to
support the demonstration of compliance with HIPAA and PCI DSS.
 9/12 to 3/14. Sabbatical at Los Positas College. Completed 51 hours of technical
training courses to refresh skills, knowledge and experience in the field of ethical
hacking, or white hat hacking. Coursework included penetration studies,
vulnerability scanning, preparation of technical audit material (for PCI type reports),
server administration, network protocol operation, etc.
 9/12 to 3/14. Sabbatical with the Urban Area Security Initiative (UASI) for the Bay
Area. Funded by the U.S. Department of Homeland Security, UASI provides a wide
spectrum of counter-terrorism, disaster preparation, emergency operations
management, medical emergency coordination, etc. Obtain 1,000 of leadership
training in simulation and modeling workshops to include certifications as: Type 3
Incident Management Team qualified (FEMA), California Emergency Management
Specialist (Cal. Office of Emergency Services, Office of the Governor).
 3/11 to 9/12. Kaiser-Permanente. Led audit team to evaluate HIPAA compliance
for three (3) regional data centers. Leverage PCI audit results and conduct new
assessment activities to collect artifacts that demonstrate compliance with the risk
assessment requirements promulgated by the HITECH-ARRA award of $800
million to the organization. Mange assessment team of 4-5 auditors that identified
880 issues requiring remediation. Manage the corrective action plan (CAP)
management for these findings.

More Related Content

Similar to CV Resume of Dave Sweigert - Cyber Security Expert

CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
jonhson198
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
VSNaipaul15
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
agathachristie112
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
KeatonJennings104
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
robertlesew5
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
jonhson198
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
agathachristie265
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
chrysanthemu49
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
McdonaldRyan78
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
donaldzs7
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
Baileyabv
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
Baileyabw
 
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.com
Davis10a
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
donaldzs7
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
DavisMurphyA97
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
donaldzs9
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
jonhson199
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
DavisMurphyA98
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
Davis12a
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
Davis10a
 

Similar to CV Resume of Dave Sweigert - Cyber Security Expert (20)

CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.com
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 

Recently uploaded (20)

PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 

CV Resume of Dave Sweigert - Cyber Security Expert

  • 1. Curriculum Vitae Dave Sweigert, M.Sci. Information Security, Subject Matter Expert
  • 2. INDEX Contents SUMMARY.......................................................................................................................................3 PARTIAL LIST OF INDUSTRY CERTIFICATIONS..........................................................................4 AREAS OF EXPERTISE....................................................................................................................4 EDUCATION & PARTIAL LISTING OF TRAINING.........................................................................4 PARTIAL LIST OF ARTICLES & PUBLICATIONS..........................................................................5 PARTIAL LIST OF RECENT PROJECTS..........................................................................................6
  • 3. SUMMARY Over twenty-five (25) years of experience in issues related to information security, governance, regulatory oversight, project management and other areas in infrastructure development and operation. This includes baseline design, implementation and operation of critical infrastructure (server hardening, security appliances, monitoring, malware protection, etc.), sensitive classified systems, and regulated environments, etc. Private sector. Provide technical leadership and oversight in areas related to digital key management and key issuance for Public Key Infrastructure (PKI) (Lawrence Livermore National Lab (LLN)); use of digital certificates to authenticate high-value transactions with electronic signatures (EuroSignCard); developing security architecture for multi-user web-based portals used in the auto financing industry (see Route One, Chrysler, General Motors and Ford combined portals); provide assessment for healthcare entities (Kaiser- Permanente) to comply with $800 Million grant funds under the HiTECH-ARRA program, perform, analyze and certify audit results for federal government auditors; certify assessments for Payment Card Industry (PCI) compliance of 800 server node network (J2 Global) processing more than $300 million in subscriber fees authorized by Master Card/VISA/Discover to include infrastructure security, administrative/operational and technical controls, intrusion monitoring, etc.; consultant to MERCK, LTD to prototype a document authentication system relying on digital signatures to authenticate New Drug Applications (NDAs) submitted to the food and drug administration. Public sector. Served as cryptological technician to perform field-level and depot-level maintenance of crypto equipment used to secure voice communications for the U.S. Air Force (assigned to A.F. Cryptological Support Center (AFCSC)); designed secure electronic messaging system relying on the CCITT (now International Telecommunications Union) X.400 standard to transport crypto keys to active duty military forces over a SECRET-HIGH network on behalf of AFCSC (while consulting to Group Technologies, Inc.); managed the commercialization of the U.S. National Security Agency’s (NSA) Certificate Authority Workstation (CAW) (on behalf of General Dynamics); provided overall design of directory schema and replication of CCITT (ITU) X.500 servers for the Kennedy Space Center (NASA) prototype of a secure X.400 e-mail system for use by 15,000 NASA associates; designed, implemented and operated a work flow system for the U.S. Special Operations Command (USSOCOM) consisting of 15 UNIX servers and 400 secure (classified) workstations to enable SECRET classified support traffic during DESERT SHIELD and DESERT STORM; represented interests of the NSA National Information Assurance Partnership (NIAP) at joint federal working committees developing the information security administrative implementing regulations for the Health Insurance Portability and Accountability Act (HIPAA) of 1996; served as the Statewide Information Security Policy Officer for the State of Ohio to develop information security policies that had a direct impact on sixty (60) agencies serving a population of 15 million citizens; consulted to the California Office of Health Information Integrity (CalOHII) to develop a 251 question assessment matrix to appraise the HIPAA compliance for forty (40) state agencies serving a population of 35 million citizens.
  • 4. PARTIAL LIST OF INDUSTRY CERTIFICATIONS  Certified Ethical Hacker (CEH)  Payment Card Industry Professional (PCIP)  California Emergency Management Specialist (CEMS)  Certified Information Systems Auditor (CISA)  Certified Information Systems Security Professional (CISSP)  Health Care Information Security and Privacy Practitioner (HCISPP)  Project Management Professional (PMP)  CompTIA Security+ (SEC+) AREAS OF EXPERTISE  Governance and compliance frameworks to reduce risk (HIPAA, PCI, FISMA, COBIT)  Regulatory certifications and audits to demonstrate compliance with frameworks  Developing administrative/operational/technical controls pursuant to Sarbanes-Oxley Act  HIPAA Privacy and Security Rule risk assessments, corrective action plans, etc.  PCI Data Security Standard (DSS) Reports of Compliance (RoC) for external auditors  PCI DSS enterprise vulnerability assessments, infrastructure scanning, risk prioritization  Business Continuity Planning Incident Command System (ICS) response, recovery, etc.  Continuity of Operations Planning (COOP) for business continued operations  Technical security: server hardening, administration, network weaknesses, etc.  Security management of the enterprise (ISO 27001)  Deployment of Certification Authorities with Public Key Infrastructure (PKI)  SAS-70 Type I and II and SSAE Type I and II reports and attestations of security controls  Policy, procedures and standards development to demonstrate compliance  Anti-phishing, anti-key-loggers, prevention of financial crimes directed at comptrollers EDUCATION & PARTIAL LISTING OF TRAINING  51 hours technology, server, security courses, Las Positas College, 2012-2014  Incident Command System Instructor, Federal Emergency Management Agency, 2013  Incident Management Team certified, Federal Emergency Management Agency, 2013  Professional Development Series (PDC), Federal Emergency Management Agency, 2012  Masters of Science-Information Security, Capella University, 2004  Masters-Project Management, Florida Institute of Technology, 1992  Bachelor of Business Administration, Texas A&M University, 1985  Associate of Applied Science, State University of New York, 1983
  • 5. PARTIAL LIST OF ARTICLES & PUBLICATIONS  Ethical Hacker: Field Operations Guide, 10/2015, ISBN: 978-1517763091, 360 pages  Surviving a HIPAA Audit: Jump Start Guide, 1/2015, ASIN: B00SOXZ5U0, 200 pages Publicly available white papers by Dave Sweigert on SLIDESHARE.NET  Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“CADRA”), 8/15, 280 SlideShare.NET views  SAMPLE HIPAA Security Rule Corrective Action Plan Project Charter, 11/14, 1461 SlideShare.NET views  What every CEO needs to know about California's new data breach law, 10/14, 646 SlideShare.NET views  Is 2014 the year for Cyber Militias?, 1/14, SlideShare.NET 641 views  Are NIST standards clouding the implementation of HIPAA security risk assessments? 9/13, 546 views  Preparing for the Cyber Pearl Harbor with increased situational awareness, 9/13, 664 SlideShare.NET views  Introduction of project risk in an information assurance environment, 7/23, 1068 SlideShare.NET views  Building on incident management metrics to support Executive Order 13636, 7/23, SlideShare.NET 568 views  Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Framework, 7/13, 489 SlideShare.NET views  Integration of cyber security incident response with IMS -- an approach for E.O. 13636, 6/23, 600 SlideShare.NET views  Cybersecurity Framework for Executive Order 13636 -- Incident Command System, 6/2013, 675 SlideShare.NET views
  • 6. PARTIAL LIST OF RECENT PROJECTS  9/15 to present. Fortune 100 health care insurance company. Senior Information Technology (I.T.) Security Strategist. Assist senior I.T. security staff with direction and guidance to manage security operations impacting more than 15,000 stakeholders. Review enterprise vulnerability assessments to plan PCI/HIPAA/NIST remediation efforts.  6/15 to 9/15. The MSA Card, LLC. Support PCI and HIPAA compliance efforts for pre-market self-administration tool. Act as Internal Security Assessor to manage dialogue with the Payment Card Industry (PCI). Collect operational and design evidence to demonstrate compliance of MSA Card product for external auditors.  12/14 to 6/15. California Office of Health Information Integrity. Provide expert guidance and consultant to the office with administrative responsibility for the implementation of the HIPAA Privacy and Security Rules at a statewide level. Conduct audit of CalPERS, state employee retirement fund, for HIPAA compliance. Prepare audit report package. Develop HIPAA assessment tools to ascertain “audit readiness” of over forty (40) state agencies.  3/14 to 12/14. Privately owned Pharmacy Benefit Management organization. Manage the implementation of security administrative, operational and technical controls for 150 employees that managed over three (3) million health records. Work with I.T. technical staff to develop controls that would produce artifacts to support the demonstration of compliance with HIPAA and PCI DSS.  9/12 to 3/14. Sabbatical at Los Positas College. Completed 51 hours of technical training courses to refresh skills, knowledge and experience in the field of ethical hacking, or white hat hacking. Coursework included penetration studies, vulnerability scanning, preparation of technical audit material (for PCI type reports), server administration, network protocol operation, etc.  9/12 to 3/14. Sabbatical with the Urban Area Security Initiative (UASI) for the Bay Area. Funded by the U.S. Department of Homeland Security, UASI provides a wide spectrum of counter-terrorism, disaster preparation, emergency operations management, medical emergency coordination, etc. Obtain 1,000 of leadership training in simulation and modeling workshops to include certifications as: Type 3 Incident Management Team qualified (FEMA), California Emergency Management Specialist (Cal. Office of Emergency Services, Office of the Governor).  3/11 to 9/12. Kaiser-Permanente. Led audit team to evaluate HIPAA compliance for three (3) regional data centers. Leverage PCI audit results and conduct new assessment activities to collect artifacts that demonstrate compliance with the risk assessment requirements promulgated by the HITECH-ARRA award of $800 million to the organization. Mange assessment team of 4-5 auditors that identified 880 issues requiring remediation. Manage the corrective action plan (CAP) management for these findings.