Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

Similar documents
Mohammad Shahadat Hossain

Defensible Security DefSec 101

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

NERC Staff Organization Chart Budget 2018

Global Security Consulting Services, compliancy and risk asessment services

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

National Defense University and IRMC. National Defense University

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

IT in Healthcare Day

NERC Staff Organization Chart Budget 2017

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Defense in Depth Security in the Enterprise

NYDFS Cybersecurity Regulations

NERC Staff Organization Chart Budget 2017

Security and Privacy Governance Program Guidelines

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CITY OF MONTEBELLO SYSTEMS MANAGER

BHConsulting. Your trusted cybersecurity partner

Treasury IT Overview February 14, 2019

BHConsulting. Your trusted cybersecurity partner

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

January Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved Empowering a Fearless Internet

Cybersecurity for Service Providers

HISTORY: ADMINISTRATION AND COST CONTROL:

J & B Hartigan, Inc. Carrollton VA ABOUT US

The Deloitte-NASCIO Cybersecurity Study Insights from

CITY UNIVERSITY OF NEW YORK - JOHN JAY COLLEGE OF CRIMINAL JUSTICE (August 2006-present)

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Security Survey Executive Summary October 2008

PCI compliance the what and the why Executing through excellence

The Widening Talent Gap: The greatest security challenge of our time

Position Description IT Auditor

Les joies et les peines de la transformation numérique

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

Northeast Ohio Chapter Annual General Meeting

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

BALA GANESHAN, PH.D. EXPERIENCE. Vice President and CTO Stellus Technologies, San Jose, CA. Technical Leadership. Ecosystem Engineering and Evangelism

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper

Supporting the Cloud Transformation of Agencies across the Public Sector

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

NERC Staff Organization Chart

Larry Clinton President & CEO Internet Security Alliance

Oregon Fire Service Conference Enterprise Security Office Update. October 26, 2018

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Training and Certifying Security Testers Beyond Penetration Testing

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework

Cybersecurity Employment SecureNinja

IT-CNP, Inc. Capability Statement

UNIVERSITY OF VIRGINIA BOARD OF VISITORS MEETING OF THE AUDIT, COMPLIANCE, AND RISK COMMITTEE DECEMBER 9, 2016

Sirius Security Overview

SOC for cybersecurity

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Hearing Voices: The Cybersecurity Pro s View of the Profession

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Cyber Security Advanced Education: Preparing the Emerging Workforce

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.

FISMA Cybersecurity Performance Metrics and Scoring

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

NYS DFS Cybersecurity Requirements. Stephen Head Senior Manager Risk Advisory Services

AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer

QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES

Moderator: Tino Mantella President, Tier4 Advisors

ISACA Greater Kansas City Chapter

building for my Future 2013 Certification

CYBERSECURITY AND THE MIDDLE MARKET

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Tim Heagarty, CISA CISSP - (859) Lexington, KY

Digital Life and Cyber Security «Public-Private Governance" Mustafa AFYONLUOGLU Cyber Security & e-governance Chief Expert

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Your Trusted Partner in Europe European Business Reliance Centre

The Institute of Internal Auditors San Gabriel Valley Chapter

ISACA NEW DELHI CHAPTER CPE Held and Credits Earned Record

Combating Cyber Risk in the Supply Chain

INTERNAL CONTROL, CORPORATE GOVERNANCE AND RISK MANAGEMENT

ISE North America Leadership Summit and Awards

ERO Enterprise Strategic Planning Redesign

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

How to Prepare a Response to Cyber Attack for a Multinational Company.

Vice President, Chief Technology Officer at Methodist Le Bonheur Healthcare

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Team Capabilities and Specializations

8/17/2015. A look at challenges and solutions to a growing trend.

ISO Professional Services Guide to Implementation and Certification AND

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

COBIT 5 Foundation Workshop

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Putting It All Together:

Transcription:

Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive with over 20 years of security leadership, Mr. Eu has served in military, federal civilian, pharmacy, financial, telecom and e-commerce organizations managing security, privacy and compliance programs. Specialties: Professional Certifications: CISSP, CISM, CRISC, CISA, GICSP, CEH, CCSK, MCSE: Cloud & Infra, PMP, ISO27001 LI, CIPP, ITIL 2011 *Certified IBM Consultant, Process Consulting, by IBM Corp *Certified Level II Navy Information Operations Planner by USN Experience Infrastructure & Endpoint Security Practice Leader, North America at IBM December 2015 - Present Practice leader responsible for thought, sales, and delivery leadership in Infrastructure & Endpoint Security Practice of IBM Security Services, North America providing vendor neutral consulting and advisory services in network security architecture, cloud security architecture, firewall optimization, intrusion detection/ prevention architecture, advanced cyber defense infrastructure, Hadoop network security, vulnerability management, and endpoint security. Commander at US Navy Reserve February 2002 - Present 2015-Present Information Warfare Officer specializing in CYBERINTELLIGENCE serving at Office Naval Intelligence. -Certified Level II Navy Information Operations Planner. 2012-2015 Reserve N2 Director CYBERINTELLIGENCE at Navy Information Operations Command- Norfolk. 2011-2012 Reserve N2 Director for CYBERINTELLIGENCE at FLTCYBERCOM/COMTENTHFLT. 2010-2011 Deputy J2 for Combined Forces Special Operations Component Command-AFG. (Mobilized) Senior Manager, ERS Cyber Risk Services at Deloitte January 2014 - December 2015 (2 years) Leading engagements providing executive level business development, proposals and communications. Engagement manager for various projects supporting security infrastructure reviews, vulnerability Page 1

assessments, penetration testing and cyber maturity program assessments. Supporting industries for large clients in retail, financial, publishing, entertainment, health and state government sectors. SVP & Chief Information Security Officer at NWFCU April 2013 - December 2013 (9 months) CISO executive for third largest federal credit union in Virginia sponsored by federal agencies in the northern virginia region. Conducted security program and IT organizational assessments resulting in strategic changes for the organization. Associate Partner / Program CISO at IBM Global Services August 2008 - April 2013 (4 years 9 months) Associate Partner, Strategic Consulting & Delivery, IBM AIS GBS Cyber Security & Privacy Practice -Executive consultant providing leadership and strategic advisory services to various programs and projects within IBM. Provided proposal support for numerous programs including client facing oral presentations and proposals. -Security Program Manager over multiple Task Orders comprising over 300 IBM consultants and subcontractors in charge of Security Architecture, Strategy, Change Management Oversight, SOC operations, Access Control Helpdesk, Firewall Operations, VPN operations, Compliance policy, Disaster Recovery/Business Continuity and audit operations. Technologies worked with: IBM P-Series virtualization, VMware virtualization, CISCO Firewalls, Checkpoint Firewall, Netscreen Firewalls, Proventia Network Sensors, ISS HIPS, CISCO Vshield, IBM DS8300 SAN, Brocade SAN Fibrechannel, Red Hat Linux, IBM AIX, Windows Servers, AD/DNS, IPSEC VPN, Oracle 10g and Oracle 11i ebusiness. -Penetration testing coordinator for various national teams in support of public sector programs. *Awarded IBM GBS Service excellence Team award for 4th Quarter 2011. *Awarded 1st Quarter 2009 IBM Service Excellence Award for outstanding security team leadership and achievement. CTO (contractor) March 2008 - May 2008 (3 months) * Short term contract CTO position for a national social networking startup designed for public school systems. Web site is classscene.com * Provided strategic review of current technologies in web infrastructure and establishing a technological road map in support of long term business objectives. * Designed strategic scalability and expansion for enterprise infrastructure for expected surge in school district customers. * Managed effort to establish monitoring of key IT metrics for performance and capacity planning. Page 2

CISO at kajeet, Inc September 2006 - February 2008 (1 year 6 months) Principal vice president within the executive management team responsible for information security, FCC Telecom CPNI compliance, PCI (Payment Card Industry) compliance, COPPA (Children Online Privacy Protection Act) compliance and Privacy Program compliance for kajeet, Inc., a telecom industry start-up MVNO (Mobile Virtual Network Operator) whose cellular niche market is for children in the 10-16 year old demographic. Besides providing age specific content for the target audience, the kajeet service provide a host of parent friendly controls for budgeting of cell expenditures, cell time of use, and protective blacklists/ whitelists for the cell user. SSA Chief Information Security Officer at Social Security Administration October 2005 - April 2006 (7 months) Senior agency information security officer in charge of the Social Security Administration s (SSA) Information Security Program reporting to the Office of the CIO. SSA is one of the largest federal government programs in existence with an annual IT budget in excess of 1 billion dollars, over 1,300 field offices, and over 103,000 workstations. Nearly every American possesses a social security number and pays into the social security system with the social security number of an individual being one of the most important identity and privacy pieces of information to be protected. SSA also conducts Medicare/Medicaid functions and has IT systems processing medical data. CISO / Director Security and Policy at NeighborCare April 2005 - October 2005 (7 months) Senior manager in charge of Information Security and HIPAA compliance reporting to the CIO and VP of IT Operations of the company. NeighborCare, Inc was the 3rd largest company in the pharmacy LTC and PPD market with over 1.4 billion dollars in annual revenue. In July 2005, NeighborCare was acquired by Omnicare Inc. Director IT Security 2003-2005 (3 years) Senior manager in charge of Information Security program reporting to the CIO and CEO of the company. ABC and LTD are direct marketing retail e-commerce sales companies grossing over 1 billion in annual revenues. Senior Manager, Information Security at Ocwen Financial Corp 2002-2003 (2 years) Manager in charge of OCWEN s global Information Security program with various sites in the United States, India, Taiwan, and Japan. Reporting to the Chief Risk Officer, served as the most senior full-time Information Security manager for the corporation championing Information Security and Privacy issues with various business units within OCWEN. ONI43 Page 3

1999-2002 (4 years) Education Heriot-Watt University MBA, Business Administration, 1994-1995 The New School B.S., HRM, 1992-1994 Nova Southeastern University PhD - ABD, Information Systems, 1999-2008 Honors and Awards 4th Quarter 2011 IBM GBS Service Excellence Team Award, Defense Meritorious Service Medal, 1st Quarter 2009 IBM Service Excellence Award, Black Belt Page 4

Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Contact Ben on LinkedIn Page 5