I have close to 20 years of experience in building/running and expanding engineering and professional services organizations. Everything from relationships to building scalable delivery methodology.
I can help organizations who are struggling with various aspects of IT performance, including operational, project and program, vendors relationships and outsourcing, digital transformation initiatives, cloud adoption, infrastructure renewal, employee development, and organizational scaling.
Alan is a technology innovator in IoT, Telecommunications and security. He is the architect of Icon Labs' award winning Floodgate products and a frequent industry speaker and blogger. He holds multiple patents related to telecommunications and security.
There is a strange duality in the minds of the consumers. They want hyper-personalized service anywhere anytime but keeping their privacy and security un-compromised. Now its up to the supply side to come up with a solution. I have experienced both sides of the table to understand how to translate policy requirements to IT functionalities. I have led CCPA live for one of the world’s largest retailer. GDPR requirements for the largest network equipment vendor. Multiple ISO implementations and audits for 27001 and 20000 / ITIL globally. Multiple SOC2, PCI-DSS, HIPAA projects.
All areas of Technology and cyber security from both a practitioner perspective (CIO/CISO) and from being a startup advisor (strategy, scale, funding, product)
As CIO of one of biggest Latin America Airlines.
As CIO of one of biggest Brazilian-Canada pharma I developed IT Strategy, best solutions and Register of Patent of different apps and software for salesforce.
Expert in IT, Digital, Applications, Support, Strategy and Roadmap solutions for Aviation, Agribusiness and Healthcare (Pharmaceuticals)
If your Cyber Security is only about technology expertise and watchers inside a Security Operations Center, then you risk the enterprise. The layers of security across the network, applications, data, cloud, endpoints or IoT constitute a logical means to compartmentalize technology. But the key to your defense is in cyber awareness. And that's the business of everyone in the company. Cyber security should be on the BoD agenda at every meeting, as an educational opportunity and assurance that the CISO and the cyber professionals are steeped in the business processes of the firm. Similarly the board should know enough of the cyber lexicon to add extensive value to the conversation. Is your Cyber Security practice embedded into corporate processes and have you built alliances with Privacy, Legal and HR? Is your cyber posture proactive and part of the firm's staff education? Can you articulate your cyber operating model in terms of an executive paradigm, meshing your cyber practices with your business value chain? Is Cyber Security seamlessly integrated with your governance, risk and compliance functions? Provide an illustrative view of the environment and end-to-end value chain, with cyber protections identified according to those processes. Cyber security isn't just effected due to regulatory mandates only, or only under pain of penalty. If you care about your customers as most firms say they do, then you are the steward of your and their critical information. Successes have included: - Creation/implementation of Cyber Security Operating model and Strategic Architecture; board artifacts and readiness education - Developed Incident Management and Response framework; Engineering mission and Supplier model. - Led Risk Management strategy, reducing overall IT Cyber Risk by 41% Please submit your questions two days in advance of our session so we can ensure thorough addressing. Optimizing my clients' time and investment is paramount.