Date post: | 11-Nov-2014 |
Category: |
Technology |
Upload: | cisoinsights |
View: | 1,444 times |
Download: | 0 times |
Dave TysonDave Tyson, MBA, CPP, , MBA, CPP, CISSPCISSP
Detailed Security ProfileDetailed Security Profile
August 2011August 2011
OverviewOverview
27 Years security industry experience27 Years security industry experience National and International Security National and International Security
Industry Award WinnerIndustry Award Winner Internationally PublishedInternationally Published One of the One of the onlyonly security professionals security professionals
in the world to successfully build and in the world to successfully build and lead a fully converged security lead a fully converged security organizationorganization
Physical Security Physical Security NotablesNotables
ExperiencesExperiences Five years as a bodyguard, both delivering and Five years as a bodyguard, both delivering and
leading executive protection programsleading executive protection programs Eleven years managing contract security Eleven years managing contract security
companies including seven years at the executive companies including seven years at the executive levellevel
Built security programs including alarm systems, Built security programs including alarm systems, access control, CCTV, and Audio Countermeasure access control, CCTV, and Audio Countermeasure programsprograms
Led teams and conducted corporate and private Led teams and conducted corporate and private investigations both nationally and internationally investigations both nationally and internationally in North America, Europe and Asia.in North America, Europe and Asia.
Security ConvergenceSecurity Convergence Built and ran effectively Built and ran effectively
for four years one of the for four years one of the first first successfully successfully converged security converged security programs in the world programs in the world Program serviced the 2010 Program serviced the 2010
Winter Olympic GamesWinter Olympic Games Built one of the first Built one of the first
integrated Identity and integrated Identity and Access management Access management systemssystems
Built industry leading Built industry leading private sector converged private sector converged security Intelligence security Intelligence Unit Unit
Industry FirstsIndustry Firsts Converged Converged
Investigations Investigations methodologymethodology
Converged Risk Converged Risk Assessment methodologyAssessment methodology
Converged Management Converged Management Metrics dashboardMetrics dashboard
Converged Security Converged Security Officer Patrol tacticsOfficer Patrol tactics
Converged Policy Converged Policy Development and Development and Approval processApproval process
First CCTV storage First CCTV storage environment using IT environment using IT systemssystems
Leading Physical & IT Leading Physical & IT Security TeamsSecurity Teams
Fully conversant and Fully conversant and credentialed in both credentialed in both fieldsfields
Built programs to help Built programs to help teams work together teams work together with a common languagewith a common language
Optimized security Optimized security investment across both investment across both programs to reduce programs to reduce management overhead management overhead and review timeand review time
Built and delivered Built and delivered training programs to training programs to security teams to build security teams to build new convergence model new convergence model understandingunderstanding
ResultsResults Reduced Costs to Reduced Costs to
provide units of provide units of serviceservice
Reduced real risk for Reduced real risk for businessbusiness
Increased staff morale Increased staff morale on physical security on physical security teamsteams
Increased cross team Increased cross team cooperation to cooperation to optimize efficiency optimize efficiency and effectiveness of and effectiveness of security resultssecurity results
Security Convergence Security Convergence TextText
Wrote the first and Wrote the first and only Security only Security Convergence “How Convergence “How To” book for the To” book for the industryindustry
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets.
Speaking Engagements on Speaking Engagements on ConvergenceConvergence
37 Domestic 37 Domestic Presentations on Presentations on Convergence –Convergence –including:including:
Secure World Atlanta Secure World Atlanta – Keynote Speaker– Keynote Speaker
TecSec – TecSec – Keynote speakerKeynote speaker
ASIS International ASIS International ––Emerging Trends Conference & Emerging Trends Conference & Annual SeminarAnnual Seminar
ISACA ISACA - Annual Security - Annual Security ConferenceConference
5 International 5 International Presentations on Presentations on Convergence –Convergence –IncludingIncluding
European Union European Union (ENISA)(ENISA)
Chilean Security Chilean Security IndustryIndustry
European Chief European Chief Security Officer Security Officer RoundtableRoundtable
Information Security Information Security NotablesNotables
Designed, developed and secured patent for new Designed, developed and secured patent for new security industry technology for the Smart Gridsecurity industry technology for the Smart Grid
Built and led industry leading information Built and led industry leading information security teams in multiple industry verticalssecurity teams in multiple industry verticals E-commerceE-commerce Critical InfrastructureCritical Infrastructure GovernmentGovernment
Industry known as a Thought Leader and Industry known as a Thought Leader and InnovatorInnovator Security ConvergenceSecurity Convergence Enterprise Security Risk ManagementEnterprise Security Risk Management Business Continuity & Disaster RecoveryBusiness Continuity & Disaster Recovery Threat and Risk Program Management and Threat and Risk Program Management and
PrioritizationPrioritization
Sample of PublishingSample of Publishing
Chief Security Officer MagazineChief Security Officer Magazine ISSA JournalISSA Journal Canadian Security MagazineCanadian Security Magazine Security Technology & Design Security Technology & Design
MagazineMagazine Security Management MagazineSecurity Management Magazine SDM MagazineSDM Magazine Others……..Others……..
Awards & RecognitionAwards & Recognition
AESRM Award for Excellence in AESRM Award for Excellence in Security ConvergenceSecurity Convergence
Security Director of the YearSecurity Director of the Year National Security Pioneer Award National Security Pioneer Award Nomination for ISE West Security Nomination for ISE West Security
Executive of the Year 2011 Executive of the Year 2011 Listed as one of the Top 10 Movers Listed as one of the Top 10 Movers
and Shakers in the Security Industry and Shakers in the Security Industry by ST&D Magazineby ST&D Magazine
Security ConsultingSecurity Consulting
Formally trained in consulting Formally trained in consulting methodology by IBMmethodology by IBM
Delivered consulting engagements in Delivered consulting engagements in 14 Countries including the USA, 14 Countries including the USA, Canada, Russia, the UK, Korea, and Canada, Russia, the UK, Korea, and ChinaChina
Degrees & CertificationsDegrees & Certifications
Masters Degree is Business Masters Degree is Business Administration Administration (MBA)(MBA)
Digital Technology ManagementDigital Technology Management Certified Protection Professional Certified Protection Professional (CPP)(CPP)
ASIS InternationalASIS International Board Certified in Security ManagementBoard Certified in Security Management
Certified Information Systems Certified Information Systems Security Professional Security Professional (CISSP)(CISSP)
ISC2 Certified in Information SecurityISC2 Certified in Information Security
Associations & Associations & AffiliationsAffiliations
ASIS International – ASIS International – International Board International Board member – Largest member – Largest Physical Security Physical Security Association in the worldAssociation in the world
Cloud Security Alliance – Cloud Security Alliance – IT & Physical Security IT & Physical Security Body for Cloud ComputingBody for Cloud Computing
Alliance for Enterprise Alliance for Enterprise Security Risk Security Risk ManagementManagement
International Systems International Systems Security AssociationSecurity Association
Chief Security Officer Chief Security Officer RoundtableRoundtable
CISO ForumCISO Forum Bay Area CSO CouncilBay Area CSO Council CISO SummitCISO Summit Advisory Board Advisory Board
Henley Putnam Henley Putnam UniversityUniversity