Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 Email and Phone Number
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 personal email
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 phone numbers
Strategic Leadership | Secure Enterprise IT Business Operations | Corporate GovernanceMantra: "Speed to Business Results!" | Core Values: Service, Leadership, Excellence, Honor, and Growth#LeadershipAndSuccess C|CISO | CISSP-ISSMP | PMPWelcome Video: https://lnkd.in/gP6Z5MpE | Word Cloud: https://lnkd.in/gnSSYQDXMy happy place is at the intersection of Leadership, Technology, and Business. My superpower is my unshakeable determination to succeed. I consistently increase my level of certainty, clarity, confidence, and courage to manage, execute, and expand results in both my personal and professional life. My passion is leadership and cybersecurity. My purpose is to help end suffering in cyberspace and inspire people to reach their highest potential. I help make living, working, and raising a family in cyberspace safer and more secure by minimizing exposure to confidential and privileged data and the impact of the next security breach. I inspire people around me through mentorship, writing, speaking, training, and other meaningful engagements to help grow leaders who will impact their respective communities and make our world a better place. I was born to lead.Award-winning visionary cybersecurity and technology risk executive.For over two decades, Bob has worked in complex environments at the intersection of people, processes, and technology. With an outstanding record of successfully establishing globally recognized technology risk management and cybersecurity programs, he has been setting the vision, driving the strategy and governance framework, establishing effective policies and standards, and managing the cybersecurity risk and compliance functions within Higher Education, State and Federal Governments, Defense Industrial Complex, High-Tech, and Consulting Industries.Bob is recognized within the information security community for knowledge, vision, leadership, and the collaborative nature of effectively approaching a constantly evolving and complex area of information security and risk management. He demonstrates ability to establish positive internal and external C-level and boardroom relationships to effect significant change, drive a risk management strategy forward while enabling organization growth. Bob Fabien Zinga is also a Senior Information Warfare Officer in the U.S. Navy Reserve, among the top 2% of 400,000+ employees worldwide.Certified Coach, Trainer, Teacher and Speaker by Dr. John C. Maxwell, Bob is a firm believer in personal growth and professional development and is dedicated to continuous growth.
Us Navy
View- Website:
- dukelong.com
-
Information Warfare Commanding Officer (Cdr And Equivalent Ceo And Ciso And Cio And Cto, Dod Ts And Sci)Us NavyCalifornia, United States -
Top Voice: Information Security & LeadershipLinkedin Jul 2024 - PresentSunnyvale, Ca, UsTop Voices is an invitation-only program featuring a global group of experts on LinkedIn covering a range of topics across the professional world, helping members uncover valuable knowledge relevant to them. Top Voices was previously known as the Influencer program prior to October 2022. Top Voices are vetted to ensure that they meet high trust standards, are consistently active on the platform, and share valuable expertise through content that demonstrates their unique, original contributions to a topic. -
Information Warfare Commander (Cdr/Ceo/Ciso/Cio/Cto, Dod Ts/Sci)U.S. Navy Reserve Sep 2007 - PresentNorfolk, Va, Us• Chief of Staff, May24• Commanding Officer (CEO-equivalent), Feb22-Apr24• Commander, Top 2% of 400,000+ employees, Apr21• XO/CoS, NR CPF IW CP, Jun18-Feb21• PM/CO, NR SPAWAR PROGRAMS DCO & CCDC, Apr14-Sep17• Provide advice, guidance, and expertise in information, command and control, and space systems through the planning, acquisition, operation, maintenance, and security of Naval networks and the systems that support Navy operational and business processes.• Foster development of the skills needed to conduct Network-Centric operations, both afloat and ashore, to maintain superior maritime operations in the information age.• Lead the Navy’s network warfare missions, developing tactics, techniques, and procedures to realize tactical, strategic, and business advantages afloat and ashore.• Principal advisor to the chain of command on INFOSEC and technology-related matters.• Manage multiple IT initiatives and programs employing industry information security risk management frameworks and best practices to address the U.S. Department of Defense strategic goals.• Information Warfare officer with strong cybersecurity leadership qualities overseeing a cybersecurity team conducting risk assessments to enhance naval networks' security posture afloat and ashore to support the war-fighter.• Develop and deliver cybersecurity training for U.S. Navy IP leaders.• Develop and implement a long-term training plan to maintain the readiness level of the unit. Work closely with senior officers to foster a positive relationship with the active component and develop new intellectual capital to support the war-fighter.• Lead and influence security strategy efforts across the enterprise to protect assets, align and prioritize our enterprise-wide information protection and security investments, to establish an enhanced information protection framework, mitigate risks, strengthen defenses, improve detection of malicious activities, and minimize vulnerabilities. -
Information Technician Petty Officer Third Class (Dod S)U.S. Navy Reserve Oct 2004 - Sep 2007Norfolk, Va, Us• Trained to provide the critical secure communications links between ships at sea and units ashore.• Help protect unclassified sensitive information related to the planning and execution of sensitive Government activities.• IT/TCOM/ADMIN Officer, CNO’s International Seapower Symposium, Naval War College, Newport, RI. Oct. 2007.• Education Petty Officer, Naval Reserve Accession Course, Great Lakes, IL. May 2005 to June 2005. -
Bcbr Aac Advisor & Co-Chair Of The Communications And Technology CommitteeSilicon Valley Executive Center Jan 2023 - PresentSanta Clara, California, UsVolunteer: The Black Corporate Board Readiness Readiness (BCBR) Alumni Advisory Council (AAC) includes hand-selected ambassadors from all past cohorts. The Council supports and evolves the BCBR application review process as well as provides guidance on continuing education and networking opportunities. The Council ensures the BCBR Alumni experience remains centered in strategic planning and programming for the BCBR community. -
Executive Board AdvisorUnited Cybersecurity Alliance Apr 2021 - PresentRoseville, Us-Ca, UsVolunteer: The mission of the United Cybersecurity Alliance (UCA) is to offer a cost-FREE education to women interested in cybersecurity & privacy careers. We focus on developing a new generation of digital warriors. We are in the business of transforming the "Faces of Cybersecurity" by creating unique opportunities for women and minorities to join the cybersecurity field. Our programs: 100 Women in 100 Days Cybersecurity Career Accelerator and SacCARES Cybersecurity Career Accelerator are the ONLY existing programs offering a complete career lifecycle support to students, from helping them gain the latest and most in demand skills, to career coaching and soft skills workshops so that they can be employable right after they graduate. Other global events include Ally of the Year Awards, CISO Townhalls, Cyber Salons and DEI Include Cybersecurity Forum align our vision and mission to one common goal - to increase the number of women and minority for much needed diversity in cybersecurity jobs. -
Board DirectorAz Cyber Initiative Apr 2021 - PresentArizona, UsVolunteer: AZ Cyber Initiative is a 501(c)(3) non-profit organization dedicated to accelerating, advocating, and amplifying the opportunities for a Cybersecurity and Information Technology (IT) education curriculum for High School students. Our mission is to develop a next generation of Arizona cybersecurity professionals capable of exceeding the expectations of the evolving digital workforce of future.Our goal is to build public/private partnerships to reach underrepresented Arizonans and prepare them for a career in CybersecurityThe AZ Cyber Initiative aims to create opportunities through scholarship funding for High School students in Arizona interested in pursuing a career in Cybersecurity. We are dedicated to identifying and appropriately resourcing the next generation of Arizona student-leaders so that, through them, many others will join the fight against one of our nation’s largest national security issues: Cybersecurity. -
Advisory CouncilHarvard Business Review Oct 2021 - PresentBrighton, Ma, UsVolunteer: As an Advisor to the Harvard Business Review, I provide insight to shape the content and perspective on ideas from HBR and the wider world of management and leadership. I share in research findings, receive exclusive content from HBR and preview new content and products. -
Forbes CouncilForbes Technology Council Oct 2020 - PresentBoston, Ma, UsMember of the San Francisco and FinTech Forbes Technology Council Groups.Forbes Technology Council is an invitation-only community comprised of leading technology executives.Members are vetted and selected by a review committee based on their depth and diversity of experience. Criteria for acceptance include a track record of successfully impacting business growth metrics, as well as personal and professional achievements and honors. Members are invited to enjoy an array of benefits including a private forum for discussion and collaboration, the opportunity to share insights via CommunityVoice on Forbes.com, exclusive product and service partnerships and concierge-level support. -
Executive DirectorMaxwell Leadership Oct 2020 - PresentDuluth , Georgia , UsTransformation Leader, Certified Coach, Speaker, Teacher, and Trainer at Maxwell Leadership.John Maxwell was named the "#1 Most Influential Business Leader" by the American Business Association, and identified as the most popular leadership expert in the world by Inc. magazine. Dr. John Maxwell has been one of the world’s foremost leadership and personal growth experts for more than 45 years. He is a number 1 New York Times best-selling author, Coach, and Speaker who has written more than 100 books in 50 languages and sold more than 34 million copies worldwide. He has personally equipped and developed more than 5 million leaders in every country of the world. Dr. John Maxwell has certified over 40,000 coaches, speakers, teachers, and trainers in over 150 nations, building the top leadership certification program in the world: The Maxwell Leadership Certification Team, formerly known as the John Maxwell Team. -
Ciso Member/MentorInformation Security Leadership Foundation Jan 2021 - PresentSan Francisco, Ca, UsThe ISLF is a community of Information Security Leaders focused on collaboration, education, mentorship, and the development of the next generation of Information Security Leaders. The Foundation partners with educational programs to offer grants for students aspiring to be future security leaders. The ISLF is a 501(c)(3) not-for-profit, volunteer organization. -
Cybersecurity Initiative/Atlanta FounderPrivate Directors Association® Oct 2020 - PresentFrankfort, Il, UsThe mission of the Private Directors Association is creating, sustaining and enhancing Private Company value through the active use of Boards of Directors and Advisory Boards. We advocate for excellent practices in board formation and governance. We provide a national network where executives and professionals interested in board service can find and meet with those interested in securing exceptional board members. -
Mentor/CoachEverwise Aug 2020 - PresentSan Francisco, California, UsChanging the world, one career at a time.Everwise connects professionals with the people and insights that help them succeed at every stage of their careers. As an Everwise mentor, I help guide high-potential protégés to make the most of their leadership capabilities.Pay it forward, volunteer as a mentor. Learn more at: https://www.geteverwise.com/become-a-mentor-today-pay-it-forward/ -
MentorInternational Consortium Of Minority Cybersecurity Professionals (Icmcp) May 2021 - PresentNew York, Ny, UsICMCP is dedicated to increasing the presence of women and minorities in cybersecurity. The SF Bay Area Chapter seeks supportive sponsorships, provides an expanding networking circle and training/job opportunities for its members. -
Sme Evaluator For Pmi Professional AwardsProject Management Institute May 2011 - PresentNewtown Square, Pennsylvania, UsVolunteer: PMI is the leading not-for-profit professional membership association for the project management profession. PMI professional resources and research deliver value for more than 2.9 million professionals working in nearly every country in the world to enhance their careers, improve organizational success and further mature the profession.PMI worldwide advocacy for project management is reinforced by globally recognized standards, certification program, extensive academic and market research programs, chapters, and volunteer and professional development opportunities. -
Keynote SpeakerBlack Speakers Collection Dec 2021 - PresentA bespoke collection of voices that need to be heard.Black Speakers Collection is meant to be a resource not only for Black speakers but for organizations who are looking to amplify and diversify their panels, conferences and company talks.Too often people want to pay in exposure, so we decided to take that part out of the equation. We are committed to giving Black speakers and consultants the exposure they need so they can get paid what they deserve. -
Head Of Information SecurityDirectly Nov 2019 - Sep 2022San Francisco, California, UsDirectly is an emerging leader in Customer Experience Automation (CXA), helping companies deliver better customer service at scale while creating economic opportunity for people in the Artificial Intelligence (AI) era.Companies like Microsoft, Airbnb, and Samsung use the platform to put their expert users at the heart of their AI, delivering automation that improves the customer experience, boosting CSAT by 20% while saving companies tens of millions of dollars (60-80% less cost) per year. Expert users identify gaps in self-service content and are paid to: create support content that’s delivered to customers automatically, teach AI algorithms to continuously improve, and resolve customer questions. -
Head Of Security & ItDirectly Mar 2019 - Nov 2019San Francisco, California, Us -
Board Director (Cio)Westmount Community Association Mar 2018 - Jun 2019San Jose, Ca, UsThe Westmount Community Association, a California nonprofit corporation formed pursuant to the California Nonprofit Mutual Benefit Corporation Law or successor statutes, and its successors-in-interest. Serving as the CIO, the Association's Chief Information Officer, responsible for the Association's technology efforts. • Assume responsibility for the Association’s IT operations• Develop and adhere to an approved budget for the Association’s technological needs• Provide technological support for digital communications including all board meetings• Manage the Association’s relationship with technological vendors• Look at future technology trends and make recommendations on steps moving forward• Recruit, develop, and deploy Association member volunteers for support in technological functions of the Association• Serve as the primary technological advisor to the Association’s Board of Directors and other committees -
Subject Matter Expert Exam Developer(Isc)² Apr 2009 - May 2019Alexandria, Virginia, UsVolunteer: Member of team responsible for continually improving the quality of the (ISC)² Certified Information Systems Security Professional (CISSP) and Information Systems Security Management Professional (ISSMP) Concentration exams.(ISC)² is the World’s Leading Cybersecurity and IT Security Professional Organization. (ISC)² is an international, nonprofit membership association for information security leaders that is committed to helping its members learn, grow and thrive. More than 130,000 certified members strong, (ISC)² empowers professionals who touch every aspect of information security. Founded in 1989, (ISC)² founders saw the need for standardization and certification in the cybersecurity industry. Since then, its founders and members have been shaping the information security profession.(ISC)² information security certifications are recognized as the global standard for excellence. They allow members to prove their expertise and highlight their skill mastery. And for employers, having certified employees means employer organizations are better prepared to protect critical information assets and infrastructures.(ISC)² created and maintains the Common Body of Knowledge (CBK) on which the certifications are based. The CBK defines global industry standards and best practices in information security. -
Director, Security Program Services (Vciso), Pci Dss QsaTruvantis May 2017 - Mar 2019San Francisco, Ca, UsLeading the professional services team, providing guidance, and hands-on leadership to deliver quality engagements, including CISO services across a variety of industries. Services include:• Technical testing (vulnerability scans, penetration testing, red team exercises, etc.) • Security program creation and remediation (policies, processes, technical architectures, and security controls)• Security compliance and governance analyses against standards: ISO27001, PCI DSS, CIS Controls, SOC 2, HIPAA• PCI DSS Attestations -
Industry Advisory Board MemberCatalyst Operating Advisors, Llc Sep 2017 - Feb 2019Los Gatos, Ca, UsStrategic Consulting, including business plan & sales strategy development. Advising new businesses on formation of corporations and business structures, drafting privacy policies and structuring commercial transactions.Specialties: GTM strategies integrated together with Industry Advisory Boards• Advise companies and C-Level executives. • Enable direct industry common sense. • Help provide voices of real-world industry intelligence, voice-of-the-market guidance and business rationale. • Help guide company growth decisions that help to accelerate the roadmap and ensure companies truly address most important key initiatives. • Becoming a sophisticated business advisement vehicle to strengthen companies sensitivity onto industry & market demand and improve execution. -
Board Manager, Central YmcaYmca Of Silicon Valley Sep 2016 - Feb 2019San Jose, Ca, Us• Help set strategic goals that achieve our mission• Enable strategic goals• Raise funds to finance strategic goals and mission • Review organizational performance• Improve the well-being of Silicon Valley youth, teens, adults, and familiesThe Y is the nation’s leading nonprofit committed to strengthening communities through youth development, healthy living and social responsibility. The Central YMCA has been serving the Silicon Valley community for almost 150 years. We’re a spirit, a movement and a cause. Members join us because they believe in us and the values we stand for—caring, honesty, respect and responsibility. The Central YMCA is open to everyone. We create opportunities every day. -
Information Security ManagerGroupon Jun 2016 - Apr 2017Chicago, Il, Us• Provide technical security expertise and leadership across a broad range of environments and technologies.• Responsible for the oversight and ongoing management of the information security programs and technical systems required to maintain the confidentiality, integrity, and availability of data within Groupon’s systems.• Work closely with the senior leadership teams in a collaborative environment to improve the current security framework and employees’ education.• Provide technical security support to IT, Engineering, and business units.• Contribute to the development of the Global Security Engineering organization’s policies and processes.• Help build the security team and provide people management and knowledge sharing. -
Microsoft Certified Trainer (Independent Consultant)Microsoft Sep 2008 - Apr 2017Redmond, Washington, UsMicrosoft Certified Trainers (MCTs) are the premier technical and instructional experts in Microsoft technologies. Mainly taught emerging Microsoft technologies to Department of Defense military personnel in fleet concentration areas across America and around the world. -
Senior Security EngineerPivotal, Inc. May 2014 - Jun 2016San Francisco, California, Us• Implement, administer, and use Pivotal’s information security systems, policies, and procedures. • Architect, design, implement, support, and evaluate security-focused tools and services.• Conduct audits of the Firm's information systems and policies with various third parties and clients.• Perform investigations of security events, provide analysis results, and develop and implement remediation plans.• Develop and deliver materials and perform security awareness training.• Evaluate and recommend new and emerging security products and technologies. -
Sr. Information Security ConsultantBest Security Essentials Jan 2014 - Aug 2014• Security Leadership• Information Security Governance• Security Architecture• Computer Network Defense• Information Assurance• Information System Security• Access & Identity Management• Risk & Vulnerability Management• Disaster Recovery Planning• Compliance & Assessments• Data Loss Prevention• Application & Network Security• Technical Training/Writing• Database Management• Project Management• Team Building/Staff Leadership & Development
-
Director Of Cybersecurity & Privacy (Ciso; Edatatech/Tscti, Contractor; Dod Ts)Defense Language Institute Foreign Language Center Mar 2011 - Mar 2014Presidio Of Monterey, Ca, Us• DoD Contractor for the newly established DCSIT Organization (formerly CTO Organization) at the Defense Language Institute Foreign Language Center (DLIFLC), Presidio of Monterey, CA.• Develop, implement, and oversee a comprehensive enterprise-wide security program to ensure that appropriate policies, standards, and procedures designed to protect information security are documented and followed across the enterprise.• Plan, design, analyze, test, integrate, and manage new and existing Information Technology systems and networks.• Participate in the development of a comprehensive Business Continuity Plan.• Provide IT security vision and leadership.• Responsible for bridging the gap between business processes, policy directives, and technical security measures.• Establish and modify strategic information technology plans and policies in response to new legislation, regulations, directives, or other guidance affecting Information Assurance Program.• Advise senior management and the chain of command about risks, changes in the technical, legal, and regulatory arenas affecting information security and computer crime.• Draft departmental budgets and participate in the development of organizational strategic plans.• Serve as the Information Assurance Manager and supervise the Cybersecurity team. -
Senior Information Security EngineerUniversity Of Alabama Dec 2010 - Feb 2011Tuscaloosa, Al, Us• Perform advanced IT activities for specialized, complex, and functional areas requiring the expert knowledge and professional application of IT principles, practices, and techniques in accordance with industry standards and university policy.• Develop, implement and oversee a comprehensive campus-wide network security and vulnerability management program to ensure that appropriate security technology, tools, processes, procedures, reporting, and remediation are put into place and maintained to protect the University’s computing assets.• Help develop, implement, and revise University security policies.• Lead projects and cross-functional activities to review security and ensures compliance with University security policy, including industry and governmental compliance. -
Information Security EngineerUniversity Of Alabama Jun 2009 - Nov 2010Tuscaloosa, Al, Us• Develop, implement, and oversee network security and vulnerability management.• Project lead at ensuring that appropriate security technology, tools, processes, procedures, reporting, and remediation are put into place and maintained to protect the University's computing assets.• Administer security infrastructure implementation and operations.• Review security and ensures compliance with University security policy, including industry and State and Federal governmental compliance. -
Assistant Director For Imaging And Network AdministrationUniversity Of Alabama Aug 2006 - Jun 2009Tuscaloosa, Al, Us• Manage a team of 8 full-time staff and student employees.• Oversee helpdesk support for the Office of Enrollment Management.• Provide advanced level technology support and consulting.• Design, install, configure, implement, secure, and administer a Windows 2003 Network with 150+ desktops and laptops. -
Manager Of Imaging And Network Support ServicesUniversity Of Alabama Dec 2005 - Aug 2006Tuscaloosa, Al, Us• Manage a team of 8 full-time staff and student employees.• Responsible for hiring, mentoring, and training computer support specialists and data imaging associates with a strong emphasis on security practices.• Install, troubleshoot, and secure microcomputer applications and operation system software. -
Computer Network AnalystUniversity Of Alabama Dec 2003 - Dec 2005Tuscaloosa, Al, Us• Manage full-time Staff and student employees.• Design, install, configure, implement, secure, and administer a Windows 2003 Network with 150+ desktops and laptops.• Protect against malware.• Research, evaluate, test, recommend, and deploy new security software and releases on Library computers. -
Computer TechnicianUniversity Of Alabama Aug 2002 - Dec 2003Tuscaloosa, Al, Us• Implement computer security for Library public desktops and notebooks through security software and Group Policy Editor and tweaking of registry settings.• Educate staff in the use of hardware, software, and peripherals and supplies. -
Computer Technician AssistantUniversity Of Alabama Aug 1997 - Jul 2002Tuscaloosa, Al, Us• Assist the Computer Technician with his many responsibilities.• Help securely setup hardware and applications. -
Campus Liaison Officer For The University Of AlabamaUs Navy Apr 2009 - Feb 2011Washington, Dc, Us• Assist the Navy Recruiting Command in diversity officer recruiting.• Help increase the diversity community awareness of the opportunities and upward mobility available to all persons in the Navy.• Help increase Navy diversity officer accessions.• Inform Officer Recruiters about campus politics, protocol, and student issues to help increase their effectiveness on campus.• The source of continuity for the Navy Recruiting District Atlanta on the University campus.• Identified 13 qualified Naval Officer prospects. -
Sans Edu Advisory Board MemberSans Institute 2005 - Feb 2011Rockville, Maryland, UsThe SANS/EDU Advisory Board is made up of higher-education CISO’s, Training Managers and IT Directors. The purpose of the board is to help bring SANS training to staff and faculty of higher-education in a creative, efficient and economical format. -
Lead Systems Security EngineerZingaweb Oct 2002 - Dec 2010• Design, install, configure, implement, and administer a Windows 2000 mixed Network• Design of Active Directory services, a delegation of authority, and EFS strategies • Implement, manage and troubleshoot service packs and security updates• Configure IPSec to help protect communication within network• Monitor log files, Implement terminal sessions, and VPN connections• Identify and correct security risks• Deploy security templates using Group Policy• Document server and network configuration including reports and Microsoft Visio graphics• Oversee backup routine for ZingaWeb servers• Configure, manage, and troubleshoot policies and rules• Deploy, configure, and troubleshoot client computers• Administer applications through Group Policy Objects• Manage file and print services• Supervise daily operation of network• Set up and maintain peer to peer networks and provide software, hardware, and peripheral devices support for ZingaWeb’s clients• Train and supervise ZingaWeb.Com’s Jr. Assistant Network Administrator
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 Education Details
-
Harvard UniversityCybersecurity: Managing Risk In The Information Age -
Leavey Executive Center At Santa Clara UniversityBlack Corporate Board Readiness -
University Of Maryland Global CampusMaster Of Business Administration -
University Of Maryland Global CampusManagement: Naval Operations And National Security -
University Of Maryland Global CampusCybersecurity Management And Policy -
National Defense UniversityGovernment Information Leadership: Chief Information Officer -
National Defense UniversityChief Information Officer -
Defense Acquisition UniversityInformation Technology Level Iii -
Defense Acquisition UniversityInformation Technology Level Ii -
Defense Acquisition UniversityInformation Technology Level I -
U.S. Naval War CollegeJpme Phase I -
Naval Postgraduate SchoolKnowledge Superiority -
Leadership Tuscaloosa -
The University Of AlabamaMicrobiology -
United States Merchant Marine AcademyNetwork Security -
United States Merchant Marine AcademyComputer Networking -
The University Of AlabamaChemistry: Biology
Frequently Asked Questions about Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦
What company does Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 work for?
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 works for Us Navy
What is Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's role at the current company?
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's current role is Information Warfare Commanding Officer (CDR and Equivalent CEO and CISO and CIO and CTO, DoD TS and SCI).
What is Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's email address?
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's email address is bo****@****avy.mil
What is Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's direct phone number?
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's direct phone number is +165028*****
What schools did Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 attend?
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦 attended Harvard University, Leavey Executive Center At Santa Clara University, University Of Maryland Global Campus, University Of Maryland Global Campus, University Of Maryland Global Campus, National Defense University, National Defense University, Defense Acquisition University, Defense Acquisition University, Defense Acquisition University, U.s. Naval War College, Naval Postgraduate School, Leadership Tuscaloosa, The University Of Alabama, United States Merchant Marine Academy, United States Merchant Marine Academy, The University Of Alabama.
Who are Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's colleagues?
Bob Fabien "Bz" Zinga (版主) 🇺🇸🇺🇦's colleagues are Rooney Jingyuan Gao, Minda Harts, Jai Koolwal, Jacob Creed, Juliette Faraut, Molly Flaks, Tiffany Y..
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial