Dan Putz Email and Phone Number
Dan Putz work email
- Valid
- Valid
Dan Putz personal email
With a proven track record as a 3x CISO, Dan Putz is a results-driven leader known for building world-class security programs and teams, coupled with a commanding leadership presence. Over 25 years, he has navigated diverse industries, including research, technology, healthcare, fitness, insurance, InsurTech, manufacturing, higher education, medical, and highly regulated sectors.Dan combines deep technical expertise with visionary leadership, driving scalable and cost-effective security strategies to protect critical assets and enable business growth. Core Expertise and Accomplishments:• Comprehensive Compliance Knowledge: In frameworks and regulations such as HIPAA, ISO27001, SOX, PCI-DSS, NIST CSF, FISMA, NYDFS, CCPA, GDPR, HITRUST, FERPA, SOC 2 (Type I & II), EU Data Privacy, and NIST SP800-53 v4.• Crisis Response: Skilled in managing active malicious breaches, accidental data exposures, and child exploitation cases, from incident response to resolution, in collaboration with law enforcement and federal agencies.• Global Security Leadership: Delivered tactical and strategic solutions for network, infrastructure, data, and applications across organizations with revenue ranging from $24M to $43B.• SaaS Security Success: Secured 70+ SaaS platforms housing over 300M PHI/PII records, reducing risk exposure by 80% for healthcare, insurance, financial, and EHS industries.• Research Security: Four years of experience securing research platforms and government contracts, ensuring compliance and data protection including AI and HPC. • Zero Trust & Incident Response: Spearheaded cutting-edge zero trust programs, CSIRT, and threat monitoring teams at a $43B Fortune 100 manufacturer, achieving an 85% faster threat response.• EDR & Risk Reduction: Implemented CrowdStrike Falcon Host, SentinelOne, and Cisco AMP to reduce attack surfaces by 99%.• Cost-Effective Security Models: Fostered MSS/MSSP/MDR relationships, achieving internal resource cost savings averaging $1M annually• Rapid Risk Reduction: Lowered a global SaaS company’s risk posture by 40%, executing 12 of 15 key initiatives in just six months as CISO.• Optimized Security Operations: Improved SIEM effectiveness from 60% to 90%, accelerating mean-time-to-resolution. • Building Security Leadership: Established a robust Office of Information Security and Security Practice for a $1B higher education and research institution, earning advocacy from executive leadership.
Ul Research Institutes
View-
Chief Information Security Officer (Ciso)Ul Research Institutes Jun 2023 - PresentEvanston, Illinois, Us• Developed and maintain a comprehensive, greenfield ground-up build of the information and cybersecurity programs that aligns with industry best practice zero trust model using NIST CSF providing the mission, and vision of UL Research Institutes and UL Standards & Engagement business entities.• Developed security measures and controls for Azure PaaS and provide guidance to company on GCP and AWS.• Implementing and testing of AI capabilities and policy enforcement while supporting and driving business AI research • Conduct risk assessments to identify vulnerabilities and potential threats to the organization's information systems, data, and intellectual property.• Built security measures to mitigate identified risks and ensure the highest level of security for all information systems, data, and intellectual property.• Manage security budget for Cybersecurity, Governance, Risk, and Compliance (GRC) including Identity Access Management (IAM) for operations, engineering and architecture, directing strategic and tactical initiatives while achieving operational effectiveness.• Provide expert knowledge in compliance with applicable laws, regulations, and industry standards related to information security. Monitor and audit access controls to ensure compliance with policies and regulations.• Established Threat Intelligence and Insider Threat, functions to identify potential threat vectors and vulnerabilities to the organization.• Architected company wide Identity and Access Management (IAM) program that ensures appropriate access controls are in place for all critical assets and manage relevant policies, procedures, and guidelines.• Defined and built incident response program and plans to ensure the organization is prepared to respond to security incidents in a timely and effective manner.• Collaborate and report to executive team, legal counsel and Board of Directors on the organization's information security program and related activities and risk thresholds. -
Chief Information Security Officer (Ciso)Ul Standards & Engagement Jun 2023 - PresentNorthbrook, Illinois, Us• Developed and maintain a comprehensive, greenfield ground-up build of the information and cybersecurity programs that aligns with industry best practice zero trust model using NIST CSF providing the mission, and vision of UL Research Institutes and UL Standards & Engagement business entities. -
Cybersecurity Keynote, Panelist And Innovation StrategistIndependent Oct 2017 - PresentProcessMAP Konnect 22★ Keynote Speaker: ProcessMAP “Konnect” User Conference 2022: “The State of Data Security & Privacy” (Hollywood, FL /October 2022) Taking a deep look into the evolution of data security and privacy over the last decade and how this applies to the world of Environmental Health Safety & Quality (EHSQ) with over 160 of our clients. Identifying the role cybercrime has played in this space and what ProcessMAP has done to ensure the security and privacy of its clients. SaaS CISO Corner ★ Interview Article: What's the Risk? SaaS Edition - Newsletter Volume 9 (August 2022) "Top things to consider in trying to keep data secure for clients."Mindfluence ★ Panelist Speaker: CISO Leadership Forum (Lake Geneva/Oct 2019) “The Evolution of a CISO & the role of a CISO during a Cyber Crisis"Worldwide Business Research (WBR) ★ Keynote Speaker: CISO Healthcare Connect 2018: Benefits of Applying Endpoint Technology to Prevent Malware Attacks (Fort Lauderdale/August 2018) As malware becomes increasingly more advanced and able to get past traditional systems, implementing endpoint protection is one impactful solution to defending your network. Learn more about the advantages and how to put this into action.★ Innovation Strategist: InfoSecurity Connect West 2018 (San Diego/March 2018) Facilitating interactive workshops, round-tables, think tanks and providing 1:1 Mentoring sessions covering the following topics: Data Loss Prevention, Endpoint Security, Incident Response★ Panelist Speaker: Threat Intelligence: InfoSecurity Connect East 2017(Miami/November 2017)Threat intelligence can be used from both a strategic and a tactical perspective to help organizations understand the risks of the most common and severe external threats. Once you have this knowledge, it then needs to be translated into applicable data you can use to protect your organization and customers.
-
Security ResearcherIndependent Feb 1992 - Mar 2022▪ Researcher in Anti-Security & Anti-Forensic tactics in Internet Relay Chat (IRC) as Script and Add-ons Tester testing DoS/DDoS techniques, bots for room and server takeovers, exploits, as well as various remote access and scanning programs, penetration and hacking tools and techniques from 1995-2000▪ Hands on experience with Sub7, Legion, Netbus, Back Orifice, Knoppix, Back | Track, Kali, & Metasploit Pro & Community versions ▪ Hacking and compiling windows systems and hardware capabilities to enhance gaming experience since Windows 3.x and MS-DOS 5.x through Windows 2000• Advanced skills in information gathering, reconnaissance, adversary profiling, Social Engineering, Dialectical & Cognitive Behavioral Analysis.
-
Infragard National (Inma) MemberInfragard National Members Alliance Jun 2012 - PresentWashington, District Of Columbia, UsInfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S. -
Board Of DirectorsInfragard National Members Alliance Jun 2015 - Oct 2015Washington, District Of Columbia, Us -
Crowdstrike Customer Security Advisory BoardCrowdstrike Apr 2018 - PresentRemote, UsMember of the CrowdStrike Customer Security Advisory Board. Paving the future of the Falcon Host product line and CrowdStrike portfolio. -
Global Technical Advisory BoardCrowdstrike Dec 2016 - Apr 2018Remote, UsProudly served as a contributing member of the Global Technical Advisory Board that collaborated with global technical peers. Founded to identify what we view as “next generation endpoint protection,” to help address the biggest security challenges that IT, Security Managers/Directors and CISO's are facing today and change the future of Endpoint Detection & Response capabilities by pioneering cloud-driven endpoint protection, delivering and unifying IT Hygiene, next-generation antivirus, Endpoint Detection and Response (EDR), managed threat hunting, and threat intelligence. -
Fractional Ciso | Vciso | Principal ConsultantCyber Consortium Consulting Llc Feb 2023 - May 2024Providing over 20 years of experience in Information Security, Cyber, GRC, IT, & consulting services, operating at tactical and strategic levels. Short and long-term Cybersecurity Consulting from Virtual and Interim CISO, to building out and maturing greenfield environments. Capable of providing business use cases and due diligence against existing and new solutions to establish your 1-3 year roadmap and budget planning.▪ Experienced in active malicious criminal breach mitigation, accidental data exposures, child exploitation and enticement; from identification through resolution, working with local law enforcement & federal agencies ▪ Expertise in managing multi-million-dollar operational budgets globally for IT & Infrastructure, Cybersecurity, Application Security, Identity, GRC, Cloud Operations, DevSecOps▪ Customer facing Global CISO to over 160 internationally located clients from Aerospace & Defense to Manufacturing▪ Provide expertise in threat modeling, product security, vulnerability management, IR, SecOps, and remediation processes▪ Provide expertise in managing digital security transformations to Cloud Services (AWS & Azure), and Managed Security Service Providers (MSSP) or hybrid configurations▪ Provide expertise in reducing risk exposure through the execution and architecting of solutions from gap assessments ▪ Provide expertise in managing controls for all major regulatory compliance and security frameworks▪ Provide expertise strengthening internal controls and prevent unauthorized and improper access to data, thereby ensuring the appropriate protection of information assets. ▪ Provide expertise in the creation and implementation of the information security program; risk management framework; information security policy development and maintenance; security education, training, and awareness activities; monitoring compliance with security policies and applicable laws; and coordinating investigation and reporting of security incidents.
-
Global Chief Information Security Officer / Head Of It & Cloud InfrastructureProcessmap Corporation May 2022 - Feb 2023Sunrise, Florida, Us• Environmental, Health, and Safety executive with expertise in providing enterprise Information Security addressing business facing risk mitigation strategies, reporting to CEO and Board of Directors advising Senior Staff on program health and industry threat landscape ▪ Expertise managing $4M operational budget globally for IT, Cybersecurity, Application Security, Identity Access Management (IAM), Governance, Risk, Compliance (GRC), Data Centers, Cloud Infrastructure & Operations▪ Provided expertise performing security maturity gap assessments and defining strategic short-term and long-term roadmaps based on risk and business priorities• Expertise managing global team of 13 direct and indirect reports over IT, Infrastructure, Cybersecurity and GRC, DevOps, and DevSecOps• Expertise reducing company risk posture 40% through the execution of 12:15 critical initiatives in first 6 months • Expertise managing IT Infrastructure, Global Data Centers, AWS Services, and Managed Security Service Providers (MSSP)• Expertise identifying risks, developing & communicating strategies and establish operational plans that align with the organization’s vision, mission and objectives, and support long-term Information Security growth and sustainability. • Expertise strengthening internal controls and prevent unauthorized and improper access to data, thereby ensuring the appropriate protection of information assets. • Expertise maturing information security program; risk management framework; information security policy development and maintenance; security education, training, and awareness activities; monitoring compliance with security policies and applicable laws; and coordinating investigation and reporting of security incidents. • Expertise providing customer facing information security program support to over 160 clients from Aerospace and Defense to Manufacturing • Maintain disaster recovery and business continuity programs to ensure customer safety and availability -
Advisory BoardWitfoo 2021 - Feb 2023Dunwoody, Georgia, UsHonored member of the Board of Advisors (BoA) at WitFoo. Ultimate goal of continuing to build Cybersecurity excellence and providing a leading class platform. -
Global Director It Security / Security OfficerZywave May 2021 - May 2022Milwaukee, Wi, Us▪ Provided global expertise in developing programs for Security Operations, Engineering for Security, Threat, Application Security, Identity, Governance, Risk, Compliance (GRC) for globally top ranked leader in SaaS InsurTech for over 34 SaaS offerings with 100M PII/PHI records▪ Provide M&A sponsorship for all security related items ▪ Provided expertise working directly with Legal & Privacy on regulatory compliance (HIPAA, PCI-DSS, GDPR, CCPA, NYDFS 3rd Party, and Cybersecurity controls frameworks (NIST CSF, SOC2 Type ll, ISO27001:2013) for alignment to business needs ▪ Provided expertise in delivering company compliance as Security Officer and enforcing controls for Cyber Insurance▪ Provided expertise maximizing security operating and automation capabilities within the Threat Program▪ Provided expertise building NIST CSF GRC platform, Security Awareness Training, Risk Register, and integrating into Risk Assessment process▪ Provided expertise performing security maturity gap assessments and defining strategic short-term and long-term roadmaps based on risk and business priorities ▪ Provided expertise in development and updating IT/Security policies and standards into a NIST CSF library▪ Provided expertise building out Insider Threat, and Data Leakage & Privacy, and Prevention programs▪ Secure and harden Web Applications through building and maturing Vulnerability Management Lifecycle Program & Secure Software Development Lifecycle.▪ Provided expertise in the improvement mechanisms for the monitoring of effective and efficient cybersecurity incidents▪ Define metrics, develop dashboards, and supply Return on Investment (ROI) use cases▪ Provided expertise leading the development of threat identification, breach analysis, and gap assessments▪ Provided expertise performing Threat Intelligence profiling, data collection, analysis and dissemination.▪ Provided expertise in defining cost-effective process and technology improvements to minimize attack surface -
Advisory Board Global Threat IntelligenceEc-Council Jan 2019 - May 2022Albuquerque, New Mexico, UsProvided strategic advice toward training, certification program development, and the endeavor to build capacity and create awareness among US businesses, government and citizens in the field of information security and Threat Intelligence. -
Executive Director, Identity Access ManagementTrustmark Feb 2020 - May 2021Lake Forest, Il, Us▪ Acquired BOD approval and strategically led the companies $10M multi-year Okta Customer Identity Access Management (CIAM) and Employee IAM programs for NYDFS, HIPAA, and HITRUST requirements aligned to NIST & HITRUST CSF including full application integration of 300+ systems ▪ Provided experience in AS400 (iSeries) and Mainframe (zOS) security and access controls ▪ Implemented industry leading Customer Identity Access Management (CIAM) platform as part of new customer digital experience that allows our 1M policy holders to securely and seamlessly access their data with 0-touch interaction allowing for a 90% quicker resolution ▪ Provided expertise performing security maturity gap assessments and defining strategic short-term and long-term roadmaps based on risk and business priorities ▪ Development of Internal Workforce Identity Access Management program▪ Experienced in integration of SaaS platforms into SSO and MFA company requirements▪ Experienced in Identity Governance Integrations including; Provisioning, Access Requests, Access Certification, Separation of Duties, Privileged Access Management, and Automation▪ Provided expertise working directly with Legal, Internal Audit, & Privacy Office on regulatory compliance on regulatory compliance, and Cybersecurity controls with alignment to business needs -
Interim Vice President & Chief Information Security Officer (Vp/Ciso)Trustmark May 2019 - Feb 2020Lake Forest, Il, Us• Served as Interim VP/Chief Information Security Officer (CISO) during a critical agile digital transformation business upgrade period while company searched externally for CISO.▪ Expertise in managing $6M operational budget for IT Security, Threat, Application Security, & Identity Access Management, Governance, Risk, Compliance (GRC) plus additional $5M in security projects supporting the business▪ Provided expertise performing security maturity gap assessments and defining strategic short-term and long-term roadmaps based on risk and business priorities • Worked with C-level and senior executives (CEO, VP-IT, CIO, CFO) and other IT security team members and provided information and decision-making structures to drive security risk-based decisions throughout the organization.▪ Execution of the overall enterprise security & business risk strategy, reducing operational risks and streamlining processes ▪ Managed a team of 15 with multiple Managed Security Service Providers (MSSP)▪ Worked directly with Legal, Legal Compliance and Internal Audit, on regulatory compliance, and Cybersecurity controls with alignment to business needs (NIST CSF, HIPAA, NYDFS, HITRUST, PCI-DSS, SOC1 Type ll, SOC2 Type ll)▪ Acting Chief Security Architect including cloud security strategy and digital transformation and optimization▪ Launched cross-functional Security Champions organization, creating career paths in security for technologists, and coordinating activities across IT operations, architecture, engineering, and development▪ Held Executive Stakeholder seat on multiple internal committees and boards -
Executive Director, It Security, Threat, & Enterprise IdentityTrustmark May 2017 - Feb 2020Lake Forest, Il, Us▪ Expertise in managing $3M budget for IT Security, Threat, Application Security, & Identity Access Management plus an additional $3M in security projects supporting the business▪ Work directly with Legal, Internal Audit, & Privacy Office on regulatory compliance, and Cybersecurity controls with alignment to business needs (NIST CSF, HIPAA, NYDFS, PCI-DSS, HITRUST)▪ Acting Chief Security Architect including security strategy for digital cloud transformation initiative▪ Provided expertise performing security maturity gap assessments and defining strategic short-term and long-term roadmaps based on risk and business priorities ▪ Provided expertise in the development of technology improvements, reducing endpoint attack surface by 99%▪ Provided expertise in building the Insider Threat, and Data Leakage and Prevention programs, working closely with HR on investigations▪ Provided expertise building the programs to secure Web Applications while building and maturing Vulnerability Management Lifecycle Program & Secure Software Development Lifecycle (DAST, SAST, MAST)▪ Provided expertise and built mechanisms for the monitoring of effective and efficient cybersecurity incidents, defensive and offensive tactics working with teams through remediation▪ Expertise managing 8 direct reports, and 2 MSSP Teams ▪ Provided expertise in defining metrics, develop dashboards, and supply Return on Investment (ROI) ▪ Provided expertise and developed security Operations, Architecture, and Engineering for IT Security, Threat, & IAM▪ Provided expertise and developed threat identification, breach, assessments, and management▪ Provided expertise in maintaining vendor and Managed Security Service Programs (MSS/MSSP)▪ Provided expertise and developed Threat Intelligence profiling/modeling, data collection, analysis and dissemination. ▪ Provided expertise in defining countermeasures and architecture requirements across business lines -
Advisory Board: Ntt Security'S Cybersecurity Center Of Excellence For AmericasNtt Security Jun 2019 - Oct 2020London, United Kingdom , GbContributing member of NTT Security Cybersecurity Center of Excellence for Americas. -
Senior Manager – Global Security Operations & MonitoringJohnson Controls Aug 2015 - May 2017Cork, Ireland, Ie▪ Leveraged security expertise building and managing $40M global cyber threats and monitoring program throughout the enterprise, adhering to a NIST and FISMA methodologies and controls for Security Monitoring and Operations Center model▪ Provided expertise driving cost-effective Endpoint Detection & Response (EDR) models with CrowdStrike Falcon Host model with Cisco Advanced Malware Protection (EDR) reducing endpoint attack surface by 99%▪ Provided expertise working with Legal, HR, and Enterprise Security teams across all regions and divisions.▪ Serving as global head of the Cyber Threats and Monitoring Division with 13 global reports.▪ Provided expertise implementing Threat Intelligence modeling and incident response dissemination ▪ Implemented key operational decisions with potentially high impact, including spam and malware campaigns, as well as criminal and nation-state operations.▪ Provided expertise minimizing risk by analyzing and performing qualitative analysis of threats and vulnerabilities ▪ Successfully designed and lead the building and budget for Federal and Enterprise Businesses:− Highly technical and complex Managed Security Service Program, SOC Team, Global Computer Security Incident Response Team (CSIRT), Threat Intelligence, Penetration Testing, Digital and Network Forensics, as well as Red Team and Blue Team− Executive security metrics showing security return on investment (SROI).▪ Leadership member of the Information Technology Extended Leadership Strategy Team building JCI future -
Global Network Security ArchitectJohnson Controls Feb 2015 - Aug 2015Cork, Ireland, Ie▪ Pioneered global security strategies for network, infrastructure, data, and applications building out Zero Trust models ▪ Initiated the analysis, requirement development, and documentation, of complex network and security solutions.▪ Strategically led assigned security projects, which included the protection of information systems assets, corporate information, and intellectual property. -
Global It Security Architect / Sap Application Security LeadGenerac Power Systems Nov 2013 - Feb 2015Waukesha, Wi, UsHighest ranking security resource globally in the company reporting directly to VP of IT.Roles assumed included: - Information Security Officer (GRC function)- Global IT Security Architect (Primary Role)- SAP Application Security Lead (Secondary function)• Provided first enterprise security expertise, presence, vision, and guidance to the business• Expertise developing security Architecture solutions for Network, Infrastructure, Data, and Applications• Expertise developing and disseminating threat analytics and risk profiling models • Expertise performing in-depth security gap analysis, while creating security architecture roadmap for Generac Power Systems’ global future state, including access controls, vulnerability management, intrusion-detection/prevention, and all other high-priority security initiatives• Expertise in managing PCI-DSS & HIPAA Compliance, assisting the business with SOX requirements.• Expertise establishing security standards for global implementation, which included blueprint and design of all authentication, authorization, and application integration for a $35M SAP ERP Central Component (ECC); SAP NetWeaver; SAP Solution Manager (SOLMAN); and SAP Customer Relationship Management (CRM). -
Senior Information Security ArchitectMedical College Of Wisconsin Jul 2011 - Nov 2013Wi, Us• Backup Director of Enterprise Infrastructure at Medical College of Wisconsin building and maintaining the $7M managed services account• Built and Designed the Office of Information Security and Security Practice supported by the Dean, President, VP of Finance, and CIO.• Provided all the information security and architectural guidance for the business to the executive leadership team reporting directly to the VP-IT/CIO • Built, managed, and maintained enterprise security architecture design and readiness for PCI-DSS, HIPAA/HITECH, FERPA, FISMA, & HRSA compliance requirements • Performed: Audit Validation through System Testing, Access Controls, Encryption Testing, Forensics Investigation, Enterprise security policies and procedures, Security Education, Training, & Awareness, Vulnerability Management, Risk & Security Gap Analysis, Incident Response, Vendor Management, Security Project Management• Active Project Portfolio included 350 project initiatives with 70 concurrently running projects. Enterprise Projects aligned with HIPAA, HRSA, FERPA, FISMA, and PCI-DSS compliance requirements.• Supported 6000 employees locally, 10,000 globally consisting of 10 campus buildings, 13 remote sites, and 54+ affiliated locations covering 87 Departments, 220+ Divisions, 1000+ Programs, and 2000+ Sub-Programs.• Performed vendor relations and coordination of vendors for service based activities -
Managing Consultant - Data Center PracticeCore Bts Jan 2010 - Jul 2011Indianapolis, In, Us• Architected Enterprise Security & Business Continuity (BC)/Disaster Recovery (DR) solutions for SLED market and dozens of other private and public facing companies • Built and maintained daily operations of a $2M Data Center Practice with 10 direct reports in WI, IL, and IN. • Maintained top tier EMC ASN Velocity Partner Program and National Commvault Partnership. • Built National Commvault Practice for outsourcing highly certified Commvault Engineers and made Core BTS the Premier go-to partner for the entire Midwest providing national exposure of Commvault expertise.• Responsible for maintaining and building the Enterprise Microsoft and Citrix practice as well as daily operations with 5 direct reports in WI, IL, and IN. • Maintained a 30 project portfolio for Data Center, Systems and Infrastructure, Citrix, Cisco Unified Communications, Microsoft Exchange 2010, VMware Virtualization, EMC, VEEAM, Cisco Networking deployments -
Sr Technical Project Manager - Server, Storage, & Virtualization | Iso AuditorPds Paragon Development Systems May 2007 - Jan 2010Oconomowoc, Wi, Us• Sr ISO9001 & 14001 Auditor for 3 years leading internal audit cycles under the Operations Manager and provided mentoring and guidance for Jr Auditors• Maintained project portfolio of 40 active projects for Enterprise Security & Business Continuity (BC)/Disaster Recovery (DR) solutions for SLED market and dozens of other private and public facing companies• Provided Pre-sales support for Server, Storage and Virtualization practice and scoped out all Statements of Work and service agreements. • Built relationship with key storage vendor NetApp, and Virtualization Entrepreneur Tyler Rohrer of Liquidware Labs while building out repeatable and profitable service offering processes. -
Lead Engineer | Sox Auditor | Business Analyst (Ge-It Services Division Divestiture)Compucom Sep 2005 - May 2007Fort Mill, Sc, Us▪ Lead Engineer that successfully hired and led a team of 30 consultants in 6 states, manually migrating Exchange 2000/2003 clients for over 8,000 employees at Citi Group, a top tier global Credit Card, Banking, Mortgage, and Personal loan provider▪ Sarbanes-Oxley (SOX) Auditor dedicated to Rockwell Automation, auditing processes and procedures, for system access controls of financial applications as part of the Global ITIL Process Team. Reviewed, tested, and created new process flow, controls, and policies to align with SOX Compliance.• Managed the North & South America SAP client side software roll-out and testing of 8000 Rockwell Automation end-users and and built a 20 person call center and engineering support team. • Redesigned Compucom multi-million dollar services contract with Rockwell Automation using Six Sigma methodology increasing contract bottom-line from -6% to 12% profit in a 6 month period. • Leveraged Six Sigma and ITIL knowledge at Rockwell Automation to create and implement new processes for more productive work flow and best business practices.• Analyzed historical and trending data at Rockwell Automation to create and or improve current processes as a Business Analyst gathering business requirements and providing gap analysis results. -
Technical Operations & Systems Team Lead | Engineer (Ge-It Services Division)Compucom Jun 2003 - Sep 2005Fort Mill, Sc, Us• Directed and led team of 15 Engineers that supported all the GE Medical campus locations including the break fix, remote engineers, field sales teams supporting ~20,000 users in the United States. • Led virus and malware remediation teams eradicating, containing, and cleaning up outbreaks • Systems tester for GE images, built and maintained laptop & desktop imaging network. • Creation of processes and process improvements applying Six Sigma methodologies.• Active Directory administration for integration of Mergers and Acquisitions• Data base support for remote sales teams software• Supported all GE VPs and devices• Dell Certified Service Engineer (DCSE) -
Security Engineer | Security Architect | FounderGlobal Multiplayer Gaming Aug 2000 - Aug 2005• Founder and primary investor of globally accessible secure online multiplayer hosted gaming. Providing dedicated hosting services for Descent 3, Unreal Tournament, Unreal Tournament 2004, and NASCAR• Security Engineer and Architect that implemented access controls, monitoring, MD5 Anti-Cheat Security Scripts, Secure Remote Access and Web Services, built secure Server 2000/2003 configurations, protected from system and game compromises, patching, performance diagnostics, system and file level backups & restores, and network configurations and lag troubleshooting.• Financed, architected, built, and performed systems testing for dedicated gaming servers and supported all network, server, security, and system upgrades• Founding member of Unreal Tournament 2K4 CTF Clan [TD] competing in CTF Ladder Matches• Semi-Professional gamer maintaining top 20 status in the world in Descent 3 for 2 consecutive years 1999 and 2000
Dan Putz Skills
Dan Putz Education Details
-
Western Governors UniversityInformation Security And Information Assurance -
University Of PhoenixInformation Technology -
Itt Technical InstituteComputer Network Systems
Frequently Asked Questions about Dan Putz
What company does Dan Putz work for?
Dan Putz works for Ul Research Institutes
What is Dan Putz's role at the current company?
Dan Putz's current role is Chief Information Security Officer (CISO) at UL Research Institutes & UL Standards and Engagement | Mentor | Coach.
What is Dan Putz's email address?
Dan Putz's email address is da****@****ave.com
What schools did Dan Putz attend?
Dan Putz attended Western Governors University, University Of Phoenix, Itt Technical Institute.
What skills is Dan Putz known for?
Dan Putz has skills like Network Security, Cyber Threat Intelligence, Threat And Vulnerability Management, Information Security, Security Information And Event Management, Threat Analysis, Application Security, Maltego, Reconnaissance, Security Operations Center, Security Incident Response, Executive Leadership.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial