Daniel Holzman-Tweed work email
- Valid
- Valid
- Valid
- Valid
- Valid
Daniel Holzman-Tweed personal email
Daniel Holzman-Tweed phone numbers
Security without tears or apology: A seasoned information security professional who solves the technical, financial, and cultural challenges of enabling secure business. I spent the first ten years of my career doing development, operations, architecture, assessment, audit, and incident response work in the financial, manufacturing, medical, academic, and telecommunications industries. As member of Enterprise Information Security teams and as a Consulting Auditor, I built on those technical skills and business understanding to enable business by designing and evaluating security process and architectures.In my most recent role, I founded an information risk management program to address multiple issues around patient and business information in a multidisciplinary patient care environment. I now seek my next opportunity.In addition to my Master's Degree, I hold the following certifications: CISSP, NSA IEM.I enjoy networking and meeting people. Please feel free to contact me to expand our networks.Specialties: Comprehensive information security and risk management strategy and tactics; auditing, conception, design, installation, operation, and improvement.Audit work program design, process review and improvement, vulnerability assessmet, risk analysis and mitigation, project management.Making security relevant to what you've got to protect from whom and what you've got to protect it with the budget you have.
-
Vp - Pci Product SpecialistJpmorgan Chase & Co. Feb 2024 - PresentNew York, Ny, UsAssess solutions for PCI complianceProvide guidance to development and architecture teams regarding issues in providing PCI-compliant solutions -
Security ProfessionalSelf-Employed Nov 2023 - Feb 2024Information and Cybersecurity consulting, fractional CISO
-
Lead Data Security SpecialistNorthwell Health Jan 2021 - Nov 2023Lake Success, Ny, Us• Designed and Conducted Application Security Assessments.• Developed and Executed Vendor Risk Management program.• Advised Executive Leadership regarding trends and events in cybersecurity.• Partnered with business leaders to ensure strategic transformation projects aligned to security policies and standards.• Mentored junior Specialists. -
Manager, It Risk ManagementNorthwell Health Jul 2010 - Jan 2020Lake Success, Ny, Us• Founded the Information Risk Management Department as a partner to the Information Security Department to identify and measure information risks.• Ensured the disposition of identified risks aligned to Executive Leadership’s risk appetite and regulatory requirements including HIPAA, HITECH, Meaningful Use, and PCI.• Identified need, recommended strategy, and developed specific programs to address: Vulnerability Management, Remediation Management, Leadership Risk Awareness, HIPAA/Meaningful Use Compliance Assessment, PCI Compliance, Medical Device Security, Threat Intelligence.• Reduced response times to emergent threats and incidents days to hours through Threat Intelligence program.• Designed, staffed, and led the Information Risk Management Team and the Threat Management Team.• Designed and implemented GRC solution to centralize and correlate various Risk Management program activities and information.• Oversaw and performed vulnerability and business process assessments.• Improved efficiency and avoided costs by reviewing vendor selection and optimizing strategic approaches to operational security processes. -
Member, Technology CommitteeBe Present, Inc. Jan 2008 - Dec 2011Decatur, Ga, UsReview business requirements and proposed solutions to ensure. Recommend security standards and solutions. -
PrincipalDaniel Holzman-Tweed Feb 2009 - Jul 2010Information Security and Technology Risk management consulting and audit.
-
Information Risk Management ConsultantJefferson Wells Oct 2004 - Jul 2010Milwaukee, Wi, Us· Designed and performed audits to meet evolving strategic and tactical customer information security needs.· Mentored other professionals in specific methodologies regarding vulnerability assessment and PCI aassessment· Educated executive and technical audiences through public speaking. -
Network Security SpecialistSony Electronics Feb 2001 - Sep 2004San Diego - Us | Tokyo - Jp, Us· Reduced personnel requirements through automation of virus handling; management of change requests; credit card transaction clearing; and order processing.· Consolidated costs through identification and elimination of legacy Internet service architectures.· Provided security awareness and training to business unit managers. · Increased security through design and implementation of multi-layer network security architectures for the region. · Implemented security and business measures resulting in elimination of web defacements.· Coordinated corporate anti-virus effort, with groups managing distributed networks matrixed to report to me.· Performed incident response for internal and external security events.· Managed projects and developed security for regional B2B and B2C architectures; security assessments for regional and partner architectures; development of global outsourcing architecture for the customer call center; and regional security policy development. -
Network Security SpecialistSony Feb 2001 - Sep 2004Tokyo, JpAKA Sony Electronics. This entry included for networking purposes. -
Senior Security AdministratorWebley Systems, Inc. Nov 1999 - Nov 2000· Created company's initial security policy and procedure structure with minimal disruption of corporate culture. · Created corporate Internet and extranet services upon separation from parent company. · Expanded corporate disaster recovery plan as company grew.· Established technical and cultural anti-virus defenses. · Implemented Network Intrusion Detection Systems. · Designed and implemented multi-layer security architecture for corporate and production networks. · Successfully promoted security consciousness among the firm's employees.· Administered security services such as firewalls, PKI, and VPN.· Conducted physical, host, and network security assessments.· Provided incident response and forensic analysis of security events.· Researched emerging technologies and identified opportunities to improve its security.· Reported state of security to senior management.
-
Systems AdministratorGoldman Sachs Jul 1999 - Oct 1999New York, New York, UsOn 12 July 1999, Goldman Sachs purchased The Hull Group. This entry is included for networking purposes. -
Systems AdministratorHull Trading Jul 1995 - Oct 1999· Planned and supervised a secure data-center expansion invisibly to our customers. · Implemented migration of corporate e-mail to an SEC compliant solution. · Developed an 8-hour disaster recovery plan. · Designed, installed and administered B2B trading systems.· Managed project assuring Y2K compliance security, production trading systems and software. · Enforced corporate acceptable use policies.· Administered network security architecture.· Provided incident response and forensic analysis of security events.· Mentored junior systems administration staff.
-
Systems AdministratorThe Hull Group Jun 1995 - Oct 1999AKA Hull Trading Company. This entry is included for networking purposes.
-
Systems AdministratorG-Bar Apr 1995 - Jun 1996· Designed and performed a complete redesign of the network, from the wire to the desktop.· Designed, installed, and administered the company's Internet connection and firewall.· Designed, installed, and administered architecture for remote access systems for developers and support personnel.· Administered a multiplatform network exceeding required uptime and performance levels.· Performed server and network monitoring and capacity planning.· Managed network security services.
-
Systems AdministratorGbar Apr 1995 - Jun 1996AKA G-Bar. Included for networking purposes.
-
Systems AdministratorGbar Apr 1995 - Jun 1996AKA G-Bar. Included for networking purposes.
-
Mis ManagerPracti-Col Services Oct 1993 - Apr 1995· Accelerated customers revenue collection and reduced costs through development of EDI and EFT procedures. · Increased employee efficiency through design and installation of companys first LAN.· Administered the firm's core business, a medical billing database.
-
Systems Administrator & Software LibrarianFermilab Apr 1991 - Dec 1992Batavia, Il, UsI managed the software library of the D0 collaboration at Fermilab. -
InternFermi National Accellerator Laboratory Jun 1990 - Oct 1990I converted legacy software to newer computer systems. The high point was writing a GUI in FORTRAN for mouse-equipped DEC VT 320s.
-
InternNevis Labs Jan 1990 - Mar 1990I converted software from a legacy mainframe to a newer VAX infrastructure for the E744/770 colaboration.I was also in this position from July 1989 - September 1989.
-
InternLamont Doherty Geological Observatory Jan 1989 - Mar 1989I wrote a Macintosh application to read, modify, and write Postscript-based weather maps.
-
InternInfoworld Magazine Apr 1988 - Oct 1988San Francisco, Ca, UsI interned as a techician at InfoWorld's review lab. -
InternBellevue Hospital Mar 1987 - Sep 1987I worked as the database administrator for Bellevue Hospital's model AIDS program.
Daniel Holzman-Tweed Skills
Daniel Holzman-Tweed Education Details
-
Capella UniversityInformation Security -
Antioch CollegePhysics -
Garden SchoolN/A
Frequently Asked Questions about Daniel Holzman-Tweed
What company does Daniel Holzman-Tweed work for?
Daniel Holzman-Tweed works for Jpmorgan Chase & Co.
What is Daniel Holzman-Tweed's role at the current company?
Daniel Holzman-Tweed's current role is Information Security Expert.
What is Daniel Holzman-Tweed's email address?
Daniel Holzman-Tweed's email address is ho****@****eam.org
What is Daniel Holzman-Tweed's direct phone number?
Daniel Holzman-Tweed's direct phone number is +134741*****
What schools did Daniel Holzman-Tweed attend?
Daniel Holzman-Tweed attended Capella University, Antioch College, Garden School.
What skills is Daniel Holzman-Tweed known for?
Daniel Holzman-Tweed has skills like Information Security, Security, Disaster Recovery, Network Security, Cissp, Vulnerability Assessment, It Audit, Networking, Computer Security, System Administration, Risk Management, Information Security Management.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial