Guy Osa, Security Professional Email and Phone Number
Guy Osa, Security Professional work email
- Valid
- Valid
- Valid
- Valid
Guy Osa, Security Professional personal email
- Valid
- Valid
Guy Osa, Security Professional phone numbers
As an early "Customer Success Solution's Guy" in the IT Infrastructure/ Information Security Market, I have been a Customer Centric Trusted Advisor to many organizations. I focus on “IT / Data / Cyber Security, DevSecOps, Intelligence, and Cloud” with a proven track record generating business and delivering outstanding results year over year for Customer Success. A 25+ year veteran and leader with broad experience in consultative sales, managing and generating Top-Line Growth for my firm. I am experienced in uncovering enterprise projects, managing customer engagements and POVs for Fortune 500 Clients.Domains of Expertise: "Information Security", Red/ Blue/ Purple Teams, Pen Testing, DFIR, CSIRT, SOC Incident Response Process & Planning, Ransomware Attacks, IT Transformation, BTO, Big Data, Cloud Security, SOC Behavioral Analytics, Quantum Security (it’s coming), ITSM, DRM/DLP Security, Data Encryption, DevSecOps, ITIL, Zero-day attacks, advanced persistent threats (APT), cyber fraud, malware, cyber-crime. User-Defined-Operating-Picture (UDOP Solution), Network HSM, SSL, Key Management, PKI, and Certificate Authority Security. SaaS, IaaS, PaaS, Cloud Computing, dB security, endpoint security, network security, email security, document security, data security classification, e-discovery, governance, data leakage, data loss prevention, encryption, VPN, IPS/IDS, SIEM, firewalls, records management, retention, social media, solutions to remedy SOX, HIPAA, PCI, GLBA, SEC and state-level regulation.• A technology consultant with a deep understanding of clients' businesses, I use my expertise and understanding to expand my customer’s thinking by teaching them something new about how their company can compete more effectively. • Customer Success and Services.• Cyber-Security Advocate working with LOB stakeholders to communicate with C-Level, Security, and Network Teams.• Capable of opportunity discovery, negotiating, and closing highly complex deals.• Industry Verticals: Financial 25 Yrs, Healthcare 20 Yrs, Telecom & Life Sciences 20 Yrs.
-
Owasp Nyc Chapter President And Chapter Leader 2020 And 2025Owasp FoundationNew York, Ny, Us -
Nyc Chapter President / Chapter Leader 2020/2024Owasp Foundation Mar 2003 - PresentWakefield, Ma, UsThe Open Worldwide Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. OWASP has 45,000 members in 110 countries worldwide for more information visit www.owasp.org -
Senior Security Sales AdvisorUndisclosed Jul 2018 - PresentAsk me how we’re assisting Corporate America Transform IT security by helping to build faster, more efficient top-tier security teams.The time for change is now. I always provide security-based solutions to help organizations summon the vision, determination, skills, and resources to build a risk-based cybersecurity program that can quickly detect, respond to, and limit fast-moving threats. Let's protect our code, apps, networks and PEOPLE. -
Security AdvsiorExodus Intelligence Jun 2018 - PresentAustin, Texas, Us -
Cloud Security Alliance Chapter Chair - Southern Connecticut / Fairfield CountyCloud Security Alliance Jan 2014 - PresentSeattle, UsThe Cloud Security Alliance (CSA) is a not-for-profit organization, CSA is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.CSA operates the most popular cloud security provider certification program, the CSA Security, Trust & Assurance Registry (STAR), a three-tiered provider assurance program of self assessment, 3rd party audit and continuous monitoring.CSA launched the industry’s first cloud security user certification in 2010, the Certificate of Cloud Security Knowledge (CCSK), the benchmark for professional competency in cloud computing security.CSA’s comprehensive research program works in collaboration with industry, higher education and government on a global basis. CSA research prides itself on vendor neutrality, agility and integrity of results. -
2015-20 Executive Director, Issa Connecticut Chapter, Chapter Co-Founder, Www.Issa.OrgInformation Systems Security Association (Issa) 1993 - PresentWoburn, Massachusetts, UsSteering Committee Executive Director | Sponsorship2014 ISSA North America Hacker GamesManaged by the Hacker Games Commission and the Connecticut ISSA Chapterwww.ISSA-CT.orgwww.ISSAHackerGames.orgI serve on our Board and assist to support our goals in 2014 & 2015 to raise awareness of the security issues facing our business community. As the Executive Director, Vendor Sponsorship for the chapter, I work closely with our vendor sponsors to provide our membership with continuing education, special events, and great membership interaction here in Connecticut. -
Security Sales AdvisorProactive Risk Inc. | Proactiverisk.Com Oct 2018 - Dec 2023West Caldwell, Nj, Us -
Board MemberBto Group Oct 2012 - Dec 2021A practitioner of Business, Technology & Optimization solutions. With over 30+ years of consulting and advisory experience in helping clients design and implement secure, reliable technology infrastructures and business operations. I specialize in IT Transformation, Security, Infrastructure, and Enterprise Solutions. I drive the development of BTO’s Advisory Solutions – an alliance with members of our experienced practitioners – to market leading solutions that address some of the most vexing management challenges facing IT leaders of today’s global institutions.As a Trusted Advisor, I focused on unlocking the value from BTO’s Security and Cloud brands, driving the BTO’s expansion plans, leveraging, and maximizing the existing footprint and resources to its clients. Advisory business, sales, developing and managing key client relationships and deal origination capabilities from securing advisory mandates to achieving transaction closure acting on IT transformation, VOI-to-ROI or all technology infrastructure procurement, acquisition and project financing structures / contracts and how they relate to the infrastructure sector. Diverse client portfolio pitching, briefing, managing relationships and challenging assumptions.As Managing Director | Endpoint SME | Security | BTO Practice ~ Business, Technology, OptimizationI served some of the largest global clients and have directed numerous client projects, including Networking OS, Internet Systems, End-User Productivity, PKI, Identify Theft, Key Management, dBase and Endpoint Encryption, and implementation of worldwide networking and technology risk management programs. In addition, have worked within the Cisco, HP, IBM, Apple, and the Microsoft partner ecosystem for more than 30 years, a 31-year veteran of the ISSA, a 23-year member of OWASP, and a 10-year member of Cloud Security Alliance.
-
Regional Vice President & Executive Director For Financial SectorNetspi Nov 2015 - Oct 2018Minneapolis, Minnesota, UsTop Sales Region 2018, NetSPI’s (sold off to Private Equity Firm 2017) offered vulnerability risk management, managed services, apps, network assessments, and a browser-based VM platform. NetSPI’s CVM platform delivered deep-dive manual pen testing, automation, and enterprise-wide reporting that provided clients with the ability to build, track, release, and deploy secure software applications. As a result, companies have a live pulse on security and can successfully identify and manage threats in less than half the time. -
Us Sales Director, Business Practice ~ It Transformation, Security And Itsm OptimizationPrivacy-Assured Inc. Oct 2012 - Nov 2015IT Transformation Strategy and Design ServicesReduce your IT costs up to 20 percent and integrate information and systems in a dispersed network? We help companies around the world do that, and today they are achieving major increases in efficiency through Right-sizing their IT infrastructure with both consolidation and visualization. IT transformation is no longer optional—that is, if you plan to stay ahead. It is the winner's response to changing market dynamics, emerging technologies and increasing operating costs. Through our IT transformation strategy and design services, we are helping organizations re-evaluate and reconstruct their IT environment to align with business goals. A robust, flexible infrastructure is key to optimizing your IT investments and incorporating new capabilities into your existing infrastructure.Let us help you transform your IT infrastructure to deliver innovative services that support higher user expectations and capitalize on new opportunities.Development of Business StrategyDevelopment of Change Management Strategy, including Organization Design, Stakeholder Adoption, and CommunicationsBusiness case developmentProcess mapping, gap assessments, and process re-engineeringTarget Operating Model Design and management systemsTalent Management Strategy and Assessment, including job roles and responsibilities, skills and behavior, and incentivesClient relationship developmentPresentation and work product/deliverable developmentIdentification of business improvements through:- Process flow documentation and gap assessment - Best practices identification and market research- Benchmarking and workforce analytics- Administration of engagement activities in support of a work product- The application through consulting methodologies, key technologies and engagement support tools
-
National Partner Director | Bliss Team - Behavioral Lightweight Intelligence For Stressed SystemsZiften Technologies Sep 2010 - Oct 2012Austin, Texas, UsDesktop Optimization, IT Optimization, Quality-of-Service (QoS), Performance, Efficient Software System Management and Window Quality-of-Service (QoS), --------------------------------------------------------------------------------------------------------------------BEHAVIORAL LIGHTWEIGHT INTELLIGENCE FOR STRESSED SYSTEMS (BLISS)--------------------------------------------------------------------------------------------------------------------Behavioral-based Desktop System Efficiency Software for Fortune 1000 companies and Public Sector Agencies (Endpoint Optimization). Ziften's BLISS software is based on Artificial Intelligence (Machine-Learning algorithms). BLISS enables organizations to acheive new levels in enterprise desktop efficiency and desktop optimization that until now have been unattainable. This AI-based desktop software and sytem-level Quality-of-Service (QoS) revolutionizes the way endpoint PCs are supported across the corporate enterprise. It will impact the "Enduser Experience" in a substantially positive way and will be the most important software used by Desktop Support personnel in 2011 and beyond. BLISS for Desktops dynamically maintains system-level QoS providing real-time System Optimization and process throttling. BLISS not only saves Fortune 500 organizations millions of dollars by making employees substantially more productive, BLISS reduces power consumption at peak hours and will dramatically extend PC Life Cycles by as much as two years. If increasing your organization's productivity and going GREEN (becoming more sustainable) is important to your organization, please consider installing BLISS on all your endpoints. Your System Management and Desktop Support will never be the same.ZIFTEN TECHNOLOGIES. Run at Peak!- Enterprise System Efficiency Software (Microsoft Desktop Optimization)- Dynamic System-Level Quality-of-Service (QoS) for your Endpoint Desktops- Dynamic Application Performance- Desktop QoS (System Optimization) -
Svp And Cio | Network Infrastructure, Security Architect, Business Strategy OptimizationMission Critical Systems Security, Encryption, It Optimization 1995 - 2010Fort Lauderdale, Florida, UsIT Transformation Technical ROI Driven CIO focused on Business Intelligence, Business Performance Management including "corporate performance management" and "enterprise performance management. -
Senior Sales Director, North America | Desktop Security, Encryption, Desktop OptimizationSecuware (Endpoint Encryption Software) 2007 - 2009EsWorked as part of the senior team to develop and execute the global strategy for the company to introduce new product to North American market, assist in building out Sales.Desktop Encryption, working with Optimization Service like Microsoft Sharepoint, Active Directory (AD) Microsoft Services Optimized Desktop Solution (MDOP), EMC (RSA) MDOP (Microsoft Desktop Optimization Pack) contain six innovative technologies to increase desktop manageability and improve overall infrastructure satisfaction: 1- Microsoft Application Virtualization (App-V). 2- Microsoft Enterprise Desktop Virtualization (MED-V). 3- Microsoft Advanced Group Policy Management (AGPM). 4- Microsoft Asset Inventory Service (AIS). 5- Microsoft Diagnostics and Recovery Toolset (DaRT). 6- Microsoft System Center Desktop Error Monitoring (DEM). -
Finanical Sales Director | Network Security, Internet Security, Transaction Server OptimizationNcipher (Encryption And Key Management) 2006 - 2007Sales Director for Client Solutions - Project Leader for: Citigroup (HSM and IAM), Goldman Sachs (PKI), HSBC (HSM), JPMorgan Chase (Key Mgt & HSM), IBM (HSM), Merrill Lynch (PKI), Merck (DTS), J & J (HSM), Viewpointe-IBM (Key Mgt)
-
Eastern Director | Digtal Rights Management | Document Security, Document Protection, OptimizationAuthentica (Drm Encryption Software) 2004 - 2006UsDocument Security, Document Protection, Optimization at Authentica (DRM Encryption Software) | Purchased by EMC -
Vice President Of Sales And Business DevelopmentApplication Security, Inc. (Data Base Security Software) 2001 - 2002New York, Ny, UsOriginal Team of 10 Founded in 2001, Application Security, Inc. (AppSec) pioneered database security, risk, and compliance solutions for the enterprise. AppDetective empowers organizations to assess, monitor and protect their most critical database assets in real-time, while simplifying audits, monitoring risk, and automating compliance requirements.I worked with InfoSec teams in the following areas:dB Vulnerability Research & Exploit DevelopmentAutomated dB Scanning on Vulnerability in Oracle, Penetration Testing (Web App, Network, Mobile, Hardware, Social Engineering, Red Team)Vulnerability Research & Exploit DevelopmentComputer Network Operations - Attack (CNA), Defense (CND), Exploitation (CNE).Malware Analysis & Reverse EngineeringIncident Response & Digital Forensics (Blue Team)Threat IntelligenceEncryption / Cryptography -
Director, Business Alliance | Data Base Db Encryption, System Efficiency, Db OptimizationProtegrity 1997 - 2000Stamford, Connecticut, UsOriginal Team of 15 Founded in 1997, Business Alliance Director - design, implementation for IBM, Oracle, Informix, Microsoft, Sybase Programs. -
Director, Professional ServicesSystron (Top Nyc Cisco Gold Partner & Microsoft Consulting Solutions Partner) 1994 - 1996Client facing working IT Transformation Director assisting with PMO on directing a team of elite networking professionals for a Top-Tier Wall Street Gold Cisco Partner, Microsoft Consulting Solutions Provider, Novell Platinum systems integrator, IBM, Compaq, HP Business Partners. Responsibilities of Sales, Engagements and Project Consulting.
-
Corporate Sales Manager (Corporate Networking Solutions)Exel Computer Systems (Ct & Ny) 1983 - 1990Sell
-
General Manager, Mail ServicesOlin 1977 - 1981Clayton, Mo, UsManaged Corporate Mail Services
Guy Osa, Security Professional Skills
Guy Osa, Security Professional Education Details
-
Mit Sloan School Of ManagementBusiness & Strategy -
Stanford UniversityInformation Management -
New York UniversityBusiness And Information Management -
Central Connecticut State UniversityMarketing And Information Management -
Rippowam High School - Stamford, CtBusiness -
New York City School Of Hard KnocksInformation Technology
Frequently Asked Questions about Guy Osa, Security Professional
What company does Guy Osa, Security Professional work for?
Guy Osa, Security Professional works for Owasp Foundation
What is Guy Osa, Security Professional's role at the current company?
Guy Osa, Security Professional's current role is OWASP NYC Chapter President and Chapter Leader 2020 and 2025.
What is Guy Osa, Security Professional's email address?
Guy Osa, Security Professional's email address is os****@****isk.com
What is Guy Osa, Security Professional's direct phone number?
Guy Osa, Security Professional's direct phone number is +120397*****
What schools did Guy Osa, Security Professional attend?
Guy Osa, Security Professional attended Mit Sloan School Of Management, Stanford University, New York University, Central Connecticut State University, Rippowam High School - Stamford, Ct, New York City School Of Hard Knocks.
What skills is Guy Osa, Security Professional known for?
Guy Osa, Security Professional has skills like Security, Enterprise Software, Network Security, Information Security, Cloud Computing, Computer Security, Virtualization, Networking, Saas, Business Intelligence, Data Center, Active Directory.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial