Jon Lehtinen

Jon Lehtinen Email and Phone Number

IAM & Cybersecurity Executive | Board Member | Advisor @ UberEther
Jon Lehtinen's Location
Greater Richmond Region, United States, United States
Jon Lehtinen's Contact Details
About Jon Lehtinen

Jon Lehtinen has 20 years of experience practicing identity security in large corporates like General Electric and Thomson Reuters, as well as within IAM security vendors such as Okta. He builds diverse, passionate teams that deliver automated, future-oriented Identity solutions that provide the bedrock for information security, governance, and new opportunities for business. Moreover, Jon is dedicated to the growth and maturity of IAM as a profession and served on the Board of Directors of IDPro. He's been an advisor to multiple identity vendors, and is a member of ISC2, the OpenID Foundation, and Women in Identity. Presently, Jon is the General Manager overseeing UberEther’s IAM Advantage & Services business unit.Jon has presented on his work at several conferences, including RSA, Identiverse, and KuppingerCole's European Identity & Cloud Conference, and is the author of Implementing Identity Management on AWS.

Jon Lehtinen's Current Company Details
UberEther

Uberether

View
IAM & Cybersecurity Executive | Board Member | Advisor
Jon Lehtinen Work Experience Details
  • Uberether
    General Manager
    Uberether Jul 2024 - Present
    Sterling, Virginia, Us
    I oversee UberEther's IAM Advantage platform and Services business unit.
  • Okta
    Senior Director - Identity Security, Okta On Okta
    Okta Mar 2021 - Jun 2024
    San Francisco, California, Us
    As Senior Director of Identity Security within Okta, I built a company-spanning program called Okta on Okta. Through deep partnership with our engineering/product functions, our field sales and customer success teams, and the broader business in general, we accomplish our mission to deliver the best-in-class identity-security experience for our employees and customers. I do this through three, interlocking priorities:First, we enable the business by providing IAM services using the Okta platform for all of our enterprise's workforce and customer identity use cases, including federal workforce. Second, we evolve the product by deeply partnering with our product and engineering teams here at Okta to position Okta as its own best and first customer. We also provide feedback and requirements based on our real-world usage of new features which are valuable to us as a growing company- and by extension, valuable to our customers as well.Last but certainly not least, we embed ourselves with our go-to-market, product marketing, and field teams to showcase the platform by sharing our own user and implementation stories here at Okta, and offering best practices, consultations, and playbooks so our customers can make the most of their platform experience alongside us.Through consistent execution, our team has grown from a small, 3-member skunkworks to a global team of 34 staff that impacts the bottom line through demonstrating the value of identity and access management in deep partnership with Okta's own security, customer trust, enablement, and information technology functions.
  • Idpro
    Board Member
    Idpro Jun 2019 - Nov 2023
    Us
    Along with the other board members, responsible for developing and executing the strategy for the long-term growth and development of the organization in order to execute IDPro’s mission of fostering ethics and excellence in the practice and profession of digital identity. Responsibilities include tactical business operations like developing new business, seeking industry alliances, and transparent non-profit management, as well as strategic maturation initiatives like executive selection, governance, and development of operational metrics.
  • Thomson Reuters
    Director, Identity & Access Management
    Thomson Reuters Nov 2017 - Mar 2021
    Toronto, On, Ca
    Responsible for developing and executing TR’s enterprise & cloud identity strategy while providing leadership, mentorship to 25+ IAM engineers in a matrixed organization. Seeks out sponsorship opportunities to highlight the accomplishments of fellow engineers in the broader industry. Delivers on IAM vision that balances business needs, cost, and user experience to deliver business value through IAM.– Customer obsessed. Instills empathy for internal & paying customers & develops the relationship we need to understand how the business operates so we can secure it without introducing unnecessary friction. – Delivers under pressure. Conceptualized, sold, drove and oversaw the execution of a rapid 120-day re-architecture of a business-critical, multi-year AzureAD separation project spanning several business teams and third-party consultants after the business surfaced new critical dependencies & requirements. – Guides and mentors IAM Leads in their own automation & cloud journeys in service of business agility & service capability. Advised team on cloud deployments and/or automated services for PingFederate, Venafi PKI, and Active Directory, with ongoing progress toward the same for Radiant VDS & SailPoint IIQ on Kubernetes.– Supports & encourages others in building their own industry profiles. Sponsors underrepresented groups by searching out opportunities to demonstrate their expertise publicly, both inside & outside the organization. Jointly presented at RSA2020 and KuppingerCole Identity Fabrics & the Future of Identity Management 2020 with two different colleagues and facilitated a colleague joining a Women in Identity panel at Gartner IAM 2019. – Designed, built, operated, and open-sourced a highly resilient, multi-region, infrastructure-as-code deployment of our new Enterprise SSO platform using commercial off the shelf software, AWS, & Docker. Total cost of ownership is $2.2mm/year less compared to the systems it replaces.
  • Ping Identity
    Customer Advisory Board
    Ping Identity Jun 2020 - Feb 2021
    Denver, Co, Us
  • Evident Id
    Advisor
    Evident Id Jul 2019 - Feb 2021
    Atlanta, Georgia, Us
    Provides guidance, roadmap feedback, and domain expertise to company leadership. Participates in and produces white papers, webinars, and other events to promote the organization’s growth.
  • Ge Digital
    Senior Service Manager - Sso & Federation Services
    Ge Digital Sep 2013 - Nov 2017
    San Ramon, California, Us
    Directed the application and API authentication/authorization security service and set the short and longterm strategies within that space. Responsible for up to ~$3.4mm of annual spend for building and managing a global team of 35 specialists, including staff, on-shore, and off-shore contractors. Built one of the largest OpenID Connect environments in the world with 10k+ clients. Delivered service through PingFederate, CA SiteMinder, Radiant Logic Virtual Directory Server, and custom-built self-service portals and API wrappers for customer self-service integration.Key projects/Accomplishments:• Fully replaced contractor team with automation and self-service for enterprise application authentication, freeing $3.2mm in annual spend.• Built a highly successful and customer-centric self-service/automated application security onboarding and professional services program from 2014 to 2017.• Cultivated team culture of learning learning, growth, and stewardship• Lead staff to increase the total throughput of customer request fulfillment 450% from 2014 to 2015 with no increase in the 2014 baseline staff or spend. Peak throughput of 1,000 business requests/month• Influenced the adoption of identity standards within GE and set federated identity via OpenID Connect, OAuth, and SAML as the authN standard for all applications moving forward from 2016.• Executed app migration program which moved 7200+ applications into replacement access management environments from 2015-2016.• Managed vendor relationships as both a provider of services and as a consumer of technology products/services across several statements of work and multiple vendors.
  • Apollo Group
    Senior It Security And Lead Identity And Access Management Analyst
    Apollo Group Jul 2010 - Sep 2013
    Phoenix, Az, Us
    Lead for the Identity and Access Management security services group. Researched, tested, and deployed new identity management technologies to address present and future business and security needs, including identity lifecycle management for cloud-based SaaS systems, highly privileged access accounts for database and systems administrators, and prevention/remediation of potential SOX/PCI DSS findings. Responsible for mentoring and facilitating the professional development of junior analysts. Delivered services through Microsoft ILM, AD, Oracle OVD, OIF, OIA, and custom RBAC applications.Key projects/Accomplishments:• Architected and deployed Oracle Virtual Directory environment with Enterprise User Security for enhanced privileged access management into databases.• Architected and deployed Oracle Identity Federation environment, and developed the SOPs for onboarding new SaaS applications. Integrated 12 SaaS applications within the first year of deployment.• Built solutions for connected yet independently-operated identity and directory systems for the launch of a new subsidiary, including virtual directory services.• Designed and implemented a skills assessment and training program to help identify and then increase the effectiveness of identity management analysts, and improved the team member’s competencies with IAM technologies.• Managed day-to-day operation of Access Support Team, including special projects, customer expectations management, and escalations.• Voting representative for Apollo Group at the Identity Ecosystem Steering Group (IDESG)
  • Apollo Group
    Additional Enterprise Iam Roles
    Apollo Group May 2005 - Feb 2009
    Phoenix, Az, Us
    Various early and mid-career technology roles supporting the identity components of enterprise systems.Responsibilities included user provisioning and role governance in Oracle Financials 11g, and frontline support for the Computer Access Process system built for Role-based Access Control. Additional details available upon request.

Jon Lehtinen Skills

Ilm Identity Management Sql Xml Oid Security Ldap Oracle Identity Federation Servers Oracle Identity Manager Information Security Cloud Computing Itil Iis Sdlc Testing Enterprise Software Oracle Databases Access Siteminder Quality Assurance Unix Active Directory Disaster Recovery Enterprise Architecture Information Technology It Management Troubleshooting Web Applications Integration Leadership Management Infrastructure Saas Vendor Management Visio Network Security Identity And Access Management Data

Jon Lehtinen Education Details

  • Arizona State University
    Arizona State University
    Spanish
  • University Of Phoenix
    University Of Phoenix
    Management

Frequently Asked Questions about Jon Lehtinen

What company does Jon Lehtinen work for?

Jon Lehtinen works for Uberether

What is Jon Lehtinen's role at the current company?

Jon Lehtinen's current role is IAM & Cybersecurity Executive | Board Member | Advisor.

What is Jon Lehtinen's email address?

Jon Lehtinen's email address is jon.lehtinen@tr.com

What schools did Jon Lehtinen attend?

Jon Lehtinen attended Arizona State University, University Of Phoenix.

What are some of Jon Lehtinen's interests?

Jon Lehtinen has interest in Education.

What skills is Jon Lehtinen known for?

Jon Lehtinen has skills like Ilm, Identity Management, Sql, Xml, Oid, Security, Ldap, Oracle Identity Federation, Servers, Oracle Identity Manager, Information Security, Cloud Computing.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.