Ken M.

Ken M. Email and Phone Number

Glastonbury, CT, US
Ken M.'s Location
Glastonbury, Connecticut, United States, United States
About Ken M.

Ken M. is a Retired at No More Meetings, Inc.. He possess expertise in leadership, computer forensics, information security, defense, cissp and 31 more skills. Colleagues describe him as "Ken is an exceptional cyber security professional with a tremendously successful career demonstrating astute leadership and focused technical abilities. A well-seasoned expert in analyzing on-going cyber security incidents, his accomplishments are unparalleled making him an instrumental catalyst in keeping the UTC information networks protected against daily attacks from an ever increasing level of exceptionally skilled adversaries. Ken has consistently kept the UTC CIRT at a ‘cutting edge’ level and more so, ensured that support to the entire UTC organization remained steadfast despite arduous hours of prolonged adversarial activity. Ken’s integrity, dependability, and professionalism are critical ingredients for operational success."

Ken M.'s Current Company Details
No More Meetings, Inc.

No More Meetings, Inc.

View
Retired
Glastonbury, CT, US
Website:
travelers.com
Employees:
33624
Ken M. Work Experience Details
  • No More Meetings, Inc.
    Retired
    No More Meetings, Inc.
    Glastonbury, Ct, Us
  • Travelers
    Avp, Cyber Risk Control
    Travelers Jan 2019 - Present
    Hartford, Connecticut Area
  • Synchrony
    Avp Information Security Governance And Risk
    Synchrony Mar 2017 - Jan 2019
    Stamford, Ct
    Governance• Establish and maintain a framework for Security Policies, Standards, and Job Aid management includingo Annual Review Cycle Ensure Governance Documentation are tracked, reviewed and updated regularlyo New document process Verify that new processes have appropriate documentation created in a timely fashion.o Ensure alignment with regulatory requirements and industry standards Identify regulatory changes that will affect IS Governance Documentation and recommend appropriate technical changes to maintain security protection events.o Verify strategic alignment to business goals Review Governance Documentation for possible security gaps, work with applicable teams to close the gaps• Assists with incident response by assessing degree to which controls and Governance Documentation may have contributed to the incident, and modify as needed to prevent future incidents.• Stay current with IT security and compliance industry requirements and technologies.• Provide policy guidance to information technology (IT) management, staff, and users • Participate in Work Review Board (WRB) meetings to identify processes that could have the potential to violate governance and therefore require exceptions• Develop/enhance Governance Metrics (KPI’s, KRI’s), and analyze exception data to determine if modifications to documentation is required.Risk Management• Developing a quantitative Security Risk Assessment program • Initiate post incident risk assessments to identify potential security gaps.
  • Synchrony Financial
    Information Security Advisor
    Synchrony Financial Mar 2016 - Mar 2017
  • Synchrony Financial
    Vulnerability Management
    Synchrony Financial Apr 2015 - Mar 2016
  • Pratt & Whitney
    It Security Manager
    Pratt & Whitney Sep 2014 - Apr 2015
    East Hartford, Ct
    - Supports assigned classified information technology (IT) systems; - Provides security assistance in the stand-up, review, audit, certification and accreditation, and wind-down of classified IT systems; - Leads individual and team self-inspections of assigned IT systems; - Supports external inspections and reviews of various classified and unclassified IT systems and processes; - Assesses, develops and executes pro-active IT security policies in partnership with end-users and system administrators, and Corporate IT department to improve the overall security environment of classified computing; - Designs, develops and implements end-user and information assurance officer security related training; - Leads CIRT processes in response to contamination events on assigned systems; - Researches and analyzes applicable U.S. Government IT security policies and procedures and industry standard IT products, services, and technologies to ensure the company is responsive to internal customer requirements while in compliance with U.S. Government security regulations; - Research and analyze external and internal cybersecurity threats to the company.
  • United Technologies
    Deputy Cirt Manager
    United Technologies Oct 2011 - Sep 2014
    East Hartford, Ct
  • Fbi
    Information Systems Security Officer / Computer Forensic Examiner
    Fbi Feb 2003 - Oct 2011
    Ensure all systems and users comply with Federal information security guidelines, policies and procedures.Examines and performs comprehensive technical analyses of computer-related evidence in MS Windows environments.
  • University Of New Haven
    Adjunct Faculty
    University Of New Haven Sep 2007 - Dec 2007
    Developed and delivered Graduate level course CJ600 – Computer Crime: Legal Issues and Investigative Techniques for the Fall 2007 semester.
  • Aetna
    Corporate Investigator
    Aetna Jun 2000 - Feb 2003
    Corporate Investigator
  • Aetna
    Systems Analyst And It Auditor
    Aetna Jun 1987 - Jun 2000
    COBOL programmerNetwork AdministratorIT Auditor
  • U.S. Coast Guard
    Data Processing Officer
    U.S. Coast Guard 1984 - 1987
    Washington D.C. Metro Area
  • U.S. Coast Guard
    Deck Watch Officer
    U.S. Coast Guard 1982 - 1984
    Greater New York City Area

Ken M. Skills

Leadership Computer Forensics Information Security Defense Cissp Employee Engagement Cybersecurity Security Operations Private Investigations Incident Response Computer Security Evidence Homeland Security Strategic Planning Enforcement Cybercrime Risk Assessment Business Continuity Risk Management Security Awareness Forensic Analysis Policy Disaster Recovery Security Management Law Enforcement Information Security Management Intelligence Analysis Security Audits Security Clearance Bagpiper Governance Vulnerability Assessment Security Information Assurance Analysis Fraud

Ken M. Education Details

Frequently Asked Questions about Ken M.

What company does Ken M. work for?

Ken M. works for No More Meetings, Inc.

What is Ken M.'s role at the current company?

Ken M.'s current role is Retired.

What schools did Ken M. attend?

Ken M. attended University Of Connecticut School Of Business, Us Coast Guard Academy, West Milford, N.j. High School.

What skills is Ken M. known for?

Ken M. has skills like Leadership, Computer Forensics, Information Security, Defense, Cissp, Employee Engagement, Cybersecurity, Security Operations, Private Investigations, Incident Response, Computer Security, Evidence.

Who are Ken M.'s colleagues?

Ken M.'s colleagues are Kevin Ahearn, Margaret Natiello, Denver Kurt Corpuz, Valerie Cosker, Jenna Nelson, Jude Mike, Andrea Torseth.

Not the Ken M. you were looking for?

  • Ken m

    Tacoma, Wa
  • Ken M.

    It Professional With Pursuit Of Knowledge In Cloud & Devops | Aws | Microsoft Azure | Google Cloud | Oracle Cloud
    United States
  • Ken Hooper

    Supply Chain Development/Management And Small Business Development/Management Experience
    Johnson City, Ny
    2
    stny.rr.com, verizon.net

    1 +160776XXXXX

  • Ken M.

    Product Analytics @ Tapad | Business Intelligence, Product Management
    New York, Ny
  • Ken M.

    Franchise Owner - Junk Shot Of Tallahassee, Junk Shot Of Jacksonville
    Jacksonville, Fl

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.