Ken M. is a Retired at No More Meetings, Inc.. He possess expertise in leadership, computer forensics, information security, defense, cissp and 31 more skills. Colleagues describe him as "Ken is an exceptional cyber security professional with a tremendously successful career demonstrating astute leadership and focused technical abilities. A well-seasoned expert in analyzing on-going cyber security incidents, his accomplishments are unparalleled making him an instrumental catalyst in keeping the UTC information networks protected against daily attacks from an ever increasing level of exceptionally skilled adversaries. Ken has consistently kept the UTC CIRT at a ‘cutting edge’ level and more so, ensured that support to the entire UTC organization remained steadfast despite arduous hours of prolonged adversarial activity. Ken’s integrity, dependability, and professionalism are critical ingredients for operational success."
-
RetiredNo More Meetings, Inc.Glastonbury, Ct, Us
-
Avp, Cyber Risk ControlTravelers Jan 2019 - PresentHartford, Connecticut Area -
Avp Information Security Governance And RiskSynchrony Mar 2017 - Jan 2019Stamford, CtGovernance• Establish and maintain a framework for Security Policies, Standards, and Job Aid management includingo Annual Review Cycle Ensure Governance Documentation are tracked, reviewed and updated regularlyo New document process Verify that new processes have appropriate documentation created in a timely fashion.o Ensure alignment with regulatory requirements and industry standards Identify regulatory changes that will affect IS Governance Documentation and recommend appropriate technical changes to maintain security protection events.o Verify strategic alignment to business goals Review Governance Documentation for possible security gaps, work with applicable teams to close the gaps• Assists with incident response by assessing degree to which controls and Governance Documentation may have contributed to the incident, and modify as needed to prevent future incidents.• Stay current with IT security and compliance industry requirements and technologies.• Provide policy guidance to information technology (IT) management, staff, and users • Participate in Work Review Board (WRB) meetings to identify processes that could have the potential to violate governance and therefore require exceptions• Develop/enhance Governance Metrics (KPI’s, KRI’s), and analyze exception data to determine if modifications to documentation is required.Risk Management• Developing a quantitative Security Risk Assessment program • Initiate post incident risk assessments to identify potential security gaps. -
Information Security AdvisorSynchrony Financial Mar 2016 - Mar 2017 -
Vulnerability ManagementSynchrony Financial Apr 2015 - Mar 2016 -
It Security ManagerPratt & Whitney Sep 2014 - Apr 2015East Hartford, Ct- Supports assigned classified information technology (IT) systems; - Provides security assistance in the stand-up, review, audit, certification and accreditation, and wind-down of classified IT systems; - Leads individual and team self-inspections of assigned IT systems; - Supports external inspections and reviews of various classified and unclassified IT systems and processes; - Assesses, develops and executes pro-active IT security policies in partnership with end-users and system administrators, and Corporate IT department to improve the overall security environment of classified computing; - Designs, develops and implements end-user and information assurance officer security related training; - Leads CIRT processes in response to contamination events on assigned systems; - Researches and analyzes applicable U.S. Government IT security policies and procedures and industry standard IT products, services, and technologies to ensure the company is responsive to internal customer requirements while in compliance with U.S. Government security regulations; - Research and analyze external and internal cybersecurity threats to the company. -
Deputy Cirt ManagerUnited Technologies Oct 2011 - Sep 2014East Hartford, Ct -
Information Systems Security Officer / Computer Forensic ExaminerFbi Feb 2003 - Oct 2011Ensure all systems and users comply with Federal information security guidelines, policies and procedures.Examines and performs comprehensive technical analyses of computer-related evidence in MS Windows environments. -
Adjunct FacultyUniversity Of New Haven Sep 2007 - Dec 2007Developed and delivered Graduate level course CJ600 – Computer Crime: Legal Issues and Investigative Techniques for the Fall 2007 semester. -
Corporate InvestigatorAetna Jun 2000 - Feb 2003Corporate Investigator -
Systems Analyst And It AuditorAetna Jun 1987 - Jun 2000COBOL programmerNetwork AdministratorIT Auditor -
Data Processing OfficerU.S. Coast Guard 1984 - 1987Washington D.C. Metro Area -
Deck Watch OfficerU.S. Coast Guard 1982 - 1984Greater New York City Area
Ken M. Skills
Ken M. Education Details
-
Mathematcs -
West Milford, N.J. High SchoolA
Frequently Asked Questions about Ken M.
What company does Ken M. work for?
Ken M. works for No More Meetings, Inc.
What is Ken M.'s role at the current company?
Ken M.'s current role is Retired.
What schools did Ken M. attend?
Ken M. attended University Of Connecticut School Of Business, Us Coast Guard Academy, West Milford, N.j. High School.
What skills is Ken M. known for?
Ken M. has skills like Leadership, Computer Forensics, Information Security, Defense, Cissp, Employee Engagement, Cybersecurity, Security Operations, Private Investigations, Incident Response, Computer Security, Evidence.
Who are Ken M.'s colleagues?
Ken M.'s colleagues are Kevin Ahearn, Margaret Natiello, Denver Kurt Corpuz, Valerie Cosker, Jenna Nelson, Jude Mike, Andrea Torseth.
Not the Ken M. you were looking for?
-
Ken Hooper
Supply Chain Development/Management And Small Business Development/Management ExperienceJohnson City, Ny2stny.rr.com, verizon.net1 +160776XXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial