Ken Adler Email and Phone Number
Ken Adler work email
- Valid
- Valid
Ken Adler personal email
Ken Adler phone numbers
I am a hands-on InfoSec professional who thrives in individual contributor and leadership roles.------Ken “gets it” and "gets it done." - SVP, CIO/CSO - Indeed
Indeed
View- Website:
- indeed.com
-
Director, Identity & Access Management, Zero TrustIndeed May 2024 - PresentAustin, Texas, Us -
Director, Security Architecture & Offensive SecurityIndeed Mar 2023 - PresentAustin, Texas, Us -
Dri, Zero Trust Strategic InitiativeIndeed Dec 2022 - PresentAustin, Texas, UsResponsible for Enterprise-wide role-out of Zero Trust Architecture. Scope includes both the production infrastructure and corporate IT environments -
Security Partner - Engineering, Product, And Data PlatformsIndeed Jul 2022 - PresentAustin, Texas, UsEstablished Indeed's Security Partner Program (BISO) -
Fellow, Indeed SecurityIndeed Sep 2021 - PresentAustin, Texas, UsKey Initiative: Workload Identity Platform; Authorization Policy as Code PlatformInitiated, architected & led technical implementation of a SPIFFE/SPIRE based zero-trust infrastructure.Achieved standardization on an Authorization Policy as Code platform based on Open Policy Agent. -
Principal - Digital Trust, Identity, & InfosecThoughtworks Feb 2017 - Sep 2021Chicago, Il, UsThoughtWorks' "go-to" SME for Identity, PCI, InfoSec Governance, Risk, and Compliance/CISO topics.Digital Platform Strategy Group (DPS).Founding Team Member, Security Pillar OwnerHelping organizations implement zero-trust, policy-driven, cloud-native digital platforms. Digital Platforms unlock the data and other business assets of a company, exposing them in reusable building blocks. Platforms are Implemented via business-domain-driven services that are continuously delivered in an agile manner and are gracefully integrated into the broader enterprise governance, risk management, and compliance landscape.Specialties:* Cloud Security (AWS, GCP) * Zero Trust Architecture (SP800-207)* Identity (OIDC/OAuth/SAML/JWT)* Service Identity Strategy. (SPIFFE/SPIRE/Istio/Oauth2-mTLS)* Policy-As-Code* Fine-grained Authorization in microService computing environments (CNCF OPA)* Applied Cryptography.* Trust over IP Stack (Verifiable Credentials, Decentralized Identifiers, DLT, Governance)Past Engagements Include:Worlds' leading collaboration, development, and issue tracking software vendor.Architected and implemented a Policy As Code-based Content Authorization System proof of concept. Scale: 2 billion user accounts with hundreds of millions of MAUs (monthly active users).Client filed a patent and is Open Sourcing the code.F100 Insurance CompanyArchitected Authorization Infrastructure (OPA/Istio/K8s) and Policy-As-Code. Includes distributed policy authoring and pipelining, microservice and K8s admission controller authorization.Largest Gym & Fitness franchisor - CISO's ProxyGreenfield Digital Platform - Architect Identity for 20 million active monthly users.PCI - led team to audit success leveraging agile artifacts. -
Chair: Security, Privacy, And Data Protection Drafting Group, Good Health PassLinux Foundation Public Health (Lfph) May 2021 - Aug 2021Led Drafting group for Security, Privacy, and Data Protection framework for the Good Health Pass Interop BluePrinthttps://trustoverip.org/wp-content/uploads/2021/08/GHP_Interoperability_Blueprint.pdf
-
Chief Information Security Officer (Ciso)Betcade (Payment Processor) Jan 2016 - Jan 2017Mobile First Payment Processor focusing on the highly regulated gambling industry in the EU/UK MarketResponsible for all Information Security and Compliance activities.• Hired before the first line of code was written• Achieved FCA license as a payment institution in the UK.• Achieved PCI Level 2 Compliance.Implemented:• eGRC Database• Cryptographic Infrastructure (HSM, Tokenization, Encryption, FIDO 2FA; SAML)• Vulnerability & Anti-malware controls for supply chain trust.
-
SabbaticalSabbatical Sep 2015 - Feb 2016Financed and helped organize this benefit concert and album recording.---In November 2015, over 150 artists walked through the doors of the legendary Fantasy Studios and spent over 22 days recording and mixing 14 songs at Fantasy Studios (the same place that Green Day recorded the original album).UnderCover asked 14 Bay Area Bands to put their own twist on the twisted. The genres have ranged from Arabic Rai to Gospel to Orchestral...with a ton of punk in between.The live performance took place on February 19th, 2016 at the Fox Theater in Oakland. At the performance, Oakland's mayor declared "Green Day Day" in Oakland and presented Green Day on stage with a proclamation. Watch Mayor Libby "mic drop" on stage with the band: https://goo.gl/JmA5S7--- UnderCover Presents enables musicians and audiences to deepen bonds with the local artistic scene through collective celebration of a shared cultural touchstone. UnderCover navigates audiences to a diverse range of musicians by reinterpreting an iconic album in its entirety with a different ensemble performing each song in their own style.Over the course of UnderCover's 5 years, 10 tributes, and 27,000+ tickets sold; UnderCover has established itself as a well curated, professional, yet incredibly intimate series. The result of UnderCover's uniquely diverse collaboration is a ripple effect. Musicians continue collaborative efforts beyond the shows. Audiences explore genres and artists that they normally wouldn't come across, and continue following them long after their UnderCover appearance.Click "View" on the below links:
-
Director, Global Information Security And ComplianceGracenote 2009 - Sep 2015Emeryville, Ca, UsRe-established Gracenote's complete ISMS (Information Security Management System) following multiple M&A activities (spin-out from Sony, acquisition of Gracenote by TribuneMedia, integration of an additional 6+ acquired companies over the last year.)Previously, following Sony acquisition of Gracenote in 2009, I established and have since managed a complete Information Security Management System, including the following programs/systems:Governance, Risk, and ComplianceMalware Incident Prevention and Response ProgramInformation Security Incident Response ProgramAwareness & Training ProgramSoftware Assurance Maturity ProgramSingle Sign-on ProgramCryptography ProgramCrisis Management ProgramBusiness Continuity Planning ProgramHands-on involvement in all aspects of the ISMS from writing policies to configuring SAML integrations to authoring Threat Models/Architecture Reviews of customer-facing service infrastructure handling PII.Gracenote's Service Operations environment includes significant data-center and AWS deployments as well as SDKs and embedded software development.Gracenote's IT environment includes significant numbers of Mac OS X and IOS devices, in addition to Windows and Linux hosts typically found in enterprises. There is a strong "cloud services first" emphasis.IT supports 1600+ employees in 20+ offices around the world.Our customer-facing infrastructure serves greater than a billion hits a day.* Ran publicly signed PKI* Implemented Enterprise Key Management* Implemented data encryptionMost recent focus:* SmartTV Privacy and Security Policy, Architecture, and Implementation.* EU Privacy Protection Safe Harbor - Policy, Architecture and Implementation.* SOX Controls Re-establishment* RESTful crypto infrastructure. -
Payment Card Industry (Pci) Infosec SpecialistInformation Security Consulting 2004 - 2008Atlanta, Ga, UsPayment System (PCI) focused security consulting in the Bay Area. Length of engagement from 6 months to 2 years. Clients include:* Visa - Cardholder Information Security Program (CISP) - Reviewed vendor’s Application Best Practices documents to certify architectural compliance - Actively monitored ~50 post-compromise Incident Response & Remediation projects - Wrote case summaries for Fine Packages.* Barclay’s Global Investors (BlackRock) – IT Risk Management (Security Architect)* Williams Sonoma & BevMo – PCI Audit preparation and remediation -
VariousVarious Security Products Start-Ups 2002 - 2004Including BigFix(proto-Tanium) and Sequoia Capital and Y-Combinator start-ups
-
Co-FounderOfficeplease Jan 2000 - Jan 2002Cloud Computing (SaaS) Start-up.SaaS enterprise Intranet based on Cisco's pioneering Intranet user experience.What we use now: GSuite, Atlassian Products.A decade too early, an interminable election recount, the dot.bomb, 9/11. YOLO(Dates Approximate)
-
Business Development - Asia/PacificCisco Systems Jan 1997 - Sep 2000San Jose, Ca, UsDrove broadband sales/marketing efforts in Asia/Pacific following acquisition of NetSpeed.Later, joined Asia-based Corporate Business Development, investing in start-ups.Expatriate.Director, Asia/PacificExpatriate posting in Hong Kong.Ran Asia/Pacific Engineering, Support, Marketing, and Sales efforts.Sold to C-level at the largest Telcos in the Asia-Pacfic Region (From Japan to India to AU/NZ)Acquired by Cisco Systems. -
Managing Director, Asia PacificPenril Datability Networks 1988 - 1996Expatriate posting in Hong Kong.Various roles of increasing responsibility. Technical, training, sales, and business development roles. Relocated to Hong Kong.Acquired by Bay Networks.
Ken Adler Skills
Ken Adler Education Details
-
Syracuse UniversityRussian Studies
Frequently Asked Questions about Ken Adler
What company does Ken Adler work for?
Ken Adler works for Indeed
What is Ken Adler's role at the current company?
Ken Adler's current role is InfoSec, Identity, and Trust | Pioneer Member, Internet Society (ISOC).
What is Ken Adler's email address?
Ken Adler's email address is ke****@****ler.net
What is Ken Adler's direct phone number?
Ken Adler's direct phone number is +151029*****
What schools did Ken Adler attend?
Ken Adler attended Syracuse University.
What are some of Ken Adler's interests?
Ken Adler has interest in Boating, Kids, Electronics, Outdoors, Home Improvement, Sports.
What skills is Ken Adler known for?
Ken Adler has skills like Information Security, Security, Cissp, Enterprise Software, Information Technology, Information Security Management, Start Ups, Integration, Identity Management, Security Architecture Design, Encryption, Business Development.
Who are Ken Adler's colleagues?
Ken Adler's colleagues are Camden Parker, Edwin Encar, Bobby (Robert) Birch, Grabriel Ortiz, Rory Mccarville, Kamini Gaikwad, Victoria Hernández Martinez.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial