Ken Adler

Ken Adler Email and Phone Number

InfoSec, Identity, and Trust | Pioneer Member, Internet Society (ISOC) @ Indeed
Ken Adler's Location
Oakland, California, United States, United States
About Ken Adler

I am a hands-on InfoSec professional who thrives in individual contributor and leadership roles.------Ken “gets it” and "gets it done." - SVP, CIO/CSO - Indeed

Ken Adler's Current Company Details
Indeed

Indeed

View
InfoSec, Identity, and Trust | Pioneer Member, Internet Society (ISOC)
Website:
indeed.com
Ken Adler Work Experience Details
  • Indeed
    Director, Identity & Access Management, Zero Trust
    Indeed May 2024 - Present
    Austin, Texas, Us
  • Indeed
    Director, Security Architecture & Offensive Security
    Indeed Mar 2023 - Present
    Austin, Texas, Us
  • Indeed
    Dri, Zero Trust Strategic Initiative
    Indeed Dec 2022 - Present
    Austin, Texas, Us
    Responsible for Enterprise-wide role-out of Zero Trust Architecture. Scope includes both the production infrastructure and corporate IT environments
  • Indeed
    Security Partner - Engineering, Product, And Data Platforms
    Indeed Jul 2022 - Present
    Austin, Texas, Us
    Established Indeed's Security Partner Program (BISO)
  • Indeed
    Fellow, Indeed Security
    Indeed Sep 2021 - Present
    Austin, Texas, Us
    Key Initiative: Workload Identity Platform; Authorization Policy as Code PlatformInitiated, architected & led technical implementation of a SPIFFE/SPIRE based zero-trust infrastructure.Achieved standardization on an Authorization Policy as Code platform based on Open Policy Agent.
  • Thoughtworks
    Principal - Digital Trust, Identity, & Infosec
    Thoughtworks Feb 2017 - Sep 2021
    Chicago, Il, Us
    ThoughtWorks' "go-to" SME for Identity, PCI, InfoSec Governance, Risk, and Compliance/CISO topics.Digital Platform Strategy Group (DPS).Founding Team Member, Security Pillar OwnerHelping organizations implement zero-trust, policy-driven, cloud-native digital platforms. Digital Platforms unlock the data and other business assets of a company, exposing them in reusable building blocks. Platforms are Implemented via business-domain-driven services that are continuously delivered in an agile manner and are gracefully integrated into the broader enterprise governance, risk management, and compliance landscape.Specialties:* Cloud Security (AWS, GCP) * Zero Trust Architecture (SP800-207)* Identity (OIDC/OAuth/SAML/JWT)* Service Identity Strategy. (SPIFFE/SPIRE/Istio/Oauth2-mTLS)* Policy-As-Code* Fine-grained Authorization in microService computing environments (CNCF OPA)* Applied Cryptography.* Trust over IP Stack (Verifiable Credentials, Decentralized Identifiers, DLT, Governance)Past Engagements Include:Worlds' leading collaboration, development, and issue tracking software vendor.Architected and implemented a Policy As Code-based Content Authorization System proof of concept. Scale: 2 billion user accounts with hundreds of millions of MAUs (monthly active users).Client filed a patent and is Open Sourcing the code.F100 Insurance CompanyArchitected Authorization Infrastructure (OPA/Istio/K8s) and Policy-As-Code. Includes distributed policy authoring and pipelining, microservice and K8s admission controller authorization.Largest Gym & Fitness franchisor - CISO's ProxyGreenfield Digital Platform - Architect Identity for 20 million active monthly users.PCI - led team to audit success leveraging agile artifacts.
  • Linux Foundation Public Health (Lfph)
    Chair: Security, Privacy, And Data Protection Drafting Group, Good Health Pass
    Linux Foundation Public Health (Lfph) May 2021 - Aug 2021
    Led Drafting group for Security, Privacy, and Data Protection framework for the Good Health Pass Interop BluePrinthttps://trustoverip.org/wp-content/uploads/2021/08/GHP_Interoperability_Blueprint.pdf
  • Betcade (Payment Processor)
    Chief Information Security Officer (Ciso)
    Betcade (Payment Processor) Jan 2016 - Jan 2017
    Mobile First Payment Processor focusing on the highly regulated gambling industry in the EU/UK MarketResponsible for all Information Security and Compliance activities.• Hired before the first line of code was written• Achieved FCA license as a payment institution in the UK.• Achieved PCI Level 2 Compliance.Implemented:• eGRC Database• Cryptographic Infrastructure (HSM, Tokenization, Encryption, FIDO 2FA; SAML)• Vulnerability & Anti-malware controls for supply chain trust.
  • Sabbatical
    Sabbatical
    Sabbatical Sep 2015 - Feb 2016
    Financed and helped organize this benefit concert and album recording.---In November 2015, over 150 artists walked through the doors of the legendary Fantasy Studios and spent over 22 days recording and mixing 14 songs at Fantasy Studios (the same place that Green Day recorded the original album).UnderCover asked 14 Bay Area Bands to put their own twist on the twisted. The genres have ranged from Arabic Rai to Gospel to Orchestral...with a ton of punk in between.The live performance took place on February 19th, 2016 at the Fox Theater in Oakland. At the performance, Oakland's mayor declared "Green Day Day" in Oakland and presented Green Day on stage with a proclamation. Watch Mayor Libby "mic drop" on stage with the band: https://goo.gl/JmA5S7--- UnderCover Presents enables musicians and audiences to deepen bonds with the local artistic scene through collective celebration of a shared cultural touchstone. UnderCover navigates audiences to a diverse range of musicians by reinterpreting an iconic album in its entirety with a different ensemble performing each song in their own style.Over the course of UnderCover's 5 years, 10 tributes, and 27,000+ tickets sold; UnderCover has established itself as a well curated, professional, yet incredibly intimate series. The result of UnderCover's uniquely diverse collaboration is a ripple effect. Musicians continue collaborative efforts beyond the shows. Audiences explore genres and artists that they normally wouldn't come across, and continue following them long after their UnderCover appearance.Click "View" on the below links:
  • Gracenote
    Director, Global Information Security And Compliance
    Gracenote 2009 - Sep 2015
    Emeryville, Ca, Us
    Re-established Gracenote's complete ISMS (Information Security Management System) following multiple M&A activities (spin-out from Sony, acquisition of Gracenote by TribuneMedia, integration of an additional 6+ acquired companies over the last year.)Previously, following Sony acquisition of Gracenote in 2009, I established and have since managed a complete Information Security Management System, including the following programs/systems:Governance, Risk, and ComplianceMalware Incident Prevention and Response ProgramInformation Security Incident Response ProgramAwareness & Training ProgramSoftware Assurance Maturity ProgramSingle Sign-on ProgramCryptography ProgramCrisis Management ProgramBusiness Continuity Planning ProgramHands-on involvement in all aspects of the ISMS from writing policies to configuring SAML integrations to authoring Threat Models/Architecture Reviews of customer-facing service infrastructure handling PII.Gracenote's Service Operations environment includes significant data-center and AWS deployments as well as SDKs and embedded software development.Gracenote's IT environment includes significant numbers of Mac OS X and IOS devices, in addition to Windows and Linux hosts typically found in enterprises. There is a strong "cloud services first" emphasis.IT supports 1600+ employees in 20+ offices around the world.Our customer-facing infrastructure serves greater than a billion hits a day.* Ran publicly signed PKI* Implemented Enterprise Key Management* Implemented data encryptionMost recent focus:* SmartTV Privacy and Security Policy, Architecture, and Implementation.* EU Privacy Protection Safe Harbor - Policy, Architecture and Implementation.* SOX Controls Re-establishment* RESTful crypto infrastructure.
  • Information Security Consulting
    Payment Card Industry (Pci) Infosec Specialist
    Information Security Consulting 2004 - 2008
    Atlanta, Ga, Us
    Payment System (PCI) focused security consulting in the Bay Area. Length of engagement from 6 months to 2 years. Clients include:* Visa - Cardholder Information Security Program (CISP) - Reviewed vendor’s Application Best Practices documents to certify architectural compliance - Actively monitored ~50 post-compromise Incident Response & Remediation projects - Wrote case summaries for Fine Packages.* Barclay’s Global Investors (BlackRock) – IT Risk Management (Security Architect)* Williams Sonoma & BevMo – PCI Audit preparation and remediation
  • Various Security Products Start-Ups
    Various
    Various Security Products Start-Ups 2002 - 2004
    Including BigFix(proto-Tanium) and Sequoia Capital and Y-Combinator start-ups
  • Officeplease
    Co-Founder
    Officeplease Jan 2000 - Jan 2002
    Cloud Computing (SaaS) Start-up.SaaS enterprise Intranet based on Cisco's pioneering Intranet user experience.What we use now: GSuite, Atlassian Products.A decade too early, an interminable election recount, the dot.bomb, 9/11. YOLO(Dates Approximate)
  • Cisco Systems
    Business Development - Asia/Pacific
    Cisco Systems Jan 1997 - Sep 2000
    San Jose, Ca, Us
    Drove broadband sales/marketing efforts in Asia/Pacific following acquisition of NetSpeed.Later, joined Asia-based Corporate Business Development, investing in start-ups.Expatriate.Director, Asia/PacificExpatriate posting in Hong Kong.Ran Asia/Pacific Engineering, Support, Marketing, and Sales efforts.Sold to C-level at the largest Telcos in the Asia-Pacfic Region (From Japan to India to AU/NZ)Acquired by Cisco Systems.
  • Penril Datability Networks
    Managing Director, Asia Pacific
    Penril Datability Networks 1988 - 1996
    Expatriate posting in Hong Kong.Various roles of increasing responsibility. Technical, training, sales, and business development roles. Relocated to Hong Kong.Acquired by Bay Networks.

Ken Adler Skills

Information Security Security Cissp Enterprise Software Information Technology Information Security Management Start Ups Integration Identity Management Security Architecture Design Encryption Business Development Security Policy Firewalls Infrastructure Pci Dss Risk Management Cisa Vmware Sdlc Antivirus Itil Active Directory Pki Os X It Risk Management Enterprise Risk Management Amazon Web Services Saml 2.0 Siem Aws Qradar Qualys Bigfix Oracle Identity Manager Vmware Infrastructure Active Directory Certificate Services Cryptography Incident Response Okta Burp Suite Acunetix Ibm Endpoint Manager Tippingpoint Ips Cisco Security Globalsign Epki Javascript Powershell Risk Assessment Mcafee Epo

Ken Adler Education Details

  • Syracuse University
    Syracuse University
    Russian Studies

Frequently Asked Questions about Ken Adler

What company does Ken Adler work for?

Ken Adler works for Indeed

What is Ken Adler's role at the current company?

Ken Adler's current role is InfoSec, Identity, and Trust | Pioneer Member, Internet Society (ISOC).

What is Ken Adler's email address?

Ken Adler's email address is ke****@****ler.net

What is Ken Adler's direct phone number?

Ken Adler's direct phone number is +151029*****

What schools did Ken Adler attend?

Ken Adler attended Syracuse University.

What are some of Ken Adler's interests?

Ken Adler has interest in Boating, Kids, Electronics, Outdoors, Home Improvement, Sports.

What skills is Ken Adler known for?

Ken Adler has skills like Information Security, Security, Cissp, Enterprise Software, Information Technology, Information Security Management, Start Ups, Integration, Identity Management, Security Architecture Design, Encryption, Business Development.

Who are Ken Adler's colleagues?

Ken Adler's colleagues are Camden Parker, Edwin Encar, Bobby (Robert) Birch, Grabriel Ortiz, Rory Mccarville, Kamini Gaikwad, Victoria Hernández Martinez.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.