Kip Boyle

Kip Boyle Email and Phone Number

Cyber Resilience Thought Leader | CEO, Cyber Risk Opportunities | Cybersecurity LinkedIn Learning Course Instructor | Co-host Cyber Risk Management Podcast | Amazon Best Selling Author | International Keynote Speaker @ Cyber Risk Opportunities LLC
Kip Boyle's Location
Kent, Washington, United States, United States
Kip Boyle's Contact Details
About Kip Boyle

I’ve been working in cybersecurity since 1992. I started as an air force officer, leading information technology teams. My assignments had us handling very sensitive information related to air-to-air weapons testing, so we were expected to practice what I now call “good cyber hygiene”. My most challenging job during this time was director of wide area network security for the F-22 “Raptor”. At the time, we were getting ready for the first production jets to come down the assembly line. It was very exciting!After the USAF, as a project leader at Stanford Research (SRI), I helped many Fortune 100 firms grapple with cybersecurity on a large scale. The problems they were dealing with were often 5 years or more ahead of the mainstream. So, there were no “off-the-shelf” solutions and many of our customers didn’t even know where to start. With no one else to turn to, they would come to us.Fast forward a few years and I was selected to be Chief Information Security Officer (CISO) of an insurance company. They owned a few subsidiaries, so I was also providing cybersecurity leadership to senior decision-makers of a community bank, credit union, debit/credit card transaction processor, and an IT managed service provider. I learned a lot about the business value of cybersecurity during those years.Then, in June of 2015, I launched my own company, Cyber Risk Opportunities. These days, cyberattacks are hurting businesses, even bankrupting them. That's wrong! We help executives manage cyber as the business risk it has become. So they’ll be ready no matter what happens. Setting priorities is a big goal in our work.Today, we have a lot of customers. Right now, we’re helping both a professional basketball team and a biotech company optimize their cyber risk management programs. It’s great to be able to use the same approach to help organizations that are so different in just about every obvious way. But, just under the surface, they are both very similar in terms of the cyber risk practices they need to follow.My mission is to enable executives to become more proficient cyber risk managers. Our customers include the U.S. Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, DuPont, and many others.And, because so many organizations in the US need better cyber risk management at the executive level, we’ve launched a partnership program so other professionals in positions of trust, such as lawyers and technology service providers, can use our tools and methods to help their existing customers thrive as cyber risk managers. Ask me about it!

Kip Boyle's Current Company Details
Cyber Risk Opportunities LLC

Cyber Risk Opportunities Llc

View
Cyber Resilience Thought Leader | CEO, Cyber Risk Opportunities | Cybersecurity LinkedIn Learning Course Instructor | Co-host Cyber Risk Management Podcast | Amazon Best Selling Author | International Keynote Speaker
Kip Boyle Work Experience Details
  • Cyber Risk Opportunities Llc
    Fractional Chief Information Security Officer (Ciso)
    Cyber Risk Opportunities Llc Jun 2015 - Present
    The CFO of a well-established company, with about 400 employees, had just lost $65,000 and the full confidence of an important customer to an email scam. This CFO was shocked. And furiously angry at the attacker.He needed to make sure they weren’t sitting ducks for another cyber-attack, whether it was another business email compromise or ransomware. Or something else.This CFO reach out to his company’s attorney, who referred him to me.After listening to his story, I asked a few more questions and then said: “It sounds like you want to manage cyber as a business risk. Is that right?”He didn’t immediately know what I meant.Simply put, it means that treating cyber as a business risk will be more effective than relying mostly or completely on technological fixes. Treating it as a business risk will let them bring more of their existing resources into the fight: Their people, processes, technology, and management. These four resources are like the engine in a powerful car helping them get up the steep “cyber risk hill”.He agreed, so we created a Cyber Risk Management Action Plan (CR-MAP) that prioritized their limited resources so they could reasonably manage their unlimited cyber risks. Here's how we did it:We first determined their top cyber risks. Then we created their prioritized mitigation plan and implementation road map.For one of the mitigations, we worked with their Human Resources department to add role-appropriate cybersecurity behaviors to everyone’s job descriptions. For another mitigation, we re-wrote their money transfer SOP so large funds transfers that are requested by email or text message need to get verification from another authorized signer prior to processing it.Once we had the mitigations prioritized, we created an implementation roadmap along with several plans and templates from our deployment kit. Then we handed over everything in an Excel workbook with built-in project management tools.Contact me to learn more...
  • Akylade
    Chief Operating Officer
    Akylade Feb 2023 - Present
    Orlando, Fl, Us
    Description: My role is to make sure that Akylade's certifications are affordable, relevant, and practically focused on a candidate's ability to be successful in the cybersecurity or information technology industries.
  • Udemy
    Course Instructor
    Udemy Feb 2022 - Present
    San Francisco, Ca, Us
    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:🧿 What are the components of the framework?🧿 Why is the framework is valuable?🧿 What type of organizations can use the framework?Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.Upon completion of this course, you will earn 4 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.
  • Cyber Risk Management Podcast
    Podcast Host
    Cyber Risk Management Podcast Jun 2018 - Present
    🧿About the Cyber Risk Management PodcastThe Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You’ll learn how to efficiently and effectively reduce your cybersecurity risks and how to continuously improve your cybersecurity management processes.You’ll also learn of the legal aspects of cybersecurity, from the reasonableness standard to the European Union’s General Data Protection Regulation. You will understand that having documentation without provable implementation is a massive risk factor for which upper management will be held responsible.🧿Meet Your Co-Hosts!🔸Kip Boyle is a husband, dad, entrepreneur, and experienced cyber risk manager. He founded Cyber Risk Opportunities LLC in 2015 after 7 years as the CISO of PEMCO Insurance in Seattle. As a captain on active duty in the US Air Force, he served in the Combat Archer and F-22 Stealth Fighter programs, where he was the director of enterprise network security. These days, he serves as virtual chief information security officer for many customers, including a professional sports team and fast-growing FinTech and AdTech companies. Over the years, Kip has built teams by interviewing hundreds of cybersecurity professionals. And now, he’s sharing his insider’s perspective with you!🔸Jake Bernstein, an attorney and Certified Information Systems Security Professional (CISSP) who practices extensively in cybersecurity and privacy as both a counselor and litigator.
  • Fire Doesn’T Innovate: The Executive'S Practical Guide To Evolving Cyber Risk
    Author
    Fire Doesn’T Innovate: The Executive'S Practical Guide To Evolving Cyber Risk Jan 2019 - Present
    Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company’s future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.Kirkus Book Review (see original document in attached articles below):FIRE DOESN'T INNOVATETHE EXECUTIVE'S PRACTICAL GUIDE TO THRIVING IN THE FACE OF EVOLVING CYBER RISKSBY KIP BOYLE ‧ RELEASE DATE: JAN. 10, 2019A cybersecurity expert breaks down what every manager needs to know about the ever-evolving threat of hackers in this debut manual.Fire brings necessary warmth and light, but it can also be a destructive force, one whose power humanity has often had to find ways to protect against. Technology and the internet have become equally ubiquitous, but unlike fire, the perils they pose are always changing, requiring a special vigilance to combat. For executives, vigilance doesn’t mean absolute expertise, and Boyle, in his manual, shares with readers the “lite” version of the easily understandable lessons he has crafted to help businesses both large and small become shrewd cyber-risk managers. Mitigating these dangers underscores cyber-readiness as not just a matter of tech, but also worker education. Numerous templates are offered for addressing employees on the subject of cybersecurity, not just informing them, but also discovering what they already know and can contribute. The adaptive NIST Cybersecurity Framework, developed by the Department of Commerce, is explained as well as strategies for identifying problem areas, preventing hacking, and addressing the crime after it happens, internally and through press releases. The book is divided into two parts. click the attachment below to read more...
  • Linkedin
    Course Instructor, Linkedin Learning
    Linkedin Aug 2016 - Present
    Sunnyvale, Ca, Us
    Check out my online video courses below (free trial available):🧿 IT and Cybersecurity Risk Management Essential Training🧿 Cybersecurity for Executives🧿 Implementing an Information Security Program🧿 Reasonable Cybersecurity for Business Leaders🧿 Outsourcing Cybersecurity🧿 Implementing a Vulnerable Management ProgramHere's my LinkedIn Learning Bio:🔸Kip Boyle is an information security expert and the founder and CEO of Cyber Risk Opportunities.🔸He is a former chief information security officer for both technology and financial services companies and was a cybersecurity consultant at Stanford Research Institute (SRI). Kip managed global IT risk for a $9 billion logistics company and was the wide-area network security director for the F-22 Raptor program. 🔸He has participated in several cybersecurity war game exercises and has worked closely with various government agencies, including the FBI. 🔸Kip is a former US Air Force officer and serves on the board of directors of the Domestic Abuse Women's Network (DAWN). 🔸He's been quoted in Entrepreneur and Chief Executive. He is the co-author of Chapter 68, "Outsourcing Security Functions," in Computer Security Handbook. 🔸He earned his BS in computer information systems from the University of Tampa, an MS in management from Troy State University, and a certificate in executive leadership from Seattle University.
  • Secureworld
    Advisory Council Member
    Secureworld Apr 2004 - Present
    Portland, Oregon, Us
    Identify hot topics and speakers for the SecureWorld educational sessions at their annual conference.
  • Your Cyber Path Podcast
    Podcast Host
    Your Cyber Path Podcast Mar 2019 - Feb 2024
    If you’re trying to make the shift to a career within the cybersecurity industry, you need a plan — and a clear path to follow.But, it is easy to get lost because there are many paths out there.When you have more than one path you are trying to follow, you can take costly missteps in the process. Worst of all, many of the paths out there are shared by those who really don’t know what is required to get a position within the cybersecurity industry.Why don’t their plans and paths work?Because they are NOT hiring managers. They don’t know what a hiring manager is looking for and they have never personally sat on that side of the table.…and that is what makes Your Cyber Path different!When you begin to take advice from experienced cybersecurity hiring managers, you will be on the right path to your dream job.🧿You’ll know what hiring managers expect.🧿You’ll know how to avoid common pitfalls.🧿You’ll learn the tips and tricks to make yourself irresistible to those who are actually doing the hiring. 🧿Oh, and you’ll also know how the hiring system works inside and out, so you can get hired in less time… and with less effort. You need a path. So, how do you find yours?It all starts with learning to think differently than other cybersecurity candidates, starting with the end in mind, and then taking action to advance along your path. Read more on our About page for insights into achieving your dream cybersecurity position! And don't forget to subscribe to the podcast!
  • Domestic Abuse Women'S Network (Dawn)
    Member Of The Board Of Directors
    Domestic Abuse Women'S Network (Dawn) Jun 2014 - Mar 2020
    Kent, Wa, Us
    DAWN saves lives. As the only provider of comprehensive domestic abuse service in South King County, we offer an immediate refuge from violence, expert guidance so survivors can set goals and solve problems to find a permanent escape from danger, and hope for families to build a new future.As chair of the Strategy Committee, I lead strategic planning and put a focus on operational excellence for DAWN, a $2 million agency serving all of south King county.
  • Expeditors International
    Manager, It Operations Management
    Expeditors International Aug 2010 - Jun 2015
    Bellevue, Washington, Us
    Manager in IT Operations Department of a $8 billion provider of global logistics services (with 225 offices and 13,000 employees) where I manage a team of 30+ employees and contractors performing these functions: Technical architecture review program; IT risk management program; change management program; problem management program; and unified communications program. Previously, I led enterprise monitoring and PC support for 1,100 people.
  • Pemco
    Chief Information Security Officer
    Pemco Oct 2005 - Jul 2010
    Seattle, Wa, Us
    In this position as a director reporting to the chief information officer, I created cyber security strategy and implementation plans by establishing policies, standards, confidentiality and availability of sensitive customer and corporate information and the underlying systems. I was accountable for providing an enterprise-wide focal point for information security best practices, delivering ways to prevent data breaches that enabled all lines of business, and consulted senior and executive-level management in cyber security business ideas and plans. My staff of ten employees and contractors also provided operational and engineering support for security components within all mainframe and distributed computing environments.
  • Pemco
    Chief Security Officer
    Pemco Oct 2003 - Oct 2005
    Seattle, Wa, Us
    As a director reporting to the chief operating officer, I established a cyber resilience road map for our customer-facing products and services. I was also accountable for oversight of internal company security strategies, policies, directions, and processes. Defining and maintaining an appropriate balance between security, availability, quality of service, and ongoing cost was my ongoing concern in all areas of company operations.Working across all departments through my staff of three employees and contractors, I provided first and second-level engineering with support for security components within the overall delivery infrastructure of the corporation by creating a cyber security strategy template so that the integrity, confidentiality and availability of data to customers was not compromised; and also ensured that the corporation and its services complied with all applicable laws and regulations.
  • Norwich University
    Adjunct Professor
    Norwich University Jul 2004 - Sep 2004
    Northfield, Vt, Us
    Taught seminar 3, Technical Defenses in the Masters of Science in Information Assurance program to twelve graduate students using WebCT to deliver exchange course content, quizzes, and grades. Graduates are expected to support strategic business objectives of their enterprises and to guide technical staff in implementing corporate security policies. By the end of this seminar, students were expected to demonstrate the ability to communicate effectively with managers using appropriate business terminology and with technical staff using appropriate technical terminology.
  • Jefferson Wells International
    Engagement Manager
    Jefferson Wells International Oct 2002 - Sep 2003
    Milwaukee, Wi, Us
    Provided technical and project leadership for the benefit of clients nationwide. Projects included the design and deployment of a methodology to assess the security of the North and South American external network connections of a global contract logistics firm. Also performed hands-on network vulnerability assessments and a Gramm-Leach-Bliley Act (GLBA) compliance audit for a community bank. Periodically taught the SANS Security Essentials Bootcamp which prepares students to test for GIAC (Global Information Assurance Certification) and the CISSP examination.
  • Cable & Wireless America
    Product Manager
    Cable & Wireless America May 2002 - Oct 2002
    Primary responsibilities include determining product line strategy; working with product development to define the features and functionality of the individual products; working with customers to collect feature requests and other product feedback; collaborate with sales, marketing, and finance to improve the profitability of the product line. During this time, I launched a commercial SSL Server Certificate issuer service which made extensive use of existing assets and resulted in revenue generation with minimal of capital expenditure.
  • Digital Island
    Senior Security Engineer
    Digital Island Feb 2001 - May 2002
    I reported directly to the Chief Security Officer. My primary responsibilities included creating a cyber security strategy template and action plan, for both corporate security posture as well as the creation of new products and services that meet the security needs of Digital Island’s enterprise customers. To meet my responsibilities, I routinely worked with our customer service managers, product development group, and members of the engineering and operations groups. In addition, I provided on-going development and implementation of various security management tools and processes (such as ISO 17799) to maintain our SAS 70 compliance. Finally, I authored the corporate Information Security Policy and designed a cyber risk management framework which was implemented by the Operations group.
  • Sri Consulting
    Senior Consultant
    Sri Consulting Sep 1997 - Feb 2001
    My main duty was to provide technical and project leadership for the benefit of our Fortune 500 and other international clients. During this period, I managed over $5 million of information security projects for several large financial institutions and a major credit card issuer, one of which was a multi-year, $3.6 million effort. My projects included: Security strategy consulting; hands-on vulnerability assessments of both networks and technical products and services; design of cyber security strategies and implementation plans for encryption infrastructures; and management of a distributed, encryption-intensive software development and systems integration project. Often my project work would culminate with presentations to senior management and audit committees.
  • Vitessa
    Information Security Manager
    Vitessa 2000 - 2000
    Reporting to the chief information officer, I established policy, standards, and strategies for safeguarding the integrity, confidentiality and availability of sensitive customer and corporate information and the underlying systems. I was accountable for providing an company-wide focal point for information on data breach response best practices, delivering way to prevent data breaches, and provided consultative cyber security business ideas and planning to other members of the management team.
  • F-22 System Program Office, Usaf
    Director, Wide Area Network Security
    F-22 System Program Office, Usaf Jul 1995 - Aug 1997
    I was the leader of a 20+ member team that safeguarded the development environment of the on-board flight control and weapons systems software for the USAF Advanced Tactical Fighter (F-22). My team was responsible for both WAN and site security at various levels of classification through Top Secret/Special Access Required. I also led a five person response team and worked with external agencies to investigate several computer and network security incidents. As an additional duty, I analyzed plans and critiqued existing network infrastructures at USAF bases around the world in support of the deployment of F-22.
  • Kpmg
    Consultant
    Kpmg 1990 - 1991
    Toronto, On, Ca

Kip Boyle Skills

Security Information Security Information Technology Management Computer Security Cissp Network Security Leadership Integration Information Security Management Security Audits Enterprise Architecture Enterprise Software Vulnerability Assessment Risk Management Project Management Disaster Recovery Strategy Business Continuity Cross Functional Team Leadership Change Management Risk Assessment Pci Dss Security Awareness Governance Information Assurance Infrastructure It Management Vulnerability Management It Audit It Strategy Itil It Operations Iso 27001 Business Process Security Management Security Architecture Design Penetration Testing Firewalls Web Application Security Identity Management Threat And Vulnerability Management Cybersecurity

Kip Boyle Education Details

  • Seattle University
    Seattle University
    Executive Leadership Program (Elp)
  • Technology Executive Leadership Academy
    Technology Executive Leadership Academy
    It Executive Leadership
  • Troy University
    Troy University
    Management
  • University Of Tampa
    University Of Tampa
    Computer Information Systems
  • Green River College
    Green River College
    Liberal Arts

Frequently Asked Questions about Kip Boyle

What company does Kip Boyle work for?

Kip Boyle works for Cyber Risk Opportunities Llc

What is Kip Boyle's role at the current company?

Kip Boyle's current role is Cyber Resilience Thought Leader | CEO, Cyber Risk Opportunities | Cybersecurity LinkedIn Learning Course Instructor | Co-host Cyber Risk Management Podcast | Amazon Best Selling Author | International Keynote Speaker.

What is Kip Boyle's email address?

Kip Boyle's email address is ki****@****ail.com

What is Kip Boyle's direct phone number?

Kip Boyle's direct phone number is +125323*****

What schools did Kip Boyle attend?

Kip Boyle attended Seattle University, Technology Executive Leadership Academy, Troy University, University Of Tampa, Green River College.

What are some of Kip Boyle's interests?

Kip Boyle has interest in Economic Empowerment, Civil Rights And Social Action, Urban Hiking, Cycling, Photography.

What skills is Kip Boyle known for?

Kip Boyle has skills like Security, Information Security, Information Technology, Management, Computer Security, Cissp, Network Security, Leadership, Integration, Information Security Management, Security Audits, Enterprise Architecture.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.