Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt Email and Phone Number
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt work email
- Valid
- Valid
- Valid
- Valid
- Valid
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt personal email
- Valid
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt phone numbers
With over 30 years of experience in Information Security, We have worked in various industries, such as Federal Government, Healthcare, Automotive, Retail, and Manufacturing, building and managing security programs in a global environment. We Hold the PMP, CISSP, CCSK+ credentials, as well as the CHSP certification, demonstrating Our expertise and commitment to the field.In 2020, I founded Shadow Rabbit Cyber, a Service-Disabled Veteran-Owned Small Business, with a mission to help SMBs meet IT Security requirements in a cost-effective way. We provide IT Security consulting, services, project management, as well as security assessments and remediation, and security managed services packages. We also offer anti-malware, email security, network, vulnerability, compliance, and security training solutions. As the CEO, I lead a team of dedicated and skilled professionals, who share my passion for security and customer satisfaction.
Shadow Rabbit Cyber
View-
CeoShadow Rabbit Cyber Mar 2020 - PresentPlain City, Oh, UsShadow Rabbit Cyber is focused on helping SMB companies meet IT Security requirements in a cost-effective way. We provide IT Security services, assessments and support. -Consulting and Project ManagementIdentification and deployment of new technologies to Train, Protect, Detect, Remediate, and monitor your environment. Development of Policies, Procedures, and Plans to meet compliance.-Security Assessments and Remediation-Security Managed Services ProviderSmall Medium Business (SMB) PackagesNetwork, Endpoint, Mobile & Email Security bundle-Anti-malware ServicesProactive monitoring of your critical systems to identify problems and give your staff the support they need while you focus on other activities.-Vulnerability Scanning ServicesVulnerability scanning is an inspection of the potential points of exploitation on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks, and communications equipment and predicts the effectiveness of countermeasures.-Phishing & Security Training ServicesUser security awareness training helps every employee recognize, avoid, and report potential threats that can compromise critical data and systems. Including Awareness, Privacy, Phishing, PCI, GDPR, HIPPA, FERPA, CCPA.-Phishing Campaign ServicesWhile spam filters and other technology solutions can help prevent them from reaching inboxes, educating users about the dangers of phishing campaign emails is a critical component of cyber security for any organization. As part of the training, mock phishing and other attack simulations are typically used to test and reinforce good behavior. -
Director Of Training / Csa InstructorOhio River Valley Chapter Of The Cloud Security Alliance Nov 2024 - Presentorv-csa.org. The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem -
Vice President (Vp) / Csa InstructorOhio River Valley Chapter Of The Cloud Security Alliance Nov 2019 - Nov 2024orv-csa.org. The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem -
Chief Information Security Officer (Ciso)Reyncon Educational Services & Training (Rest) Mar 2019 - PresentColumbus , Oh, UsResponsible for providing strategic and operational leadership for the company’s security management of data, technology, processes, and risks, coordinating alignment across the enterprise. Establishes and sustains a cyber risk strategy fit with business objectives, implementing frameworks that integrate governance and risk compliance controls, requirements, oversight, and validation into Information Technology operations and underscores vigilance across multiple Customers. Identifies training opportunities to align ReynCon with the future needs of the Cyber Security market. Oversee the development of security programs to align companies with industry leading frameworks and build road-maps to help them achieve compliance. Develops and supports methods, tools, and metrics for managing cyber risk, ensuring effective and evolving technological defenses, monitors reporting and operational processes including incident management. Directs resources, internal staff and external/outsourced Partners, that support the components of the strategic cyber security framework, ensuring sustained capability, development, and performance. -
Director, It Security & Compliance (Ciso)Dsw May 2018 - Feb 2019Columbus, Ohio, UsLeads the Compliance, Risk, IAM and Security teams responsible for DSW Inc companies. Responsible to develop and drive an integrated IT & Security strategy, combining industry leading physical and digital security practices, and associate knowledge capabilities, with cyber security elements such as data security practices, monitoring, response activities and predicative modeling across the DSW Inc companies. Responsible for identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise. Proactively works with business units to implement practices that meet defined policies and standards for information security. Experience with IT-related laws and compliance mandates (e.g. Sarbanes Oxley 404, PCI DSS, HIPAA, and Personal Information Privacy). -
Sr. Manager, Global Information Security (Ciso)Cooper Tire & Rubber Company Jan 2016 - Apr 2018Manages global cyber security functions, responsible for establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected. Responsible for identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise. Provides visionary leadership with sound knowledge of business management and a working knowledge of information security technologies. Proactively works with business units to implement practices that meet defined policies and standards for information security. Process owner of all assurance activities related to the availability, integrity and confidentiality of customer, business partner, employee and business information in compliance with the organization's information security policies. Experience with IT-related laws and compliance mandates (e.g. Sarbanes Oxley 404, GDPR, PCI DSS, HIPAA, and PII).
-
Manager, Information Security OperationsThe Scotts Miracle-Gro Company Nov 2012 - Dec 2015Marysville, Ohio, UsLeverages information security frameworks, practices and principles to drive performance. Manages network security, web security, anti-virus/anti-malware, data loss prevention, identity & access management, application security, threat and vulnerability management, security event monitoring, and incident management. Responsible for both design and implementation of enterprise network infrastructure including perimeter security and remote access services. Proficient in risk assessment and analysis for an enterprise network. Develops use cases, evaluating alternative solutions, cost justification, recommended solutions, and comprehensive deployment plans. Proficient in change, problem and incident management principles and procedures. Working knowledge of IT-related laws and compliance mandates. Solid analytical, problem solving and conceptual skills to identify and deliver high performing solutions. Strong verbal and written communication skills, with an ability to express complex technical concepts in understandable business terms. Proficient in project management principles, and ability to delivery of high quality solutions on time and within budget with proper resources. Solid interpersonal skills with the ability to work on cross-functional project teams and to foster team commitment to tasks as well as collaborate with Business partners. Experience with IT-related laws and compliance mandates (e.g. Sarbanes Oxley 404, PCI DSS, and PII). -
It DirectorU.S. Department Of Transportation Oct 2007 - Nov 2012Washington, Dc, UsPlans, develops, implements, and maintains IT programs, polices, and procedures to support the Data Center and Enterprise Infrastructure. Manages IT project activities and resources to achieve project objectives and milestones; develops innovative solutions to resolve problems in existing systems. Develops and manages IT Strategic planning, operational analyses, budgets, and procurement to ensure health of the investment. Experience with IT-related laws and compliance mandates (e.g. FISMA, NIST, and PII). -
Chief Information Security OfficerVeteran Administration May 2006 - Oct 2007Washington, Dc, UsLead medical center information security program. Established programs, polices, and procedures to protect the availability, integrity and confidentiality of government systems. Planed and conducted security accreditation reviews for installed systems or networks, and recommends new or revised security measures and countermeasures based on results of accreditation reviews. Investigated and reported on all security, privacy and HIPAA incidents; ensuring proper computer forensics procedures are followed. Experience with IT-related laws and compliance mandates (e.g. FISMA, NIST, HIPAA, PHI and PII). -
Information Assurance Network Officer (Iano)Us Army Oct 2005 - May 2006Arlington, Virginia, UsImplemented and monitored network security initiatives and requirements (including policies, procedures and systems security equipment); Information Assurance vulnerability management program analysis and reporting issue resolution. Evaluated policies, procedures and plans from command and higher headquarters; provided guidance regarding policies and procedures; provides technical, analytic and advisory functions pertinent to the development and review of local IT policies and programs. Responsible for FISMA, NIST and Privacy Compliance. -
It Specialist (Customer Support)Veteran Administration Oct 2003 - Oct 2005Washington, Dc, UsCustomer Support: Provided maintenance, installation, training, purchase proposals, and system recommendations for hardware and software to local customers. Provided Configuration Management and developed server, desktop and laptop Windows software images for standard and custom hospital operations. Deployed PC images using software and delivery systems: Ghost and Remote Installation Server. Alternate Information Security OfficerMonitored Department of Veterans Affairs vulnerability Alerts, ensured timely reporting and compliance with notifications. Provided advice and guidance on a wide range of technical security issues; interpreted policies, standards, and guidelines and applied them to the operational environment; provided analyses and recommended resolutions for issues affecting information security based on NIST 800 criteria. -
It ManagerUnited States Air Force Feb 2002 - Jun 2003Randolph Afb, Tx, UsIT ManagerLead, designed, developed, and implemented short and long range organizational IT plans, policies, procedures, and systems. Projected system requirements and conducted post-implementation studies; provided briefings and reports to department managers used in the decision process for new acquisitions. Program manager for all IT systems including classified LAN (SIPRNET) and Defense Message System (DMS) installations. Computer Security Officer (CSO) Planned, developed, implemented, and maintained programs, polices, and procedures to protect Information systems from compromise and exploitation. Created and updated organization's contingency and disaster recovery plans to respond to new security requirements and changes in the IT architecture. -
Director, Quality Assurance And Logistics SupportUnited States Air Force Nov 1999 - Jan 2002Randolph Afb, Tx, UsDirected quality assurance program, created policies and procedures for personnel and equipment inspections. Lead inspection team, provided trends analysis, self-sufficiency, and budget reports. -
Avionics Maintenance ManagerUnited States Air Force Sep 1998 - Oct 1999Randolph Afb, Tx, UsDirected maintenance team; responsible for component level repair of $750 million reconnaissance aircraft. -
Airborne Systems Engineer (Ase)United States Air Force Jul 1986 - Sep 1998Randolph Afb, Tx, UsASE Evaluator: Authored and administered written and performance tests for airborne engineers on reconnaissance aircraft.ASE Instructor: Authored and presented class room training courses, developed workbooks and PowerPoint presentations, and evaluated performance. -
Electronic Warfare TechnicianUnited States Air Force Jun 1981 - Jun 1986Randolph Afb, Tx, Us
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt Skills
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt Education Details
-
Jones International UniversityCyber Security -
University Of Maryland Global CampusManagement Information Systems
Frequently Asked Questions about Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt
What company does Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt work for?
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt works for Shadow Rabbit Cyber
What is Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt's role at the current company?
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt's current role is CEO at Shadow Rabbit Cyber☑️VCISO/CISO☑️CSA Instructor☑️Board Member/Advisor☑️SMB-focused IT Security Consulting, Services & Project Management☑️Managed Service Provider: SMB Security Tools & Training.
What is Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt's email address?
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt's email address is la****@****ire.com
What is Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt's direct phone number?
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt's direct phone number is +141942*****
What schools did Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt attend?
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt attended Jones International University, University Of Maryland Global Campus.
What are some of Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt's interests?
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt has interest in Children.
What skills is Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt known for?
Louis Lyons, Mba, Cissp, Pmp, Ccsk-Ttt has skills like Project Management, Change Management, It Management, Sharepoint, Project Planning, It Strategy, Sd, Disaster Recovery, Information Security Management, Network Security, Security, Information Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial