Mark Schertler Email and Phone Number
Mark Schertler work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
Mark Schertler personal email
Mark Schertler phone numbers
Mark Schertler has demonstrated effectiveness catalyzing and driving complex projects, developing strong internal coordination and external customer relations. He is a versatile security product and services strategist that has helped early stage organizations spin up. Mark has over 30 years experience across the Information Security spectrum, including engineering, product management, professional services and sales at both individual contributor and leadership levels.Skills and experience include:- Driving complex projects from concept to production- Building and leading teams in product development, IT, and professional services- Architecture and design of complex products and systems that meet real world requirements- Technology evangelism in written and speaking forums- Start-up veteran who can contribute to product development and the bottom lineSpecialties: Security ExpertContinuous Integration and Agile DevelopmentEdited several Internet Engineering Task Force (IETF) Internet-drafts and RFCs including:- RFC 5408 Identity-Based Encryption Architecture and Supporting Data Structures- RFC 5409 Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax (CMS)- RFC 2408 Internet Security Association and Key Management Protocol (ISAKMP)
-
Chief Information Security OfficerIntapp Mar 2023 - PresentPalo Alto, Ca, UsCISO of Intapp, Inc., an enterprise software company serving the worldwide Professional Services industry, including legal, accounting, consulting and financial services firms. -
Independent Security And Development ConsultantIndependent Consulting Jan 2007 - PresentSecurity, software, product and services strategy.SEEKING ADDITIONAL PROJECTSRecently completed projects:- Editor RFC 5408 Identity-Based Encryption Architecture and Supporting Data Structures and RFC 5409 Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax (CMS)- Program Committee for the Department of Homeland Security (DHS) conference of its Cyber Security program - Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH) 2009- Wrote Information Security Policy for a company providing online identity theft and account fraud prevention products and services- Article published: "Identity Based Encryption Case Study: Security-Enhanced Blackberry Trial" in the Government Purchasing Guide (GPG), May/June 2007 Edition- Defined offshore development and release process for consumer based Web 2.0 company- Wrote cryptographic key management whitepaper for data security company
-
Chief Information Security OfficerTibco Software Inc. Nov 2017 - Jan 2023Responsibilities included product, cloud services and corporate infrastructure security and privacy.Accomplishments include:- Leading security team and coordinating requirements across all TIBCO security efforts.- Recruiting, budgeting and prioritization for security team efforts.- Defining security and privacy requirements and architecture for TIBCO Cloud services operations.- Defining and driving adoption of secure product development processes, procedures and tooling.- Drive requirements, priorities and implementation of TIBCO Cloud and infrastructure IAM architecture.- Lead security@TIBCO sales enablement to provide the sales team with tools needed to demonstrateTIBCO’s security commitment to customers and prospects.
-
Senior Director, Security ArchitectureSalesforce Apr 2014 - Oct 2017San Francisco, California, UsProviding definition, design and direction where security strategy meets tactical implementation.Responsibilities included developing product and infrastructure security requirements covering operations and architecture. Accomplishments include:- Define requirements, architecture and implementation design for Salesforce’s production certificatemanagement program including automating certificate issuance and consolidating 3rd party CA providers thereby saving ~$8M in service expenses.- Security expert on a cross-functional team to architect and build out production key management service for encryption-at-rest offering.- Drive requirements and priorities for internal infrastructure security services to support Salesforce production infrastructure covering data centers on 3 continents.- Drive architecture and requirements for a DoD compliant Salesforce offering. -
Chief Security Architect And Engineering LeaderAxway Sep 2008 - Apr 2014Scottsdale, Az, UsAxway acquired Tumbleweed Communications in September 2008.Axway provides solutions to manage and control business-critical information in motion — improving value chain efficiency, regulatory compliance and quality of service. Our offerings reflect the evolution of Axway's industry-leading technology for connecting applications, employees, customers, partners and regulatory bodies.Led Axway cybersecurity team responsible for all security aspects of both cloud services and enterprise class on-premise offerings.Responsibilities include:- Lead development and rollout of Continuous Integration (CI) infrastructure and Agile development tools and practices- Lead integration of Secure Application Development Life Cycle into CI infrastructure- Lead development of common engineering practices, policies and tools- Engineering Budgeting and Planning -
Senior Security ArchitectTumbleweed Jun 2007 - Sep 2008Tumbleweed provides security solutions for email, file transfers, and identity validation focusing on the following industries - Financial Services, Government, Health Care, Retail, Insurance and other segments. Our products include MailGate Email Firewall, MailGate AntiSpam Appliance, MailGate Secure Messenger, MailGate Edge, SecureTransport, SecureTransport Edge and Tumbleweed Validation Authority Suite.
-
Cto / CsoVoltage Security Feb 2003 - Mar 2007Sunnyvale, Ca, UsEnterprise secure email and data protection products startupDeveloped product, services and federal sales strategies to help the company grow.- Define product requirements; work with product management & engineering to execute on requirements. Instrumental in the creation of new client & server products.- Drive US federal government business development and product management activities, including acquiring & driving strategic efforts such as the Joint Warfighter Interoperability Demonstration (JWID) and US-Canadian Secure Blackberry Trial. Won “Outstanding Performer” (Top 10%) and Transformation Change Package Award (Top 5%) awards in JWID04.- Jump started federal sales activities - Generated over $1M+ in revenue.- Managed 100+ customer engagements to ensure positive customer experience and gather feedback for future product development. Streamlined product deployment time and costs.- Create and lead teams in professional services, customer satisfaction, and development. -
Vice President Of Enterprise Security And Networking Services PracticePrimitive Logic 2001 - 2002San Francisco, Ca, UsDiversified boutique IT and application consulting services firmLead team of 10 networking and information security consultants providing Internet and enterprise networking and security consulting services.· Responsible for acquiring customer engagements, including determining customer requirement, developing proposals, project staffing and management, and customer communication and satisfaction.· Directed analysis of network and security architecture and services for an international delivery company· Directed architecture review and cost benefit analysis of WAN architecture for retail business with extensive geographical presence -
Vp Professional ServicesSecurify, Inc. May 1998 - Nov 2001UsProvided consulting services on security issues covering Internet, enterprise and Web security, security policy, incidence response, product assessment, network assessment, penetration testing, systems / applications security architecture and design, and PKI.* Directed four supervisors, 25+ consultants and support staff· Directed development of practice area methodology, training, budgets, & performed hiring· Developed proposals and managed staffing, scheduling, & quality assurance for client projects· Responsible for $4M in revenue fulfillment, report to COO· Met all FY quarterly revenue goals· Increase staff by 50% in tough Silicon Valley job market· Introduced project management and reporting procedures that provided executive management in-sight into current and future revenue trends· Lead the design of a custom cryptographic-based digital content protection and rights management system for large digital media client -
Product ManagerTerisa Systems / Spyrus May 1996 - May 1998Managed all aspect of the SecureWeb Toolkit product definition, development, testing, and release. Consulted with customers integrating the SecureWeb Toolkit into their products, including defining Secure Sockets Layer (SSL), Secure-HTTP, SET protocols, and cryptographic key management requirements.· Supported sales and marketing in all aspects of Toolkit presentation and positioning.· Active in the Internet Engineering Task Force (IETF) Transport Layer Security Area.
-
Computer ScientistNational Security Agency Sep 1984 - May 1996Ft. Meade, Md, Us· Designed Internet Security Association and Key Management Protocol (ISAKMP). Organized and led technical team that wrote the IETF Internet Draft (became RFC 2408) and developed protocol prototype. Coordinated internal and external consensus on requirements.· Facilitated addition of ATM cell types in the International Telecommunications Union (ITU) - Telecommunications Sector B-ISDN Operations and Maintenance (OAM) Principles and Functions Recommendation. The additional cell types are critical for development of ATM encryptors· Technical editor for 3 papers concerning network layer security, security management and upper layer security issues for the NATO Adhoc Working Group on Security· Directed the detailed design of a distributed data switching control system - a 2000+ module system* NETWORK SECURITY RESEARCHER (1992 to 1996)· SOFTWARE DEVELOPER / DEVELOPMENT MANAGER (1984 to 1992)
Mark Schertler Skills
Mark Schertler Education Details
-
The George Washington UniversityComputer Science -
University Of Illinois Urbana-ChampaignComputer Science
Frequently Asked Questions about Mark Schertler
What company does Mark Schertler work for?
Mark Schertler works for Intapp
What is Mark Schertler's role at the current company?
Mark Schertler's current role is Chief Information Security Officer at Intapp, Inc..
What is Mark Schertler's email address?
Mark Schertler's email address is ma****@****eed.com
What is Mark Schertler's direct phone number?
Mark Schertler's direct phone number is +165080*****
What schools did Mark Schertler attend?
Mark Schertler attended The George Washington University, University Of Illinois Urbana-Champaign.
What skills is Mark Schertler known for?
Mark Schertler has skills like Encryption, Software Development, Enterprise Software, Security, Agile Methodologies, Cloud Computing, Internet Security, Integration, Saas, Network Security, Computer Security, Pki.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial