William Mcborrough Email and Phone Number
William Mcborrough work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
William Mcborrough personal email
- Valid
William Mcborrough phone numbers
I am a 20+ year cybersecurity industry veteran and small business cyber risk advisor. I am co-founder and CEO at MCGlobalTech (https://www.mcgcyber.com), a cybersecurity consulting firm helping small business government and corporate suppliers meet cybersecurity compliance requirements, including CMMC and NIST 800-171. I am also co-founder and Chief Security Officer at Posture (https://www.postured.io), an innovative cybersecurity risk management company using artificial intelligence and cloud-based solutions to help small businesses simplify and manage cybersecurity programs. In addition, I am also a founder at Next Gen Cyber, a managed security service providing 24/7 comprehensive cybersecurity protection against the most common vectors of cyber attacks against small businesses.I have served on the faculty of various universities for the last 15 years, including the University of Maryland Global College, Southern New Hampshire University, EC-Council University, George Mason University, and Northern Virginia Community College, where I have conducted research and taught graduate and undergraduate courses relating to cybersecurity, cybercrime, cyberterrorism, and information security and assurance.I am a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk Information System Control (CRISC), and Certified CMMC Professional (CCP)
Next Gen Cyber
View- Website:
- nextgencyber.io
- Employees:
- 2
-
Founder And Factional CisoNext Gen CyberWashington, Dc, Us -
Co-Founder And Chief Security AdvisorMcglobaltech 2013 - PresentWashington, District Of Columbia, UsMCGlobalTech is a cyber risk management firm that helps business leaders protect their brands, data, and systems from cyber threats. We build and manage cyber risks and compliance programs to meet regulatory and industry standards like NIST, HIPAA, PCI DSS, ISO, and more. As a CMMC RPO, MCGlobalTech helps small business government contractors develop the policies, processes, and infrastructure to meet CMMC and NIST 800-171/A requirements. Our Managed Compliance and Security Services were designed for small businesses without dedicated security and compliance experts. Partner with us and experience the benefits of having a Trusted Security Advisor as you make business decisions about your security. -
Co-Founder And Chief Security OfficerPosture 2019 - PresentLos Angeles, UsPosture provides small and mid-size enterprises with a low-cost solution to improve their organizations’ cybersecurity hygiene and prepare them for the competitive advantages of compliance. -
Founder/Factional CisoNext Gen Cyber Feb 2023 - PresentNext Gen Cyber is a managed security service providing 24/7 comprehensive cybersecurity protection against the most common vectors of cyber attacks against small businesses. -
Associate Professor, Cybersecurity And Information AssuranceUniversity Of Maryland Global Campus 2011 - PresentAdelphi, Maryland, UsTeach multiple courses in the cybersecurity undergraduate and graduate degree programs including cybercrime and cyberterrorism, systems and telecommunications security architecture, information security assessment and planning, information security policy and programs, and ethical hacking. -
MemberInfragard Nations Capital Members Alliance 2010 - PresentAlexandria, Virginia, UsOur 1000+ membership is voluntary yet exclusive and is comprised of individuals from both the public and private sector. The main goal of the Washington, DC Nations Capital Chapter of InfraGard is to promote ongoing dialogue, education, community outreach and timely communication between public and private members. Furthermore, to achieve and sustain risk-based target levels of capability to prevent, protect against, respond to, and recover from all hazards or events, and to minimize their impact on lives, property, and the economy.InfraGard members gain access to vital information and education that enables them to in turn provide assistance to prevent and address terrorism and other transnational crimes. InfraGard members are provided threat advisories, alerts and warnings and access to a robust secure web-VPN site and e-mail. InfraGard also helps promote an effective liaison with local, state and federal agencies, to include the Department of Homeland Security.The FBI retained InfraGard as an FBI sponsored program, and will work closely with DHS in support of the CIP mission. The FBI will further facilitate InfraGard's continuing role in CIP activities and further develop InfraGard's ability to support the FBI's investigative mission, especially as it pertains to counterterrorism and cyber crimes. The FBI and Department of Homeland Security Office of Infrastructure Protection are currently executing an InfraGard Partnership Program Plan under a Memorandum of Understanding signed in December 2007. -
AdvisorSkydesks International Jun 2018 - Jul 2020Sky Desks is a new computing paradigm in the cloud, using Linux. Most of the Crypto currency community is powered by Linux (including miners). Sky Desks enables Windows and Linux Applications to be run in a web browser. To learn more, watch the promo video. The Sky Desks system is currently operational as a prototype. Sky Desks is seeking $5 Million in a token offering to build out the system to other use cases and deployment. -
Board Member (Acting Chairman) - Tyke FoundationTyke Center 2016 - 2018Leesburg, Va, UsTYKE FOUNDATION IS A NON-PROFIT ORGANIZATION THAT WAS ESTABLISHED TO STOKE THE PASSION OF SCIENCE TECHNOLOGY ENGINEERING AND MATH (STEM) DISCIPLINES IN OUR YOUTH AT THE VERY BEGINNING OF LEARNING. -
Chairman, Board Of DirectorsAssociation Of Liberia Engineers - Usa, Inc (Aleusa) 2013 - Sep 2016The Association of Liberian Engineers – USA, Inc. (ALEUSA) is a US-based non-profit 501(c)(3) organization that seeks to bring together Liberian technical professionals residing outside of Liberia to help with the redevelopment of Liberia after more than fourteen years of civil war. ALESUA is committed to collaborating with other like-minded institutions and harnessing in ingenuity of every Liberian in promoting Science, Technology Engineering and Mathematics throughout the Republic of Liberia.
-
Board Member, Board Of TrusteesInternet Society - Liberia 2013 - 2016The Internet Society is a global cause-driven organization governed by a diverse Board of Trustees that is dedicated to ensuring that the Internet stays open, transparent and defined by you.
-
Board Member, Board Of DirectorsByte Back, Inc. 2013 - 2014Washington, Dc, UsByte Back, Inc. is a 501(c)(3) charitable organization (FEIN 52-2061398) that provides computer literacy and employment readiness skills to underserved communities throughout Washington D.C. Our mission is to improve economic opportunities by providing computer and technology courses to low-income residents in D.C.. What we do is bridge the digital divide. There are many people in the D.C. community who lack access to digital communications, and who have yet to learn how to use a computer. In addition to providing free and low-cost computer courses for neighborhoods in D.C., we also teach advanced certification courses, enabling our students to enter the workforce with competitive and useful skills. We teach computer literacy classes at over a dozen locations throughout the city, at D.C. Public Libraries, at human service agencies, and at our own central office at Washington, D.C. With our full-time and volunteer staff, we served over 1,000 students in 2010, empowering them to master today’s technological skills and advance their careers. -
Board Member, Editorial Advisory BoardIgi Global Dec 2012 - 2014Hershey, Pennsylvania, UsProvide pre-publication editorial review for technical manuscripts and texts related to information systems and security. -
Board Member, Technical Advisory BoardIsc8 2011 - 2014Plano, Tx, UsA visionary in a world of look-alike security companies, ISC8 has evolved from Irvine Sensors Corporation, a company founded in 1974. Our singular focus now is to deliver the most comprehensive security solutions available - solutions that to give you visibility into everything that's happening on your mission-critical networks, and then mitigates your risk as new threats to your security emerge.Having performed customer-funded research and developed technology used primarily by the U.S. government for key national security initiatives, ISC8 is now leveraging its more than 30-years of experience to bring a new breed of security products to market. These products are intended to solve the toughest challenges government, defense, and business face - including the human factor, a problem that until now has gone virtually unaddressed. -
Cyber Security Practice Leader/Solutions ArchitectPragmatics, Inc. Nov 2011 - Sep 2013Reston, Va, UsProvide cyber security subject matter expertise, technical solutions, business development, leadership and management within the Cyber Security division and programs. Cyber solutions architect developing security technology solutions and service methodologies to manage client security risk, improve information assurance and ensure regulatory compliance. Develop and manage core capabilities including security architecture, enterprise risk management, security and risk assessments, independent verification and validation, FISMA support and program management, software assurance, incident response, continuous monitoring and assessments and authorization (C&A). As Practice Leader, assist in defining and updating strategy and operating plans including identification of growth opportunities and acquisition candidates. Assist with Cyber Security operations (e.g., market and business opportunity development, administration of contracts, project execution, product design, engineering development, and process/methods improvement / TPP and Continuous improvement Initiatives / Customer Funded projects / Planning, executing, monitoring, corrective action). Manage people resources (manpower forecasting, recruiting, staff augmentation, consultant acquisition, project management assignments, development programs, and workforce transitions). Provide assistance to ensure effective work processes, procedures, practices, roles and performance objectives are established and meet or exceed customer and company performance expectations -
Principal AdvisorSecure Intervention 2010 - Feb 2013Secure Intervention provides Expert Executive level Information Assurance and Cyber Security Advisory Services to help client executives and managers manage risks to their sensitive information and mission-critical systems throughout its entire life cycle.
-
President & Information Security SmeSecure Intervention 2010 - Oct 2011Secure Intervention provides Expert Executive level Information Assurance and Cyber Security Advisory Services to help client executives and managers manage risks to their sensitive information and mission-critical systems throughout its entire life cycle. Our goal is to help you develop, implement and maintain sensible and cost-effective strategies to protect your information assets by investigating threats, eliminating vulnerabilities, and managing risks unique to your organization.
-
Security Architecture Sme (Project Manager/Contract Lead)Department Of Homeland Security/Transportation Security Administration Nov 2011 - Jan 2013Arlington, Virginia, UsManaged program providing secure infrastructure subject matter expertise, security testing and security audit services. Supported new technology initiatives including cloud computing, mobility, BYOD, HSPD-12 compliant muti-factor authentication, enterprise vulnerability and threat management, data loss prevention and digital rights management. Interfaced with DHS and other components on department wide security initiatives and working groups. Analyzed security requirements and provide recommendations to enhance security posture commensurate with risk and FISMA compliance requirements. Developed security requirements from policy, standards and other best practices as required. Integrated security requirements throughout the Systems Engineering Life Cycle (SELC) . Reviewed and provided recommendations for updates of IT Security Policies and Technical Standards. Reviewed and provided recommendations for COTS/GOTS Application Approvals. Reviewed and provided security recommendations for internal A\application development efforts. Developed and presented technical presentations for a wide range of audiences. Served as security subject matter expert for enterprise architecture review. -
Adjunct Faculty, Information SecurityEc-Council University 2011 - 2013Albuquerque, New Mexico, UsTeach multiple courses in EC-Council University's Masters of Security Science program. Courses include Disaster Recovery, e-Business Security, Cyber Law and Project Management in IT Security -
Adjunct Faculty, Network SecurityNorthern Virginia Community College 2008 - 2013Annandale, Va, UsTeach multiple courses at undergraduate level, including:• ‘Ethical Hacking, Attacks and Computer Crime’, which provides an in-depth exploration of various methods for attacking and defending a network from the point of view of the hacker and their attack methodologies• ‘Network Defense, Firewalls, Intrusion Detection, and E-Commerce Security’, which provides an in-depth exploration of Firewalls, Intrusion Detection Systems, Virtual Private Network solutions, and E-Commerce Security Solutions• ‘Network Security Layers’, which provides an in-depth exploration in the various security layers needed to implement a security program based in Defense-in-Depth philosophy. Topics covered include Security Management, Operations Security, Physical Security, LAN Security, Personnel Security, Applications/Database/Systems Security. -
Adjunct Faculty, Network SecurityGeorge Mason University Jan 2011 - May 2011Fairfax, Virginia , UsCourse examines information security services and mechanisms in network context. Topics include symmetric and asymmetric cryptography; message authentication codes, hash functions and digital signatures; digital certificates and public key infrastructure; access control including hardware and biometrics; intrusion detection; and securing network-enabled applications including e-mail and web browsing -
Founder And Security EvangelistSmb Cyber Security Alliance 2010 - 2011The SMB Cyber Security Alliance is volunteer-run organization seeking to increase cyber security awareness in small business communities through education, awareness training, free resources and consultations, and active engagements between small business owners and local security professionals.
William Mcborrough Skills
William Mcborrough Education Details
-
George Mason UniversityComputer Engineering - Digital Networks -
George Mason UniversityInformation Security And Assurance
Frequently Asked Questions about William Mcborrough
What company does William Mcborrough work for?
William Mcborrough works for Next Gen Cyber
What is William Mcborrough's role at the current company?
William Mcborrough's current role is Founder and Factional CISO.
What is William Mcborrough's email address?
William Mcborrough's email address is wj****@****ail.com
What is William Mcborrough's direct phone number?
William Mcborrough's direct phone number is +157124*****
What schools did William Mcborrough attend?
William Mcborrough attended George Mason University, George Mason University.
What are some of William Mcborrough's interests?
William Mcborrough has interest in Research, Cloud Computing, Information Assurance, Cyber Intelligence.
What skills is William Mcborrough known for?
William Mcborrough has skills like Information Security, Security, Computer Security, Cissp, Network Security, Information Security Management, Penetration Testing, Information Technology, Program Management, Information Assurance, Disaster Recovery, Security Architecture Design.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial