Stephen Fried

Stephen Fried Email and Phone Number

Cybersecurity and Digital Risk Leadership @ Amazon Web Services (AWS)
Pewaukee, WI, US
Stephen Fried's Location
Pewaukee, Wisconsin, United States, United States
Stephen Fried's Contact Details
About Stephen Fried

An accomplished cybersecurity thought leader with expertise in enterprise digital risk management, information security, and digital technology for large and small organizations.- A history of outstanding leadership in the development, implementation, and transformation of cybersecurity and information risk management programs for global Fortune 500 companies. - Demonstrated leadership in sound security and risk management strategies for the financial services, insurance, manufacturing, and technology services industries. - Hands-on expertise in all aspects of security and information risk.- Areas of specialty include: - Cybersecurity and information risk program strategy - Digital risk management - Regulatory compliance (GLBA, PCI, SOX, FFIEC, HIPAA) - Policy development (ISO, NIST, CIS) - Security technology and operational architecture - Cloud security - Identity & access management - Incident management - Business continuity - Insider risk management - Information technology auditing

Stephen Fried's Current Company Details
Amazon Web Services (AWS)

Amazon Web Services (Aws)

View
Cybersecurity and Digital Risk Leadership
Pewaukee, WI, US
Website:
aws.amazon.com
Employees:
142019
Stephen Fried Work Experience Details
  • Amazon Web Services (Aws)
    Amazon Web Services (Aws)
    Pewaukee, Wi, Us
  • Amazon Web Services (Aws)
    Senior Security Consultant
    Amazon Web Services (Aws) Oct 2022 - Present
    Seattle, Wa, Us
  • Writing And Publications
    Author
    Writing And Publications Jan 2001 - Present
    Author and developer of courseware on various cybersecurity, risk management, and technology topics.- (ISC)2 Express Learning Course Development, “Securing the Remote Work Force”, June 2021, (https://bit.ly/3eZGRLT)- ISC)2 Blog, “Remote Work During the Pandemic: What We Got Wrong”, February 2021 (https://bit.ly/3BFdFDH)- Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World”. Published by CRC Press in 2010- Certified Information Security Manager (CISM) Review Manual, 2009. Study guide contributor.- Official (ISC)2 Guide to the CISSP CBK, Second Edition, 2009. “Access Control” chapter- Information Security Management Handbook. A leading reference book for CISSP certification preparation. 2001, 2004, 2005, and 2006 editions. Chapter topics include Phishing, Off-shore Development Risks, Email Retention, Biometric Security, and Penetration Testing.
  • American Family Insurance
    It Security Principal
    American Family Insurance Jun 2020 - Oct 2022
    Madison, Wi, Us
    Currently transforming the Enterprise Information Risk Management team by providing leadership, consultation, and advisory expertise to develop an effective and sustainable digital risk management program in the areas of program strategy, risk assessment, assurance, third party cyber risk, resiliency, insider risk, and governance.- Improved the capabilities and effectiveness of the enterprise Insider Risk Program by advising on the design and build-out of program.- Established an Insider Risk data analytics capability by designing an enterprise data analytics architecture.- Greatly improved Governance, Risk, and Compliance (GRC) management by leading the technology search, selection, and deployment of a GRC technology platform.- Improved the program efficiency and analytical capabilities of the organization as the Agile Release Train Engineer for Enterprise Information Risk Management.- Exemplified the company’s commitment to diversity and equity as the project manager and lead author of the “American Family Insurance Guide to Allyship” on behalf of enterprise Business Resource Groups.
  • American Family Insurance
    It Security Director
    American Family Insurance Oct 2016 - Jun 2020
    Madison, Wi, Us
    Transformed the growth of the company’s Information Security program by leading high-performing teams in the areas of Compliance and Risk Management, Identity Management, Defensive Technology, Vulnerability Management, Threat Hunting, and Incident Response services. - Greatly improved the effectiveness of the threat management program by implementing industry-leading threat-hunting and adversarial simulation technologies and practices. - Established the company's first Enterprise Insider Threat program.- Unified security policies through the development of the first enterprise-wide security policy set.- Ensured comprehensive disaster recovery capabilities through dramatic improvements in the scope, completeness, and quality of the company’s digital resiliency program.- Proudly earned a reputation for cultivating positive relationships with peers and management, building strong relationships with business partners, and promoting a strong, customer-focused environment.
  • Patina Solutions
    Patina Professional
    Patina Solutions Jun 2015 - Oct 2016
    Brookfield, Wi, Us
    Partnered with organizations to help achieve their information security goals as an Interim CISO and Information Security Expert, specializing in information security program development, security program analysis, information risk management, and security leadership.- Served as Interim Chief Information Security Officer for a leading mortgage insurance provider.- Guided clients in scoping and developing effective and financially-responsible security program capabilities. - Identified security gaps and proposed opportunities for client program improvement, technology enhancement, and risk reduction. - Greatly improved the effectiveness of the threat management program by implementing industry-leading threat-hunting and adversarial simulation technologies and practices. - Established the company's first Enterprise Insider Threat program.- Unified security policies through the development of the first enterprise-wide security policy set.- Ensured comprehensive disaster recovery capabilities through dramatic improvements in the scope, completeness, and quality of the company’s digital resiliency program.- Proudly earned a reputation for cultivating positive relationships with peers and management, building strong relationships with business partners, and promoting a strong, customer-focused environment.
  • Qbe North America
    Senior Vice President, Information Security
    Qbe North America Jan 2014 - Feb 2015
    New York, Ny, Us
    Led the restructuring and enhancement of the information security program for QBE’s North American business unit, ensuring the program continually drove down security and operational risk while meeting the company’s business, financial, regulatory, and customer expectations. - Ensured team alignment with corporate strategic objectives by unifying and consolidating the division’s multiple security functions.- Reduced operating expenses over $150,000 in the first 6 months through efficiency transformations, team consolidation, and elimination of redundant licensing.- Established program visibility and support by cultivating key partnerships with divisional and corporate leadership.- Promoted a global enterprise focus for security issues (such as compliance, vulnerability management, and penetration testing) by establishing cross-divisional peer collaboration.
  • People'S United Bank
    Chief Information Security Officer
    People'S United Bank Aug 2010 - Dec 2013
    Bridgeport, Ct, Us
    Established a comprehensive information security program for a large regional financial institution, including strategic planning, tactical execution, and operational support. - Effectively addressed the bank’s strategic focus by realigning the security program based on business lines and strategic areas.- Reduced technical vulnerability risk by 90% through partnerships with IT and business organizations.- Greatly improved relationships with federal examiners and internal/external auditors by increasing the efficiency of responses to GLBA, SOX, and OCC examinations/audits.- Established a positive working relationship with the bank’s Board of Directors, executive governance committees, business leadership, and regulatory agencies through honesty, integrity, and consistency.
  • Sans Institute
    Instructor
    Sans Institute Jan 2000 - Apr 2010
    Rockville, Maryland, Us
    Member of the instructional staff of the SANS Institute, one of the leading security training, research, and certification organizations. Developed courseware and led classroom instruction for following courses:- Security Essentials Bootcamp- CompTIA Security+ Certification Training- GIAC Information Security Officer Certification Training- Information Security Leadership - GIAC Certification: Information Security: The Big Picture- Operating System Security- Fundamentals of the Internet Protocol
  • Fis
    Vp, Information Security
    Fis Sep 2004 - Nov 2009
    Jacksonville, Fl, Us
    Established credibility and customer confidence in the company’s information security program by ensuring efficiency and coverage of all program aspects. Established and improved multiple aspects of the program, including information classification, policies and standards, comprehensive application assessment & testing procedures, and improved vulnerability management.
  • Lucent Technologies
    Director, Global Information Security
    Lucent Technologies May 2002 - Mar 2004
    Espoo, Southern Finland, Fi
    Established and led a global program to ensure information security program alignment with corporate business and IT strategic objectives.
  • Avaya
    Director Of It Security/Assistant General Auditor
    Avaya Mar 2000 - Apr 2002
    Morristown, New Jersey, Us
    Created the strategic and operational models for information security and led the IT security program during the company’s spin-off from Lucent Technologies. Also assumed leadership of the IT Audit group.
  • Lucent Technologies
    Senior Manager, Global Risk Assessment And Secure Business Solutions
    Lucent Technologies Jan 1996 - Mar 2000
    Espoo, Southern Finland, Fi
    Led risk assessment and internal consulting activities, security technology architecture, and the evaluation and implementation of appropriate technologies to protect Lucent’s computer systems, network infrastructure, and intellectual property.

Stephen Fried Skills

Information Security Management Information Security Security Disaster Recovery Cissp Penetration Testing Business Continuity Information Technology Leadership Risk Management Security Awareness It Audit Governance Computer Security Network Security Management Security Architecture Design Cisa Vendor Management Program Management Risk Assessment Vulnerability Management Pci Dss Vulnerability Assessment Cism Firewalls Payment Card Industry Data Security Standard Application Security Business Process Improvement Certified Information Security Manager Computer Forensics Public Speaking Sarbanes Oxley Act Itil Enterprise Risk Management Data Privacy Security Policy Data Security Threat And Vulnerability Management It Management Communication Training Business Acumen It Strategy Process Improvement

Stephen Fried Education Details

  • Monmouth University
    Monmouth University
    Computer Science
  • Syracuse University
    Syracuse University
    Telecommunications Management

Frequently Asked Questions about Stephen Fried

What company does Stephen Fried work for?

Stephen Fried works for Amazon Web Services (Aws)

What is Stephen Fried's role at the current company?

Stephen Fried's current role is Cybersecurity and Digital Risk Leadership.

What is Stephen Fried's email address?

Stephen Fried's email address is sf****@****fam.com

What is Stephen Fried's direct phone number?

Stephen Fried's direct phone number is +172437*****

What schools did Stephen Fried attend?

Stephen Fried attended Monmouth University, Syracuse University.

What are some of Stephen Fried's interests?

Stephen Fried has interest in Children, Computers, Music, Golf, Travel.

What skills is Stephen Fried known for?

Stephen Fried has skills like Information Security Management, Information Security, Security, Disaster Recovery, Cissp, Penetration Testing, Business Continuity, Information Technology, Leadership, Risk Management, Security Awareness, It Audit.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.