Tom Cornelius

Tom Cornelius Email and Phone Number

Senior Partner at ComplianceForge | Founder & Contributor at Secure Controls Framework (SCF) @ ComplianceForge
sheridan, wyoming, united states
Tom Cornelius's Location
Newberg, Oregon, United States, United States
Tom Cornelius's Contact Details
About Tom Cornelius

Technology without strategy is chaos - I help bring order by aligning with business objectives and applying industry-recognized cybersecurity and data privacy practices. I do this through a focus on risks that are specific to the organization, while avoiding the Fear, Uncertainty & Doubt (FUD) that often complicates risk-based decisions.Through the implementation of reasonably-expected practices and risk mitigation strategies, I offer brand protection for companies by identifying and reducing vulnerabilities, that could otherwise be exploited and do serious harm to a company's reputation and bottom line. I am experienced at leading teams in the design and implementation of secure business processes and networks. Specialties Include: - NIST 800-171 Compliance (CMMC / DFARS)- Cybersecurity Supply Chain Risk Management (C-SCRM)- Cybersecurity / IT Policy Development & Implementation- Risk Assessment & Mitigation- Developing Incident Response Programs- Vulnerability Assessments- IT General Controls (ITGC)- Certification & Accreditation - DIACAP / FISMA / RMF / SCF- Statutory, Regulatory & Contractual Compliance (NIST 800-171, FAR, DFARS, CCPA, EU GDPR, PCI DSS, HIPAA, FERC, NERC, FACTA, GLBA)

Tom Cornelius's Current Company Details
ComplianceForge

Complianceforge

View
Senior Partner at ComplianceForge | Founder & Contributor at Secure Controls Framework (SCF)
sheridan, wyoming, united states
Employees:
2
Tom Cornelius Work Experience Details
  • Complianceforge
    Senior Partner
    Complianceforge Dec 2017 - Present
    Newberg, Or
    We specialize in delivering professionally-written cybersecurity documentation that enables businesses to expedite the process of getting & staying compliant with cybersecurity requirements. Quite simply, we are a business accelerator - we take care of the tedious and time-consuming work that is associated with writing comprehensive cybersecurity documentation. By doing this, we offer a unique service to businesses - we can provide you with semi-customized cybersecurity documentation, based on industry-recognized leading practices that include ISO, NIST, OWASP, CSA and others. This allows you to quickly obtain professionally-written cybersecurity documentation and you have the ability to edit this documentation for your specific needs, since it comes in Microsoft Office formats. This is beyond buying an "IT security policy template" online - these products allow you to have the same level of professional quality documentation that you would expect from hiring a cybersecurity consultant to write it for you.Our comprehensive cybersecurity solutions enable companies to meet common information security requirements, such as EU GDPR, PCI DSS, HIPAA, FACTA, GLBA, as well as unique requirements like FedRAMP and NIST 800-171 compliance. Everything we do centers around providing your company a solid set of cybersecurity documentation to use as a foundation to build from!
  • Secure Code Alliance
    Co-Founder
    Secure Code Alliance Jul 2021 - Present
    Newberg, Oregon, United States
    Architected the Developing Security & Privacy by Design (DSPD) initiative that is a conformity assessment methodology designed to issue individual-level certifications, specific to Secure Software Development Practices (SSDP).
  • Secure Controls Framework
    Founder & Contributor
    Secure Controls Framework Feb 2018 - Present
    Newberg, Or
    Hackers share information on attack methods with other hackers, so why shouldn’t the good guys share information on how to best protect an organization? We decided to take action and make a difference. Our mission is to provide a powerful catalyst that will advance how cybersecurity and privacy controls are utilized at the strategic, operational and tactical layers of an organization, regardless of its size or industry. ​We have the ambitious goal of providing cybersecurity and privacy control guidance to cover the strategic, operational and tactical needs of organizations, regardless of its size, industry or country of origin. The end state is to help companies become and stay compliant with cybersecurity and privacy requirements. The glue that ties Governance, Risk and Compliance (GRC) together is a uniform set of controls. Unfortunately, in most organizations, there is no set of shared controls and that leads to poor governance practices and an overall weaker state of security and privacy.​Like it or not, cybersecurity is a protracted war on an asymmetric battlefield - the threats are everywhere and as defenders we have to make the effort to work together to help improve cybersecurity and privacy practices, since we all suffer when massive data breaches occur or when cyber attacks have physical impacts.
  • Cognizant
    Associate Director, Corporate Security
    Cognizant Oct 2016 - Dec 2017
    Tualatin, Or
    Focus on process improvement within the Corporate Security department under Architecture & Engineering. - Designed the Cognizant Controls Framework (CCF) to build a scalable and comprehensive cybersecurity and privacy controls catalog. - Developed next generation cybersecurity policies and standards with a focus on digital security requirements. - Developed Cybersecurity for Privacy by Design (C4P) processes for EU GDPR compliance.
  • Nike
    Manager, Governance Risk & Compliance (Grc) Processes
    Nike Nov 2015 - Oct 2016
    Beaverton, Or
    Worked across multiple business units to enable the implementation of cybersecurity best practices for Governance, Risk & Compliance (GRC) through process improvement and documentation. Focused alignment with ISO 27001 and ISO 27002 frameworks. Led the development of the Nike Controls Framework (NCF).Founder and co-executive of the Nike Military Veterans (NMV) network, which was Nike's second largest Employee Resource Group (ERG). The NMV socially connects military veterans and helps promote Nike’s initiatives that support veterans.
  • Nike
    Director, Information Security Compliance
    Nike Jun 2014 - Nov 2015
    Beaverton, Or
    Led the development, implementation and governance of Nike's global information security compliance program. Partnered with multiple business units to generate a vision, establish direction and motivate stakeholders to accomplish the goals that included addressing compliance with applicable statutory, regulatory and legal information security requirements for Nike, Converse & Hurley. Leveraged industry and technical expertise to assist stakeholders to more effectively address risks associated with their business units.
  • Nike
    Sr. It Security Engineer / Information Security Governance Lead Analyst
    Nike Jan 2012 - Jun 2014
    Beaverton, Or
    Used industry-recognized best practices and good judgment to select methods and techniques for properly implementing and executing cybersecurity operations at Nike. Worked with other Corporate Information Security (CIS) engineers and analysts to ensure projects were fully integrated into the operations environment, as well as constantly improve security processes for:- Incident response- Compliance (PCI DSS)- Endpoint protection- Vulnerability & patch management- Intrusion detection and security event correlation- Change & access control
  • Portland General Electric
    Senior It Security Engineer / Supervisor
    Portland General Electric Nov 2009 - Jan 2012
    Portland, Or
    Operational supervisor for IT Security Operations (ITSECOPS). Performed Security Test & Evaluation (ST&E) to validate management, operational and technical controls to identify threats and mitigate vulnerabilities to PGE’s IT infrastructure. Led incident response teams to perform technical forensic analysis to identify corporate and regulatory compliance violations, including working closely with HR and with corporate management to present the findings. Conducted vulnerability assessments and led mitigation operations to meet compliance requirements for SOX, NERC, FERC and PCI DSS. Developed and briefed position papers on security-related topics for presentations to management and clients. Led systems integration projects to provide hands-on security engineering services. Represented IT Security at the Change Control Board (CCB).
  • Sureid, Inc.
    It Manager / Information Security Officer (Iso)
    Sureid, Inc. Nov 2008 - Nov 2009
    Portland, Oregon Area
    Directed the IT and Information Security operations of the enterprise, which included two data centers, statutory, regulatory & legal compliance, Network Operations Center (NOC) management, help desk, and communication networks (voice and data). Coordinated physical and technical security efforts across the enterprise, including IT, HR, legal, facilities management, and other groups, to identify security initiatives and implement standards. Interacted with the executive management team to monitor and validate the company’s compliance with its regulatory requirements for the Oregon Identity Theft Protection Act (OITPA) and the DoD IA Certification & Assurance Process (DIACAP), as well as PCI DSS. Served as chair of the Change Control Board (CCB).
  • Cogent Logik
    Director, Information Technology & Network Security
    Cogent Logik Jan 2006 - Nov 2008
    Portland, Oregon Area
    Served as a senior consultant and adviser to clients’ senior management on their technology and security requirements. Performed formal risk assessments and developed risk mitigation strategies, with a focus on statutory, regulatory and legal compliance. Provided project management for client network migrations and systems integration. Responsible for the 24x7 monitoring, patch management, log analysis, and off-site backups for client networks.
  • U.S. Joint Forces Command
    Senior Information Assurance (Ia) Analyst
    U.S. Joint Forces Command Aug 2005 - Jan 2006
    Virginia Beach, Va
    Conducted Computer Network Defense (CND) operations at the United States Joint Forces Command (USJFCOM) military headquarters’ Security Operations Center (SOC). Provided subject matter expertise for sensor monitoring, incident detection, threat analysis and incident response for both unclassified (NIPRNET) and classified (SIPRNET) military networks. Directed and coordinate security investigations with other departments. Monitored firewall and Intrusion Detection System (IDS) logs in support of 24x7 operations. Implemented operational training for IT personnel in support of DoD 8570 certification requirements.
  • United States Army
    Commissioned Officer
    United States Army Jun 1996 - Aug 2005
    Worldwide
    Commissioned officer in the Aviation branch of the U.S. Army. Assignments:- Company Commander. Fort Eustis, VA- Logistics Officer. Fort Hood, TX- Operations Officer. Fort Hood, TX- Platoon Leader. Soto Cano Airbase, Honduras- Platoon Leader. Camp Stanley, Korea- Logistics Officer. Camp Stanely, KoreaSchools:- Combined Arms and Services Staff School- Aviation Offcers Advanced Course- Aviation Officers Basic Course- UH-60 "BlackHawk" Qualification Course- Advanced Rotary Wing Training (Flight School)- Rappel Master Course- Air Assault Course

Tom Cornelius Skills

Security Information Security Network Security Vulnerability Assessment Computer Security Data Security Information Assurance Information Technology Pci Dss Information Security Management Computer Forensics Penetration Testing Risk Management Integration Ids Disaster Recovery Security Management Security Policy Security Audits Identity Theft Network Engineering Nist Fisma Vulnerability Management Incident Response Diacap Nerc Governance Payment Card Industry Data Security Standard Information Security Governance It Audit Operational Risk Management Identity Management Business Continuity Policy Writing Security Policy Development Compliance Management It Security Auditor Ma 201 Cmr 17.00 Oregon Identity Theft Protection Act Regulatory Compliance Nist 800 171 General Data Protection Regulation It Grc Policy Development Iso 27002 Nist 800 53

Frequently Asked Questions about Tom Cornelius

What company does Tom Cornelius work for?

Tom Cornelius works for Complianceforge

What is Tom Cornelius's role at the current company?

Tom Cornelius's current role is Senior Partner at ComplianceForge | Founder & Contributor at Secure Controls Framework (SCF).

What is Tom Cornelius's email address?

Tom Cornelius's email address is to****@****ail.com

What is Tom Cornelius's direct phone number?

Tom Cornelius's direct phone number is +150328*****

What schools did Tom Cornelius attend?

Tom Cornelius attended United States Military Academy At West Point, University Of Maryland Global Campus, University Of Maryland Global Campus.

What are some of Tom Cornelius's interests?

Tom Cornelius has interest in Snowboarding, Learning New Things, Running, Being Outdoors, Mountain Biking, Tinkering With Technology, Archery.

What skills is Tom Cornelius known for?

Tom Cornelius has skills like Security, Information Security, Network Security, Vulnerability Assessment, Computer Security, Data Security, Information Assurance, Information Technology, Pci Dss, Information Security Management, Computer Forensics, Penetration Testing.

Who are Tom Cornelius's colleagues?

Tom Cornelius's colleagues are Beverly Cornelius, Cameron Cornelius.

Not the Tom Cornelius you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.