Thomas Fowler Email and Phone Number
Thomas Fowler work email
- Valid
Thomas Fowler personal email
Thomas Fowler phone numbers
Favorite Quote "Simplicity is the ultimate sophistication." — Leonardo da VinciTom Fowler is an accomplished leader and strategist with over three decades of experience in the tech industry, specializing in cybersecurity. His proven track record of success in various roles has positioned him as a respected figure in the field, known for his ability to drive growth and innovation while safeguarding critical assets and infrastructure.With a strong foundation in computer science, Tom has honed his expertise in cybersecurity by focusing on strategic planning and execution. His extensive background in network and system security, along with his exceptional leadership and collaboration skills, make him an asset to any organization looking to enhance their security posture.Throughout his career, Tom has demonstrated a keen ability to identify and address risks, create, and implement comprehensive security strategies, and align organizational goals with industry best practices. His commitment to fostering a positive team culture has allowed him to build high-performing teams capable of tackling complex cybersecurity challenges.As an active member of the cybersecurity community, Tom remains dedicated to staying ahead of the latest trends and developments. He is a frequent attendee of conferences, workshops, and meetups, where he expands his network and shares his knowledge with fellow professionals.Tom's passion for leadership extends beyond his professional engagements. He dedicates time to mentoring aspiring cybersecurity specialists, helping them navigate the ever-evolving landscape of the industry. He firmly believes that success in the tech world is rooted in continuous learning, collaboration, and adaptation.Connect with Tom Fowler on LinkedIn to explore new opportunities and stay updated on his latest projects and achievements, and benefit from his experience in leadership and strategy.Embracing simplicity in cybersecurity.
-
Head Of Cybersecurity, ArchitectHoonigan IndustriesUnited States -
Head Of Cybersecurity, ArchitectHoonigan Industries Feb 2022 - PresentGreenwood Village, Colorado, UsDevelop and maintain the company's information security strategy and roadmap in alignment with business goals and objectives.Define and implement policies, procedures, and controls to protect the confidentiality, integrity, and availability of company information assets.Provide cyber security technical and strategic leadership to the information technology operational teams.Ensure industry best practices and framework adaptations such as NIST-CSF, CIS, and FAIR.Conduct regular risk assessments and penetration tests and implement effective risk management strategies to mitigate identified risks.Work closely with cross-functional teams, including IT, legal, and compliance, to ensure security requirements are integrated into company operations and technology.Manage security incidents and coordinate response efforts, including incident triage, containment, and reporting.Establish and maintain relationships with external stakeholders, including vendors, industry associations, and government agencies.Develop and manage the information security budget and make recommendations for necessary investments in security technology and services.Lead the development and implementation of the company's information security program, including policies, procedures, and controls.Implement security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability scanners, to protect the company's assets.Develope and conducted regular security awareness training programs for all employees to ensure compliance with security policies and procedures.Implement a risk management program, including conducting regular risk assessments and developing mitigation plans to minimize identified risks.Maintain compliance with industry regulations and standards, including PCI-DSS resulting in successful annual audits. -
Chief Information Technology OfficerInnovative Financial, Llc Sep 2018 - PresentProvide strategic and technical centric oversight to assist business operations in protecting the confidentiality, integrity, and availability of the data. Capture risks and provide a planned roadmap to the organization that outlines the costs, priorities, and timelines to meet business initiatives.
-
Sharholder And DirectorSeward Motor Freight Inc Jan 2014 - PresentSeward, Ne, Us -
Architect/Lead/Senior Cyber Security EngineerXcel Energy May 2017 - Feb 2022Minneapolis, Minnesota, UsProvide guidance and security assessments on all projects from an architectural and technical valuation on efforts enterprise wide. Apply reference architectures, security best practices and adherence to standards to these efforts along with continuous governance and ongoing oversight.Establish a positive and mutually beneficial working relationship between diverse and sometimes siloed business units to meet strategic security and business roadmaps.Prepare and deliver operative documentation as key deliverables. Communicate and present project, overall security architecture, design and run-books to technical and non-technical audiences. Successfully introduced and deployed two major enterprise initiatives; Firewall Rule Management and Network Intrusion Prevention programs. Lead and mentor others so they can grow and be successful in their efforts.Offer guidance and work delegation to staff to provide opportunity to learn and take initiative actions. Support enterprise initiatives with the development and maturation of processes, implementation of new solutions and continually operationalize our environments. -
Senior Information Security SpecialistState Of Colorado Sep 2013 - May 2017Denver, Co, UsResponsible for executing the state’s information security strategic plan and statutory responsibilities by applying a broad range of business management and technical security skills.Assist with the development and subsequent enforcement of security policies and procedures, security awareness programs, business continuity and disaster recovery plans, IT, auditing, and applicable industry and governmental compliance issues.Inform and advise executives, business, and IT management on security plans, operations, and metrics to ensure the information security program adapts to the evolving business needs. Provide a multidisciplinary role in planning, developing, managing, and overseeing all aspects of the state’s information security program, including Risk Management, Policy Management, Organizing Information Security, Asset Protection, Human Resource Security, Physical and Environmental Security, Communication and Operations Management, Access Control, Information Systems Acquisition, Development and Maintenance, Incident Management, Disaster Recovery Management, Compliance and Audit Management. -
Information Security SpecialistColorado Springs Utilities Jun 2004 - Sep 2013Colorado Springs, Co, UsProvide strategic consulting and support for enterprise and SCADA security initiatives, compliance, policies, and infrastructure throughout the organization. Installed and maintained software and hardware for firewalls, intrusion detection, network monitoring, anti-virus, and network auditing and compliance infrastructures to prevent and defend against unauthorized access to systems, networks, and classified data. -
Security AuditorNexgen Technologies, Inc. May 2004 - May 2004Lakewood, Colorado, UsProvided security assessments on Department of Interior systems throughout Southwestern United States. Also participated in the analysis and vulnerability scanning of applications; developed and revised security checklists, and reviewed security certification documentation. -
Help DeskEchostar Feb 2004 - May 2004Englewood, Co, UsAnswered and resolved inbound sales as well as customer service calls for satellite provisioning relating to entertainment services and products, hardware systems/accessories, and customer service inquiries regarding technical issues, billing, and general informational requests. -
Noc SupervisorDynegy Jan 2001 - Aug 2003Irving, Texas, UsRecruited, directed, supervised, and evaluated a staff of 12 to 15 technicians and analysts who maintained and supported voice, data, and video communications systems for a nationwide long-haul communications network. Engineered and managed public and private IP address and network subnet schemes for infrastructure and network management.Planned, coordinated, and installed physical and logical security controls for network systems. Analyzed outages, network availability, and prepared statistical creation of network and NOC performance metrics for senior management. Administered the network security firewall. Managed daily trouble cases and served as an escalation point for technical staff and customers. -
ProvisionerRhythms Net Connections Sep 2000 - Jan 2001Provisioned ATM private virtual circuits for DSL Service Order Providers.
-
Tier Ii/Iii TechnicianTeksystems Jul 2000 - Sep 2000Hanover, Md, UsSupported Rhythms in the installation, efficient operation, and maintenance of all telecommunication equipment and network components associated with DSL service provisioning, including FR, ATM, DSLAM, routers, bridges, hubs, switches, network backbones, RBOC, and CLEC. Also directed the testing, isolation, and resolution of DSL problems remotely with distant field technicians on customer premise as it pertained to the last mile. -
ManagerPremier Data Corporation Sep 1999 - Jul 2000Managed support services as well as a subject matter expert for customized software used to manage coin-operated amusement equipment and routes.
-
Business OwnerTc Entertainment Mar 1993 - Sep 1999Built and operated, from start-up, a successful coin-operated amusement company.
-
General ManagerSeward Motor Freight Jun 1990 - Mar 1993Managed all the operations of a 5.5 million dollar refrigerated over-the-road trucking company consisting of 50 plus personnel.
-
Avp Network Support ServicesSecurity Pacific Automation Dec 1989 - Jul 1990Managed technical projects for all branches in the region (from San Diego to Los Angeles), ensuring timely and cost-efficient implementation as well as security and integrity for all requests in support of telecommunication services, including Centrex, computers, pagers, voice mail, cellular, and PBX systems.
-
Systems AnalystUnion Bank Mar 1986 - Dec 1989San Francisco, Ca, UsManaged technical projects. Researched, tested, and coordinated voice/data equipment as well as supporting communications equipment. Also controlled and coordinated security projects requiring cameras and door badgering systems. -
Lead Field TechnicianLee Data Corporation May 1983 - Mar 1986Subject matter expert in demonstration of equipment capabilities as well as service and the support of secure installations of IBM compatible equipment and remote hardware, personal computers, hubs, and printers.
Thomas Fowler Skills
Thomas Fowler Education Details
-
Colorado Technical UniversityComputer Systems Security -
Control Data InstituteComputer & Systems Technology
Frequently Asked Questions about Thomas Fowler
What company does Thomas Fowler work for?
Thomas Fowler works for Hoonigan Industries
What is Thomas Fowler's role at the current company?
Thomas Fowler's current role is Head of Cybersecurity, Architect.
What is Thomas Fowler's email address?
Thomas Fowler's email address is to****@****e.co.us
What is Thomas Fowler's direct phone number?
Thomas Fowler's direct phone number is (303) 866*****
What schools did Thomas Fowler attend?
Thomas Fowler attended Colorado Technical University, Control Data Institute.
What skills is Thomas Fowler known for?
Thomas Fowler has skills like Vulnerability Assessment, Information Security Management, Disaster Recovery, Cissp, Networking, Business Continuity, Security Policy Development, Security, Incident Management, Information Security, It Audit, Network Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial