William Godwin

William Godwin Email and Phone Number

Founder @ GIRI Ring
Atlanta, GA, US
William Godwin's Location
Atlanta Metropolitan Area, United States, United States
William Godwin's Contact Details

William Godwin personal email

n/a
About William Godwin

A seasoned business leader poised for the next challenge in cyber security, data security, risk management, or compliance. Recognized as a 'Problem Solver' with over 25 years of experience tackling intricate security and compliance issues in both public and private sectors. Ensures alignment and security of organizational technology assets and supply chains to support business goals. Enhances cyber security and governance oversight through strategic compliance design, process refinement, customer retention strategies, and risk reduction initiatives. Currently lending expertise in cyber and data governance to Fortune 1000 enterprises as they migrate or develop new technology capabilities across multi-cloud deployment models such as AWS, GCP, and Azure.I am currently available in an advisory capacity and would enjoy exploring your needs to see if my expertise would benefit your business.Please direct message if you are interested in starting a conversation.INDUSTRY EXPERIENCE:• Healthcare • Financial Services • Banking • Energy• Manufacturing • Dept. of Defense • Military • Federal/StatePRODUCT DEPLOYMENT SECURITY STRATEGIES:• On-Site • Co-location Datacenters • Amazon Web Services AWS• Microsoft Azure • Google Cloud COMPLIANCE SPECIALTIES:• HIPAA/HITECH • FFIEC/GLBA • SOX 404 • NERC/FERC/US NRC• FISMA/DFAR/CMMC • PRIVACY (COPPA, CCPA, GDPR, GLBA)SECURITY & RISK MANAGEMENT FRAMEWORK EXPERIENCE:• HITRUST CSF • NIST • ISO • CIS • FEDRAMP/CSA• SOC 2/SSAE18 • COSO/ERM

William Godwin's Current Company Details
GIRI Ring

Giri Ring

View
Founder
Atlanta, GA, US
William Godwin Work Experience Details
  • Giri Ring
    Founder
    Giri Ring
    Atlanta, Ga, Us
  • Datascan
    Cyber Governance Principal
    Datascan Apr 2022 - Present
    Alpharetta, Ga, Us
    DataScan provides financial services in the wholesale inventory and inventory audit space. DataScan is established as the industry leader in the wholesale asset finance and risk management space.My Responsibilities:1. Implement, operate, and improve the company's Information Security and Governance program.2. Support Product Security initiatives through Shift left strategies.3. Implement FedRamp and NIST based controls to manage risk.4. Client Advocate to support the data security of client's data residing in DataScan’s Cloud production environment.
  • Independent Consultant
    Senior Consultant - Vciso, Governance, Risk Management, And Compliance
    Independent Consultant Jan 2019 - Present
    Advising customers and developing strategic plans to ensure technology strategy alignment with business objectives in accordance with Information Technology Infrastructure Library (ITIL) best practices. Key areas of contribution include; information security, governance, vendor risk, and compliance solutions. Capture of product requirements, reference architecture, develop product road-map and manage product requirements to release.Key Engagements: Reference contract positions below.Key Achievements:> Eliminated 50% waste in resource by transforming third-party risk management processes.> Accomplished FedRAMP and HITRUST certifications for Health Information Technology (HIT)> Significantly enhanced revenue assurance through customer retention and regulatory compliance (Alliance Management) Develop client requirements for procurement, vendor risk and GRC; and> Developed procurement support tools to control IT spend.
  • Independent Consultant
    Vciso (Cottage Health)
    Independent Consultant Feb 2020 - Jun 2020
    Served as Cottage Health's interim Information Technology Governance Executive. Established relevant policies, standards, perform assessments to assess risk exposure and drive Cottage Health's risk reduction strategy. The organizational impact of my contribution resulted in greater Business Intelligence (BI) around key risks and maturing business process improvements to enable the hospital to mitigate threats to its technology/data environment.
  • Independent Consultant
    Information Technology Risk Management - Third-Party Risk (Kaiser Permanente)
    Independent Consultant Aug 2019 - Dec 2019
    Assisted Kaiser Permanente Third-Party Risk Management (TPRM) Strategy and Transformation efforts. Evaluated TPRM program, implemented program improvements and developed metrics to measure TPRM program effectiveness.
  • Independent Consultant
    Vciso - Data Governance And Risk Management (Equifax)
    Independent Consultant Mar 2019 - Jun 2019
    Led implementation of ServiceNow GRC platform for Data Governance and implementation of ServiceNow Asset Management platform.
  • Independent Consultant
    Vciso (Redmonocle.Com)
    Independent Consultant Feb 2019 - May 2019
    Providing vCISO capabilities and insights to development of software platform (RedMonocle.com) used to control IT Spend and Sprawl.
  • Giri Ring
    Founder
    Giri Ring Jan 2020 - Present
  • Here Technologies
    Grc Compliance Consultant
    Here Technologies Sep 2021 - Mar 2022
    Eindhoven, North Brabant, Nl
    Joined HERE Technologies TRUST organization (GRC) to provide company management team insights and plan to capture new market opportunities.My Responsibilities:1. Support Product Security initiatives through Shift left strategies.2. Implement FedRAMP, HITRUST, and NIST based controls to manage risk.
  • Carrier
    Global Head Of Product And Information Security - Automated Logic
    Carrier Feb 2021 - Aug 2021
    Palm Beach Gardens, Florida, Us
    Short-term engagement to develop and implement cyber and product security program worldwide to achieve SOC 2 type 2, FedRAMP, and IEC 62443 compliance for building automation solutions (Automated Logic Business Unit (www.automatedlogic.com). Key aspects of the security program include Governance, Risk Management, Incident Management, Product Security and Recovery. The scope of responsibilities includes building security within automation controls hardware manufacturing, supply chain risk management, software / firmware product security, and support business transformation objective to deliver our products-as-a-service through AWS cloud. Secondary responsibilities included supporting sales to address customer security requirements and reviews.
  • Ciox Health
    Vice President, Enterprise Risk Management And Compliance
    Ciox Health Oct 2017 - Jan 2019
    New York, Ny, Us
    I co-founded the office of the Chief Compliance Officer and was charged with Heading the company's Enterprise Risk Management (ERM) function for all lines of business. Responsibilities in this role consisted of assessing and monitoring key risks. Developed key risk metrics to track compliance, report risk assessment findings to operational stakeholders and escalate unresolved risk to the Board (Audit Committee). Produced positive impacts for the company in the area of risk reduction, business process improvements, and demonstrated compliance with legal, regulatory and client mandates (e.g. HIPAA, CMS, FDR), and Industry requirements (e.g. HITRUST, PCI DSS, SOC, ENAC).Promoted organizational teamwork by building inclusive alliances across the enterprise and within my department. Built and managed an exemplary team consisting of diverse ERM, Audit, and business professionals to execute the ERM, Information Security & Governance program. Utilized these resources to support the objectives of Identify, Protect, Detect, Respond and Recover. (ref. NIST CSF). Key Accomplishments:- Key contributor in M&A activities – Significant reduction in M&A risk;- Drove FP&A initiatives by conducting financial analysis around technology spend;- Streamline compliance processes – Cost reduction / Increased speed to market;- Key contributor for implementing GRC and security control practices within AWS cloud transformation- Implemented RSAM GRC platforms. Managed product implementation and lifecycle management;- Established Third-Party / Vendor Risk Management (VRM) program. Reduced VRM risk by 92%; and- Enhanced Revenue Assurance (FedRAMP, HITRUST, and SOC Audit Attestations)
  • Ciox Health
    Senior Director, Information Security And Risk Management
    Ciox Health Nov 2014 - Oct 2017
    New York, Ny, Us
    Initially joined to address regulatory and client requirements by leading development and implementation of the company's cyber security strategy, IT Governance, Risk and Compliance (GRC) department. Working with technology partners, audit personnel and cross-organizational leadership, I implemented a cyber security strategy that postured CIOX successfully achieved PCI, HITRUST, HIPAA compliance and successful SOC 2 audits.Key Accomplishments:- Recovered 10% technology costs through de-duplication of technology capabilities; and- Integrated Secure Software Development Life Cycle (SDLC)
  • Datalink
    Information Security Manager - Practice Lead (Consultant)
    Datalink May 2014 - Oct 2014
    Eden Prairie, Mn, Us
    Responsible to establish and manage Information Security and Risk Management advisory practice. I defined the service strategy, engaged sales organization and developed delivery team. Offering comprised of information security, vendor management, risk assessments and IT transformation services.Key Achievements:- Achieved 115% year 1 practice revenue target ($1.5M) in 10 months.- Successfully delivered and expanded over 25 client engagements
  • Processnow
    Evp, Information Security And Compliance Officer (Consultant)
    Processnow Aug 2010 - May 2014
    Co-founder and information security management SME for ProcessNow. ProcessNow was founded to assists service-oriented organizations by streamlining, integrating, and transforming data silos through a standards-based method, providing a seamless experience and increase the value of data throughout our customer's enterprise. I developed a variety of fast proto-typing and process management tools and techniques to enable our clients to drive more value from data. We specialize in transforming requirements into consistent and measurable operational execution strategies. I was responsible for the company's internal control environment, information security, and IT Service Management service offerings for the company's critical clients (AT&T and COX Enterprises).Key Achievements:- Revenue Assurance achieved - PCI Compliance and Client Satisfaction- Achieved 85% cost savings for client – Service Catalog ($1.2M / DC)- Significant reduction in internal and client Identity and Authentication risk
  • Dell
    Principal Security Architect (Military Contractor)
    Dell Nov 2010 - Jun 2011
    Round Rock, Texas, Us
    Principal Security Architect for U.S. Army, Tank-automotive and Armament Command (TACOM)Recruited to the Dell Federal Systems team to provide key contract support to TACOM information security officer. Working through the Directorate of Information Management (DOIM) Information Security Program Office, I was responsible to lead all TACOM information security engagements. Principal responsibilities included leading Governance Risk and Compliance (GRC), Security, Data, Architecture and Technology activities to maintain US Army security posture to fulfill compliance requirements outlined in FISMA and AR 25-1,2, and 380-5 through the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) and PCI DSS standards.Key Accomplishments:- Established quantifiable information security program and compliant business processes;- Achieved DIACAP Certification for operation of over 30 applications and network environment;- Achieved PCI Certification for base level payment systems;- Developed and mentored contractor and government civilian security team; and- Developed local incident response procedures and malware analysis process.
  • Smartronix
    Information Security Officer (Military Contractor)
    Smartronix Dec 2009 - Oct 2010
    Hollywood, Md, Us
    U.S. Marine Corp System Command (MARCORSYSCOM)Recruited directly by Smartronix leadership to establish and lead MARCORSYSCOM Information Security Office for command operations. Principal responsibilities include leading Governance Risk and Compliance initiative, data, network and systems architecture activities to maintain US Marine Corps security posture and fulfill compliance requirements outlined in FISMA and IRM 5239 Series through the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) and PCI DSS standards.Key Accomplishments:- Achieved contract option execution (performance-based renewal). Represented $2.5M in revenue;- Elected to Enterprise Architecture Review Board for cloud technologies;- Achieved DIACAP Certification for operation of over 50 warfighter support applications;- Achieved PCI Certification for base-level payment systems; and- Developed and mentored contractor and government civilian security team of 30.
  • Rootvector Llc
    Chief Information Security Officer (Consultant)
    Rootvector Llc May 2008 - Dec 2009
    Served as an independent consultant to both private and public organizations, leading the development of client Governance Risk and Compliance (GRC) and Information Security programs to safeguard client sensitive and payment cardholder information through proper application of security frameworks/standards (ISO, NIST, PCI DSS). Consulting with client addressing strategic security direction, goals, and business objectives.Key Accomplishments:- Grew business to surpass revenue goal. $1.5M- Achieved successful FFIEC government compliance audits- Achieved DIACAP (Information Security) Certification for US Army major application- Developed and mentored security analyst teams- Successfully developed US Army (TACOM) Vendor Management business processes
  • Dsd Labs
    Sr. Director, Information Security And Assurance (Consultant)
    Dsd Labs May 2004 - May 2008
    Sudbury, Ma, Us
    Recruited to establish and grow DSD Laboratories Security Systems Division. Grew DSD System Security Division by adding risk assessment, asset management, and NIAP testing services. My responsibilities included management and mentor thirty (30) information security engineers in the principles of corporate information security practices we governed ourselves by and model we applied though our client contracts. I served as the primary client interface to US Department of Agriculture (USDA), and secondary interface to US Department of Interior (DOI). I also led engineering efforts supporting the US Air Force. Responsible for responding to client request for quotation \ proposal (RFQ \ RFP). I was also responsible for managing all projects and serving as the principal consultant on all client engagements. Provided information security consulting services to 3rd party vendors of the U.S. Government to certify technical solutions with regards to PCI DSS, National Information Assurance Partnership (NIAP) and Federal Information Processing Standards (FIPS).Key Accomplishments:- Successfully developed over 30 junior - senior information security professionals;- Grew service line to surpass revenue target ($2.7M);- Established and maintained contract award percentage of 70%;- Led company to SEI CMMI Level 2 and 3 certifications;- Successful implementation of corporate and client information security programs with regards to PCI DSS, PA DSS, ISO, NIST, HIPAA and organizational security standards;- Led engineering efforts including network engineering and development professionals to establish the US Air Force Standard Desktop and Standard Server baseline configurations;- Led over 50 information security evaluations concentrated within NIST, ISO, disciplines; and- Developed service capability to offer security engineering services complementing our NIAP laboratory. Resulted in development of additional ($2M) revenue stream.
  • Maxwell Afb / Gunter Annex, Al
    Multiple Information Security Contractor Positions
    Maxwell Afb / Gunter Annex, Al Jan 2000 - May 2004
    Unisys, Inc. - Department of Defense Information Systems Agency (DISA)Title: Network Engineer III \ Team LeadLinkedIn Company Site: https://www.linkedin.com/company/unisys/about/Recruited by local Unisys leadership team to lead technology transformation and information security assurance mission of DISA Computer Services Division (CSD). The mission of DISA/CSD is to provide compute power to the warfighter abroad and support government technology operations stateside. My responsibilities consisted of developing technology management of DISA/CSD network infrastructure and establishing process management capabilities of the Central Command Center (C3). I performed user requirements reviews and provided direction in the identification of enterprise requirements, issues and resolution/mitigation actions. Led the efforts to support the conceptualization, development and implementation of complex, multiple tiered and inter-linked systems within a defined enterprise architecture. Once requirements were defined, I led efforts to identify resources and solutions whether developed with DISA\CSD resources or outsourced to vendors. From a compliance perspective, I led the efforts to evaluate technical countermeasures to manage risks within acceptable levels and to safeguard sensitive information.Key Accomplishments: Designed and engineered csd.disa.mil (NIPR) domain to support operational capabilities; Designed and engineered csd.disa.smil (SIPR) domain to support operational capabilities; Led accreditation activities and achieved certificate to operate DNS infrastructure; and Roll-out of DISA\CSD Active Directory and LDAP services
  • Maxwell Afb / Gunter Annex, Al
    Senior Security Specialist (Military Contractor)
    Maxwell Afb / Gunter Annex, Al 2003 - 2003
    Titan Corporation - U.S. Air Force (USAF) Material Command (AFMC)LinkedIn Company Site: https://www.linkedin.com/company/titan-corporation/about/Recruited by request of customer, Titan requested I join their team to ensure security and resiliency of the USAF LOGCOM Combat Ammunition System (CAS). My responsibility was to ensure security design, development, analysis, and evaluation of this mission critical system.Key Accomplishments:- Led information security efforts in system configuration, provisioning processes, audit log review, security test and evaluation, intrusion detection and prevention, cryptography and key management, distributed authentication, and system interfaces.- Led information security support functions to transition to major release- Guided spiral development processes of CAS 3rd generation.
  • Maxwell Afb / Gunter Annex, Al
    Regional Chief Lead And Network Security Engineer (Military Contractor)
    Maxwell Afb / Gunter Annex, Al 2000 - 2002
    TRW, Inc. - U.S. Air Force (USAF) Systems Command (SYSCOM)Began military contracting career as I was recruited to support USAF SYSCOM Combat Information Transport System (CITS) Program Management Office. CITS provided information security and boundary protection services for all USAF base installations worldwide. I was responsible to architect, engineer, and provide sustainment support services. I provided subject matter expertise for all technical elements operating within the CITS suite. Leading a group of 16 network security engineers, I ensured cross-training of all human resources, and provided sustainment support for 200 US Air Force sites executing the suite for the purpose of boundary protection.Key Accomplishments:- Led information security efforts in system configuration, provisioning processes, malware analysis, and communications path integrity.- Led support initiatives to counter threats and track incidents throughout the US Air Force enterprise- Maintained secure environments featuring no significant breach of security from external human threat agents.
  • Mach Usa
    Senior Network Engineer
    Mach Usa Jan 1999 - Dec 1999
    Developed and implemented corporate Security policy through Network Design and Domain Security. Provided customers secure telecommunications support for data connectivity, administered and troubleshoot Multiple Domains.Key Accomplishments:- Identified and implemented corporate cost savings strategy of 1M annually through connecting to clients via virtual private network.- Established end user security policy
  • Southtrust Bank
    System Administrator
    Southtrust Bank 1996 - 1998
    Provided support for Branch Support Services Division during normal operations and transition states. As the System Administrator, was familiar with various branch support technologies.Key Accomplishments:- Maintained 99% up time performance metric.- Established and led user authentication process to safeguard system confidentiality and integrity

William Godwin Skills

Business Process Design Pmo Sap Products Iso Fortune 500 Clinical Research Penetration Testing Frameworks Netsuite Information System Healthcare Information Technology Spiral Ssh Customer Support Categorization Desktop Computers Mature System Architecture Cissp Human Resources Sustainment Uptime Qualification Incident Response Posture System Sage Act International Standards Tank Cloud Based Strategies Enterprise Architecture Network Installation Risk Management Policy Sla Security Design Network Architecture Mission Critical Coppa Vmware Esx Xsan Rsa Security Information Security Standards Information Technology Energy Regulatory Portability Perspective C Orchestration Network Design Business Development Communication Ferc Email Servers Privacy Law Data Security Safeguard Data Logging Paas Cloud Computing Soho Responsibility Usa Firewalls Fips Regulations International Active Directory Itil Threat Start Ups Ipsec Security Architecture Design Vendor Management Raptor Compliance Sensitive Information Solarwinds Addressing Proposal Writing Cryptography Risk Health Insurance Certificate Services North American Csd Automation Certify Air Force Logic Archer Infrastructure Us Army Vulnerability System Configuration Finance Access Control Cloud Security 10.x Temporary Placement At&t Corporate Actions Information Assurance Delivering Results Medicaid Maxwell Auditing Grc Sharepoint Accounting Linux Workflow Disaster Response Networking Local Area Network Mcafee Information Rights Management Validation Engineering Cisco Ucs Connecting Testing Probability Disaster Recovery Ssl Confidentiality Solution Mitigation Pptp System Monitoring Results Driven Microsoft Partnerships Security Policy Provisioning Countermeasures Advertising Agency .net Contingency Planning Management System Network Infrastructure Birmingham Payment Industry Erp Maturity Armed Security Audits Project Planning Security Clearance Metric Directories Media Technical Solutions Direct Store Delivery Security Certification Nuclear Justice Cisco Technologies Nsa Level 2 Intrusion Detection Sidewinder Army It Risk Management Munitions Microsoft Sql Server Fiscam Process Improvement Oracle Business Process Management It Operations Corporate Security Mil Audit Internal Controls Libraries Cmmi Ffiec Civilian Architecture Evaluation Process Optimization Databases Os X Workforce Key Management Top Secret Windows Server Checkpoint Vendors Medicare Cobit Enterprise Risk Management Sales Gauntlet Client Interface Security Controls Sei Serving Revenue Streams Network Security Cross Functional Team Leadership Windows 7 Organizational Structure Detection Revenue Outsourcing Science Security Integration Mysql Pki Publications Defense Cybersecurity Support Functions Automotive Telecommunications Strategy Wind Marines Encryption Solaris Corporate Governance Boundary Pix Analysis Business Continuity Planning L2tp Laboratory Professional Associations It Compliance Rfp Xen Dns Evaluations Operating Systems Accountability Applications Hipaa Iam Open Architecture Risk Management Framework User Requirements Decision Support Suite Dell Computers Multi Tenant Ccna Network Engineering Network Administration National Security Governance Sarbanes Oxley Act Contractual Agreements Fisma Cmms Malware Analysis Unix Diacap Service Recovery Linkedin Material Requirements Planning Internal Audit Council Interfaces Reviews Consortium Computer Security Bmc Patrol Emc Program Management Nrc Platforms Customer Engagement Switching Hitrust War Cics Cas Team Building Togaf Consulting Insurance Windows Ato Authentication Unisys Juniper Technologies Offerings Smil Information Security Management Assessment Management It Governance Enterprise Systems High Impact It Service Management Routing Leadership Nerc Ldap Information Systems Sdlc Rfq Execution It Audit Doi Business Services Data Recovery Team Leadership Offering Engagements Concept Design Vulnerability Management Usda Cooperation Training Financial Institutions Enterprise Software Critical Systems Self Insurance Virtual Titan Information Processing Incident Agriculture Third Party Applications Esa Internet Security Information Management It Management Business Resilience Computer Forensics Information Security Process Maturity Workstations Accreditation Cisco Ips Ips Strategic Planning Cost Savings Operations Sarbanes Oxley Server Configuration Marine Corps Glba Technical Support Microsoft Certified Professional Iso 27001 Business Process Improvement Measurements Tmg Sabsa Process Management Pci Dss Dod Conforming Cross Training Mcitp Electronics Prevention Nist Government Connectivity Aptitude Business Continuity Agents Business Process Federal Government Program Development Treasury Saas Directives Mis Combat Wells Fargo Ciso

William Godwin Education Details

  • University Of Alabama At Birmingham
    University Of Alabama At Birmingham
    Management

Frequently Asked Questions about William Godwin

What company does William Godwin work for?

William Godwin works for Giri Ring

What is William Godwin's role at the current company?

William Godwin's current role is Founder.

What is William Godwin's email address?

William Godwin's email address is wi****@****lth.com

What is William Godwin's direct phone number?

William Godwin's direct phone number is +167860*****

What schools did William Godwin attend?

William Godwin attended University Of Alabama At Birmingham.

What skills is William Godwin known for?

William Godwin has skills like Business Process Design, Pmo, Sap Products, Iso, Fortune 500, Clinical Research, Penetration Testing, Frameworks, Netsuite, Information System, Healthcare Information Technology, Spiral.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.