Bill W.

Bill W. Email and Phone Number

Cyber Threat Intelligence | Incident Response | Threat Hunting | Investigations | Event Analysis @ Bloomberg LP
Bill W.'s Location
New York City Metropolitan Area, United States, United States
Bill W.'s Contact Details

Bill W. work email

Bill W. personal email

n/a
About Bill W.

With 25 years of dedicated Information Security leadership experience, I have honed a comprehensive expertise spanning incident response, threat intelligence, vulnerability management, security operations, penetration testing, red teaming, security engineering, and identity & access management. My journey has taken me through a myriad of roles, each contributing to my deep understanding of the cybersecurity landscape and how to navigate its complexities effectively.Currently, as the Global Head of Cyber Security Operations at Bloomberg LP, I lead a talented team tasked with the critical responsibility of providing services related to operational and tactical threat intelligence, threat hunting, detection engineering, incident response, data loss protection and ensuring 24x7 security event monitoring and triage.My career is underpinned by a solid foundation of professional certifications, reflecting both my commitment to continual learning and my expertise in the field. I am an active holder of the CISSP, GSOM, GSTRT, GCTI, and GMON certifications, and although my CISM certification has expired, the knowledge and skills it represents remain integral to my professional ethos.My specialties encapsulate a broad spectrum of cybersecurity disciplines, including but not limited to:• Information Security Management• Information Security Architecture & Design• Vulnerability Management• Cyber Threat Intelligence• Malware Mitigation• Intrusion Detection / Prevention• Cybersecurity Investigations & Forensics• Data Loss Prevention• NIST Cybersecurity Framework• Wireless Security; Firewalls; Remote Access SecurityThis extensive skill set, combined with a proactive approach to cybersecurity challenges and a leadership style that fosters collaboration and innovation, has enabled me to contribute significantly to the organizations I've been part of. I remain dedicated to the continuous improvement of cybersecurity practices, aiming to not only protect but also empower the businesses and clients I serve.Note: All views and opinions shared are my own and not that of my employer.

Bill W.'s Current Company Details
Bloomberg LP

Bloomberg Lp

View
Cyber Threat Intelligence | Incident Response | Threat Hunting | Investigations | Event Analysis
Bill W. Work Experience Details
  • Bloomberg Lp
    Global Head Of Cyber Security Operations
    Bloomberg Lp Dec 2015 - Present
    New York, Ny, Us
    In my role as the Global Head of Cyber Security Operations at Bloomberg LP, I lead a dynamic and high-performing team dedicated to safeguarding the company's digital assets against emerging cyber threats. My team is at the forefront of cyber defense, overseeing a comprehensive suite of security capabilities including:• Operational and Tactical Threat Intelligence: We delve deep into the cyber threat landscape, gathering actionable intelligence to preemptively counter potential threats before they can impact our operations.• Threat Hunting and Detection Engineering: Through proactive threat hunting and sophisticated detection engineering, we identify and neutralize advanced threats, ensuring the robustness of Bloomberg's cyber defenses.• Incident Response: We are responsible for rapid and effective incident response, minimizing any impact through swift action and strategic mitigation efforts.• 24x7 Security Event Monitoring and Triage: We maintain vigilance around the clock, with continuous monitoring and triage of security events to protect against unauthorized access and cyber-attacks.• Data Loss Protection: We oversee the Data Loss Protection (DLP) program which is a critical pillar in safeguarding our organization's intellectual property, customer data, and regulatory compliance information. By implementing robust DLP strategies, we proactively mitigate risks associated with data loss and exposures, thereby maintaining the trust of our clients and partners, and upholding our reputation for operational excellence and integrity. • Security Operations Solutions Design: We drive the design and requirements for innovative security solutions that enhance our operational efficiency and security posture.
  • Ca Technologies
    Sr Director, Cyber Security
    Ca Technologies May 2006 - Dec 2015
    San Jose, California, Us
    As a global leader and driving force behind protecting the confidentiality, availability, and integrity of our company's systems, networks, applications, and information, I spearheaded a holistic approach to cybersecurity. My leadership ensured robust defensive controls and fused Security Operations & Engineering into a cohesive Cybersecurity Program. Key accomplishments included:• Strategic Integration: Unified disparate security disciplines, enhancing the organization's resilience against cyber threats.• Incident Response Framework: Developed and implemented a comprehensive Computer Security Incident Response Plan (CSIRP) and established a dedicated CSIRT / SOC team to promptly and effectively address security events / incidents.• Advanced Security Solutions: Engineered and deployed a comprehensive suite of cybersecurity technologies, including Endpoint Protection, Next-Generation Firewalls, Network IDS, SIEM, SSO, and MFA, significantly bolstering our security posture.• Collaborative Efforts: Forged strategic partnerships with legal teams to deliver world class security incident response services.• Acquisition Security Assurance: Navigated through numerous strategic acquisitions, meticulously integrating assets and resources without compromising security standards.• Awareness and Education: Launched and led security awareness campaigns encompassing New Hire Training, Annual Security Awareness, Secure Coding, and System Hardening.• Proactive Security Measures: Directed company-wide social engineering campaigns to evaluate and enhance employee security awareness, crucial in building a culture of cybersecurity mindfulness.Through these initiatives, I elevated our cybersecurity controls but also cultivated a culture of security awareness, directly contributing to the organization’s resilience and strategic agility in the face of evolving cyber threats.
  • Ca Technologies
    Senior Security Architect
    Ca Technologies Apr 2002 - May 2006
    San Jose, California, Us
    guiding the company's breach response, security awareness training, and the development and enforcement of comprehensive security policies, procedures and protocols. My strategic oversight significantly bolstered our security posture through:• Global Security Initiatives: As Solution Delivery Lead and/or Architect, I spearheaded key security projects including an Endpoint Protection overhaul, Internal Network Segmentation, Enhanced Perimeter Access Controls, Outbound Proxy improvements, and the enhancement of Patch & Vulnerability Management processes/tooling. I also established a robust Penetration Testing Program and deployed sophisticated network intrusion detection and prevention systems.• Vulnerability Reduction Campaign: Initiated and led a campaign that substantially minimized the company's external attack surface by reducing exploitable vulnerabilities from 26% to well below 1%. Utilizing a Six Sigma approach ensured that my team and I executed this effort with precision. This effort also helped establish a go forward process that would be simpler for supporting teams to keep dangerous / perimeter vulnerabilities at bay. • Integration of Acquired Companies: Managed the security integration of multiple acquisitions, strategically planning and implementing measures to prevent security risks during transitions. These efforts enabled a more seamless integration without negative security implications for either the parent company or the newly acquired entities.
  • Secure Enterprise Solutions
    Senior Security Consultant
    Secure Enterprise Solutions Oct 1999 - Apr 2002
    In my role as a Security Engineer at Secure Enterprise Solutions, I provided expert security services both internally and to a diverse client base. My key contributions included:• Security Solutions Implementation: Spearheaded the deployment of robust security measures including Intrusion Detection Systems (IDS), Firewalls, and VPN solutions, ensuring the protection and integrity of customer applications across a variety of industries.• Comprehensive Security Assessments: Led detailed Penetration Testing exercises, Risk Assessments, and Security Architecture Reviews for clients, identifying vulnerabilities and recommending strategic improvements to bolster their security posture.• Forensic Investigations: Conducted thorough computer forensic investigations for both public and private sector clients, assisting in the swift resolution of security incidents and enhancing their overall incident response capabilities.

Bill W. Education Details

  • State University Of New York At Plattsburgh
    State University Of New York At Plattsburgh
    Computer Science / Minor Mathematics
  • Stony Brook University
    Stony Brook University
    Studied Mathematics

Frequently Asked Questions about Bill W.

What company does Bill W. work for?

Bill W. works for Bloomberg Lp

What is Bill W.'s role at the current company?

Bill W.'s current role is Cyber Threat Intelligence | Incident Response | Threat Hunting | Investigations | Event Analysis.

What is Bill W.'s email address?

Bill W.'s email address is william.welch@ca.com

What is Bill W.'s direct phone number?

Bill W.'s direct phone number is (631) 342*****

What schools did Bill W. attend?

Bill W. attended State University Of New York At Plattsburgh, Stony Brook University.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.