Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Cyber Strategist | Captivator | Change Agent | Speaker
Industry
Apparel / Fashion
About
I’m at my best when straddling boundaries: bringing different people, organizations, disciplines, and worldviews together. I'm proud of my professional journey. Come relive the ride with me for a moment:
It began with a scandal. After the Enron fallout, Congress demanded private companies improve their accountability. So BAM! IT security goes mainstream. Instant career liftoff for me. I dabble in the technical – even pretend to live in The Matrix (pen tester). Then I get a “business itch” that needs scratching, so I aim upward and begin helping companies with enterprise risk management. I was connecting all sorts of viewpoints together (from the weeds to the clouds). Fun!
Next, I feel c...
Likes
(16)Future of IoT: Key Challenges to Face
Altoros
•
6 years ago
10 predictions for the future of IoT
Ahmed Banafa
•
8 years ago
Crew Resource Management
Lisa West
•
10 years ago
Cyber security: A roadmap to secure solutions
Schneider Electric
•
10 years ago
[Webinar Presentation] Best Practices for IT/OT Convergence
Schneider Electric
•
10 years ago
How the Convergence of IT and OT Enables Smart Grid Development
Schneider Electric
•
10 years ago
Enter into the 4th Industrial Revolution
Dassault Systemes
•
10 years ago
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Community Protection Forum
•
10 years ago
Industrial Control System Cyber Security and the Employment of Industrial Firewalls as a Partial Solution
Schneider Electric
•
11 years ago
Cyber-Physical Systems - contradicting requirements as drivers for innovation
Michael Heiss
•
8 years ago
Data science and_analytics_for_ordinary_people_ebook
Jeffrey Strickland, Ph.D., CMSP
•
8 years ago
26 Time Management Hacks I Wish I'd Known at 20
Étienne Garbugli
•
11 years ago
IoT Developer Survey 2015
Ian Skerrett
•
9 years ago
Monetizing the Internet of Things: Creating a Connected Customer Experience
Zuora, Inc.
•
9 years ago
7 Principles of Agile Enterprises
Mendix
•
10 years ago
IT vs. OT: ICS Cyber Security in TSOs
Community Protection Forum
•
10 years ago
Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Cyber Strategist | Captivator | Change Agent | Speaker
Industry
Apparel / Fashion
About
I’m at my best when straddling boundaries: bringing different people, organizations, disciplines, and worldviews together. I'm proud of my professional journey. Come relive the ride with me for a moment:
It began with a scandal. After the Enron fallout, Congress demanded private companies improve their accountability. So BAM! IT security goes mainstream. Instant career liftoff for me. I dabble in the technical – even pretend to live in The Matrix (pen tester). Then I get a “business itch” that needs scratching, so I aim upward and begin helping companies with enterprise risk management. I was connecting all sorts of viewpoints together (from the weeds to the clouds). Fun!
Next, I feel c...