Uncommon.

InfoSec.

Acumen.

My professional cybersecurity and data privacy path is unconventional.

Yet, since my career began 25 years ago, Information Security has been integral to my success as…

  • Investigative & Financial Journalist

  • Entrepreneur

  • Consultant

  • Content Strategist

  • Thought Leader

    …allowing me to master eclectic skills in different industry domains.

  • Gained access to isolated, 20-acre high-security complex where Australia detained Afghan and Iraqi refugees after 9/11. Wrote story for The New York Times that ran Sunday on A1.

  • Investigative work resulted in stories that were published in The Wall Street Journal that revealed bank and securities law violations and drew regulatory scrutiny.

  • Oversaw disaster recovery and risk-management challenges when my consulting firm’s managed service provider suffered a cyber attack 3 years after I started the business.

  • Created plan to increase security posture — assessed threats, vulnerabilities and risks related to firm’s most critical functions, assets and data.

  • Took over network administration and all related functions—including Identity and Access Managment— after managed service provider and website host got hacked.

    Solely responsible as network administrator since 2013.

Cybersecurity & Data Privacy Certifications

  • Certified Information Systems Security Professional

    ISC(2) [ID/Exam# 120183]

    (Provisionally passed March 3, 2023.)

  • Certified Information Privacy Professional/US

    International Association of Privacy Professionals [Cert# 0005749651]

  • CompTIA [ID# COMP00102209136]

  • Certified Cybersecurity Awareness Professional

    [#10241]

"I decipher cyber."

~

"I decipher cyber." ~


I translate technical topics in ways that connect with humans and get results.

In other words:

  • Effective awareness programs that inspire behavior change and fortify enterprise security posture.

  • Calm and clear crisis communication with C-suite and other stakeholders around data breaches and incident response issues.

  • Proactive solutions to mitigate risk and minimize the largest attack surface— the human layer of cybersecurity.

Cyber Content Thought Leadership