Websites
Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Interests
Additional Information
Affiliations
Blockchain Council
Work Availability
Work Preference
Quote
Software
Interests
Languages
IOT [Mater]
Matter
Timeline
SoftwareDeveloper
Scottard
 Banks

Scottard Banks

Phoenix,AZ

Summary

Knowledgeable IT security professional with 30 years of experience designing and implementing security solutions in high-availability environments. Skilled in CISO and Enterprise Risk and adept at delivering strong risk management practices. Goal-oriented IT professional with significant success in planning, analyzing and implementing of security plans and initiatives. Excel in developing comprehensive, secure network designs and systems. Highly-motivated employee with desire to take on new challenges. Strong worth ethic, adaptability and exceptional interpersonal skills. Adept at working effectively unsupervised and quickly mastering new skills. Hardworking employee with customer service, multitasking and time management abilities. Devoted to giving every customer a positive and memorable experience. Committed job seeker with a history of meeting company needs with consistent and organized practices. Skilled in working under pressure and adapting to new situations and challenges to best enhance the organizational brand.

Overview

34
34
years of professional experience
7
7

Certifications

9
9

Years Post Education

Work History

FMLA

Medical Leave of Absence
Anthem , az
04.2024 - Current
  • Collaborated with medical professionals to communicate patient needs with accuracy and speed using hospital and medical codes.
  • Maintained levelheadedness and efficiency in high-pressure situations, effectively prioritizing tasks to save lives and provide medical care.
  • Conducted equipment and vehicle checks to maintain continuous and safe operation.
  • Utilized oxygen tanks, EKG and IVs to perform various medical procedures.B
  • Administered CPR, oxygen and other life-saving medical treatments.
  • Immobilized patient for placement on stretcher and ambulance transport.

CISO

UCT
Chandler, Arizona
08.2023 - 04.2024
  • Develop and implement a strategic, long-term information security strategy and roadmap to ensure that UCT’s information assets are adequately protected.
  • Work with senior leaders across the business to assess and communicate acceptable levels of risk.
    Identify, evaluate, and report on information security risks, practices and projects to the Executive Committee and the Board of Directors, and provide subject matter expertise on security standards and best practices (e.g., FFIEC, Dodd-Frank, SOX, PCI, etc.).

Develop, mentor, and manage a high performing staff of information security professionals.
Chair the information security steering committee (or governance board, or advisory board).
Develop the Board’s understanding of security beyond a ‘compliance-only’ view.
Lead the development of up-to-date information security policies, procedures, standards, and guidelines, and oversee their approval, dissemination, and maintenance.
Ensure that the security management program is in compliance with applicable laws, regulations, and contractual requirements.
Act as the champion for the enterprise information security program and foster a security-aware culture.
Oversee the evaluation, selection and implementation of information security solutions that are innovative, cost-effective, and minimally disruptive.
Partner with enterprise architects, infrastructure, and applications teams to ensure that technologies are developed and maintained according to security policies and guidelines.
Manage regular intrusion detection and vulnerability reporting, internal and external IT audit groups reviews, and the coordination of all required fixes.
Develop business metrics to measure the effectiveness of the security management program and increase the maturity of the program over time.

  • Monitor the industry and external environment for emerging threats and advise relevant stakeholders on appropriate courses of action.
  • Liaison with law enforcement and other advisory bodies as necessary to ensure that the organization maintains a strong security posture.
  • Oversee incident response planning and the investigation of security breaches, and assist with any associated disciplinary, public relations and legal matters.
  • Oversee and lead the creation, communication, and implementation of a process for managing vendor risk and other third-party risk.
  • Lead due diligence and post integration activities related to information security for all M&A activity.
  • Organized professional with expertise in managing resources and optimizing performance. Proficient in providing valuable insights and supporting decision-making processes. Committed to enhancing productivity and contributing to overall success.

Chief Information Security Officer/ EU

DPO, SmartRent.com LLC
07.2019 - 07.2023
  • IoT SmartHome, automation solution company
  • Creation of overall strategy around risk, privacy, compliance, and internal audit program
  • That interacts with Sales, product, engineering, operation, and physical security
  • Developed and implemented the overall global privacy strategy and framework
  • Creation of overall responsible disclosure and intake system for continuous testing of every product and service offering deployed
  • Facilitated and identified security framework for COVID-19 and work-from-home protocol
  • Implementation and coordination of certification and attestation
  • obtained ISO 27001:2013 certification and SSAE 18- SOC 2 Type II
  • Expanded within AWS and architecture of fully redundant solutions and compliance within production services
  • Implemented ISMS with no exclusion with full creation of policy library, vendor, vulnerability, risk, and internal audit function
  • Creation of a 5-year security roadmap and KPI for governance structure and board reporting
  • Lead initiative to convert SOW and Manual to workflows that are being automated
  • Designed and implemented of security awareness LMS that leverages animation, gamification, and interactive training
  • Creation of content for marketing and external websites
  • Working with shareholders to implement and coach other holding companies
  • Implementation of Salesforce, HRIIS, and automation tool security
  • Auditor and author of Internal Audit framework, schedule, and reporting
  • Implementation and administration of security controls, CI/CD scans, technical security, and WAF security controls as well as directory and SAML 2.0 and Auth 2.0 profiles data
  • Creation of data dictionary and security controls and retention and risk statements
  • Development of (Alliance/ Consortium) to help shape reasonable industry standards in the vertical to ensure proper, effective, and efficient security solutions and interop.
  • Managed new hire trainings and onboarding to educated employees on company policies and procedures.
  • Investigated information security breaches to identify vulnerabilities and evaluate damage.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Audited networks and security systems to identify vulnerabilities.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Used penetration testing tools to identify weaknesses in security systems. As part of organizationAl bug bounty program.
  • Mentored junior employees in departmental activities and procedures.

Chief Information Security Officer

WebPT LLC
Phoenix, Az
02.2016 - 09.2019
  • Web-based Physical Therapy EMR Solution
  • Creation of a comprehensive certified risk-based information security program and governance structure
  • Design and development of risk-based methodology and information security program
  • Obtained ISO 27001:2013 certification over EMR, Medical billing, and operational support organization(s), HITRUST rating 5, PCI -DSS 3.2 certification (Marketplace and Salesforce) Design and implementation of Information Security Architecture and
  • Secure SDLC that includes cloud providers (AWS, Gsuite, and
  • Azure) and private data center Creation of an AI-based orchestration incident response framework that included 3rd party and customer monitoring, with the integration of SIEM and smart response threat protection
  • Designed and Implementation of comprehensive risk escalation
  • Alignment of awareness program and gamification that align high risk (phishing, ransomware, and extortion ware trending) Budget forecasting and management of financial spending, ROI, and TCO
  • Reduce yearly spending by highly effective negotiation and partnership
  • Management of multi-location security professionals across 9 states and offshore and nearshore personnel.
  • Engineered and oversaw [Type] environment by developing zones and aliases.

Executive Security Strategist

Healthcare System, California Statewide
06.2015 - 06.2016
  • University of California healthcare system
  • Oversight and management of t UC medical system with mentoring & development of 12 university management systems
  • Established and trained CISOs across the systems and criteria for evaluation
  • Creation of organizational structures based on the NIST CSF framework
  • Scottard Banks
  • Executive Risk and Information Security
  • Senior level Information Security and Risk executive who innovates and enhances security and risk programs
  • Dedicated professional and certified:
  • C-CISO, CRISC, CISSP, NSA IAM, ISO
  • Communicated and enforced compliance with state and local laws while emphasizing company standards of professionalism and safety.
  • Used two-way communication to generate enthusiasm and foster atmosphere receptive to open exchange.
  • Inspected security systems to maintain consistent operational availability and to detect evidence of tampering.
  • Warned violators of rule infractions and escorted unauthorized persons off premises.
  • Maintained calm composure during emergencies while communicating with local law enforcement and emergency response services.

Interim Chief Information Security Officer Honor

Health/Scottsdale Healthcare
Scottsdale, Az
02.2013 - 05.2015
  • We are a non-profit, local healthcare organization known for community service and outstanding medical quality
  • Our organization encompasses; - 5 Magnet designated acute care hospitals - 11,000 employees
  • Created a role to address overall deficits and weaknesses, in the absence of a structured information security program
  • Performed Hitech audit on all IoT and address FDA security absence in the solution being put into the organization
  • Created strategic information security program and roadmap
  • Provided annual State of Security presentation to the Board of
  • Directors and auditing board on risk
  • Introduced a cost-reducing process based on Six Sigma to address acquisition, mergers, and joint development
  • Reduced Technology costs by negotiating best-of-breed vetting
  • Deputy CIO /CISO Xerox HRO
  • Managed new hire trainings and onboarding to educated employees on company policies and procedures.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Audited networks and security systems to identify vulnerabilities.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Reviewed security bulletins and vulnerability patch releases.
  • Mentored junior employees in departmental activities and procedures.
  • Collaborated with stakeholders to implement and update disaster recovery plans.
  • Researched and designed advanced computer forensic tools.

Xerox Corporation
Phoenix, Az
02.2011 - 01.2013
  • (NYSE: XRX) is a technology leader that innovates the way the world communicates, connects, and works
  • Designed and Implemented SAAS/PAAS/IAAS security solution and security services for Xerox's HRO solution
  • Which included IdP, WAF, IDS/IDP, SIEM, database encryption, and DLP
  • Designed risk management scorecards that were presented graphically
  • Managed data center operations from 5 to 2
  • Provided implementation and guidance in SOW and contractual solution, and provided compliance and security effectiveness against EU Xerox Corporation (NYSE: XRX) is a technology leader that innovates the way the world communicates, connects, and works Privacy Act
  • Obtained regulation and certification; SSAE 16 SOC I Type and ISO 27001:2013
  • As well as vendor management protocols that reduced risk and accounted for vendor interaction.

Chief Information Security Officer

Arizona State University
01.2005 - 02.2011
  • Managed new hire trainings and onboarding to educated employees on company policies and procedures.%
  • Managed new hire trainings and onboarding to educated employees on company policies and procedures.
  • Advanced technical features and improved performance of network hardware.
  • Managed organizational security posture by monitoring networks for potential threats, cyber espionage, malware and internal sabotage.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Used penetration testing tools to identify weaknesses in security systems.
  • Designed, implemented and maintained security systems and controls.
  • Adaptable individual with exceptional interpersonal skills and talent for building relationships. Known for delivering outstanding service and enhancing client satisfaction. Focused on fostering positive interactions and creating collaborative environment.
  • Developed strong organizational and communication skills through coursework and volunteer activities.
  • Proved successful working within tight deadlines and a fast-paced environment.
  • Developed strong communication and organizational skills through working on group projects.
  • Versatile professional with strong problem-solving skills and history of adapting to diverse challenges. Applies innovative solutions and technical expertise to deliver exceptional results. Committed to streamlining processes and advancing organizational objectives.
  • Demonstrated leadership skills in managing projects from concept to completion.
  • Managed time efficiently in order to complete all tasks within deadlines.
  • Maximized performance by monitoring daily activities and mentoring team members.

Chief Security Officer

Arizona State University
02.2005 - 01.2011
  • (ASU) for a well-rounded college education
  • The research university offers a wide variety of bachelor's, master's, and doctoral degree programs, with more than 250 majors
  • Planned, designed, and implemented a fully robust security program that adhered to HIPAA, FERPA, PCI-DSS 3.0, DoD, FISMA, GLBA, and local and state laws and regulations
  • Lead University-wide, security and compliance committee
  • Architecture and engineering of overall awareness program for 75000 students, 5000 staff, and 800 faculty guests yearly
  • Appointed to the Pandemic and Virginia Tech security initiative enabling AI-based review solutions
  • Engaged to add to legal and security compliance contracts and requirements
  • Designated HIPAA, Negotiated Statewide contracts for IdM, Vulnerability Management for ASU, NAU, and UofA
  • Maintained a high-security environment that aligned with FISMA, NIST, and FIPS requirements
  • With highly restricted environments based on DoD with a Bio-design facility
  • Addressed problems quickly and reported clear information while working under minimal supervision.
  • Developed and grew staff competencies through team development, implementation and support of specific training for various responsibilities.
  • Oversaw safety of guests, employees and and assets by enforcing and regulating security policies and procedures and monitoring and maintaining security systems.

Principle

Security Architect Teradata NCR, Boise ID
02.2003 - 01.2005
  • Teradata leverages all of the data, all of the time, so customers can analyze anything, deploy anywhere, and deliver analytics that matters most to them
  • And we do it on-premises, in the Cloud, or anywhere in between
  • Created a delivery system of security services to support customer engagements
  • Reviewed and aligned security programs with legislation and state and federal requirements
  • Created solutions to support manufacturing banking and government security organization
  • OCC, Federal Reserve, and OTS bodies were key parties represented
  • Maintained and developed customer security solutions based on engagement and SOW requirements
  • Management financials and time forecasting to maintain the budget and add value.
  • Informed students and parents of policies and procedures regarding student behavior and disciplinary actions.
  • Resolved various situations to cultivate strong student and parent relationships.

Senior Director

First Command Financial Services
Fort Worth, Tx
05.2001 - 01.2003
  • First Command Financial Services creates customized financial plans for members of the United States Military
  • Established security programs in banking and
  • Implemented Information Security Program, Disaster Recovery,
  • FFIEC Audit
  • Open-Source IPS solutions implementation
  • Policy and Procedure Development and approval

Information Security Architect

JDA Software, Farmers Branch
, Tx
01.1997 - 01.2001
  • Designed follow the sun VPN solution, 2fa, ROI/TCO model and business case Vulnerability management, VPN 99.999% uptime security solutions

Regional Security Manager

SBC,Nevada Bell, Pacific Bell
Plano, TX
01.1995 - 01.1997
  • Optimized website exposure by analyzing search engine patterns to direct online placement of keywords or other content.
  • Utilized graphic design software to prepare storyboards and mock-ups.
  • Optimized text, graphics or multimedia assets for SEO or display and usability on internet-connected devices.
  • Evaluated new emerging media or technologies and made recommendations for application within internet marketing or search marketing campaigns.
  • Identified issues, analyzed information and provided solutions to problems.

Provider Information Risk Management Consultant

KPMG, BIig 5 Consultancy Services
Manhattan, NY
01.1993 - 01.1995
  • Identified potential risk exposure to develop corrective action plans.
  • Conducted program analysis to improve efficiency and cost-effectiveness of operations.

Senior Network Engineer SuperNet

ISP, Denver Co
01.1991 - 01.1993
  • Created and supported West Pop and infrastructure for networks, and Sonnet implementations IETF task force on domains, and MPLS
  • PERSONAL PROJECTS
  • Elliptical Block chaining Using ECC to generate blockchain with less energy consumption
  • Risk-Based Artificial Intelligence _ RAI platform and cloud agents help facilitate the risk posture and integration of any risk-based tool for integration and compile risk strategies and safeguards with predictive analysis
  • Successfully deployed server overhaul of both wired and wireless networks, completing projects ahead of anticipated deadline.
  • Reviewed system logs to determine usage levels, bandwidth, performance and system security to target inefficiencies and implement appropriate solutions.
  • Effectively managed variety of mission-critical network tasks, which included vulnerability and application patching, data backups and network configurations.
  • Performed root cause analysis of problems, documented faults in tracking system and generated daily reports.

Education

Certificate Diploma Competency - Security Management

ALAMEDA
Idaho
06.2003 - 08.2009

Bachelor of Science - Technology Engineering

Charter University
Irvine, CA
06.1993 - 06.1996

Certification - ISO Lead Auditor

BSI
07.2005 - 08.2005

Certification - C|CISO

ISACA
06.2007 - 06.2007

Certificate - CISSP

IC2
02.1999 - 03.1999

Skills

  • SOFT SKILLS
  • Public Speaking
  • Negotiation
  • People Management
  • Crisis Management
  • Presentation
  • Communication
  • Writing
  • Financial Management
  • Team Building
  • KPI's
  • Vendor Management
  • Merger and Acquisitions
  • Protecting Networks
  • Managing Security Breaches
  • Resource Allocation
  • Symantec Blue Coat Data Loss Prevention
  • Reliable & Trustworthy
  • Team Management
  • Training & Development
  • Organizational Skills
  • PPE Use
  • Active Listening
  • Customer Service
  • Critical Thinking
  • Problem Resolution
  • Relationship Building
  • Supervision & Leadership
  • Good Work Ethic
  • Data Management
  • Friendly, Positive Attitude
  • People Skills
  • Flexible Schedule
  • Computer Skills
  • Conflict Resolution
  • Microsoft Office
  • Mentoring
  • AI and Machine Learning
  • Policy and Procedures
  • Information Risk Management
  • Business Continuity /Resilience and DR Governance
  • Consensus Building
  • KPI/KRI and Risk Appetite/Tolerence

Accomplishments

  • Award : RIAA secure Arrchitecture
  • i2 Award - on the fly.VPN
  • Accreditation - asset return triangulation
  • Nortel Award - Secure Within

Certification

ISO Certification,

ASU

SmartRent

WebPT

St Joseph Hospital

NovaSignal

lLifeLock

i2 Technologies

Southwestern Bell

FFIEC

Bank of America

First Command Bank

SSAE 18 SOC 2 Type II

LifeLock

NovaSignal

SmartRent

WebPT

Mentoring AI and Machine Learning Policy and Procedures Information Risk Management Business Continuity /Resilience and DR Governance and Consensus Building KPI/KRI and Risk Appetite/ opportunity Risk versus risk

Interests

Quantum Mechanics Statistical Analysis Artificial Intelligence Block Chain Machine Learning /Orchestration Human Firewalling New Age Attack Vectors ( Cyber Security ) Risk Reduction Algorithms SUPPORTED CAUSES Autism Prevention Information Risk Management Advance Calculation TECHNICAL SKILLS Information Security Firewall/ Attack Vector, Emerging Attacks, SIEM, Security architecture, Technical Control Implementation, Networking, IPSEC, SSL, TLS 1.2., IdP, IDM, SAML, OAuth 2.0, Next Gen Firewall, Vulnerability Management, OS, SAAS, Cloud (Gsuite/Asure/AWS)Security, Database security, Authorization/Authentication, Code Review, DevSecOps, Information Risk Management Methodology, Scoring, Treatment, Risk Appetite, Risk Scorecards, Key Risk Indicator

Additional Information

  • Negotiated and evaluated security structures and architectures based on technology acquisitions. Development or initial budget-based negative funding providing a revenue stream. Responsible for maintaining Dynamic Clinical’s standard operating procedures and keeping the team’s security and privacy responsibilities up-to-date. Responsible for a bioinformatics security framework

Affiliations

  • IEEE -ALUMNI

Blockchain Council

Blockchain Council is an authoritative group of subject experts and enthusiasts who are evangelizing the Blockchain Research and Development, Use Cases and Products and Knowledge for a better world. Blockchain technology is more than just a technology, which is emerging rapidly with a vast scope in the future. Blockchain acts as a financial network, software, distributed ledger, etc. Owing to this multitude of benefits and features, companies are now shifting their centralized and traditional working system to this trending and futuristic technology “Blockchain”.

Blockchain Council creates an environment and raises awareness among businesses, enterprises, developers, and society by educating them in the Blockchain space. We are a private de-facto organization working individually and proliferating Blockchain technology globally.

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Work Preference

Work Type

Full TimeGig Work

Work Location

RemoteHybrid

Important To Me

Work from home optionFlexible work hoursCompany CultureWork-life balanceStock Options / Equity / Profit Sharing

Quote

There is a powerful driving force inside every human being that, once unleashed, can make any vision, dream, or desire a reality.
Tony Robbins

Software

Java

AWS

GCP

Azure

NetSuite

Saleforce

WAP

SBOM

Atlassin Software

GitHub

GitLab

SAAS

CCPA

Nydfs

GDPR

Pipedia

RDMS

Elixir

Mondo DB

Elixir

Vector DB

SDLC

Qualys

Rapid 7

Cloud strike

EDR

NDR

IDM

IDP

Interests

AI Modeling

IOT

IIOT

Blockchain

Advisory Board

Non-profits

Languages

French
Native language
Arabic
Intermediate (B1)
B1
English
Proficient (C2)
C2

IOT [Mater]

Matter is the new universal standard for smart home devices. Many smart home devices today aren't compatible with each other because they use different standards and protocols. Matter was specifically designed to ensure that devices from different manufacturers can talk to each other.

Matter

Matter is the new universal standard for smart home devices. Many smart home devices today aren't compatible with each other because they use different standards and protocols. Matter was specifically designed to ensure that devices from different manufacturers can talk to each other.

Timeline

FMLA

Medical Leave of Absence
04.2024 - Current

CISO

UCT
08.2023 - 04.2024

Chief Information Security Officer/ EU

DPO, SmartRent.com LLC
07.2019 - 07.2023

Chief Information Security Officer

WebPT LLC
02.2016 - 09.2019

Executive Security Strategist

Healthcare System, California Statewide
06.2015 - 06.2016

Interim Chief Information Security Officer Honor

Health/Scottsdale Healthcare
02.2013 - 05.2015

Xerox Corporation
02.2011 - 01.2013

Certification - C|CISO

ISACA
06.2007 - 06.2007

Certification - ISO Lead Auditor

BSI
07.2005 - 08.2005

Chief Security Officer

Arizona State University
02.2005 - 01.2011

Chief Information Security Officer

Arizona State University
01.2005 - 02.2011

Certificate Diploma Competency - Security Management

ALAMEDA
06.2003 - 08.2009

Principle

Security Architect Teradata NCR, Boise ID
02.2003 - 01.2005

Senior Director

First Command Financial Services
05.2001 - 01.2003

Certificate - CISSP

IC2
02.1999 - 03.1999

Information Security Architect

JDA Software, Farmers Branch
01.1997 - 01.2001

Regional Security Manager

SBC,Nevada Bell, Pacific Bell
01.1995 - 01.1997

Bachelor of Science - Technology Engineering

Charter University
06.1993 - 06.1996

Provider Information Risk Management Consultant

KPMG, BIig 5 Consultancy Services
01.1993 - 01.1995

Senior Network Engineer SuperNet

ISP, Denver Co
01.1991 - 01.1993
Scottard Banks