Dave Tyson , MBA, CPP, CISSP Detailed Security Profile August 2011
Overview 27 Years security industry experience National and International Security Industry Award Winner Internationally Published One of the  only  security professionals in the world to successfully build and lead a fully converged security organization
Physical Security Notables Experiences Five years as a bodyguard, both delivering and leading executive protection programs Eleven years managing contract security companies including seven years at the executive level Built security programs including alarm systems, access control, CCTV, and Audio Countermeasure programs Led teams and conducted corporate and private investigations both nationally and internationally in North America, Europe and Asia.
Security Convergence Built and ran effectively for four years one of the  first  successfully converged security programs in the world  Program serviced the 2010 Winter Olympic Games Built one of the first integrated Identity and Access management systems Built industry leading private sector converged security Intelligence Unit  Industry Firsts Converged Investigations methodology Converged Risk Assessment methodology Converged Management Metrics dashboard Converged Security Officer Patrol tactics Converged Policy Development and Approval process First CCTV storage environment using IT systems
Leading Physical & IT Security Teams Fully conversant and credentialed in both fields Built programs to help teams work together with a common language Optimized security investment across both programs to reduce management overhead and review time Built and delivered training programs to security teams to build new convergence model understanding Results Reduced Costs to provide units of service Reduced real risk for business Increased staff morale on physical security teams Increased cross team cooperation to optimize efficiency and effectiveness of security results
Security Convergence Text Wrote the first and only Security Convergence “How To” book for the industry Security Convergence  describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result.  Security Convergence  discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets.
Speaking Engagements on Convergence 37 Domestic Presentations on Convergence –including: Secure World Atlanta  – Keynote Speaker TecSec –  Keynote speaker ASIS International  –Emerging Trends Conference & Annual Seminar ISACA  - Annual Security Conference 5 International Presentations on Convergence –Including European Union (ENISA) Chilean Security Industry European Chief Security Officer Roundtable
Information Security Notables Designed, developed and secured patent for new security industry technology for the Smart Grid Built and led industry leading information security teams in multiple industry verticals E-commerce Critical Infrastructure Government Industry known as a Thought Leader and Innovator Security Convergence Enterprise Security Risk Management Business Continuity & Disaster Recovery Threat and Risk Program Management and Prioritization
Sample of Publishing Chief Security Officer Magazine ISSA Journal Canadian Security Magazine Security Technology & Design Magazine Security Management Magazine SDM Magazine Others……..
Awards & Recognition AESRM Award for Excellence in Security Convergence Security Director of the Year National Security Pioneer Award  Nomination for ISE West Security Executive of the Year 2011  Listed as one of the Top 10 Movers and Shakers in the Security Industry by ST&D Magazine
Security Consulting Formally trained in consulting methodology by IBM Delivered consulting engagements in 14 Countries including the USA, Canada, Russia, the UK, Korea, and China
Degrees & Certifications Masters Degree is Business Administration  (MBA) Digital Technology Management Certified Protection Professional  (CPP) ASIS International Board Certified in Security Management Certified Information Systems Security Professional  (CISSP) ISC2 Certified in Information Security
Associations & Affiliations ASIS International – International Board member – Largest Physical Security Association in the world Cloud Security Alliance – IT & Physical Security Body for Cloud Computing Alliance for Enterprise Security Risk Management International Systems Security Association Chief Security Officer Roundtable CISO Forum Bay Area CSO Council CISO Summit Advisory Board Henley Putnam University

More Related Content

PPT
Calgary2011
PDF
How Companies Like Siemens Manage Cyber Risk
PDF
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
PDF
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
PPTX
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
PDF
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
PPTX
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Calgary2011
How Companies Like Siemens Manage Cyber Risk
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
New COBIT 5 Framework: Master the skills to review Implementation - By Compli...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...

What's hot (15)

PDF
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
PPTX
What is iso 27001 isms
PPTX
2015 KSU So You Want To Be in Cyber Security
PPT
[null] Iso 27001 a business view by Sripathi
PPTX
MCGlobalTech Consulting Service Presentation
PDF
EHSxTech Spring 2017: EHS Leadership in a Changing World
PPTX
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
PDF
Creating an effective cyber security awareness programme
PPT
Ccie security 01
PPTX
Cissp training and certification in mumbai
PDF
Cissp Training |IEVISION
PPTX
Cissp Training |IEVISION
PDF
The State of Cyber
PPTX
Is the IT security gap a threat to SMBS?
PDF
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
What is iso 27001 isms
2015 KSU So You Want To Be in Cyber Security
[null] Iso 27001 a business view by Sripathi
MCGlobalTech Consulting Service Presentation
EHSxTech Spring 2017: EHS Leadership in a Changing World
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Creating an effective cyber security awareness programme
Ccie security 01
Cissp training and certification in mumbai
Cissp Training |IEVISION
Cissp Training |IEVISION
The State of Cyber
Is the IT security gap a threat to SMBS?
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Ad

Similar to Dave Tyson Profile for CISO Insights (20)

PDF
Fissea09 mgupta-day3-panel process-program-build-effective-training
PPT
Developing an Information Security Program
PDF
Dev week cloud world conf2021
PDF
Application Security Maturity Model
PPTX
Does Anyone Remember Enterprise Security Architecture?
PDF
Enterprise%20 security%20architecture%20 %20business%20driven%20security
PDF
ICISS Newsletter Sept 14
PDF
CISSP Certification Training Course
PPT
II Security At Microsoft
PDF
10 KEYS TO EFFECTIVE NETWORK SECURITY
PDF
NUS-ISS Learning Day 2019-Architecting security in the digital age
PDF
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
PDF
Security-by-Design in Enterprise Architecture
PDF
Safeguarding the Enterprise
PPT
Open group spc rosenthal v3
PPT
Security architecture rajagiri talk march 2011
PPT
2 Security And Internet Security
PPTX
D1 security and risk management v1.62
PDF
Safeguarding the Enterprise. A new approach.
PDF
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
Fissea09 mgupta-day3-panel process-program-build-effective-training
Developing an Information Security Program
Dev week cloud world conf2021
Application Security Maturity Model
Does Anyone Remember Enterprise Security Architecture?
Enterprise%20 security%20architecture%20 %20business%20driven%20security
ICISS Newsletter Sept 14
CISSP Certification Training Course
II Security At Microsoft
10 KEYS TO EFFECTIVE NETWORK SECURITY
NUS-ISS Learning Day 2019-Architecting security in the digital age
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
Security-by-Design in Enterprise Architecture
Safeguarding the Enterprise
Open group spc rosenthal v3
Security architecture rajagiri talk march 2011
2 Security And Internet Security
D1 security and risk management v1.62
Safeguarding the Enterprise. A new approach.
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
Ad

Recently uploaded (20)

PPTX
Configure Apache Mutual Authentication
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
The various Industrial Revolutions .pptx
DOCX
search engine optimization ppt fir known well about this
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPT
Geologic Time for studying geology for geologist
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
Configure Apache Mutual Authentication
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Module 1.ppt Iot fundamentals and Architecture
Enhancing emotion recognition model for a student engagement use case through...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
OpenACC and Open Hackathons Monthly Highlights July 2025
sustainability-14-14877-v2.pddhzftheheeeee
The various Industrial Revolutions .pptx
search engine optimization ppt fir known well about this
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Geologic Time for studying geology for geologist
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Benefits of Physical activity for teenagers.pptx
A review of recent deep learning applications in wood surface defect identifi...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Abstractive summarization using multilingual text-to-text transfer transforme...
A proposed approach for plagiarism detection in Myanmar Unicode text

Dave Tyson Profile for CISO Insights

  • 1. Dave Tyson , MBA, CPP, CISSP Detailed Security Profile August 2011
  • 2. Overview 27 Years security industry experience National and International Security Industry Award Winner Internationally Published One of the only security professionals in the world to successfully build and lead a fully converged security organization
  • 3. Physical Security Notables Experiences Five years as a bodyguard, both delivering and leading executive protection programs Eleven years managing contract security companies including seven years at the executive level Built security programs including alarm systems, access control, CCTV, and Audio Countermeasure programs Led teams and conducted corporate and private investigations both nationally and internationally in North America, Europe and Asia.
  • 4. Security Convergence Built and ran effectively for four years one of the first successfully converged security programs in the world Program serviced the 2010 Winter Olympic Games Built one of the first integrated Identity and Access management systems Built industry leading private sector converged security Intelligence Unit Industry Firsts Converged Investigations methodology Converged Risk Assessment methodology Converged Management Metrics dashboard Converged Security Officer Patrol tactics Converged Policy Development and Approval process First CCTV storage environment using IT systems
  • 5. Leading Physical & IT Security Teams Fully conversant and credentialed in both fields Built programs to help teams work together with a common language Optimized security investment across both programs to reduce management overhead and review time Built and delivered training programs to security teams to build new convergence model understanding Results Reduced Costs to provide units of service Reduced real risk for business Increased staff morale on physical security teams Increased cross team cooperation to optimize efficiency and effectiveness of security results
  • 6. Security Convergence Text Wrote the first and only Security Convergence “How To” book for the industry Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets.
  • 7. Speaking Engagements on Convergence 37 Domestic Presentations on Convergence –including: Secure World Atlanta – Keynote Speaker TecSec – Keynote speaker ASIS International –Emerging Trends Conference & Annual Seminar ISACA - Annual Security Conference 5 International Presentations on Convergence –Including European Union (ENISA) Chilean Security Industry European Chief Security Officer Roundtable
  • 8. Information Security Notables Designed, developed and secured patent for new security industry technology for the Smart Grid Built and led industry leading information security teams in multiple industry verticals E-commerce Critical Infrastructure Government Industry known as a Thought Leader and Innovator Security Convergence Enterprise Security Risk Management Business Continuity & Disaster Recovery Threat and Risk Program Management and Prioritization
  • 9. Sample of Publishing Chief Security Officer Magazine ISSA Journal Canadian Security Magazine Security Technology & Design Magazine Security Management Magazine SDM Magazine Others……..
  • 10. Awards & Recognition AESRM Award for Excellence in Security Convergence Security Director of the Year National Security Pioneer Award Nomination for ISE West Security Executive of the Year 2011 Listed as one of the Top 10 Movers and Shakers in the Security Industry by ST&D Magazine
  • 11. Security Consulting Formally trained in consulting methodology by IBM Delivered consulting engagements in 14 Countries including the USA, Canada, Russia, the UK, Korea, and China
  • 12. Degrees & Certifications Masters Degree is Business Administration (MBA) Digital Technology Management Certified Protection Professional (CPP) ASIS International Board Certified in Security Management Certified Information Systems Security Professional (CISSP) ISC2 Certified in Information Security
  • 13. Associations & Affiliations ASIS International – International Board member – Largest Physical Security Association in the world Cloud Security Alliance – IT & Physical Security Body for Cloud Computing Alliance for Enterprise Security Risk Management International Systems Security Association Chief Security Officer Roundtable CISO Forum Bay Area CSO Council CISO Summit Advisory Board Henley Putnam University