Simply put, I am a fun-loving Cyber Security Executive Leader/Architect who enjoys: Motorcycling; Hiking; Golfing; Sailing; Drinking Fine Wine/Beer; Eating Gourmet Food, HAM’ing, and sparring other TKD Black Belts

Information Security.
Motorcycling.
Hiking.
Golfing.
TKD.
Sailing.
AmAteur Radio,

 

With over 25 years leading cybersecurity and technology strategy across regulated industries, I help organizations drive governance, resilience, and growth. Board advisor, vCISO, and cloud security leader with deep expertise in digital transformation and risk management.

Posts, Thoughts and Whitepapers

Evolving Role of the CISO – Key Trends and Insights (2022–2025)

Expansion into Business Strategy and Risk Management As a former CISO and currently a Virtual CISO (vCISO), leading cybersecurity for an organization has become increasingly tied to business strategy and enterprise risk management (ERM). After reviewing many studies,...

🛡️ The choice is clear: Be proactive today, or reactive tomorrow.

In today’s ever-evolving threat landscape, proactivity is the lifeline of a secure organization. Every breach teaches us one critical truth: It’s not just about having the best tools but fostering a security culture across every level of your organization. 🔑...

Bridging the Cybersecurity Gap

Our Responsibility as Information Security Professionals I've worked in 112 industries and eleven sectors and noticed a common trend—the urgent need for help creating a more secure environment. Over the past 18 months as an independent cybersecurity advisor, I've...

Urgent Call to Action: Law Firms Must Reevaluate Cybersecurity Practices

TLDR: Cyber-attacks are increasing across all sectors, but law firms represent, and incredibly juicy target based on their broad access to sensitive personal and company data. Law firms must step up their cyber readiness and engage true cyber professionals to help...

Small and Medium Business (SMB) Cyber Protection Plan

Executive Summary The 2023 Verizon Data Breach Investigations Report (DBIR) highlights some alarming trends within the US Small and Medium Business Segment. Thus, an SMB Protection Plan is designed to fortify small and medium-sized businesses against external...

2024 Cyber Insurance Requirements and The Imperative of Implementing MFA

As a vCISO speaking to current and potential clients, it's vital to highlight the evolving requirements of cyber insurance in 2024, particularly the essential role of Multi-Factor Authentication (MFA). The cyber insurance market is undergoing significant changes due...

Securing the Future: Cybersecurity and Data Management Strategies for U.S. Law Firms    

Introduction This document provides a comprehensive overview of the pressing issues surrounding cybersecurity and data management in U.S. law firms. It delves into the challenges law firms face due to the sensitive nature of their work, making them attractive targets...

Winds of Change: SEC’s SolarWinds Lawsuit Signals Hotter Cybersecurity Enforcement

The SEC has taken unprecedented action against SolarWinds and its CISO for cybersecurity misrepresentations following a significant cyberattack. The lawsuit alleges SolarWinds made false statements regarding its cybersecurity practices and the severity of the...

Meet Your New Cybersecurity Auditor: Your Insurer

The article from Dark Reading discusses the evolving role of cyber insurers in the cybersecurity landscape. Due to increased cyber threats, particularly ransomware, cyber insurers are becoming key players in setting cybersecurity standards. They use detailed...

10 Ways Boards Are Setting Their Companies Up For Cybersecurity Failure

The article from Forbes outlines ten critical missteps that corporate boards make that leave their companies vulnerable to cybersecurity risks: Not adhering to established cybersecurity governance standards. Failing to see themselves as a critical part of...

Information Security – Cyber…

The word “cyber” originates from the Greek word kybernētēs (κυβερνήτης), which means “steersman” or “governor.” This term was used to describe someone who pilots or directs a ship and later, more generally, someone who governs or controls.

As a cybersecurity executive with over 20 years of experience leading organizations in building resilient security infrastructures. As the founder of Longo Cyber Technologies, I’ve partnered with Goliath Cyber Security Group to deliver cutting-edge solutions in network security, risk management, and compliance for businesses of all sizes.

With a passion for aligning cybersecurity with business goals, I excel at translating complex technical concepts into actionable strategies. My career has spanned leadership roles at BetMGM, Consortium Networks, Resorts Casino Hotel, Symantec, and Intel Security Group (McAfee), where I’ve pioneered robust security programs and guided organizations through the evolving digital landscape.

This blog is where I share insights on cybersecurity, leadership, and staying ahead of emerging threats. Welcome to my world of security, strategy, and innovation.

 

 

 

Locations

I have worked across North American and Europe during my career.

Companies

Goliath Security Group, Longo CyberTech, BetMGM, Resorts Casino Hotel, Symantec, BlueCoat, Qualys, McAfee, Intel, Mobil Oil, Exxon Mobil, Morse Diesel (AMEC), Consortium Networks, and Edmunds & Associates.

Cybersecurity Consulting Industries

Federal, tribal, state, and local agencies, financial services, entertainment, real estate, energy, transportation, health care, petrochemical, gaming, retail, manufacturing, education, hospitality, insurance, legal, pharmaceutical, and telecommunications

Information Security Leadership

Financial, Entertainment, Hospitality, DoD, Retail, Tech Services

Contact me

Work Locations