Information Security.
Motorcycling.
Hiking.
Golfing.
TKD.
Sailing.
AmAteur Radio,

 

Simply put, I am a fun-loving Cyber Security Architect who enjoys: Motorcycling; Hiking; Golfing; Sailing; Drinking Fine Wine/Beer; Eating Gourmet Food, HAM’ing, and sparring other TKD Black Belts

2024 Cyber Insurance Requirements and The Imperative of Implementing MFA

As a vCISO speaking to current and potential clients, it's vital to highlight the evolving requirements of cyber insurance in 2024, particularly the essential role of Multi-Factor Authentication (MFA). The cyber insurance market is undergoing significant changes due...

Winds of Change: SEC’s SolarWinds Lawsuit Signals Hotter Cybersecurity Enforcement

The SEC has taken unprecedented action against SolarWinds and its CISO for cybersecurity misrepresentations following a significant cyberattack. The lawsuit alleges SolarWinds made false statements regarding its cybersecurity practices and the severity of the...

Meet Your New Cybersecurity Auditor: Your Insurer

The article from Dark Reading discusses the evolving role of cyber insurers in the cybersecurity landscape. Due to increased cyber threats, particularly ransomware, cyber insurers are becoming key players in setting cybersecurity standards. They use detailed...

10 Ways Boards Are Setting Their Companies Up For Cybersecurity Failure

The article from Forbes outlines ten critical missteps that corporate boards make that leave their companies vulnerable to cybersecurity risks: Not adhering to established cybersecurity governance standards. Failing to see themselves as a critical part of...

Mr. Cooper, the third-largest mortgage servicer in the United States, has suffered a cybersecurity breach

The article reports that Mr. Cooper, the third-largest mortgage servicer in the United States, has suffered a cybersecurity breach. The incident occurred on October 31, and upon discovering the breach, Mr. Cooper took immediate action by restricting access to their...

Rising Ransomware Attacks Target Healthcare Institutions: Lessons in Strengthening Digital Infrastructure

In recent news, the healthcare sector has grappled with an alarming surge in ransomware attacks, underscoring the critical need for fortified digital infrastructure. Managing 16 hospitals and 165 clinics, Prospect Medical Holdings faced a ransomware attack that forced...

Harmonizing Waves: The Multidimensional World of Amateur Radio

Amateur radio, often referred to as "ham radio," is a unique and multifaceted hobby combining technology, communication, community, and even a bit of magic in radio wave propagation. Here are some reasons why the craft of amateur radio is unique: Global Communication:...

Embracing Timelessness: The Enduring Allure of the 2001 Honda Valkyrie

In the world of motorcycles, specific models manage to transcend eras, capturing the hearts of enthusiasts across generations. Among these legendary rides, the 2001 Honda Valkyrie stands tall, a testament to engineering brilliance and an embodiment of timelessness....

From Human Vulnerability to First-Line Defenders

As businesses delve further into the digital realm, fueled by data and technology, the stakes in cybersecurity and data privacy intensify. Despite sophisticated AI and cybersecurity measures, the overlooked human factor remains a prime vulnerability. The increasing...

The Evolving Landscape of Cybersecurity Threats in 2023

Introduction: In the fast-paced digital age, cybersecurity remains a constant battle against evolving threats and cunning attackers. The year 2023 has brought to light numerous incidents that have left organizations and individuals grappling with the aftermath of...

Information Security – Cyber…

The word “cyber” originates from the Greek word kybernētēs (κυβερνήτης), which means “steersman” or “governor.” This term was used to describe someone who pilots or directs a ship and later, more generally, someone who governs or controls.

As a cybersecurity executive with over 20 years of experience leading organizations in building resilient security infrastructures. As the founder of Longo Cyber Technologies, I’ve partnered with Goliath Cyber Security Group to deliver cutting-edge solutions in network security, risk management, and compliance for businesses of all sizes.

With a passion for aligning cybersecurity with business goals, I excel at translating complex technical concepts into actionable strategies. My career has spanned leadership roles at BetMGM, Consortium Networks, Resorts Casino Hotel, Symantec, and Intel Security Group (McAfee), where I’ve pioneered robust security programs and guided organizations through the evolving digital landscape.

This blog is where I share insights on cybersecurity, leadership, and staying ahead of emerging threats. Welcome to my world of security, strategy, and innovation.

 

 

 

Locations

I have worked across North American and Europe during my career.

Companies

Goliath Security Group, Longo CyberTech, BetMGM, Resorts Casino Hotel, Symantec, BlueCoat, Qualys, McAfee, Intel, Mobil Oil, Exxon Mobil, Morse Diesel (AMEC), Consortium Networks, and Edmunds & Associates.

Cybersecurity Consulting Industries

Federal, tribal, state, and local agencies, financial services, entertainment, real estate, energy, transportation, health care, petrochemical, gaming, retail, manufacturing, education, hospitality, insurance, legal, pharmaceutical, and telecommunications

Information Security Leadership

Financial, Entertainment, Hospitality, DoD, Retail, Tech Services

Contact me

Work Locations