Expert Details
Strategic Sourcing: Identity, Privacy, Security; Business Process Management
ID: 729475
Pennsylvania, USA
For IBM's Security and Privacy consulting practice, he led development of winning solution for phase II of National Security Agency’s High Assurance Platform multi-level security (MLS) for workstations. He also led creation of technology offering to prevent terrorist entry into Federal government buildings and disaster sites. He also managed the transition of a security operations center (SOC) for the Dept. of Homeland Security. After leaving IBM, he developed a framework for trusted identity and currently leads the development of an auditable trust framework for e-commerce as co-chair of the Kantara Initiative Privacy and Public Policy working group. He also assisted in implementing an integrated security solution for the US Patent and Trademark Office.
Expert attained IBM's "expert" certification in process design, optimization, and management. He has leveraged his skills to harmonize service delivery across multiple geographies and address multiple process gaps discovered in a failed security audit for a major client.
Expert developed expertise in strategic sourcing while serving as technical solutions manager at IBM. He designed both generalized offerings and customized IT outsourcing solutoins for several of the world's largest enterprises. As strategic sourcing has moved on, he now advised potential buyers of services that include cloud computing and business process outsourcing. This includes defining requirements, evaluating vendor solutions, as well as providing negoiation assistance.
Devised a winning solution for an aerial traffic reconnaissance system capable of identifying vehicles by type (e.g., car, pickup, SUV, semi), direction and velocity in all weather conditions. Leveraged experience in sensor technology, including pattern recognition, to provide a lightweight, all weather solution that could be mounted on small aircraft to provide continuous monitoring. The solution included a data link to a ground station to allow the surveillance to be immediately used and/or stored for later analysis.Devised strategy and managed the development of a proposal to provide a wide range of information technology services to the Dept. of Veterans Affairs. Strategy included customer contact plan, development of Win themes, proposal design and management of the proposal team for a large federal contractor.Provided insight into potential "Do Not Track" regulations being considered by the Federal Trade Commission. The co-chairman of the global Privacy and Public Policy working group of the Kantara Initiative, Expert is an authority on identity and privacy issues and regularly provides insight on this dynamic area.Described the range of go-to-market strategies used in the IT security outsourcing market for prospective new entrant in the market.
Also provided insight into the strategies used for a wide variety of managed services.Provided guidance on forthcoming compliance area in data security that will require comprehensive destruction of data. Prompted by increasing costs of holding data resulting from impending privacy regulations, the economics of acquiring personally identifiable information will be transformed from "collect everything" to a strategy of selective collection and regular pruning of data that is no longer cost-justified to maintain.
Education
| Year | Degree | Subject | Institution |
|---|---|---|---|
| Year: 1974 | Degree: MA | Subject: Economics | Institution: Tufts University |
| Year: 1974 | Degree: BA | Subject: English, Economics | Institution: Tufts University |
Work History
| Years | Employer | Title | Department |
|---|---|---|---|
| Years: 2008 to Present | Employer: Undisclosed | Title: Principal Consultant | Department: |
Responsibilities:A polymath, bringing together disparate elements to solve difficult client problems that often can't be solved effectively in a traditional single-discipline approach. Examples include the following::IDENTITY, PRIVACY, SECURITY • Simplifying authentication and authorization while empowering users to control their personal information. • Providing a mechanism to allow people to better control the personal information • Conceived an architecture to enable the next "internet" tsunami and redefine electronic commerce • Working to broker de facto open standards to support the cost-effective incremental build-out of a identity-based Service-Oriented Architecture (SOA) constellation that will provide o Global interoperability o Reduced fraud o Reduced identity theft • User control of Personally Identifiable Information (PII) to enhance privacy. • Developing intellectual property to support implementation of these standards for governments, commercial entities, and end users. • Has three patents in this area. BUSINESS STARTUPS • Working with startup businesses to develop compelling business plans to generate equity participation • Providing startups with the programmatic discipline and work products to foster successful business plan execution • Assisting developers of emerging technologies to properly protect their Intellectual Property • Transforming emerging technologies into solutions to tactical client problems. BUSINESS PROCESS MANAGEMENT • Development and documentation of new business processes • Reconciliation of competing business processes (common in merger and acquisition environments) • Optimization (re-engineering) of business processes CROSS-CULTURAL PROBLEM SOLVING • Facilitating foreign operations whose effectiveness is constrained by culture, law, or environment • Assisting domestic businesses open effective foreign operations • Facilitating solutions that require interdepartmental cooperation where interdepartmental trust and respect is lacking STRATEGIC SOURCING • Defining requirements for prospective RFPs • Evaluation of strategic sourcing alternatives including cloud computing and business process outsourcing • Negotiation assistance in sourcing of services. |
|||
| Years | Employer | Title | Department |
| Years: 1996 to 2007 | Employer: IBM | Title: Technical Solutions Manager | Department: |
Responsibilities:Directed development of technical solutions and cost cases for successful global solutions for IBM’s leading revenue-generating engagements ($100M-$3B). Managed global teams of architects, financial analysts, account executives, and other TSMs in developing technical proposals.Devised strategic plans for IT outsourcing business. Identified market requirements, defined new service offerings, and drove enhanced competitiveness into existing service offerings. |
|||
| Years | Employer | Title | Department |
| Years: 1980 to 1996 | Employer: RMTC Systems | Title: General Manager | Department: |
Responsibilities:Strategized and implemented marketing plans for commercial and government sectors. Directed the development of Request For Proposal (RFP) responses, technical solutions, and product/service delivery. Hired, managed, and coached technical staff.Personally pioneered industry innovations, including attachment of large hard disks to PCs for IBM Corporation; integrating 9-track tape subsystems with PCs for US West (now Qwest); developing one of the first portable tape drives for the IBM PC XT; and developing a monochrome graphics adapter for the Leading Edge Model D PC. |
|||
| Years | Employer | Title | Department |
| Years: 1974 to 1979 | Employer: Energy Resources Co. Inc. | Title: Senior Scientist | Department: |
Responsibilities:Identified and secured commercial and government clients for a multidisciplinary research and consulting firm. Developed proposals for energy and environmental policy analysis and engineering technology assessment projects. Led technical solution development and delivery of economic impact analyses. Directed high-level engineering/scientific project teams.Managed the development of a modular, transportable unmanned, robot-operated, solution for demilitarizing the entire range of chemical weapons in the US arsenal, including small arms ammunition, mortar and canon shells, bombs, and spray tanks. |
|||
Additional Experience
| Expert Witness Experience |
|---|
| Retained to Provide expert witness testimony at a series of public hearings held by US EPA on proposed noise abatement regulations for wheel and crawler tractors. Expert's testimony focused on the economic impacts of the proposed regulations. He had become an expert as the Program Manager for an analysis performed under contract with the EPA. Retained to review patents in information technology -- particularly identify and access management systems -- for potential infringement litigation. Served as technical consultant to International Telecommunications Union-Technology Working Group (ITU-T) on identity trust frameworks. |
Career Accomplishments
| Associations / Societies |
|---|
| Kantara Initiative; International Information Systems Security Certification Consortium, Inc., (ISC)²; Greater Philadelphia Senior Executive Group; Mid-Atlantic Consultants Network. |
| Licenses / Certifications |
|---|
| Certified Information Systems Security Professional (CISSP). |
| Awards / Recognition |
|---|
| IBM Global Services Thanks Award: contribution to development of IBM OmniFind Personal Email Search applications IBM Global Services Thanks Award: outstanding contribution to winning NSA High Availability Platform II multi-level security solution proposal effort IBM Global Services Thanks Award: outstanding contribution to marketing and proposal efforts targeting secure passport production IBM Global Services Thanks Award: leadership and proposal writing on successful Logistics Data Management System proposal for Army Future Combat Systems IBM Global Services Thanks Award: management contribution to successful Logistics Data Management System proposal for Army Future Combat Systems IBM Global Services Thanks Award: development of key management volume for successful USAF black programs proposal IBM Global Services Thanks Award: successful deployment of critical, high-visibility remote backup solution for US TSA IBM Ideas Award: for recommendations to improve the internal phone system. IBM Global Services Bridge Award: for development of training program for strategic outsourcing costing tool. IBM Global Services Bridge Award: for developing curriculum to train Technical Solution Managers. Technology Professionals Networking Group Super Speaker Award: for presentation “It’s the Economy! Perspectives & Prospects for Finding Work. |
| Publications and Patents Summary |
|---|
| Publications “Trust Framework Meta Model” Identity Collaboration Day “The Growing Need for Data Destruction Planning” Computer Security Institute "It's Getting Harder To Be Super," TECHNOLOGY REVIEW, Massachusetts Institute of Technology (MIT) Market Analysis of the Potential for Wind Systems Use in Remote and Isolated Area Applications Numerous technical reports published by agencies of the US Government. PATENTS Methods and apparatus related to document processing based on a document type. Methods and apparatus related to transmission of confidential information to a relying party Methods and apparatus for transacting with multiple domains based on a credential Methods and apparatus related to billing and accounting for assets that require more than two factors to establish asset value Gamification Systems and Methods for Improved Healthcare Outcomes Systems and Methods to Ensure Product and Supply Chain Integrity Systems and Methods to Validate Transactions For Inclusion in Electronic Blockchains Systems and Methods for Extending the Utility of Blockchains Through Use of Related Child Blockchains Systems and Methods for Monetizing Intellectual Property |
Fields of Expertise
Internet of Things, information security management, homeland security, brand identity, information technology, contract bid evaluation, Federal Acquisition Regulation, federal specification, security, Standard of Identity, business process management, process assessment, business process re-engineering, process optimization, outsourcing, cloud computing, privacy law, web hosting, data hosting, software outsourcing, management contract, business continuity planning, internet technology, compliance, policy, identity theft, fraud, biometric identification, business plan, business startup, business strategy, Internet infrastructure, application service provider, Internet regulation, World Wide Web application, computer system disaster recovery planning, sensor technology, client/server computing, data protection, gemology, Defense Contract Audit Agency, export regulation, military sensor, inventions, corporate strategic planning, technology innovation, activity analysis, computer system integration, economics, business re-engineering, application software, computer processing, redesign process, local area network, optimization, acquisition, business system design, computer security system, imported product, client/server architecture, intranet, Internet, logistics, Data Encryption Standard, process management, computer, sensor, security system, robotics, economic analysis, computer network, biometrics