SlideShare une entreprise Scribd logo
1  sur  29
Information Technology Leader
Transformative IT Leader with 15+ years
experience advising C-level executives,
partnering with business division,
delivering solutions, creating IT value,
influencing innovation.
The Woodlands, Texas, USA
Woodforest National Bank
Vice President, Information Security
Report to the CIO oversee the enterprise’s
information security program which includes
chairing the Information Security Committee,
participating in IT Steering Committee
meetings, reporting IS program initiatives to
the Board, developing IS strategy,
implementing new technologies, leading
regulatory requirements (PCI, GLBA, Privacy),
acting as liaison to Enterprise Risk, Internal
Audit, and other business units, participating
in government intel sharing programs,
maintaining related policies, and other tasks.
Master of Business Administration
2008
Dean’s Leadership Circle member,
elected 2008 EMBA Class Representative,
Merage Student Association member, E2E
mentor participant, received ISS Proxy
Governance (BOD) Certification.
Tick
Innovate
Collaborate
IT Governance
/ M & A
activities
Business
Technology
Portfolio /
Lifecycle
Management
Risk
Management
Information
Security IT Strategy and
Implementation
Core
Competencies
Secret Clearance – Department of Homeland Security
Security + - CompTIA
C|CISO – Certified Chief Information Security Officer
PMP Certification – Project Management Professional
CRISC Certification – Certified in Risk and Information Systems Controls
CSM Certification – Certified ScrumMaster
TOGAF Certification – The Open Group Architecture Framework
ITIL Foundation Certification - Information Technology Infrastructure Library
ISS Certification - Institutional Shareholder Services Director Governance
CISM Certification - Certified Information Security Manager (2006-2009)
CISA Certification - Certified Information Systems Auditor (2005-2009)
ENFP
creative
innovative
team player
communicative
results-oriented
efficient
goal-oriented
determined
inquisitive
activator
continuous
learner
strategic
collaborative
aspiring
decisive
agile
ethical
focused
“…Your wisdom and guidance moved the IT department where we need to be.”
Lewie Wake, CTO, Advantage Sales and Marketing
“He has transformed the IT departments and corporate business units opinions on
governance, risk, and compliance. Marc has shown himself to be a leader…”
Phil Ben-Joseph, National Technology Director, Advantage Sales and Marketing
“…surpassed my expectations. I would recommend him as proactive in his approach and
takes a leadership stance in all his tasks.”
Jason James, Director of Technology Risk Management, Jefferson Wells
“…stepped up from day one to serve our class... His willingness to be a leader
demonstrates his talent in management and amongst his peers…contribution to the class
has been significant and he will always be a contributor to any organizations he is part of.”
Roy Kim, Principal, PacRim Engineering
LinkedIn
technology
MAKO Model
CIO traits
innovation
program management
beingaveteran
entertainment
best practices
continuing education
Steelers
networking
current events
sports
Internet marketing
sustainability
emerging business
green IThealth
knowledge
Facebook
product development
NFL
ocean
Web2.0
travel
thought leadership
IT frameworks macroeconomics Cloud Computing
family
Mariners Church
helping others
golf
music
values
leadership
beingaleaderwinning
diving
teamwork
agile
success
exercising
goodeats
Cancer research
Twitter
Marc Crudgington
Information Technology Leader
Email: marccrudgington@yahoo.com
LinkedIn: http://linkedin.com/in/marccrudgington
Twitter: http://twitter.com/WoodlandsTXMarc

Contenu connexe

Tendances

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
EnergySec
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 

Tendances (20)

Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 

Similaire à Marc Crudgington Who I Am

IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
360 BSI
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
subramanian K
 
JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5
Jason Jowers
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
360 BSI
 
JDF Resume Rev June 2016
JDF Resume Rev June 2016JDF Resume Rev June 2016
JDF Resume Rev June 2016
Julius Foronda
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAEIT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
360 BSI
 

Similaire à Marc Crudgington Who I Am (20)

Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Pkf advant edge_orientation3
Pkf advant edge_orientation3Pkf advant edge_orientation3
Pkf advant edge_orientation3
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5
 
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
10 Visionary Leaders Shaping Digital Transformation In 2024 (1).pdf
 
IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014IT Governance in Banks, May, 2014
IT Governance in Banks, May, 2014
 
Preston Williams III Curriculum Vitae (CV)
Preston Williams III Curriculum Vitae (CV)Preston Williams III Curriculum Vitae (CV)
Preston Williams III Curriculum Vitae (CV)
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Information Security Manager
Information Security ManagerInformation Security Manager
Information Security Manager
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020Technophile CEO's Revamping the Tech October 2020
Technophile CEO's Revamping the Tech October 2020
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 
JDF Resume Rev June 2016
JDF Resume Rev June 2016JDF Resume Rev June 2016
JDF Resume Rev June 2016
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Certified IT Leader
Certified IT LeaderCertified IT Leader
Certified IT Leader
 
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAEIT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
IT Governance & Leadership 17 - 20 November 2014 Dubai, UAE
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Marc Crudgington Who I Am

  • 1. Information Technology Leader Transformative IT Leader with 15+ years experience advising C-level executives, partnering with business division, delivering solutions, creating IT value, influencing innovation.
  • 2.
  • 3.
  • 5.
  • 6. Woodforest National Bank Vice President, Information Security Report to the CIO oversee the enterprise’s information security program which includes chairing the Information Security Committee, participating in IT Steering Committee meetings, reporting IS program initiatives to the Board, developing IS strategy, implementing new technologies, leading regulatory requirements (PCI, GLBA, Privacy), acting as liaison to Enterprise Risk, Internal Audit, and other business units, participating in government intel sharing programs, maintaining related policies, and other tasks.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Master of Business Administration 2008 Dean’s Leadership Circle member, elected 2008 EMBA Class Representative, Merage Student Association member, E2E mentor participant, received ISS Proxy Governance (BOD) Certification.
  • 15.
  • 16.
  • 17.
  • 19.
  • 20. IT Governance / M & A activities Business Technology Portfolio / Lifecycle Management Risk Management Information Security IT Strategy and Implementation Core Competencies
  • 21.
  • 22. Secret Clearance – Department of Homeland Security Security + - CompTIA C|CISO – Certified Chief Information Security Officer PMP Certification – Project Management Professional CRISC Certification – Certified in Risk and Information Systems Controls CSM Certification – Certified ScrumMaster TOGAF Certification – The Open Group Architecture Framework ITIL Foundation Certification - Information Technology Infrastructure Library ISS Certification - Institutional Shareholder Services Director Governance CISM Certification - Certified Information Security Manager (2006-2009) CISA Certification - Certified Information Systems Auditor (2005-2009)
  • 23.
  • 25.
  • 26. “…Your wisdom and guidance moved the IT department where we need to be.” Lewie Wake, CTO, Advantage Sales and Marketing “He has transformed the IT departments and corporate business units opinions on governance, risk, and compliance. Marc has shown himself to be a leader…” Phil Ben-Joseph, National Technology Director, Advantage Sales and Marketing “…surpassed my expectations. I would recommend him as proactive in his approach and takes a leadership stance in all his tasks.” Jason James, Director of Technology Risk Management, Jefferson Wells “…stepped up from day one to serve our class... His willingness to be a leader demonstrates his talent in management and amongst his peers…contribution to the class has been significant and he will always be a contributor to any organizations he is part of.” Roy Kim, Principal, PacRim Engineering
  • 27.
  • 28. LinkedIn technology MAKO Model CIO traits innovation program management beingaveteran entertainment best practices continuing education Steelers networking current events sports Internet marketing sustainability emerging business green IThealth knowledge Facebook product development NFL ocean Web2.0 travel thought leadership IT frameworks macroeconomics Cloud Computing family Mariners Church helping others golf music values leadership beingaleaderwinning diving teamwork agile success exercising goodeats Cancer research Twitter
  • 29. Marc Crudgington Information Technology Leader Email: marccrudgington@yahoo.com LinkedIn: http://linkedin.com/in/marccrudgington Twitter: http://twitter.com/WoodlandsTXMarc