“I've rarely had the opportunity to work with someone as knowledgeable, capable, and dedicated as Kevin. I had the pleasure of working for, and with, Kevin for three years at CyberGRX. He is a master at effortlessly shifting from deep technical concepts to high-level strategic themes while never losing sight of true north. In one moment he'd be coding automation for a SIEM tool and the next he'd be briefing the CEO on security ROI. Kevin designed and built a business-enabling security program with DevSecOps in mind, paving the way for seamless and effective integration between two pivotal business units at a fast-growing software development company. I miss working with him, and any organization should consider themselves quite fortunate to have Kevin at the helm of their security practice. Can't recommend him enough! ”
About
Accomplished IT, cybersecurity, and privacy leader with an emphasis on innovation…
Activity
-
Once again, thank you to the UND Alumni Association & Foundation, Julia Ernst, the University of North Dakota at large, and all of the many…
Once again, thank you to the UND Alumni Association & Foundation, Julia Ernst, the University of North Dakota at large, and all of the many…
Liked by Kevin Ford
-
UMD is proud to announce our highest-ever U.S. News & World Report ranking at No. 44—rising 20 spots since 2020! 🎉 #FearlesslyUMD |…
UMD is proud to announce our highest-ever U.S. News & World Report ranking at No. 44—rising 20 spots since 2020! 🎉 #FearlesslyUMD |…
Liked by Kevin Ford
-
I’ve been exploring definitions of AI, and the common thread seems to be this: AI's purpose is to simulate human learning, comprehension…
I’ve been exploring definitions of AI, and the common thread seems to be this: AI's purpose is to simulate human learning, comprehension…
Liked by Kevin Ford
Experience
Education
Licenses & Certifications
-
Certificate of Leadership Development - National Security Stratagy
The United States Army War College
Issued
Volunteer Experience
-
Volunteer
Chesapeake Bay Foundation
- Present 10 years 5 months
Environment
Volunteered at Clagett Farms to help support the development of both economically and environmentally sustainable farming methods.
Publications
-
Sections of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
Wiley
Wrote sections: CISO Mindset Regarding Security Incidents, Defining Security Operations, Measuring Results: Key Performance Indicators, Information Sharing, Multi-State Security Operations
-
The Future of Cybersecurity is Collaboration
CyberGRX
An overview of how we can work together in key cybersecurity fields for the greater good.
-
Third-Party Cyber Risk Management 101: A Guide for Beginners
CyberGRX
As your third-party cyber risk management program matures, you will likely encounter challenges related to resource requirements and timeliness. Risk assessments can be a very laborious and tedious process, particularly if you have large numbers of third parties to assess.
Automation is one way to mitigate both resource constraints and lengthy assessment timeframes. You may want to analyze your process to identify any repetitive tasks. These are likely candidates for…As your third-party cyber risk management program matures, you will likely encounter challenges related to resource requirements and timeliness. Risk assessments can be a very laborious and tedious process, particularly if you have large numbers of third parties to assess.
Automation is one way to mitigate both resource constraints and lengthy assessment timeframes. You may want to analyze your process to identify any repetitive tasks. These are likely candidates for automation.
No matter how many risk analysts are on your team, you simply cannot be aware of every threat that has the potential to impact your third-party ecosystem. Fortunately, there are countless resources for threat intelligence that can enrich your assessment results and mitigation activities. One use of this type of externally produced data can be to influence the prioritization of corrective actions. You may decide to de-prioritize mitigation if a control weakness is identified during your assessment process, but there is no account of that weakness ever being successfully exploited in the wild.
Projects
-
Cal Poly Pomona Cyber Collaborative Industry Advisory Council
- Present
Cal Poly Pomona’s Cyber Collaborative is a partnership between the colleges of Business Administration, Engineering, and Science, that advances technologies and discovers new ideas in multiple disciplines using cybersecurity as a shared commitment.
Dedicated spaces and programs are available to students to apply their skills and knowledge using industry-level equipment and programs. This exposure enables them to acquire relevant experience in their future careers. Students graduate ready…Cal Poly Pomona’s Cyber Collaborative is a partnership between the colleges of Business Administration, Engineering, and Science, that advances technologies and discovers new ideas in multiple disciplines using cybersecurity as a shared commitment.
Dedicated spaces and programs are available to students to apply their skills and knowledge using industry-level equipment and programs. This exposure enables them to acquire relevant experience in their future careers. Students graduate ready to work and earn internships and full-time positions in companies, organizations, and federal and government agencies, including the Jet Propulsion Laboratory, the U.S. Navy, Northrop Grumman and AT&T.
Students have opportunities to do research and contribute new ideas, information and data to industry experts. Research skills are valued in their career or graduate work.
Expert faculty members are involved in innovative research and projects. They bring their knowledge of industry standards into the classrooms and teach best practices. Faculty has access to current equipment and take part in unique opportunities to work on specialized topics to contribute to innovations and breakthroughs in their fields. -
AdvisoryCloud Board Member of Ovis
- Present
Ovis is a blockchain-powered, decentralized media network with a singular focus: Incentivizing the truth. We want to form a new trust paradigm by merging technology and journalism to increase transparency, verifiability, accountability, accuracy, and immutability of our stories.
Media bias and fake news have eroded the public’s faith in one of the most important institutions in a well-functioning democracy–journalism. Our mission is to restore this trust. Our core values of…Ovis is a blockchain-powered, decentralized media network with a singular focus: Incentivizing the truth. We want to form a new trust paradigm by merging technology and journalism to increase transparency, verifiability, accountability, accuracy, and immutability of our stories.
Media bias and fake news have eroded the public’s faith in one of the most important institutions in a well-functioning democracy–journalism. Our mission is to restore this trust. Our core values of transparency, diversity, democracy, and accountability are the driving force behind Ovis’ push to redesign the journalistic paradigm.
Ovis acts as the intersection of blockchain and journalism. Through use of the cryptocurrency “Truth Token” (TRUTH), community Ovis’ community members are incentivized to produce and validate accurate, bias-free news content. TRUTH tokens hold Ovis’ community members accountable to themselves and each other, harnessing the power of democracy and a free market to decentralize the process by which individuals make decisions.
Every Aspect of Ovis’ platform is “of the people, by the people, and for the people.” The people decide what they want to see and whether they trust it. Ovis uses immutable, decentralized blockchain technologies to verify and curate the identity of users and content providers, democratizing them across the platform -
Center for Digital Government Cybersecurity Council
- Present
The Center for Digital Government (CDG) is a national research and advisory institute on information technology policies and best practices in state and local government. Through its diverse and dynamic programs and services, the Center provides public and private sector leaders with decision support, knowledge, and opportunities to help them effectively incorporate new technologies in the 21st century. View our Senior Fellows, Digital States Performance Institute and Digital Communities…
The Center for Digital Government (CDG) is a national research and advisory institute on information technology policies and best practices in state and local government. Through its diverse and dynamic programs and services, the Center provides public and private sector leaders with decision support, knowledge, and opportunities to help them effectively incorporate new technologies in the 21st century. View our Senior Fellows, Digital States Performance Institute and Digital Communities programs.
-
Cyber Wire Hash Table
- Present
Regular guest on the CyberWire's network of webinars and podcasts, specifically the CSO Perspectives Podcast, providing expert commentary and sharing professional insights to their global audience of cybersecurity professionals. The Hash Table is an influential group of experienced cybersecurity experts who share their experiences and lend their perspectives to the CyberWire’s programs.
Honors & Awards
-
Top 25 Doers, Dreamers & Drivers
Government Technology
https://www.govtech.com/top-25/2021/Kevin-Ford.html
Every year we highlight the exceptional work of people who tirelessly leverage technology to make government better. This, our 20th cohort of the Top 25 Doers, Dreamers and Drivers, is no exception. Among their ranks are IT chiefs who brought their years of public service to face the challenges of 2020 head on. There are officials who have worked to uphold the integrity and security of American elections in a time when the vote was…https://www.govtech.com/top-25/2021/Kevin-Ford.html
Every year we highlight the exceptional work of people who tirelessly leverage technology to make government better. This, our 20th cohort of the Top 25 Doers, Dreamers and Drivers, is no exception. Among their ranks are IT chiefs who brought their years of public service to face the challenges of 2020 head on. There are officials who have worked to uphold the integrity and security of American elections in a time when the vote was perhaps never more contentious. And there are those who work alongside government to make it a safer, more ethical guiding force for communities. Read their stories here, and help us honor this deserving group. -
NASA Group Achievement Award
NASA
Achievement award for security engineering and risk analysis of advanced NASA research and development communication systems.
-
Deloitte Cybersecurity Award
Deloittte
Award for outstanding graduate research in the field of cybersecurity.
Organizations
-
IAPP
-
-
ISACA
-
-
ISC2
-
-
IT-ISAC
-
-
OWASP
-
Recommendations received
5 people have recommended Kevin
Join now to viewMore activity by Kevin
-
UMD has moved up to No. 12 among public institutions in Forbes' 2024 rankings of America’s Top Colleges!
UMD has moved up to No. 12 among public institutions in Forbes' 2024 rankings of America’s Top Colleges!
Liked by Kevin Ford
-
"Where you are had a lot to do with who you are" It was very cool seeing Geography Teacher, Governor, and now VP Candidate Tim Walz speak at Esri's…
"Where you are had a lot to do with who you are" It was very cool seeing Geography Teacher, Governor, and now VP Candidate Tim Walz speak at Esri's…
Shared by Kevin Ford
-
On July 15th, the opening day of the Esri User Conference, I heard Gov. Tim Walz as one of our keynote speakers. This was before President Biden…
On July 15th, the opening day of the Esri User Conference, I heard Gov. Tim Walz as one of our keynote speakers. This was before President Biden…
Liked by Kevin Ford
-
The ProcessUnity Global Risk Exchange (GRX): Attack Scenario Analytics Leveraging the 13 MITRE tactics, an organization is able to have greater…
The ProcessUnity Global Risk Exchange (GRX): Attack Scenario Analytics Leveraging the 13 MITRE tactics, an organization is able to have greater…
Liked by Kevin Ford
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Kevin Ford in United States
-
Kevin Ford
Head of Marketing & Strategic Alliances - Myriad360
-
Kevin Ford
-
Kevin Ford
-
Kevin Ford
Vice President | Business Intelligence, Database & Automation Specialist | Global Technology Infrastructure
636 others named Kevin Ford in United States are on LinkedIn
See others named Kevin Ford