RL

Ric Longenecker

CISO at Open Systems
On the record
Share profile 
Link:
#OpenSystems#CISO#ChiefInformationSecurityOfficer#SecurityLeadership#EngineeringManagement#ProjectManagement#InformationSecurity#CrossFunctionalTeamLeadership#ProgramManagement#ITIL#ProjectPlanning#RiskManagement#ProjectEngineering#ProjectPortfolioManagement#Engineering#PenetrationTesting#ChangeManagement#RootCauseAnalysis#NetworkSecurity#ProcessEngineering#SoftwareProjectManagement#ProductManagement#VendorManagement#ComputerForensics#DisasterRecovery#ResourceManagement#IdentityManagement#AccessManagement#PrivacyLaw#RiskAssessment#ISO27001#SecurityOperations#Privacy#Cybersecurity#InformationSecurityManagement#CloudComputing#Fraud#Leadership#EnterpriseNetworkSecurity#InformationSecurityAwareness#InformationSecurityGovernance#IntrusionDetection#CybersecurityIncidentResponse#SecurityIncidentResponse#WebApplicationSecurityAssessment#ICTSecurity#SecurityAwareness#CorporateSecurity#ApplicationSecurity#CybersecurityIncidentManagement
Bio
Edit

Ric is the Chief Information Security Officer at Open Systems. A seasoned security leader with global experience in the government, energy and consumer services industries, he remains strongly passionate about security and enablement in a fast-changing world. Ric has had a notable career in the United Nations - where he worked to build the UN's global security program based in New York and Geneva - as well as experience at Verisure Securitas Direct, a global player in the home security industry.

Recent Quotes
Sign up to view all
  • News that IT consulting giant Accenture has been hit by a massive ransomware attack is the latest addition to the growing list of ransomware incidents, following reports earlier of the attack on Gigabyte. These attacks highlight the importance of 24×7 threat coverage. Yet in-house security teams struggle to keep up with threat alerts and afford, find and retain enough cybersecurity experts. Compounding this, the traditional approach of employing multiple point security products from a variety of vendors has increased complexity, making it hard to quickly identify and contain attacks.

Headshots