
Your Goals,My Priority
When you work with me, you get 20+ years of hands-on security engineering and boardroom advisory experience - focused entirely on helping you navigate security, governance, and AI challenges.
I Build Security Programs. That Is What I Do.
I have built security programs from scratch more times than most CISOs will in an entire career. First at Fortune 500 companies like Coca-Cola, Cigna, and Marriott, where I learned what enterprise-grade security actually looks like. Then for dozens of growing companies that needed that same caliber of leadership without the $400K salary.
The pattern was always the same: a company hits an inflection point where security becomes a board-level concern, a sales blocker, or a compliance requirement. They need someone who has done this before. Not a consultant who delivers a report and disappears. A builder who will own the outcome.
That is why I went independent. I saw too many companies struggling with the same problem: they needed a CISO, but they did not need a full-time CISO. They needed someone who could walk into a board meeting, run a compliance program, architect a cloud security model, and train a development team, all in the same week. So I built a practice around doing exactly that, for multiple companies at once.
After 20+ years, 50+ clients, and 12 industry certifications (including CISSP-ISSAP, CISM, CISA, CRISC, and CGEIT), I have refined this into a repeatable methodology: the CISO Accelerator Framework. Assess in two weeks, architect in four, accelerate for the next six. Every engagement follows this playbook because it works. SOC 2 in 4 months. ISO 27001 in 6. FedRAMP in 12 weeks.
“I do not advise from the sideline. I embed in your organization, own the security roadmap, and build something that lasts long after I leave. That is the difference between a consultant and a fractional CISO.”
Work Directly With a Senior CISO
At large consulting firms, senior partners win the deal — then hand you off to junior staff. With me, you get the same expert from first call to final deliverable.
You Get Me — Not a Junior Analyst
Every call, every document review, every board presentation comes directly from a CISO with Fortune 500 experience. No handoffs, no surprises.
Accountability Without Bureaucracy
When you have a question or a security incident, you reach me directly. No ticketing systems, no waiting for 'the right resource' to be assigned.
Skin in the Game
As a solo practitioner, my reputation is built on every engagement's success. Your outcomes directly reflect my work — creating alignment you won't find at larger firms.
When security matters, experience shouldn't be delegated.
Expertise You Can Trust
A rare combination of certifications spanning technical security, governance, audit, and risk management - backed by formal business education.
CISSP-ISSAP
TechnicalInformation Systems Security Architecture Professional
CISM
ManagementCertified Information Security Manager
CISA
AuditCertified Information Systems Auditor
CRISC
RiskCertified in Risk and Information Systems Control
CGEIT
GovernanceCertified in Governance of Enterprise IT
CPDSE
PrivacyCertified Privacy Data Security Expert
GCIH
TechnicalGIAC Certified Incident Handler
GSEC
TechnicalGIAC Security Essentials Certification
GSTRT
LeadershipGIAC Strategic Planning, Policy & Leadership
CIPP/US
PrivacyCertified Information Privacy Professional
PMP
ManagementProject Management Professional
CCSK
CloudCertificate of Cloud Security Knowledge
Education
Master of Business Administration (MBA)
Georgia Institute of Technology, Scheller College of Business
Honors, GPA 3.94
Bachelor of Science, Computer Science
University of the Virgin Islands
National Science Foundation Scholar
What You Can Expect
Four principles that guide every engagement - designed to deliver maximum value for your organization.
Your Business Comes First
Security enables your objectives, not obstructs them. You get solutions that balance risk reduction with operational efficiency.
Partnership, Not Dependency
You build internal capabilities while we work together. Your team learns and grows - no vendor lock-in, no dependency on consultants.
Practical Over Perfect
Perfect security is impossible. You get pragmatic, risk-based approaches that deliver measurable improvements within your constraints.
Clarity You Can Act On
Whether it's your board or your engineers, complex security concepts become clear language that drives action.
Let's Discuss Your Security Needs
Whether you're looking for fractional CISO services, AI governance guidance, or strategic security advice, I'd love to learn about your challenges and explore how I can help.