Ken Orwig
Ken is an independent consultant, a retired Cyber Defense Warrant Officer, an adjunct college professor, and head of security & compliance for Designer Shoe Warehouse (DSW) with almost two decades of security experience in both offensive and defensive roles.
Some of Ken’s achievements are a matter of public record. In 2016, CNN reported on Ken and his unit for contributing to the security of the 2016 Presidential election in Ohio via a penetration test and vulnerability assessment of the Ohio Board of Elections. The success of Ken and his team is evidenced by an independent Department of Homeland Security report concerning the unvarnished integrity of Ohio’s election system. Ken has also been awarded the Bronze Star Medal for revolutionizing combat zone operations using Information Technology resulting in reduced reaction time, fewer injuries to soldiers and civilians, and better planning through improved analytics.
Ken has a hunger for knowledge above and beyond his passion for information security. He routinely challenges himself to learn new skills across a wide array of disciplines and encourages his students to do the same.
Ken has completed numerous certifications with an emphasis on security (GSTRT, CISSP, GSNA, GCWN, GCFE, GCIH, GCIA, GSEC, RHCSA, VCP, Security+, CEH, CCNA Security, CCNA Route/Switch, and several Microsoft MCSA, MCSE, and MCTS offerings). Additionally, Ken has earned 4 SANS challenge coins (AUD 507, FOR 500, SEC 503, and SEC 504).
When he is relaxing, Ken is usually riding his motorcycle, playing his guitar, or trying not to set off the Lunk Alarm at Planet Fitness.
korwig3
Preferred Social Media –Session
Compliance-driven security programs have traditionally been plagued with weak 8-character passwords, missing security controls (because they are not required), and incomplete implementations of tools like FIM and DLP. In the wake of the Securities and Exchange Commission’s Cybersecurity decision last year, the game may have changed. Let’s talk about closing the loop on Compliance, Risk-Management, and Cybersecurity in a way that will help you build buy-in with the business and the Board to establish cybersecurity as a business imperative and accomplish your program goals.