Personal Information
Organization / Workplace
Edison, NJ United States
Occupation
Senior Security Consultant
Industry
Technology / Software / Internet
Website
About
Senior information security and risk management professional. Career incorporates successful track record across corporate and consulting roles, securing IT assets for numerous Fortune 1000 companies.
Areas of expertise include analyzing and providing cyber security, information risk and regulatory compliance requirements to protect corporate data assets, business opportunities and maximize revenue in alignment with corporate goals and initiatives.
Core Competencies
• Information security and privacy
• Operational Security
• Secure Cloud Services
• Security Risk Frameworks
• Encryption & Key Management
• New Technology Evaluation
• Application Security Assessments
•...
Contact Details
Tags
rothke
information security
security
pci
dss
encryption
cryptography
infosec
nac
wireless
cissp
computer security
rsa
wpa
ligatt
ron coleman
des
aes
endpoint
twitter
facebook
time synchronization
ntp
dlp
pci dss
biometrics
cloud computing
microsoft
tomhave
privacy
linkedin
wifi
rothke security pharma 21cfr part11
wep
mazu
nba
information privacy
information s
security books
pink sheet
goetz fitzpatrick
gregory evans
cicada security
racism
pump and dump
fair use
boyce watkins
naacp
scot terban
attrition
bird
p&d
krypt3ia
world’s #1 hacker
alston
ryk edelstein
social media
80211
cambridge
whos who
heritage
malware
spam
virus
national enquirer
worms
internet voting
elections
oracle
hackers
ellison
kazaa
p2p
spectracom
endrun technologies
symmetricom
acsac
asis
security management
networktimesynchronization ntp rothke
auditing checkpoint firewalls rothke security
pci dss rothke braintree
pci dss qsa rothke
rothke webcast
press quote
presentation
articles
pa dss
nair
verderber
joel kazin
ben rothke
separpci
david navetta
qpl
aviation
dhs
aoa
twic
airports
irtpa
sia
awareness
patchlink
audit
cloud
csa
compliance
clearswift
data loss
data leak prevention
bank
bank technology
ciso
csp
security operations center
soc
social networks
deployment strategies for effective encryption
key management
crisc
information security professional
cisa
isc2
gartner
plagiarism
books
perimeter
vpn
advanced encryption standard
rothke information security workstation hardening
rothke mobile security blackberry ipad iphone itou
rothke perimeter security vpn firewall dlp
rothke social engineering hadnagy phishing surveym
interop
risk
computer security law
law
tj hooper
learned hand
torts
digital certificate
berkeley premium nutraceuticals
snake oil
international star registry
avacor
kyl smith
vital basics
wins
advertising
fda
scams
deceptive advertising
1010
bad science
wcbs
biltmore
emerald
scam
madison
lumension
forensics
isaca
cgeit
cism
data destruction
sanitization
nist
naid
dban
800-88
wireless security
wap
ssid
qsa
reading
virtualization
mundhenk
fraud
newsradio88
See more
- Presentations
- Documents
- Infographics