際際滷

際際滷Share a Scribd company logo
息 UnifyCloud LLC All rights reserved
1
 35-year veteran of the IT industry starting as an IT Director in traditional IT organizations.
 Participated in the transition from distributed processing through client-server to Cloud first - mobile first IT.
 Last 20 years focused on Security, Identity & Access Management (S/IAM), and IT Risk Management.
 Currently, Managing Director at UnifyCloud LLC, a Cloud-focused consultancy specializing application migration to Windows Azure
(IaaS/PaaS) and in S/IAM controls for the emerging Hybrid IT environments.
 Previously held management positions with PwC, KPMG, Andersen Worldwide (Partner and Global Services Director for the
Security & Privacy practice), Protiviti (Founding Managing Director and Identity Practice Lead) and with Oxford Computer Group -
Microsoft Identity & Security Partner of the Year 2013 and 2014 (Sr. Vice President).
 Microsofts Strategic Security Advisor for the US Financial Services sector and Principal Program Manager for the Customer &
Partner Engineering Group within the Azure Identity & Security Services Division.
 Held CISSP and CISM certifications and served on the Technology Committee of the Institute of Internal Auditors.
 Member of the Cloud Security Alliance (CSA), the Information Systems Audit and Control Association (ISACA), the Information
Systems Security Association (ISSA), InfraGard (the private sector and FBI partnership), and U.S. Secret Service Electronic
Crimes Task Force.
Norm Barber
Managing Director, UnifyCloud LLC
Ad

Recommended

The Safety of Cloud Data
The Safety of Cloud Data
Vic Mankotia
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environment
Estuate, Inc.
Keeping FE on track and progressing, by Rob Rawlinson
Keeping FE on track and progressing, by Rob Rawlinson
Jisc
The infrastructure review process and aggregated results, by Rohan Slaughter
The infrastructure review process and aggregated results, by Rohan Slaughter
Jisc
Conquest Security Capabilities
Conquest Security Capabilities
Conquest Security, Inc.
How to stop dreaming about security and start implementing
How to stop dreaming about security and start implementing
Aleksandr Maklakov
Preparing for a media crisis
Preparing for a media crisis
Fiona Austin
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
Gareth Niblett
B&D Mi Case Software Overview
B&D Mi Case Software Overview
yankees247
True Services Portfolio Overview
True Services Portfolio Overview
Nathaniel "Lee" Wade
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
ForgeRock
或沿艶稼遺鞄温庄稼
或沿艶稼遺鞄温庄稼
nanoCredit 速 Technology
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS
Andrew_Goss
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
Aptera Inc
Silsbee - Interface Seattle 2015 - Cybersecurity
Silsbee - Interface Seattle 2015 - Cybersecurity
Kenneth Silsbee, MS
Security meeting 2012 ID Theft
Security meeting 2012 ID Theft
Luis Martins
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
Kevin Duffey
Securing Web Applications
Securing Web Applications
Mark Garratt
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Carlos Collazo
David Smith gfke 2014
David Smith gfke 2014
innovationoecd
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity Defined Security Alliance
Protect油your hybrid workforce油across the attack chain
Protect油your hybrid workforce油across the attack chain
David J Rosenthal
Secure the modern Enterprise
Secure the modern Enterprise
Microsoft sterreich
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
OneLogin
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
Perficient, Inc.
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PlatformSecurityManagement
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Siddick Elaheebocus
Office 365 Saturday - Office 365 Security Best Practices
Office 365 Saturday - Office 365 Security Best Practices
Benoit HAMET
Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti

More Related Content

What's hot (12)

B&D Mi Case Software Overview
B&D Mi Case Software Overview
yankees247
True Services Portfolio Overview
True Services Portfolio Overview
Nathaniel "Lee" Wade
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
ForgeRock
或沿艶稼遺鞄温庄稼
或沿艶稼遺鞄温庄稼
nanoCredit 速 Technology
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS
Andrew_Goss
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
Aptera Inc
Silsbee - Interface Seattle 2015 - Cybersecurity
Silsbee - Interface Seattle 2015 - Cybersecurity
Kenneth Silsbee, MS
Security meeting 2012 ID Theft
Security meeting 2012 ID Theft
Luis Martins
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
Kevin Duffey
Securing Web Applications
Securing Web Applications
Mark Garratt
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Carlos Collazo
David Smith gfke 2014
David Smith gfke 2014
innovationoecd
B&D Mi Case Software Overview
B&D Mi Case Software Overview
yankees247
True Services Portfolio Overview
True Services Portfolio Overview
Nathaniel "Lee" Wade
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
ForgeRock
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS
Andrew_Goss
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
Aptera Inc
Silsbee - Interface Seattle 2015 - Cybersecurity
Silsbee - Interface Seattle 2015 - Cybersecurity
Kenneth Silsbee, MS
Security meeting 2012 ID Theft
Security meeting 2012 ID Theft
Luis Martins
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
Kevin Duffey
Securing Web Applications
Securing Web Applications
Mark Garratt
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Carlos Collazo
David Smith gfke 2014
David Smith gfke 2014
innovationoecd

Similar to Norm Barber At-a-Glance 2015 (20)

Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity Defined Security Alliance
Protect油your hybrid workforce油across the attack chain
Protect油your hybrid workforce油across the attack chain
David J Rosenthal
Secure the modern Enterprise
Secure the modern Enterprise
Microsoft sterreich
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
OneLogin
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
Perficient, Inc.
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PlatformSecurityManagement
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Siddick Elaheebocus
Office 365 Saturday - Office 365 Security Best Practices
Office 365 Saturday - Office 365 Security Best Practices
Benoit HAMET
Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
OracleIDM
Identity Access Management 101
Identity Access Management 101
OneLogin
SharePoint Governance and Compliance
SharePoint Governance and Compliance
SPC Adriatics
SharePoint Governance and Compliance
SharePoint Governance and Compliance
Alistair Pugin
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
Ahmad Almarzouk
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
David J Rosenthal
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365
Chris Bortlik
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
3 Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
Andrew Bettany
How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
ITCamp
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity Defined Security Alliance
Protect油your hybrid workforce油across the attack chain
Protect油your hybrid workforce油across the attack chain
David J Rosenthal
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
OneLogin
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
Perficient, Inc.
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PlatformSecurityManagement
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Siddick Elaheebocus
Office 365 Saturday - Office 365 Security Best Practices
Office 365 Saturday - Office 365 Security Best Practices
Benoit HAMET
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
OracleIDM
Identity Access Management 101
Identity Access Management 101
OneLogin
SharePoint Governance and Compliance
SharePoint Governance and Compliance
SPC Adriatics
SharePoint Governance and Compliance
SharePoint Governance and Compliance
Alistair Pugin
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
Ahmad Almarzouk
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
David J Rosenthal
Stay Productive, Collaborative, and Secure with Microsoft 365
Stay Productive, Collaborative, and Secure with Microsoft 365
Chris Bortlik
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
3 Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
Andrew Bettany
How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
ITCamp
Ad

Norm Barber At-a-Glance 2015

  • 1. 息 UnifyCloud LLC All rights reserved 1 35-year veteran of the IT industry starting as an IT Director in traditional IT organizations. Participated in the transition from distributed processing through client-server to Cloud first - mobile first IT. Last 20 years focused on Security, Identity & Access Management (S/IAM), and IT Risk Management. Currently, Managing Director at UnifyCloud LLC, a Cloud-focused consultancy specializing application migration to Windows Azure (IaaS/PaaS) and in S/IAM controls for the emerging Hybrid IT environments. Previously held management positions with PwC, KPMG, Andersen Worldwide (Partner and Global Services Director for the Security & Privacy practice), Protiviti (Founding Managing Director and Identity Practice Lead) and with Oxford Computer Group - Microsoft Identity & Security Partner of the Year 2013 and 2014 (Sr. Vice President). Microsofts Strategic Security Advisor for the US Financial Services sector and Principal Program Manager for the Customer & Partner Engineering Group within the Azure Identity & Security Services Division. Held CISSP and CISM certifications and served on the Technology Committee of the Institute of Internal Auditors. Member of the Cloud Security Alliance (CSA), the Information Systems Audit and Control Association (ISACA), the Information Systems Security Association (ISSA), InfraGard (the private sector and FBI partnership), and U.S. Secret Service Electronic Crimes Task Force. Norm Barber Managing Director, UnifyCloud LLC