Dr. Segun Odion D.M IST, MS CYB, MS CIS, CYBER CERT-Harvard
Chief Information Officer | Chief Technology Officer at Night Lite Pediatrics- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Funmi Jemima Oyelahan
Dr. Segun Odion has been consistent in demonstrating a high level of knowledge and leadership in the field of Information and Communications Technology. His delivery of excellent solutions that have successfully aided improved business performance with excellent ROI is directly related to his insight and understanding of the underlying business objectives. He has a calm problem-solving demeanor. He is a great teacher and mentor dedicated to building a new generation of experts around the world. He has continued to dedicate his time and resources to this goal with excellent results.
Engr. Noble Olasimbo,AICP
Dr. Segun is a qualified IT technical professional, Autor and professor to students across the nation. Dr. Segun is a man of God that has develops practical solutions to help students in IT industrial leaderships.
Funmi Jemima Oyelahan
Dr. Segun Odion has been consistent in demonstrating a high level of knowledge and leadership in the field of Information and Communications Technology. His delivery of excellent solutions that have successfully aided improved business performance with excellent ROI is directly related to his insight and understanding of the underlying business objectives. He has a calm problem-solving demeanor. He is a great teacher and mentor dedicated to building a new generation of experts around the world. He has continued to dedicate his time and resources to this goal with excellent results.
Engr. Noble Olasimbo,AICP
Dr. Segun is a qualified IT technical professional, Autor and professor to students across the nation. Dr. Segun is a man of God that has develops practical solutions to help students in IT industrial leaderships.
Funmi Jemima Oyelahan
Dr. Segun Odion has been consistent in demonstrating a high level of knowledge and leadership in the field of Information and Communications Technology. His delivery of excellent solutions that have successfully aided improved business performance with excellent ROI is directly related to his insight and understanding of the underlying business objectives. He has a calm problem-solving demeanor. He is a great teacher and mentor dedicated to building a new generation of experts around the world. He has continued to dedicate his time and resources to this goal with excellent results.
Engr. Noble Olasimbo,AICP
Dr. Segun is a qualified IT technical professional, Autor and professor to students across the nation. Dr. Segun is a man of God that has develops practical solutions to help students in IT industrial leaderships.
Funmi Jemima Oyelahan
Dr. Segun Odion has been consistent in demonstrating a high level of knowledge and leadership in the field of Information and Communications Technology. His delivery of excellent solutions that have successfully aided improved business performance with excellent ROI is directly related to his insight and understanding of the underlying business objectives. He has a calm problem-solving demeanor. He is a great teacher and mentor dedicated to building a new generation of experts around the world. He has continued to dedicate his time and resources to this goal with excellent results.
Engr. Noble Olasimbo,AICP
Dr. Segun is a qualified IT technical professional, Autor and professor to students across the nation. Dr. Segun is a man of God that has develops practical solutions to help students in IT industrial leaderships.
Credentials
-
Welcome Campus
MIT Professional EducationNov, 2022- Nov, 2024 -
CISSP Cert Prep (2021): 1 Security and Risk Management
LinkedInMar, 2021- Nov, 2024 -
CISSP Cert Prep (2021): 2 Asset Security
LinkedInMar, 2021- Nov, 2024 -
CISSP Cert Prep (2021): 3 Security Architecture and Engineering
LinkedInMar, 2021- Nov, 2024 -
CISSP Cert Prep (2021): 4 Communication and Network Security
LinkedInMar, 2021- Nov, 2024 -
CISSP Cert Prep (2021): 5 Identity and Access Management
LinkedInMar, 2021- Nov, 2024 -
CISSP Cert Prep: 6 Security Assessment and Testing (2018)
LinkedInMar, 2021- Nov, 2024 -
CISSP Cert Prep: 7 Security Operations (2018)
LinkedInMar, 2021- Nov, 2024 -
CISSP Cert Prep: 8 Software Development Security (2018)
LinkedInMar, 2021- Nov, 2024 -
National Society of Leadership and Success
NSLSAug, 2020- Nov, 2024 -
Collaborative Institutional Training Initiative (CITI) Certificate
CITI Program, A Division of BRANYJan, 2019- Nov, 2024 -
Cybersecurity: Managing Risk in the Information Age
Harvard UniversityNov, 2017- Nov, 2024 -
Capella Faculty and Mentors
CITI ProgramApr, 2022- Nov, 2024 -
Microsoft Certified Professional
Microsoft -
Microsoft Certified System Engineer
Microsoft
Experience
-
Night Lite Pediatrics
-
United States
-
Medical Practices
-
1 - 100 Employee
-
Chief Information Officer | Chief Technology Officer
-
Jul 2020 - Present
• Responsible for performing the following services: application support monitoring, asset management, maintaining and decommissioning network and server hardware, SLA Management, Service Management, and Hardware Procurement. • Responsible for managing an organization's technology strategy, operations, and infrastructure. • Responsible for developing and implementing the organization's technology strategy, which includes identifying technology trends and opportunities, evaluating, and… Show more • Responsible for performing the following services: application support monitoring, asset management, maintaining and decommissioning network and server hardware, SLA Management, Service Management, and Hardware Procurement. • Responsible for managing an organization's technology strategy, operations, and infrastructure. • Responsible for developing and implementing the organization's technology strategy, which includes identifying technology trends and opportunities, evaluating, and adopting new technologies, and aligning technology with the organization's business goals. • Responsible for ensuring the security of the organization's technology systems and data, including developing and implementing security policies and procedures, and ensuring that staff are trained in security best practices. • Manage technology teams, including hiring and training staff, setting performance goals, and ensuring that staff are motivated and engaged. • Build relationships with key stakeholders, including business leaders, customers, and technology partners • Responsible for ensuring that technology is a strategic asset for the organization, and that it is used to drive business value and innovation. • To innovate, collaborate, balance the IT budget, and motivate IT, staff. • Monitoring Key Performance Indicators (KPIs) and IT budgets to assess technological performance • Developing objectives and strategies for the implementation of innovative solutions while optimizing existing systems, applications, and information • Making recommendations and presenting business advantages for technology initiatives and improvements • Leading teams in identifying, comparing, selecting, and implementing technology solutions and partnerships to meet current and future needs • Tracking and controlling the development of annual operating and capital budgets for purchasing, staffing, and technology operations
-
-
Information Technologist | Information Security Analyst | Consultant
-
May 2017 - Present
*Advises cybersecurity stakeholders on required security best practices and assists with the development of technical security enhancements. *Outlines documentation for security program initiatives in a leadership role. *Assisting in identifying security deficiencies and creating an actionable plan to address gaps. *Develops and promotes opportunities for career growth and development to ensure the success of the security program. *Applying forensic techniques and best practices… Show more *Advises cybersecurity stakeholders on required security best practices and assists with the development of technical security enhancements. *Outlines documentation for security program initiatives in a leadership role. *Assisting in identifying security deficiencies and creating an actionable plan to address gaps. *Develops and promotes opportunities for career growth and development to ensure the success of the security program. *Applying forensic techniques and best practices for implementing a cyber event and delivering forensic action reports for executive leadership. *Works as a Project Manager to complete a project action item, create a new project including plan and action items, manage a delegated project, and present a project review to an audit team or executive leadership. *Trains & Documents new incident handling procedures, conduct a training presentation, provide constructive feedback to fellow analysts on events, and review and update incident handling documentation. *Performs technical assessments of information systems security configuration to ensure compliance before the system moves to a production environment; conducts reviews and technical inspections to ensure compliance with HIPPA policies and to identify vulnerabilities or security weaknesses. Recommends corrective actions and provides proper vulnerability reporting. *Supports the Information Security Program, which includes testing, verifying, and validating controls. *Assesses the cybersecurity framework based on the National Institute of Standards and Technology (NIST) *Reviews and updates System) and Plan of Action for weaknesses and remediation plans. *Engages in system vulnerability testing, ensure necessary controls are in place, identify IT risks, and provide recommendations to mitigate the risks and maintain compliance. *Advise on Business Continuity (BC), and Disaster Recovery (DR) Plans
-
-
-
The National Society of Leadership and Success (NSLS)
-
United States
-
Higher Education
-
500 - 600 Employee
-
Member - Nation’s Largest Collegiate Leadership Honor Society
-
2020 - Present
-
-
-
Order of the Sword and Shield
-
United States
-
Higher Education
-
1 - 100 Employee
-
Member - First Academic and Professional Honor Society dedicated to Homeland Security
-
2019 - Present
-
-
-
University of the Cumberlands
-
United States
-
Higher Education
-
400 - 500 Employee
-
Professor - School of Computer and Information Sciences
-
Jun 2017 - Present
Teach Executive Masters Degree & Ph.D. Courses in Information Technology & Cybersecurity: • ISOL 531 Access Control - Cyber Security • ISOL534 Application Security - Cyber Security • ITS631 Operational Excellence – Information Technology • ITS833 Information Governance - Information Technology • DSRT736. Dissertation Seminar - This course provides guided instruction on the design and writing of a dissertation proposal focused on organization-based research. Course activities… Show more Teach Executive Masters Degree & Ph.D. Courses in Information Technology & Cybersecurity: • ISOL 531 Access Control - Cyber Security • ISOL534 Application Security - Cyber Security • ITS631 Operational Excellence – Information Technology • ITS833 Information Governance - Information Technology • DSRT736. Dissertation Seminar - This course provides guided instruction on the design and writing of a dissertation proposal focused on organization-based research. Course activities are intended to strengthen skills in writing, project design, and research methods. • DSRT931 Dissertation: These courses are an independent application of research, design, and methodology that leads to the completion of an original research study. . Serving on PhD student(s) dissertation committee(s). Doctoral Mentor strives to ensure timely completion of the doctoral learner's degree. Show less Teach Executive Masters Degree & Ph.D. Courses in Information Technology & Cybersecurity: • ISOL 531 Access Control - Cyber Security • ISOL534 Application Security - Cyber Security • ITS631 Operational Excellence – Information Technology • ITS833 Information Governance - Information Technology • DSRT736. Dissertation Seminar - This course provides guided instruction on the design and writing of a dissertation proposal focused on organization-based research. Course activities… Show more Teach Executive Masters Degree & Ph.D. Courses in Information Technology & Cybersecurity: • ISOL 531 Access Control - Cyber Security • ISOL534 Application Security - Cyber Security • ITS631 Operational Excellence – Information Technology • ITS833 Information Governance - Information Technology • DSRT736. Dissertation Seminar - This course provides guided instruction on the design and writing of a dissertation proposal focused on organization-based research. Course activities are intended to strengthen skills in writing, project design, and research methods. • DSRT931 Dissertation: These courses are an independent application of research, design, and methodology that leads to the completion of an original research study. . Serving on PhD student(s) dissertation committee(s). Doctoral Mentor strives to ensure timely completion of the doctoral learner's degree. Show less
-
-
-
American Public University System
-
United States
-
Higher Education
-
700 & Above Employee
-
Professor - School of Science, Engineering, Technology & Mathematics
-
Mar 2012 - Nov 2019
ITMG 381- Cyberlaw and Privacy in a Digital Age ITCC500 - Research Methods in Information Systems and Technology ITMG 381- Cyberlaw and Privacy in a Digital Age ITCC500 - Research Methods in Information Systems and Technology
-
-
-
Zippro System Limited
-
United Kingdom
-
Software Development
-
1 - 100 Employee
-
Director- ICT
-
Jan 2013 - Jun 2016
• Responsible for developing and implementing a strategic plan for the organization's technology infrastructure. This included identifying goals and objectives, assessing the organization's current technology capabilities, and developing a roadmap for future technology investments. • Responsible for managing the technology budget, including allocating resources to specific projects and initiatives. Ensured that spending aligned with the organization's overall financial goals. • Managed… Show more • Responsible for developing and implementing a strategic plan for the organization's technology infrastructure. This included identifying goals and objectives, assessing the organization's current technology capabilities, and developing a roadmap for future technology investments. • Responsible for managing the technology budget, including allocating resources to specific projects and initiatives. Ensured that spending aligned with the organization's overall financial goals. • Managed the implementation and maintenance of technology systems and infrastructure across the organization. Ensured that all systems are running smoothly and addressing any issues that arise. • Ensured that the organization's data is secure and protected from unauthorized access. This includes implementing security measures such as firewalls, encryption, and access controls. This included implementing security measures such as firewalls, encryption, and access controls. • Responsible for managing a team of technology professionals, including hiring, training, and development. Also provided leadership and guidance to their team to ensure that all technology initiatives are completed successfully. Show less • Responsible for developing and implementing a strategic plan for the organization's technology infrastructure. This included identifying goals and objectives, assessing the organization's current technology capabilities, and developing a roadmap for future technology investments. • Responsible for managing the technology budget, including allocating resources to specific projects and initiatives. Ensured that spending aligned with the organization's overall financial goals. • Managed… Show more • Responsible for developing and implementing a strategic plan for the organization's technology infrastructure. This included identifying goals and objectives, assessing the organization's current technology capabilities, and developing a roadmap for future technology investments. • Responsible for managing the technology budget, including allocating resources to specific projects and initiatives. Ensured that spending aligned with the organization's overall financial goals. • Managed the implementation and maintenance of technology systems and infrastructure across the organization. Ensured that all systems are running smoothly and addressing any issues that arise. • Ensured that the organization's data is secure and protected from unauthorized access. This includes implementing security measures such as firewalls, encryption, and access controls. This included implementing security measures such as firewalls, encryption, and access controls. • Responsible for managing a team of technology professionals, including hiring, training, and development. Also provided leadership and guidance to their team to ensure that all technology initiatives are completed successfully. Show less
-
-
-
SAIC
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Enterprise Technical Architect
-
Jul 2010 - Mar 2015
❖ Provided strategic and tactical leadership to develop and execute the long-term Information Technology vision for SAIC, an $11B international defense contractor with 38,000+ employees. ❖ Played a vital role in IT strategic planning and development as it relates to SAIC’s separation into two new companies (NEW SAIC & LEIDOS) with very different business models. ❖ Effectively developed the IT strategy that continues to drive substantial change within SAIC and it’s now divested business… Show more ❖ Provided strategic and tactical leadership to develop and execute the long-term Information Technology vision for SAIC, an $11B international defense contractor with 38,000+ employees. ❖ Played a vital role in IT strategic planning and development as it relates to SAIC’s separation into two new companies (NEW SAIC & LEIDOS) with very different business models. ❖ Effectively developed the IT strategy that continues to drive substantial change within SAIC and it’s now divested business units. ❖ Successfully drove the IT strategy to migrate SAIC to a centralized management model. ❖ Deployed enterprise solutions for centralized business operations with standard business processes. ❖ Retired departmental applications and processes. ❖ Modernized key business systems including Customer Relationship Management, HR, and Finance. ❖ Took steps to gain control over the sprawl of data to establish enterprise information management. ❖ Worked closely with stakeholders to identify opportunities to leverage technology to improve business outcomes, improve process efficiency, and empower the workforce that saved roughly $75 M annually. ❖ Successfully drove execution of the strategy to modernize the IT infrastructure while reducing IT spend 25%. ❖ Moved from a SAIC managed data center to a hosted enterprise private cloud. Show less ❖ Provided strategic and tactical leadership to develop and execute the long-term Information Technology vision for SAIC, an $11B international defense contractor with 38,000+ employees. ❖ Played a vital role in IT strategic planning and development as it relates to SAIC’s separation into two new companies (NEW SAIC & LEIDOS) with very different business models. ❖ Effectively developed the IT strategy that continues to drive substantial change within SAIC and it’s now divested business… Show more ❖ Provided strategic and tactical leadership to develop and execute the long-term Information Technology vision for SAIC, an $11B international defense contractor with 38,000+ employees. ❖ Played a vital role in IT strategic planning and development as it relates to SAIC’s separation into two new companies (NEW SAIC & LEIDOS) with very different business models. ❖ Effectively developed the IT strategy that continues to drive substantial change within SAIC and it’s now divested business units. ❖ Successfully drove the IT strategy to migrate SAIC to a centralized management model. ❖ Deployed enterprise solutions for centralized business operations with standard business processes. ❖ Retired departmental applications and processes. ❖ Modernized key business systems including Customer Relationship Management, HR, and Finance. ❖ Took steps to gain control over the sprawl of data to establish enterprise information management. ❖ Worked closely with stakeholders to identify opportunities to leverage technology to improve business outcomes, improve process efficiency, and empower the workforce that saved roughly $75 M annually. ❖ Successfully drove execution of the strategy to modernize the IT infrastructure while reducing IT spend 25%. ❖ Moved from a SAIC managed data center to a hosted enterprise private cloud. Show less
-
-
-
IBM
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Project Manager/IT Architect
-
Nov 1999 - Jun 2010
• Created future vision architecture to expedite delivery of new products and services to market while meeting the Company's cost and risk reduction objectives. • Outlined current and future vision enterprise architecture, including traceability from business and IT strategies to suggested technologies. • Coordinated with architects and business experts across IS to translate critical strategic objectives into actionable and governable roadmaps and designs. • Analysed business and… Show more • Created future vision architecture to expedite delivery of new products and services to market while meeting the Company's cost and risk reduction objectives. • Outlined current and future vision enterprise architecture, including traceability from business and IT strategies to suggested technologies. • Coordinated with architects and business experts across IS to translate critical strategic objectives into actionable and governable roadmaps and designs. • Analysed business and technology challenges, assess costs, and suggest solutions. • Designed and execute proofs-of-concept for critical enterprise capabilities, including building a business case with costs, benefits, and efficiency measures. • Collaborated with key stakeholders and internal teams to define enterprise architecture principles, standards and guidelines, and blueprints. • Developed, enhanced, and maintained reference architectures for various capabilities. • Designed the overall structure of technology systems and applications, including hardware, software, and network components. They consider factors such as scalability, performance, security, and cost. • Planned and supervised the implementation of technology projects, working with stakeholders to ensure that project goals and requirements are met. • Evaluated new and emerging technologies to determine their potential impact on the organization and make recommendations for adoption or rejection. Show less • Created future vision architecture to expedite delivery of new products and services to market while meeting the Company's cost and risk reduction objectives. • Outlined current and future vision enterprise architecture, including traceability from business and IT strategies to suggested technologies. • Coordinated with architects and business experts across IS to translate critical strategic objectives into actionable and governable roadmaps and designs. • Analysed business and… Show more • Created future vision architecture to expedite delivery of new products and services to market while meeting the Company's cost and risk reduction objectives. • Outlined current and future vision enterprise architecture, including traceability from business and IT strategies to suggested technologies. • Coordinated with architects and business experts across IS to translate critical strategic objectives into actionable and governable roadmaps and designs. • Analysed business and technology challenges, assess costs, and suggest solutions. • Designed and execute proofs-of-concept for critical enterprise capabilities, including building a business case with costs, benefits, and efficiency measures. • Collaborated with key stakeholders and internal teams to define enterprise architecture principles, standards and guidelines, and blueprints. • Developed, enhanced, and maintained reference architectures for various capabilities. • Designed the overall structure of technology systems and applications, including hardware, software, and network components. They consider factors such as scalability, performance, security, and cost. • Planned and supervised the implementation of technology projects, working with stakeholders to ensure that project goals and requirements are met. • Evaluated new and emerging technologies to determine their potential impact on the organization and make recommendations for adoption or rejection. Show less
-
-
Education
-
Harvard University
Cybersecurity Certificate: Risk Management in Information Age -
American Military University
Master of Science (M.Sc.) Cybersecurity Studies, GPA: 3.72 -
University of Phoenix
Doctor of Management (D.M.), in Organizational Leadership with a Specialization in Computer Information Systems & Technology -
University of Phoenix
Master of Science - (M.Sc.), Computer Information Systems -
University of Phoenix
Bachelor of Science - (B.Sc.), Information Technology -
Southern Polytechnic State University
Bachelor of Science - BS, Electrical & Computer Engineering Technology (ECET) -
MIT Professional Education
Certificate, Digital Transformation - AI, IoT, Cloud, Blockchain, and Cybersecurity