Edward Ferrara

Information Technology, Security, and Privacy Advisor at Thorne HealthTech
  • Claim this Profile
Contact Information
Location
West Chester, Pennsylvania, United States, US

Topline Score

Bio

Generated by
Topline AI

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.
You need to have a working account to view this content. Click here to join now

Experience

    • United States
    • Wellness and Fitness Services
    • 1 - 100 Employee
    • Information Technology, Security, and Privacy Advisor
      • Jan 2023 - Present

      Provide interim Information Technology leadership for Thorne Laboratories solving technology, cybersecurity, service provider, challenges including cloud security (Azure), zero-trust, defense in depth, security organization design, data protection, and regulatory compliance. Key projects include HIPAA compliance and HITRUST certification. Placement in this role provided by Fortium Partners (www.fortiumpartners.com) Provide interim Information Technology leadership for Thorne Laboratories solving technology, cybersecurity, service provider, challenges including cloud security (Azure), zero-trust, defense in depth, security organization design, data protection, and regulatory compliance. Key projects include HIPAA compliance and HITRUST certification. Placement in this role provided by Fortium Partners (www.fortiumpartners.com)

    • United States
    • Business Consulting and Services
    • 1 - 100 Employee
    • Partner
      • Jan 2023 - Present

      Fortium's technology leadership-as-a-service platform quickly delivers leadership to fill a role, produce an outcome, or offer an expert opinion through the largest group of world-class, operating technology leaders in the world. Our expert CIOs, CTOs, and CISOs are available immediately to fill leadership roles in your organization. Full-time or part-time, short-term or long-term, on-site or remote. Fortium Partners know what to do. Our partnership gets the job done as part of your team. Fortium's technology leadership-as-a-service platform quickly delivers leadership to fill a role, produce an outcome, or offer an expert opinion through the largest group of world-class, operating technology leaders in the world. Our expert CIOs, CTOs, and CISOs are available immediately to fill leadership roles in your organization. Full-time or part-time, short-term or long-term, on-site or remote. Fortium Partners know what to do. Our partnership gets the job done as part of your team.

    • Legal Services
    • Managing Principal
      • Jun 2020 - Present

      436 Research is a digital forensics and cybersecurity services firm offering services to address the needs of small, medium and enterprise organizations. After retiring from CSL Behring I created a consulting firm to provide technical Services to SMBs and non-profits. I also provided free-lance editorial services to International Data Corporation. 436 Research is a digital forensics and cybersecurity services firm offering services to address the needs of small, medium and enterprise organizations. After retiring from CSL Behring I created a consulting firm to provide technical Services to SMBs and non-profits. I also provided free-lance editorial services to International Data Corporation.

    • United States
    • Higher Education
    • 700 & Above Employee
    • Adjunct Professor
      • Jun 2015 - Present

      Teach classes on data analytics for fraud, network security, and intrusion detection. Course content includes the use of Autopsy, Kali, Splunk, Palo Alto firewalls, Cisco Packet Tracer network simulator, MySQL, Excel, and Audit Control Language (ACL) to detect fraud and cybersecurity breaches. Courses taught: • MIS 5208 – Data Analytics for Fraud Investigation • MIS 5216 – Organizational (Digital) Forensics • MIS 5217 – Network Security Teach classes on data analytics for fraud, network security, and intrusion detection. Course content includes the use of Autopsy, Kali, Splunk, Palo Alto firewalls, Cisco Packet Tracer network simulator, MySQL, Excel, and Audit Control Language (ACL) to detect fraud and cybersecurity breaches. Courses taught: • MIS 5208 – Data Analytics for Fraud Investigation • MIS 5216 – Organizational (Digital) Forensics • MIS 5217 – Network Security

    • United States
    • Biotechnology Research
    • 700 & Above Employee
    • Chief Information Security Officer
      • Apr 2015 - Jan 2020

      The company’s first CISO. Responsible for global cybersecurity for a large $10B bio-pharmaceutical organization. Leadership focuses on the areas of identity and access management, network, data, and application security. The Chief Information Security Officer is a new role at CSL Behring. It is accountable for the ground-up creation of the information security organization across North America, Europe, and Asian theaters. The role's mission was to develop a cybersecurity organization from scratch using a matrixr management structure across application, infrastructure, and business operations organization. Built the cybersecurity organization from two to thirty-five direct reports in four years. Successfully lead security improvement projects to improve the company's security posture. Programs include manufacturing network redesign, data center upgrades, and security in a U.S. FDA Good Manufacturing Practice (GxP) environment, global network segmentation, global identity management, global vulnerability management, continuous compliance security review, and risk management. Show less

    • Belgium
    • Veterinary Services
    • Vice President, Principal Analyst
      • Apr 2011 - Jul 2015

      information security topics, including managed security services and supporting technologies – SIEM, log management, incident response, and threat intelligence. Rated a Top-20 analyst while at Forrester. A leader in client engagement and business development by an analyst. Other coverage areas include threat intelligence, network security, cloud security, information security, strategy, analytics, and metrics. Select Publications: • The Forrester Wave™: DDoS Services Providers, Q3 2015, Forrester Research, July 22, 2015 [w/Rick Holland] • Market Overview: Managed Security Services, Asia, Q2 2015, Forrester Research, July 1, 2015 • RSA Conference 2015 Recap: Forrester Research Perspectives, Forrester Research, April 28, 2015 [w/ Merritt Maxim] • Prioritize Tokenization to Secure The Payment Chain, Forrester Research, April 27, 2015 [w/ Andras Cser & John Kindervag] • Government Spying Will Cost US Vendors Fewer Billions Than Initial Estimates, Forrester Research, April 1, 2015 [w/James Staten] • Did PRISM Cause an Exodus From US Clouds? Forrester Research, April 1, 2015 [w/James Staten] • PRISM's Impact on The US Cloud Industry, Forrester Research, February 17, 2015 [w/James Staten] • Measure the Effectiveness of Your Security Operations - Performance Management: The Security Architecture and Operations Playbook. Forrester Research, January 15, 2015 • Understand Cybersecurity and Risk Budgets For 2015 - Benchmarks: The S&R Practice Playbook. Forrester Research, January 14, 2015 • Develop Effective Security Metrics - Performance Management: The S&R Practice Playbook. Forrester Research, December 9, 2014 • Create A Security Strategy That Builds Real Business Value - Strategic Plan: The S&R Practice Playbook. Forrester Research, October 27, 2014 • Measure Information Security Effectiveness — Information Security Economics 103 – Analyze Where You Spend Your Money Using the Three R's: Readiness, Response, And Recovery. Forester Research, September 26, 2013. Show less

Education

  • Norwich University
    Master of Science - MS, 4.0/4.0
    2006 - 2008
  • University of Delaware
    Master of Arts - MA, Cognitive Science, Computer Science
    1985 - 1991
  • Franklin & Marshall College
    Bachelor of Arts - BA, Economics
    1977 - 1981

Community

You need to have a working account to view this content. Click here to join now