Zachery S. Mitcham
Wilmington, NC 28409
mitchamz@gmail.com
(910) 777-7401
CHIEF INFORMATION OFFICER * CHIEF INFORMATION
SECURITY OFFICER * EXECUTIVE DIRECTOR
EXECUTIVE PROFILE
Information Technology Security ~ Network
Design ~ Strategic Planning
Technology and business visionary with executive
and hands-on experience in automating multi-million dollar enterprises. Strong
record of success in deploying robust IT security architecture and
infrastructure. Documented ability to bring the benefits of IT to solve business
issues while managing costs and risks. Led deployment of custom
healthcare network communications systems. Over 27 years of information
technology experience with emphasis on e-commerce and operational compliance.
Provided strategic direction to board of trustees, board of directors and senior
management on technological issues and challenges.
-
Technology Architecture and Integration
* Leading Edge WAN/LAN Design
-
Global IT Delivery and Project Management
* Electronic Commerce Strategy Development
-
Budgeting and Cost Control * Staff Management and Team Builder
-
Organization and Staff Development
* Strategic Analysis and Internal Consulting
Dynamic management career with strong leadership,
consistent track record of excellence,
problem-solving, planning, team-building and project management skills.
Recruited, developed, motivated and retained diverse staff structuring them into
teams that delivered results and savings. Full responsibility for return on
investment (ROI) and managing multi-million dollar budgets. Proven record of
department profitability and cost savings realized within various business enterprise settings.
EDUCATION
CENTRAL MICHIGAN UNIVERSITY, Mount Pleasant, MI
MERCER UNIVERSITY-EUGENE STETSON SCHOOL OF BUSINESS, Macon, GA
PROFESSIONAL DEVELOPMENT
HARVARD UNIVERSITY,
Extension School, Cambridge, MA
STANFORD UNIVERSITY - Center for Professional Development, Stanford, CA
CARNEGIE MELLON UNIVERSITY - Software Engineering Institute, Pittsburgh, PA
-
Fundamentals of Incident Handling
-
Certificate-Information Security for Technical
Staff
-
Certified Computer Security Incident Handler
VILLANOVA UNIVERSITY, Villanova, PA
UNIVERSITY OF CENTRAL FLORIDA- - National Center for Forensic Science, Orlando,
FL
UNITED STATES ARMY SCHOOL OF INFORMATION TECHNOLOGY, Fort Gordon, GA
CERTIFICATIONS
EMPLOYMENT HISTORY
-
Associate Director, Security Operations
Virginia Tech University, 1300 Torgensen Hall, 620 Drillfield Drive,
Blacksburg, VA 24061
(02/2022-Present)
-
VP and Chief Information Security
Officer
SURGE
Professional Services-Group, Wilmington, NC
(05/1988-Present)
-
Chief Information Security and
Compliance Officer
North Carolina Central University, 1801
Fayetteville, Street, Durham, NC 2770 (03/2017-04/2019)
-
Chief Information Security Officer
University of North Carolina Wilmington, 601 South College Road, Wilmington, NC 28403 (06/2006 - 09/2016)
-
Department Chair
State of NC-Public Schools of Robeson County,
11344 Deep Branch Road, Pembroke, NC 28372
(12/2003 - 06/2006)
-
Director, Network Services
New Hanover
Regional Medical Center, 2131 South 17th Street Wilmington, NC
28401
(04/2001 - 12/2003)
-
United States Army Field Grade Officer (Systems Automation Functional Area)
United
States Department of Defense (Army), 200 Stovall Street Alexandria,
VA 22332
(03/1981-06/2001)
-
Social Service Case Manager
Division of Family and Children Services, Macon, GA 31201
(1980-1981)
-
Social Service Case Manager
Medical Center
of Central Georgia, Macon, GA 31201
(1977-1980)
PROFESSIONAL EXPERIENCE
Virginia Tech University, Blacksburg, VA
Associate Director, Security Operations
●
Maintains security metrics program to assess and understand university-wide
information
security trends
over time
● Coordinates broad scale
security initiatives that build processes and tools for mitigating risk, and
efficiently
meeting the security requirements of the university
● Builds collaborative
internal relationships across the Division of IT and the university to
improve information
flow regarding security requirements, available
services and resources, and IT security status
● Participates in research
that evaluates gaps in security and identify solutions to reduce risk,
including
business processes, technical controls, or policy
improvements
● Assists Division of IT
senior leaders and others with strategic and operational planning as related
to
information security, working alongside the University
IT Security Officer in promoting,building,
and
advancing security practices across all units
● Partners with other
Information Security team members to collectively build and drive the
Information
Security Program, Strategy, and Roadmap
● Works both independently and
collaboratively with departments to set and/or implement policies,
procedures and systems as directed by the IT Security
Officer
SURGE Professional Services-Group, Wilmington, NC
VP and Chief Information Security Officer
Chief Information Security Officer for a group
of technical consultants. Plays a significant role in the strategic
planning and policy development for information technology security
programs, provides disaster recovery/business continuity support, leads risk
management and analysis assessments, insures compliance with federal, state
and local mandates, develops security plans, provides information security
awareness presentations and training, develops customized information
security programs, liaises with legal counsel and law enforcement for
electronic discovery support, and cyber-criminal investigations.
North Carolina Central University,
Durham, NC
Chief Information Security and
Compliance Officer
-
Established the university's first full
service information security department.
-
Directed an internationally acclaimed,
recognized and awarded university information security program.
-
Nominated and recipient of the 2018
EC-Council CISO of the Year Award
-
Nominated and recipient of the 2017 SC
Magazine Reboot Award- Outstanding Information Security Educator
-
Developed and delivered a comprehensive
information security program for NCCU which purpose included assurance
that data created, acquired or maintained by the university and our
users were utilized pursuant to federal/state laws and university
regulations relative to information access and control, security and
privacy. Further, to protect university information and its
infrastructure from both internal and external threats.
-
Balanced security requirements of the
university's strategic plan, identified risk factors and recommended
mitigations controls and solutions to both.
-
Maintained management and oversight of the
IT security department, providing leadership and professional
development to the team.
-
Insured the university was up to date and
in compliance with ISO 27001, SOC2 and Payment Card Industry-Data
Security Standards.
-
Coordinated the development of information
security policies, standards and procedures.
-
Ensured that university policies were in
compliance with external requirements.
-
Maintained oversight of the dissemination
of policies, standards and procedures to the university.
-
Served as the university’s representative
for inquiries from customers, partners, and the public regarding the
organization’s security strategy.
-
Liaised with law enforcement agencies with
respect to computer security incidents and security breaches.
-
Coordinated the development and delivered
university training on information security and privacy requirements for
faculty staff, students. employees, other authorized users and senior
management.
-
Developed and implemented an Computer
Security Incident Reporting and Response system to address security
incidents, and response to policy violations and external complaints.
-
Developed and implemented a quarterly Risk
Assessment program with respect to information security and data
privacy.
-
Planned for and managed the university's
Business Continuity and Disaster Recovery programs.
-
Coordinated for third party risk and
security assessments.
-
Maintained oversight of the
university information security Audit programs with the
University auditor
-
Maintained knowledge of the
latest security and privacy legislation, regulations, advisories, alerts
and vulnerabilities pertaining to the university and its mission.
-
Served as the university's point of
contact for internal and external security audits.
-
Prepared and presented to the Board,
senior management, employees and external stakeholders on the university
information security program.
University
of North Carolina, Wilmington, NC
Chief Information Security Officer
-
Established the University of North Carolina
Wilmington's first full service Information Technology Security Department
consisting of 4 Full Time Equivalent IT Security professionals with
associated forensics tools and information security equipment.
-
Directed, managed, planned and administered the
operational and administrative activities of a full service IT security
department.
-
Developed, implemented security standards,
procedures and guidelines for multiple platforms and diverse systems
environments.
-
Prepared responses to NC State inquiries
regarding UNCW information security related matters on behalf of the
Chancellor
-
Reviewed the development, testing and
implementation of security plans, products and controls techniques
-
Identified and assessed IT security risk/
exposure on new and existing infrastructure
-
Investigated and recommended appropriate
corrective actions for IT security incidents .
-
Developed and maintained security policies,
controls and their compliance.
-
Analyzed security incidents and escalation of
security events.
-
Liaised with customers with regards to
information security incidents.
-
Developed cutting-edge, innovative solutions
for IT network security.
-
Studied the proliferation of viruses; prevent
hacker intrusion.
-
Conducted active penetration tests; discovered
vulnerabilities in information systems.
-
Overall
responsible for the University's
central data security and privacy policies, architecture, and procedures.
-
Prepared on-line and hard-copy documentation
of University security plans and procedures.
-
Worked with constituent groups to create,
document, implement, and manage policies, procedures, and practices that
ensured the availability, integrity, and privacy of information asset on
centrally managed computer systems.
-
Worked with functional groups and staff in the
creation of guidelines to ensure the security and privacy of information on
the University's computer systems.
-
Assisted the University in its compliance with
relevant information technology laws and policies.
-
Developed and implemented the overall
information security strategy and architecture to be used by the
University's centrally managed systems developers and administrators.
-
Served as facilitator of the Computer
Security Incident
Response Team (CSIRT) working in collaboration with other UNCW constituencies,
such as University Council and University Police, concerning information
security and privacy incidents.
-
Served as liaison between CSIRT, University
administration, and department representatives to maximize the adoption of
and support for IT security plans and procedures within UNCW.
-
Maintained expertise in
security-related technologies, trends, issues, and solutions.
-
Investigated security needs, and recommended,
plans, implements, tests, and monitors information security improvements.
-
Planned and coordinated information security
investigations, feasibility studies, and surveys, to include cost-benefit
evaluations of proposed and existing security solutions.
-
Provided instruction and information security
awareness training for a Faculty, Staff and Student body consisting of over
14,000 end users.
-
Insured State of NC regulatory requirements
with respect to information security procedures and their application are
adhered to.
-
Participated as appropriate in the planning
and implementation of hardware and software.
-
Maintained a broad knowledge of
state-of-the-art information technology security equipment, and systems.
-
Instrumental in the facilitation of the
Information Technology Systems (ITS)
operational change management program
New Hanover
Regional Medical Center, Wilmington, NC
Director, Network Services
-
Provided executive leadership as head of the network services section of the
fifth largest healthcare delivery network in the state of North Carolina.
-
Provided principal direction for all aspects of strategic IT planning, implementation and
support network wide as an integral component of the hospital business plan.
-
Engineered the turnaround of the network services performance and service
levels.
-
Prepared technical briefings and presented them to enterprise senior
leadership and Board of Trustees.
-
Transformed network services into a strategic business partner.
-
Managed and delivered multiple large scale projects on time and within
budget.
-
Directed all budgeting activities, design and support of all technology.
-
Successfully managed an Operations and Capital
Budget totaling over $3.5 Million dollars for a network services department
supporting the infrastructure of a 660 bed hospital with over 4000
employees.
-
Provided budgetary control and cost reduction
in information systems in excess of $200,000 dollars annually.
-
Supported the mission and goals of New Hanover
Health Network (NHHN) in a dynamic, evolving environment, while supporting a
strategic vision/plan for information technology.
-
Established credibility with the Senior
Management Team and executives across the health system.
-
Supported business growth, add value and
improve the information systems environment by managing over 300 information
technology projects
-
Developed and implemented a project
methodology and coordinate projects across all departments.
-
Developed a technically competent, proactive,
customer-service oriented, high-performance team .
-
Created teams that are technically perceptive
and have a solid understanding of business processes.
-
Established vision and built consensus for
information technology endeavors
-
Functioned as a partner with the Chief
Information Officer, assisting and collaborating as appropriate.
-
Maintained oversight and coordinated the
day-to-day operations of the information technology systems for New Hanover
Health Network, including application development and support, operations,
and data networks.
-
Worked in collaboration with others that
reported to the Chief Information Officer to ensure smooth and effective
operations across the health system.
-
Led the deployment and maintenance of all
enterprise hardware for New Hanover Health Network.
-
Developed and fostered a culture of responsive
customer oriented services and internal accountability.
-
Taught and mentored project managers and staff
on how to apply standards, tools, and methodologies while delivering high
quality business focused customer service.
-
Provided technical expertise on systems,
market trends, technology directions, and product directions.
-
Established performance measures to ensure
project managers and staff are accountable and compliant in project
planning, risk and issue management, processes and procedures, and change
management.
-
Worked with the Chief Information Officer,
developed and communicated the New Hanover Health Network information
systems vision to all levels of the organization.
-
Planned, developed and deployed New Hanover
Health Networks' first 802.11 wireless network converting it from a PROXIM
open air system to an IEEE 802.xx standard architecture
-
Managed the activities of 22 full-time
employees - Project Managers, Telecommunications Support Technicians,
Network Engineers, Systems Analyst, Computer Support Specialists and Help
Desk.
U.S. Army Bosnia-Herzegovina Task Force Eagle HQs Tuzla Information Technology
Director
-
Supervised automated information processing
for units, installations, and activities within the United States
Multi-National Division area of responsibility in Bosnia-Herzegovina.
-
Directed the activities of 12 system
automation professionals supporting United States, Russian, Turkish
and Nordic Polish forces throughout the Task Force Eagle area of
operations within Bosnia-Herzegovina. -
Broke new ground in providing reliable
voice, data, and video teleconferencing capabilities to the
Multi-National Division-North's dispersed forces. -
Advised commanders and staff on computer
information systems policy and technical matters.
-
Planned and managed the integration of
hardware, software and data communications at the user interface level.
-
Supervised the installation, operation, and
administration of all computer systems and local area networks at all
organizational levels to include combined, joint and service agencies.
-
Translated mission needs into computer systems
requirements and helped to define functional requirements.
-
Evaluated and optimized efficiency of computer
network resources.
-
Performed economic analysis, planned,
programmed, and budgeted for information systems resource requirements
(equipment, people, and facilities).
-
Developed and implemented procedures for the
local procurement, storage, and distribution, and control of commercial
computer system products.
-
Managed computer information systems
resources, maintenance programs, and logistics support.
-
Established procedures for effective and
efficient use of computer systems resources.
-
Developed, implemented and managed data base
management systems and local area networks.
-
Established and prioritized computer systems
goals and objectives.
-
Wrote and maintained security accreditation
plans for computer systems.
-
Developed and managed information security
procedures.
-
Configured and maintained security fire walls.
-
Provided networking security for one of the
largest WAN in the world.
-
Developed and coordinated procedures for
contingency operations during system emergencies, outages and degraded
operations, or downtime for maintenance.
-
Designed and maintained the installation of
web sites at major organizations and commands.
-
Developed and conducted customer education
programs.
V Corps Headquarters,
Intelligence (G2) Heidelberg, Germany
Director, Information Systems Security
-
Certified all Department of Defense
Intelligence Information Systems within the sensitive compartmented
information facility (SCIF).
-
Provided security for the sensitive
compartmented information systems (SCIS) within the largest U.S. Army
forwarded deployed headquarters.
-
Drafted intelligence systems security policies
and procedures for operations within a multi-national environment.
-
Analyzed foreign intelligence cyber threats
against sensitive Department of Defense agencies.
-
Identified operational sensitive compartment
information systems vulnerabilities and applied necessary fixes.
V Corps Headquarters,
Information Technology (G6) Heidelberg, Germany
Director, Information Systems Integration
-
Planned and coordinated all systems automation
support for a 30,000 person organization.
-
Forecasted and designed baseline automation
security systems architecture to meet the mission requirements of corps
headquarters.
-
Operationally tested and evaluated new systems
software and hardware.
-
Trained all information management officers
(IMO) throughout the corps
-
Managed the activities of two senior level
managers
-
Developed and maintained oversight of the
Corps $20 million dollar systems automation budget.
-
Executed the Corps systems automation
operation spending plan.
Division
Support Command, Fort Riley, Kansas
Director, Logistics Information Systems
-
Provided logistical automation support to a
16,000 person organization for Standard Army Management Information Systems
(STAMIS).
-
Managed and directed the operations of three
staff sections consisting of 16 full time employees.
-
Maintained logistics information systems
totaling over $2 million dollars.
-
Installed, operated and maintained over 300
tactical computer systems.
-
Maintained oversight of logistics software
development.
-
Prepared and executed the operations plan to
deploy the largest rollout of Standard Army Management Information
Systems in Fort Riley history.
ADDITIONAL INFORMATION
NETWORKING:
Cloverleaf SNMP End to End Network Monitoring, Network Security, Network
Essentials and TCP-IP, Gigabit Data Transfer technology (Native Mode LAN
Interconnection) Fiber optic and CAT 5 cabling plants.
SECURITY:
FTK, Qualys, Nessus, Computrace, Symantec-Norton
Anti-virus enterprise solutions, Spirion Identity Finder and NMap
ENTERPRISE MOBILITY: Data Leakage Prevention Systems
INTERNET AND TECHNOLOGICAL
PROTOCOLS: Web Graphics, HTML coding, Microsoft Exchange, Internet
Information Server, popular web browsers, DNS, DHCP, PGP, RAS,
and Website creation.
SPECIAL SKILLS:
Comprehensive knowledge of IT security
technologies, techniques and best practices that cover all levels of IT
architecture, including those that affect business processes, data
applications and network and systems infrastructure and their effects on a
diverse computing environment. Thorough knowledge of relevant
information security laws, guidance and policies applicable to the various
industries. Thorough knowledge of the various industry and government
standards in privacy and security including but not limited to
ISO 27001, SSAE16, SOC 1/2, NIST, GDPR. Knowledge of business
continuity planning, auditing and risk management. Extensive experience in
TCP/IP networking, intrusion detection systems, firewalls, virtual private
networks, access controls, encryption techniques, IT security solution
deployment strategies and management and vulnerability assessments.
Excellent Project Management, written and oral communication skills. Educator in Christian and Social Ethics, Well versed and
traveled throughout Euro-Centric and Asiatic cultures, Working knowledge of U.S.
Electronic Communications
statutes, court proceedings and Federal Codes with respect to (Electronic
Discovery, Electronic Communications Privacy, Identity Theft Protection, Export
Administration Regulations, Payment Card Industry Data Security Standards,
Health Insurance Portability and Accountability Act, Family Education Right and
Privacy Act and the National Incident Management System), Youth mentor, Joint Commission on Accreditation of Healthcare Organizations (JCAHO) preparation, Skilled adult
education instructor and trainer. Past recipient of United States of America Secret Security Clearance
HONORS, AWARDS, MEMBERSHIPS AND COMMUNITY
INVOLVEMENT:
Ten Most Influential CISOs for 2022-CIO Views Magazines;
Recipient
of the 2018 EC-Council CISO of The Year Award; 2018
SC Awards Judge;
SC Media Reboot Leadership Awards 2017-Outstanding Educator;
2013 McAfee Digital Government Cybersecurity Leadership and Innovation Award
recipient;
Digital Government Award 2013; 2010 EC Council Certified CISO Honor Roll; 2009
University of North Carolina Wilmington Excellence Award Nominee;
2003 McKesson Corporation VIP Award; United States Army Meritorious Service Medal - 3
Awards; United States Army Commendation Medal - 4 Awards; United States Army
Achievement Medal - 4 Awards; Armed Forces Expeditionary Medal - Bosnian
Peacekeeping Mission; Armed Forces Service Medal - Bosnian Peacekeeping
Mission; Presidential Unit Citation; New Hanover
County Board of Health; EDUCAUSE-Higher
Education Information Security Council (HEISC) Awareness and Training
Working Group (former member);
HEISC Governance, Risk, and Compliance Working Group,
University of North Carolina System IT Security Council; UNCW
Chancellor's Council on Safety and Security;
UNCW Administrative Officer; Cape Fear Community College Information Technology Advisory Committee;
State of North Carolina Department of Corrections Community Volunteer
(Community Resource Council Chairman);
Former member of the New Hanover County Youth Empowerment
Services (YES) Advisory Board; American College of Health Care Executives (ACHE); Association of Military Surgeons of the United States (AMSUS);
Former member of the Salt Lake, Aliamanu and Foster
Village Community Board - Chairman Community Affairs committee- Honolulu, Hawaii;
Former member of the Volunteers
of the Heidelberg, Germany Community.
PROFESSIONAL TRAINING AND COURSES:
Department of Defense Intelligence Information Systems Certification
Training, National Incident Management System Training; The
University of Tennessee - Knoxville, TN - Strategic Management, 30 Graduate
Level Semester Hours; Managing Employees, 4 hrs, 6/2/2003; Disciplinary Process,
3.5 hrs, 8/15/2001; Effective Communications, 5 hrs, 5/21/2001; Employee
Relations, 2.5 hrs, 7/15/2001; Management Orientation, 8.5 hrs, 3/02/2002;
Management Support Tools, 4 hrs,10/12/2001; Performance Improvement/Problem
Solving, 4 hrs, 6/15/2001; Sexual Harassment, 2 hrs, 8/15/2001; Using Data to
Make Decisions, 4 hrs, 7/20/2001; Conflict Resolution, 4 hrs, 6/05/2001;
Counseling Employees, 5.5 hrs,10/22/2001; Emergency Response Planning for Your
Business -Disaster Recovery Course, 8 hrs, 8/2003; Contracting Officer's
Representative Course, 9 hrs, 10/15/1985; Personnel/Human Resources Management
Course, 244 hours, 12/12/1989; Information Systems Security Course, 24 hrs,
05/21/1999; Emerging Healthcare Trends: The New Economics of Care 3 hrs 3/26/02;
Health Insurance Portability and Accountability Act (HIPAA) Security 4 hrs
4/2/02; Bioterrorism Incident Command Training and Drill 8 hrs 8/8/02; Health
Safety Training ( Emergency Management, Hazardous Materials/Waste, Life Safety,
Medical Equipment, Safety Management, Security, Utilities, Domestic/Workplace
Violence, Latex Allergy Awareness, Infection Control: Blood borne Pathogens, TB)
3 hrs 2/19/02; 28 credit hours Combined Graduate and Undergraduate Finance and
Accounting Courses.
PROFESSIONAL PUBLICATIONS AND PRESENTATIONS
Mitcham, Zachery S., CISO Magazine, 26
January 2022
"Cybersecurity Predictions for the Year"
Mitcham, Zachery S., Kindervag, John and Farmer, Charlotte M.
PhD, Chief of Staff Journal, December 2021, pp 50-51,
"Embedding
Zero Trust Cybersecurity into Enterprise Operations"
Mitcham, Zachery S., CISO Magazine, 1
August 2021
"How Crytojacking and Cryptomining Assaults Work"
Mitcham, Zachery S., CISO Magazine, 7 March 2021,"Data Security-A Layered Approach"
Mitcham, Zachery S., CISO Magazine, 20
February 2021,"After
the Breach and Beyond"
Mitcham, Zachery S., Bright Talk Webinar: 11
February 2021
"Don't Let Them Catch You With Your Work Undone-Today's
Threat Landscape"
Mitcham, Zachery S., CISO Magazine, 21 October 2020,"Social Engineering: Life Blood of Data Exploitation
(Phishing)"
Mitcham, Zachery S., Bright Talk Webinar: 18
March 2020
"Phases of Incident Response"
Mitcham, Zachery S. 22 April 2018,
"Privacy and Security Implications of Using Smart Devices and Having
Intelligent Homes", NCCU Law School,
Legal Eagle Review Broadcast, WNCU Radio FM 90.7
Mitcham, Zachery S. 7 April 2018,
ABA Hackathon, abajusticehack.org, hosted by North Carolina Central
University Law School.
Mitcham, Zachery S. 17 February 2018,
"Social Media and the Emerging Cyber Threats to Personal Privacy",
Intellectual Property Law Institute and Information System Security
Association Cybersecurity Conference hosted by North Carolina Central
University.
Mitcham, Zachery S. Sep 2018,
"Global CISO Forum Podcast Awards-2018", EC-Council Podcast
Mitcham,
Zachery S. 17 September 2016,
"Information Security Awareness-What
Everyone Should Know", PMI-Metrolina and the Wilmington Community
Chapter, New Hanover County Public Library NE Branch Watkins Room,
Wilmington, NC
Mitcham, Zachery S., SC Magazine, 1 April 2016,
"Stop Blaming The Victim"
Mitcham, Zachery S. , WECT News, 1 October
2014, "Expert Weighs In On Cybersecurity Threats to Protect You"
Mitcham, Zachery S. and Dr. Laurie Patterson,
15 November 2013, Department of Computer Science, Computer Information
Technology Lecture, "Computer Security and Client Privacy"
Mitcham, Zachery S. , 17 October 2013, Cape
Fear Community College, Cyber-Security Awareness Month Presentation, "Topics
in Information Security"
Mitcham, Zachery S. and Dr. Mahnaz Moallem, 19
February 2013, UNCW Watson College of Education, Masters of Instructional
Technology Lecture, "Security
Conscience Computing"
Mitcham, Zachery S., 18 Apr 2012, Wilmington Information Technology Exchange and Conference, "The
Enemy Within" an Analysis of Insider Threats to Network Security, UNCW
Computer Information Systems
Mitcham, Zachery S. and Dr. Mahnaz Moallem, 7 February 2012, UNCW Watson School of Education, Masters of Instructional
Technology Lecture, "Information Technology Change Management
Framework"
Mitcham, Zachery S. 5-6 December 2011 EC-Council CISO Executive Summit Panelist, "Implementing a High-Performing Information Security Program", Las
Vegas, NV
Mitcham, Zachery S. 5-6 December 2011 EC-Council CISO Executive Summit Panelist, "Managing
Insider Threats", Las Vegas, NV
Mitcham, Zachery S. 12 - 13 September 2011, UNCW Chancellor's Council of Safety and Security
Symposium, Program Coordinator and Presenter,
Wilmington, NC
Mitcham, Zachery S. 18 May 2011, E Discovery
Panelist - The University of North Carolina General Administration
System Wide Attorneys Meeting-Center for School Leadership Development
("Electronically Stored Information Collection Methods and Procedures"),
Chapel Hill, NC
Mitcham, Zachery S. 8-10 November 2010,
"Computer
Security Incident Response Framework", UNC CAUSE Conference, Wilmington, NC
Mitcham, Zachery S. 4 October 2010,
"Emerging Threats to Personal Information Security and Privacy", North Carolina University Auditors Association, Wilmington, NC
Mitcham, Zachery S. September-October
2010, "Protecting Portables", EdTech Magazine, CDW-G, Tommy Peterson
Mitcham, Zachery S. September 2009 "Information Security in Higher
Education",
UNCW Chancellor's Safety and Security Symposium,
Wilmington, NC
Mitcham, Zachery S. 18 November 2008, "Information
Technology Tools used by Cyber Stalkers and Other Predators ", UNC CAUSE
Conference, Greensboro, NC
Mitcham, Zachery S. 17 November 2008, "E
Discovery - Planning Considerations for ESI Security and Containment", UNC
CAUSE Conference, Greensboro, NC
Mitcham, Zachery S., 3 March, 2008, "Information Security and NC Records Management Requirements", 2008 UNC Financial Systems Conference , New Bern,
NC
Mitcham, Zachery S., 26 October, 2007,"Information Security Planning Considerations for Telecommuting" EDUCAUSE,
Seattle, WA
Computer Security Incident Handling ("Code Red
Virus")
New Hanover Regional Medical Center Computer
Security Incident Response Team
PROFESSIONAL REFERENCES
|
|