Curriculum Vitae - Experience



The Chief Information Security Officer’s role is to provide vision and leadership for developing and supporting security initiatives. The Chief Information Security Officer directs the planning and implementation of enterprise IT systems, business operations, and facility defenses against security breaches and vulnerability issues. This individual is also responsible for auditing existing systems, while directing the administration of security policies, activities, and standards.


Strategy & Planning

  1. Participate as a member of the senior management team in governance processes of the organization’s security strategies.

  2. Lead strategic security planning to achieve business goals by prioritizing defense initiatives and coordinating the evaluation, deployment, and management of current and future security technologies using a risk-based assessment methodology.

  3. Develop and communicate security strategies and plans to executive team, staff, partners, customers, and stakeholders.

  4. Assist with the design and implementation of disaster recovery and business continuity plans, procedures, audits, and enhancements.

  5. Develop, implement, maintain, and oversee enforcement of policies, procedures, and associated plans for system security administration and user system access based on industry-standard best practices.

Acquisition & Deployment

  1. Define and communicate corporate plans, procedures, policies, and standards for the organization for acquiring, implementing, and operating new security systems, equipment, software, and other technologies.

Operational Management

  1. Act as advocate and primary liaison for the company’s security vision via regular written and in-person communications with the company’s executives, department heads, and end users.

  2. Work closely with the IT department on corporate technology development to fully secure information, computer, network, and processing systems.

  3. Manage the administration of all computer security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.

  4. Manage the administration of the facility’s security systems and their corresponding equipment or software, including fire alarms, locks, intruder detection systems, sprinkler systems, and anti-theft measures.

  5. Develop, track, and control the security services annual operating and capital budgets for purchasing, staffing, and operations.

  6. Ensure that facilities, premises, and equipment adhere to all applicable laws and regulations.

  7. Recommend and implement changes in security policies and practices in accordance with changes in local or federal law.

  8. Creatively and independently provide resolution to security problems in a cost-effective manner.

  9. Assess and communicate any and all security risks associated with any and all purchases or practices performed by the company.

  10. Collaborate with IT leader, privacy officer, and HR to establish and maintain a system for ensuring that security and privacy policies are met.

  11. Where necessary, supervise recruitment, development, retention, and organization of security staff in accordance with corporate budgetary objectives and personnel policies.

  12. Promote and oversee strategic security relationships between internal resources and external entities, including government, vendors, and partner organizations.

  13. Remain informed on trends and issues in the security industry, including current and emerging technologies and prices. Advise, counsel, and educate executive and management teams on their relative importance and financial impact.

Client Services

  1. Mentor and lead all contracted Trusted Advisory Services using Virtual CxO Resources to guide BlueAlly clients as their:

  2. vCISO Chief Information Security Officer,

  3. vCSO Chief Security Officer (Physical),

  4. vCSO Chief Strategy Officer,

  5. vCRO Chief Risk Officer,

  6. vCPO Chief Privacy Officer,

  7. vCIO Chief Information Officer,

  8. vCIO Chief Innovation Officer, and

  9. vCTO Chief Technology Officer.

  10. 3rd Party Advisor/SME to Board of Directors or Committees

  11. Note: Virtual CxO (vCxO) is a trusted advisory service concept that Andrew Reese created back in 1995/1996 timeframe when he started his first professional services company, ReeseWeb.

Knowledge & Experience

  1. Proven experience in planning, organizing, and developing IT security and facility security system technologies.

  2. Experience in planning and executing security policies and standards development.

  3. Excellent knowledge of technology environments, including information security, building security, and defense solutions.

  4. Considerable knowledge of business theory, business processes, management, budgeting, and business office operations.

  5. Substantial exposure to data processing, hardware platforms, enterprise software applications, and outsourced systems.

  6. Good understanding of computer systems characteristics, features, and integration capabilities.

  7. Experience with systems design and development from business requirements analysis through to day-to-day management.

  8. Excellent understanding of project management principles.

  9. Superior understanding of the organization’s goals and objectives.

  10. Demonstrated ability to apply IT in solving security problems.

  11. In-depth knowledge of applicable laws and regulations as they relate to security.

  12. Proven leadership ability.

Personal Attributes

  1. Ability to set and manage priorities judiciously.

  2. Excellent written and oral communication skills.

  3. Excellent interpersonal skills.

  4. Strong negotiating skills.

  5. Ability to present ideas in business-friendly and user-friendly language.

  6. Exceptionally self-motivated and directed.

  7. Keen attention to detail.

  8. Superior analytical, evaluative, and problem-solving abilities.

  9. Exceptional service orientation.

  10. Ability to motivate in a team-oriented, collaborative environment.

Andrew R. Reese

Mobile: (717) 395-3063

Links to more detail:

  1. CV Overview

  2. CV Education

  3. CV Experience

  4. Security Tips

  5. My Security Pledge

Page (Down) or (Up)

Chief Information Security Officer (CISO)              November 2019 – November 2020

BlueAlly                                   United States