“Martin Bally has been a valuable member of the Detroit CISO Community Governing Body since its founding in 2013. This year, in his new role as one of the group’s chair members, Martin helped launch a new collaborative event format (the Detroit CISO Solutions Tour) by evangelizing it via social media and through in-person conversations with his peers. In addition, he delivered the opening remarks, set the tone for the event with a Threat Landscape level set and led a discussion with Lear Corporation’s Brad Barton on the topic of the Internet of Things (IoT). Martin went above and beyond to ensure that the Detroit CISO Solutions Tour was a great success. He is a true leader and an incredible asset to his company, his team and the Detroit CISO Community. ”
About
Activity
-
Best surprise ever!!!!! Today, I received a handwritten note from one of our dedicated leaders, Matt Pettinato. Matt's journey with Covenant…
Best surprise ever!!!!! Today, I received a handwritten note from one of our dedicated leaders, Matt Pettinato. Matt's journey with Covenant…
Liked by Martin Bally
-
The AI Act is officially law! The compliance clock is now ticking… #aiact
The AI Act is officially law! The compliance clock is now ticking… #aiact
Liked by Martin Bally
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Director of Membership Services
Cloud Security Alliance - Detroit Chapter
- 4 years 6 months
Science and Technology
-
Member Board of Directors
Proofpoint Security Awareness Training
- 4 years 5 months
Science and Technology
Projects
-
Detroit Secureworld Speaker 2016 - Emergence of the Chief Digital Risk Officer
Digital technologies will increase an organizations competitiveness, agility, and reaction time. While increasing the speed of business, these digital technologies and processes will introduce greater security threats and evolution of digital risk management. Join Martin Bally as he discusses the Emergence of the Chief Digital Risk Officer.
-
Digital Risk and IoT
Martin Bally will be leading a 70-minute roundtable discussion, diving into the crazy world of "IOT" at the inaugural Detroit CISO Solutions Tour, taking place on June 9, 2016 at Ford Field.
Take advantage of this opportunity to join the members of the Detroit CISO Governing Body and their peers for this full day event, featuring 14 unique roundtable discussions on the most pressing issues for today's IT Security Leaders.
-
Evanta CIO Conference - Weaving a Web of Protection
With the new mantra of “it’s not if, it’s when,” the data security focus has shifted from creating a blockade to creating a web of detection and protection. To weave an effective web, organizations must break down silos and collaborate on larger security initiatives like risk assessments and enterprise-wide governance policies for data storage. Join this discussion to explore how collaborative efforts in these strategic areas support an organization’s overall data security plan.
-
Evanta CISO Summit - Building a Successful Audit Program to Keep Insider Threats at Bay
Insider threats encompass more than just the obvious data thief. According to the CERT Insider Threat Center, in 2012, 53 percent of organizations experienced some type of insider incident. While your IT system can be a witness, victim or enabler, insider threat is more than a technology problem — policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible — yet very real vulnerability. Martin Bally, Brad Barton and Bob Slocum leads…
Insider threats encompass more than just the obvious data thief. According to the CERT Insider Threat Center, in 2012, 53 percent of organizations experienced some type of insider incident. While your IT system can be a witness, victim or enabler, insider threat is more than a technology problem — policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible — yet very real vulnerability. Martin Bally, Brad Barton and Bob Slocum leads this open discussion on managing and mitigating insider threats within your organization.
-
How to get the most out of your incident response plan test
Incident Response Interview and table top review
-
Detroit Secureword Speaker
IOT – Challenges Within Automotive
A new world of connected vehicles is on its way and its increasing reliance on interacting systems and connectivity is opening up new attack surfaces and a completely new area of consumer risk. The automotive industry faces increased challenges regarding safety, liability and privacy.
-
Internet of Things - Challenges within Automotive
ISACA Detroit Chapter 40th Anniversary – Guest Speaker
-
EXECUTIVE PANEL: The Challenge of Enterprise Security Today and into the Future
Emerging and significant security concerns threaten the enterprise daily and are becoming more complex as you broaden the scope from internal, to supply chain, and out to the customer. Today's CIOs are expected not only to drive efficiency, transparency and strengthen information and network security, but also to implement the best technologies and practices to establish and maintain relationships with their customers. How can CIOs balance the demand for immediate, transparent access to…
Emerging and significant security concerns threaten the enterprise daily and are becoming more complex as you broaden the scope from internal, to supply chain, and out to the customer. Today's CIOs are expected not only to drive efficiency, transparency and strengthen information and network security, but also to implement the best technologies and practices to establish and maintain relationships with their customers. How can CIOs balance the demand for immediate, transparent access to information while maintaining security and privacy? How can they reduce IT spending while improving services?
This panel of executives will share their views and experiences on how to meet these challenges as well as their priorities for the next year.
http://www.hmgstrategy.com/events/speakers.asp?eventID=70 -
Detroit Executive CISO Summit
As cloud computing technologies continue to evolve and expand, concerns of information security are becoming drowned out by the increasingly appealing efficiencies, opportunities and capabilities that distributed computing offers the enterprise. Like the Internet, email and the use of mobile devices before it, the cloud is quickly reaching a tipping point where a CISO can no longer hold their organization back from implementation. Recognizing that there is no discernible silver bullet yet…
As cloud computing technologies continue to evolve and expand, concerns of information security are becoming drowned out by the increasingly appealing efficiencies, opportunities and capabilities that distributed computing offers the enterprise. Like the Internet, email and the use of mobile devices before it, the cloud is quickly reaching a tipping point where a CISO can no longer hold their organization back from implementation. Recognizing that there is no discernible silver bullet yet available for cloud security, CISOs are scrambling for solutions to the cloud security challenge. Perhaps Martin Bally can provide some answers. A cloud security veteran, Bally insists that the key to securing the cloud starts, not with technology, but with a familiar infosec concept — risk. Join Bally for his perspectives on the future of cloud security and his successful approach at TRW.
http://www.evanta.com/ciso/summits/detroit/november-2013/speakers#
-
BC / DR - The Dolan Company
-
This project involved creating a Data Center Strategy to support Business Continuity & Disaster Recovery requirements for The Dolan Company and its subsidiaries. Strategy included, locating a site to construct a second data center, overseeing the construction of the data center, engineering all security and technologies used within the data centers to provide a secure cloud service environment, and enabling business continuance and disaster recovery technologies to achieve a RTO and RPO of 24…
This project involved creating a Data Center Strategy to support Business Continuity & Disaster Recovery requirements for The Dolan Company and its subsidiaries. Strategy included, locating a site to construct a second data center, overseeing the construction of the data center, engineering all security and technologies used within the data centers to provide a secure cloud service environment, and enabling business continuance and disaster recovery technologies to achieve a RTO and RPO of 24 hours between active \ active data centers.
Other creators
Languages
-
Arabic
-
Recommendations received
13 people have recommended Martin
Join now to viewMore activity by Martin
-
Join us for the 9th Annual Philadelphia C-Level Technology Leadership Summit on August 15, 2024, at the Philadelphia Country Club! Don't miss our…
Join us for the 9th Annual Philadelphia C-Level Technology Leadership Summit on August 15, 2024, at the Philadelphia Country Club! Don't miss our…
Liked by Martin Bally
-
Who among my peers will be attending BlackHat this year? Send a Like if you'd like to catch up!
Who among my peers will be attending BlackHat this year? Send a Like if you'd like to catch up!
Liked by Martin Bally
-
🚀 Proud moment for Argus Cyber Security Ltd.! We’ve been named an innovation and growth leader in Frost & Sullivan's 2024 Frost Radar™️ for…
🚀 Proud moment for Argus Cyber Security Ltd.! We’ve been named an innovation and growth leader in Frost & Sullivan's 2024 Frost Radar™️ for…
Liked by Martin Bally
-
Exciting Opportunity for CISOs, VPs, CIOs, CTOs! Join us on July 17th at the Hilton Nashville Downtown for an exclusive workshop designed to elevate…
Exciting Opportunity for CISOs, VPs, CIOs, CTOs! Join us on July 17th at the Hilton Nashville Downtown for an exclusive workshop designed to elevate…
Liked by Martin Bally
-
It’s that time again. Who’s looking to mingle with the top technology executives in the region? Chris Burrows Afia Phillips Juman Doleh-Alomary…
It’s that time again. Who’s looking to mingle with the top technology executives in the region? Chris Burrows Afia Phillips Juman Doleh-Alomary…
Shared by Martin Bally
-
Watch this insightful discussion as executives from KPMG LLP, Microsoft, and Cranium explore the utilization of AI in the State and Local Government…
Watch this insightful discussion as executives from KPMG LLP, Microsoft, and Cranium explore the utilization of AI in the State and Local Government…
Liked by Martin Bally
-
I am very excited to announce that I will be moderating Panel 2: 2024 & The Biggest Threats to Your Business - How to Manage Your Attack Surface &…
I am very excited to announce that I will be moderating Panel 2: 2024 & The Biggest Threats to Your Business - How to Manage Your Attack Surface &…
Liked by Martin Bally
-
The Best. The best Dad & role model, husband, friend, advocate, overall standup guy. Paul Harris Award winner, Rotary member instrumental in Polio…
The Best. The best Dad & role model, husband, friend, advocate, overall standup guy. Paul Harris Award winner, Rotary member instrumental in Polio…
Liked by Martin Bally
-
Very grateful to be recognized with this prestigious award. Thank you Hunter Muller and HMG Strategy.
Very grateful to be recognized with this prestigious award. Thank you Hunter Muller and HMG Strategy.
Liked by Martin Bally
-
Had the pleasure of being a panelist along Scott Sadlocha and Steve Herrin, MBA, GCPM, ARM at the Detroit Evanta CISO Summit focusing on the New Era…
Had the pleasure of being a panelist along Scott Sadlocha and Steve Herrin, MBA, GCPM, ARM at the Detroit Evanta CISO Summit focusing on the New Era…
Liked by Martin Bally
-
We are excited to welcome Jason Lish to the MightyID Advisory Board. 🚀 Lish was recently named Global CISO of Cisco, adding to his experience in…
We are excited to welcome Jason Lish to the MightyID Advisory Board. 🚀 Lish was recently named Global CISO of Cisco, adding to his experience in…
Liked by Martin Bally
-
It Takes a Village! The past 5 days at the Team8 CISO Village Summit in California were truly special. Sharing memorable moments with over 100…
It Takes a Village! The past 5 days at the Team8 CISO Village Summit in California were truly special. Sharing memorable moments with over 100…
Liked by Martin Bally
-
Things have been busy, so I’m a bit late in posting this, but a couple weeks back, I had the chance to contribute to an Evanta CISO Summit panel…
Things have been busy, so I’m a bit late in posting this, but a couple weeks back, I had the chance to contribute to an Evanta CISO Summit panel…
Liked by Martin Bally
-
Nearly 30 years ago, brothers Shep and Ian Murray were driving across New England selling ties out of their Jeep Wrangler. Today, the cofounders of…
Nearly 30 years ago, brothers Shep and Ian Murray were driving across New England selling ties out of their Jeep Wrangler. Today, the cofounders of…
Liked by Martin Bally
People also viewed
-
Erik Wille
Connect -
Chris Burrows
Connect -
Tom Doane
Connect -
Rob Force
Connect -
Sai Aditya CISSP CISA CBCP CISRA
Connect -
Juman Doleh-Alomary
Connect -
Mo Wehbi
Connect -
Julia Anderson
Connect -
Sydney Mann
Website and Event Management | Board Member | Volleyball Coach | Retired Collegiate Athlete
Connect -
Lena Krislasky
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Martin Bally
-
Martin Bally
Inhaber bei Bally Labels AG
-
Martin Bally
-
Martin Bally
-
Martin Bally
Human Resources Professional
8 others named Martin Bally are on LinkedIn
See others named Martin Bally