Martin Bally

Detroit Metropolitan Area Contact Info
8K followers 500+ connections

Join to view profile

About

Martin Bally is the Vice President and Chief Information Security Officer of Campbells…

Activity

Join now to see all activity

Experience & Education

  • Campbell Soup Company

View Martin’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Director of Membership Services

    Cloud Security Alliance - Detroit Chapter

    - 4 years 6 months

    Science and Technology

  • Proofpoint Security Awareness Training Graphic

    Member Board of Directors

    Proofpoint Security Awareness Training

    - 4 years 5 months

    Science and Technology

  • Auto-ISAC Graphic

    Member Board of Directors

    Auto-ISAC

    - 4 months

    Science and Technology

Projects

  • Detroit Secureworld Speaker 2016 - Emergence of the Chief Digital Risk Officer

    Digital technologies will increase an organizations competitiveness, agility, and reaction time. While increasing the speed of business, these digital technologies and processes will introduce greater security threats and evolution of digital risk management. Join Martin Bally as he discusses the Emergence of the Chief Digital Risk Officer.

    See project
  • Digital Risk and IoT

    Martin Bally will be leading a 70-minute roundtable discussion, diving into the crazy world of "IOT" at the inaugural Detroit CISO Solutions Tour, taking place on June 9, 2016 at Ford Field.

    Take advantage of this opportunity to join the members of the Detroit CISO Governing Body and their peers for this full day event, featuring 14 unique roundtable discussions on the most pressing issues for today's IT Security Leaders.

    See project
  • Evanta CIO Conference - Weaving a Web of Protection

    With the new mantra of “it’s not if, it’s when,” the data security focus has shifted from creating a blockade to creating a web of detection and protection. To weave an effective web, organizations must break down silos and collaborate on larger security initiatives like risk assessments and enterprise-wide governance policies for data storage. Join this discussion to explore how collaborative efforts in these strategic areas support an organization’s overall data security plan.

    See project
  • Evanta CISO Summit - Building a Successful Audit Program to Keep Insider Threats at Bay

    Insider threats encompass more than just the obvious data thief. According to the CERT Insider Threat Center, in 2012, 53 percent of organizations experienced some type of insider incident. While your IT system can be a witness, victim or enabler, insider threat is more than a technology problem — policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible — yet very real vulnerability. Martin Bally, Brad Barton and Bob Slocum leads…

    Insider threats encompass more than just the obvious data thief. According to the CERT Insider Threat Center, in 2012, 53 percent of organizations experienced some type of insider incident. While your IT system can be a witness, victim or enabler, insider threat is more than a technology problem — policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible — yet very real vulnerability. Martin Bally, Brad Barton and Bob Slocum leads this open discussion on managing and mitigating insider threats within your organization.

    See project
  • How to get the most out of your incident response plan test

    Incident Response Interview and table top review

    See project
  • Detroit Secureword Speaker

    IOT – Challenges Within Automotive




    A new world of connected vehicles is on its way and its increasing reliance on interacting systems and connectivity is opening up new attack surfaces and a completely new area of consumer risk. The automotive industry faces increased challenges regarding safety, liability and privacy.

    See project
  • Internet of Things - Challenges within Automotive

    ISACA Detroit Chapter 40th Anniversary – Guest Speaker

    See project
  • EXECUTIVE PANEL: The Challenge of Enterprise Security Today and into the Future

    Emerging and significant security concerns threaten the enterprise daily and are becoming more complex as you broaden the scope from internal, to supply chain, and out to the customer. Today's CIOs are expected not only to drive efficiency, transparency and strengthen information and network security, but also to implement the best technologies and practices to establish and maintain relationships with their customers. How can CIOs balance the demand for immediate, transparent access to…

    Emerging and significant security concerns threaten the enterprise daily and are becoming more complex as you broaden the scope from internal, to supply chain, and out to the customer. Today's CIOs are expected not only to drive efficiency, transparency and strengthen information and network security, but also to implement the best technologies and practices to establish and maintain relationships with their customers. How can CIOs balance the demand for immediate, transparent access to information while maintaining security and privacy? How can they reduce IT spending while improving services?

    This panel of executives will share their views and experiences on how to meet these challenges as well as their priorities for the next year.

    http://www.hmgstrategy.com/events/speakers.asp?eventID=70

    See project
  • Detroit Executive CISO Summit

    As cloud computing technologies continue to evolve and expand, concerns of information security are becoming drowned out by the increasingly appealing efficiencies, opportunities and capabilities that distributed computing offers the enterprise. Like the Internet, email and the use of mobile devices before it, the cloud is quickly reaching a tipping point where a CISO can no longer hold their organization back from implementation. Recognizing that there is no discernible silver bullet yet…

    As cloud computing technologies continue to evolve and expand, concerns of information security are becoming drowned out by the increasingly appealing efficiencies, opportunities and capabilities that distributed computing offers the enterprise. Like the Internet, email and the use of mobile devices before it, the cloud is quickly reaching a tipping point where a CISO can no longer hold their organization back from implementation. Recognizing that there is no discernible silver bullet yet available for cloud security, CISOs are scrambling for solutions to the cloud security challenge. Perhaps Martin Bally can provide some answers. A cloud security veteran, Bally insists that the key to securing the cloud starts, not with technology, but with a familiar infosec concept — risk. Join Bally for his perspectives on the future of cloud security and his successful approach at TRW.

    http://www.evanta.com/ciso/summits/detroit/november-2013/speakers#

    See project
  • BC / DR - The Dolan Company

    -

    This project involved creating a Data Center Strategy to support Business Continuity & Disaster Recovery requirements for The Dolan Company and its subsidiaries. Strategy included, locating a site to construct a second data center, overseeing the construction of the data center, engineering all security and technologies used within the data centers to provide a secure cloud service environment, and enabling business continuance and disaster recovery technologies to achieve a RTO and RPO of 24…

    This project involved creating a Data Center Strategy to support Business Continuity & Disaster Recovery requirements for The Dolan Company and its subsidiaries. Strategy included, locating a site to construct a second data center, overseeing the construction of the data center, engineering all security and technologies used within the data centers to provide a secure cloud service environment, and enabling business continuance and disaster recovery technologies to achieve a RTO and RPO of 24 hours between active \ active data centers.

    Other creators
    • Dale Risden
    • Bill Fanning
    • Dave Wallace
    • Sam Davis
    • Bobby Barrett

Languages

  • Arabic

    -

Recommendations received

More activity by Martin

View Martin’s full profile

  • See who you know in common
  • Get introduced
  • Contact Martin directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Martin Bally

Add new skills with these courses