Phil Agcaoili
Phil Agcaoili | |
---|---|
Born | Philippines |
Residence | U.S. |
Citizenship | American |
Fields |
Information Technology Hacker (computer security) |
Institutions |
General Electric Lockheed Martin SecureIT VeriSign Internet Devices Alcatel Scientific-Atlanta Cisco Dell Cox Communications Elavon U.S. Bancorp |
Alma mater |
Virginia Tech Rensselaer Polytechnic Institute Georgia State University |
Known for |
Leadership Cybersecurity Information Security Privacy Cloud Computing Mixed Martial Arts |
Phil Agcaoili (also known as philA[1]) is a leader, technologist, entrepreneur, and accomplished cyber security, information security, and privacy expert. He is the Chief Information Security Officer at Elavon,[2] a Senior Vice President at U.S. Bancorp,[3] chairman of the Ponemon Institute Fellows,[4] a Distinguished Fellow of the Ponemon Institute,[5] on the Board of Advisors for the Payment Card Industry (PCI) Security Standards Council (SSC),[6] a Founding Member of the Cloud Security Alliance,[7] co-inventor and co-author of the Cloud Security Alliance Cloud Controls Matrix (CCM),[8] a standards developer for the Electronic Discovery Reference Model (EDRM),[9] on the Board of Directors for Mobile Active Defense,[10][11] and was on the Advisory Boards of Qualys [12] and Rapid7.[13]
Education
Phil Agcaoili graduated from Columbia High School in East Greenbush, New York in 1989, studied aerospace engineering at Virginia Tech in Blacksburg, Virginia, received a Bachelor of Science in mechanical engineering from Rensselaer Polytechnic Institute in Troy, New York in 1993, and attended Georgia State University in Atlanta, Georgia for an MBA in computer information systems. He was inducted into the Mechanical Engineering Honor Society Pi Tau Sigma in 1991[14] at Rensselaer Polytechnic Institute[15] and was inducted into the East Greenbush Education Foundation Hall of Fame in 2011.[16]
Career
Agcaoili started his career at General Electric.
He co-founded and was the Chief Information Security Officer of SecureIT in 1996,[17] which was one of the first pure-play Internet security services providers that was acquired by Verisign in 1998 for $70M.[18] After the acquisition, he became VeriSign's first CISO.[19] He was an early foundation member at Internet Devices, which was acquired by Alcatel in 1999 for $180M.[20] He was the Chief Security Architect [21] at Scientific-Atlanta, which was acquired by Cisco in 2005 for $6.9B.[22]
He co-founded the Southern CISO Security Council in 2006.[23]
While at Dell in 2008, he set security standards for Cloud computing as a Founding Member and Steering Committee member of the Cloud Security Alliance.[24] He co-invented and co-authored the Cloud Controls Matrix (CCM) in 2009[25] (versions 1.0, 1.1, and 1.2), co-founded the GRC Stack in 2010,[26] and co-founded the Security, Trust & Assurance Registry (STAR) in 2011.[27]
Agcaoili was named the Chief Information Security Officer at Cox Communications in 2009.[28]
He has helped shape cyber security best practices for U.S. Telecoms as a committee co-chair for the Federal Communications Commission (FCC) Communications Security, Reliability and Interoperability Council (CSRIC) II [29] Work Group 2A (Cyber Security Best Practices) in 2010,[30] served on the NCTA Cyber Security Work Group as an inaugural member,[31][32] played an instrumental role in 2012[33] in the FCC CSRIC III [34] Work Group 11 (Consensus Cyber Security Controls),[35] served as a committee co-chair for cyber security on the Communications Sector Coordinating Council (CSCC),[36] was a member of the Communications Information Sharing and Analysis Center (Communications ISAC),[37] and was an industry representative on the National Coordinating Center for Communications (NCCC).[37]
He was inducted into the Ponemon Institute as a Distinguished Fellow in 2011[38] and then appointed the Chairman of the Ponemon Institute Distinguished Fellows in 2012.[39][40]
He has been instrumental in shaping United States cyber security efforts.[41][42][43][44][45][46][46][47][48][49][50][51][52] Throughout 2013 he helped the National Institute of Standards and Technology develop the first version of the U.S. Cybersecurity Framework released as the Framework for Improving Critical Infrastructure Cybersecurity on February 12, 2014.[53] In 2013, Agcaoili was appointed as a co-chair for the FCC CSRIC IV Working Group 4 – Cybersecurity Best Practices[54] in order to help operationalize the Framework into practice within the Communications sector by updating and aligning his previous effort co-chairing the FCC CSRIC II Work Group 2A (Cyber Security Best Practices) with the NIST CSF.
In 2013, through a partnership with the Cloud Security Alliance and the American Institute of Certified Public Accountants (AICPA), a team of industry experts and the founder of the Service Organization Control (SOC) released seminal guidance[55] that reshaped how companies demonstrate and attest for their security and privacy practices by incorporating additional subject matter such as the CSA Cloud Controls Matrix in the type 2 SOC2 attestation standard and assessed using the AT 101 proven auditing principles. This replaced the SAS 70 auditing standard and augmented the successor, SSAE 16 SOC 1, to attest for internal controls over financial reporting.
Agcaoili was appointed the Vice President and Chief Information Security Officer of Elavon in 2014.[2] He serves on the FS-ISAC [58] and on the Payments Processing Information Sharing Council (PPISC).[59]
He was nominated to serve a two-year term on the Board of Advisors of the PCI Security Standards Council in 2015.[60][61]
He has served on the Editorial Advisory Board for TechTarget Security Media Group Information Security Magazine,[62] Advisory Board for CSO Magazine,[63] Advisory Board for CIO Magazine,[64] Governing Body Co-chair for Evanta CISO Leadership Network,[65] Founding Advisory Council for CISO Executive Network in Atlanta,[66] Founding Member and CISO Advisory Council for Wisegate,[67] Advisory Board for the RSA Executive Security Action Forum (ESAF),[68] and Advisory Board for SecureWorld Expo in Atlanta, Houston, and Dallas.[69] He has served 10 times as a judge for the Information Security Executive (ISE®) Awards [70][71][72][73][74][75] and was on the Advisory Board for the Worldwide Executive Council Goldman Sachs CISO Council and the Citibank CISO Council.[76]
Information Security and Cyber Security Industry Contributions
- [American Institute of Certified Public Accountants (AICPA) endorsed Cloud Security Alliance (CSA) Position Paper on SOC Reports (SAS 70 and SSAE 16 replacement) http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/csa-position-paper-on-aicpa-service-organization-control-reports.pdf]
- [Cloud Security Alliance (CSA), founding member https://cloudsecurityalliance.org/about]
- [CSA Steering Committee, co-founder http://www.csoonline.com/article/2138561/data-protection/cloud-security-alliance-updates-controls-matrix.html]
- [CSA Cloud Controls Matrix (CCM), co-inventor and co-author https://cloudsecurityalliance.org/cm]
- [CSA GRC Stack, co-founder https://cloudsecurityalliance.org/research/grc-stack/]
- [CSA Security, Trust & Assurance Registry (STAR), co-founder https://cloudsecurityalliance.org/star]
- [CSA Computer Security Incident Response Team (CSIRT), founding member https://cloudsecurityalliance.org/research/cloudsirt/]
- [Hogan Lovells US LLP & Cyber Privacy Working Group - Preliminary Cybersecurity Framework – Privacy Methodology http://csrc.nist.gov/cyberframework/framework_comments/20131205_harriet_pearson_hoganlovells.pdf]
- [NIST Cybersecurity Framework (CSF) aka Framework for Improving Critical Infrastructure Cybersecurity (FICIC) [77] - Suggested Updates https://app.box.com/s/2qd8fs7d9xxdgmg7euhc]
- [FCC Communications Security, Reliability and Interoperability Council (CSRIC) II Work Group 2A (Cyber Security Best Practices), Committee co-chair http://transition.fcc.gov/pshs/docs/csric/WG2A-Cyber-Security-Best-Practices-Final-Report.pdf]
- [National Cable Television Association (NCTA) Cyber Security Working Group, inaugural member http://www.ncta.com/DocumentBinary.aspx?id=968]
- [FCC Communications Security, Reliability and Interoperability Council (CSRIC) III Work Group 11 (Consensus Cyber Security Controls), CSCC cyber security sub-committee co-chair http://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRIC_III_WG11_Report_March_%202013.pdf]
- MSO (cable) Security Council, founding member
- MSO Acceptable Use Policy Management (AUPM) Roundtable, founding member
- Alliance for Telecommunications Industry Solutions Network Reliability Steering Committee (ATIS NRSC)
- [Information Systems Audit and Control Association (ISACA) Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Cloud-Computing-Business-Benefits-With-Security-Governance-and-Assurance-Perspective.aspx] [78]
- [Electronic Discovery Reference Model (EDRM) Data Set Project http://www.edrm.net/members/2011-2012/individuals]
- [IETF Capwap, Contributing Member [79][80]]
- [Risk-based vulnerability scanning [81][82]]
Recognition
- [1991 Inducted into the Rensselaer Polytechnic Institute Phi chapter of the Pi Tau Sigma http://www.pitausigma.net/Chapters/upload/6-Rensselaer-Phi-1990-1999.pdf]
- [1998 InfoWorld - Network Hardware: Product of the Year Award (IDI Fort Knox) http://findarticles.com/p/articles/mi_m0EIN/is_1999_Feb_15/ai_53875599/]
- [2005-2007 Microsoft Most Valuable Professional (MVP) in Security http://mvp.support.microsoft.com/]
- [2007-2008 Microsoft Most Valuable Professional (MVP) in Enterprise Security http://mvp.support.microsoft.com]
- [2008 Microsoft CSO Summit Excellence in Data Protection Award (Dell) http://mvp.support.microsoft.com]
- [2008 Information Security Project of the Year North American Award Nominee (Dell) http://www.ten-inc.com/press/2008/press_2008.11.18.asp]
- [2009 Information Security Executive (ISE®) of the Year Central Executive Award Winner (Dell) http://www.ten-inc.com/press/2009/press_2009.04.07.asp][83]
- [2010 Information Security Magazine Security 7 Award in Telecommunications] (Cox Communications) http://viewer.media.bitpipe.com/1152629439_931/1286461369_610/1010_ISM_eMag.pdf]
- [2011 Inducted into the East Greenbush Education Foundation Hall of Fame http://www.egedfoundation.org/hall%20of%20fame%20bios/Phil%20Agcaoili%20Bio.pdf]
- [2011 Named Ponemon Institute Distinguished Fellow http://www.ponemon.org/ponemon-institute-fellows]
- [2012 Veracode Bridge Builder Award (Cox Communications) http://www.businesswire.com/news/home/20120314006268/en/Veracode-Honors-Blue-Shield-California-Cox-Communications]
- [2012 RSA Conference Award for Excellence in the Field of Security Practices http://www.reuters.com/article/2012/02/29/idUS142103+29-Feb-2012+BW20120229]
- [2012 Named Chairman of the Ponemon Institute Fellows http://www.ponemon.org/ponemon-institute-fellows#agcaoili]
- [2012 Information Security Executive (ISE®) of the Decade Southeast Award Winner] (Cox Communications) http://www.ten-inc.com/press/2012/press_2012.03.14.asp]
- [2013 Evanta Top 25 Breakaway Leader Award http://www.evanta.com/ciso/summits/global/481/page/3549]
- [2014 CEOWorld Magazine Top Chief Security Officers (CSOs) to Follow on Twitter http://ceoworld.biz/2014/04/04/top-chief-security-officers-csos-to-follow-on-twitter-198120]
- [2014 Evanta Top 25 Breakaway Leader Award http://www.evanta.com/ciso/summits/global/page/4108]
References
- ↑ "Don't Reinvent the Wheel: Phil Agcaoili on the Cyber Security Framework - The State of Security". The State of Security.
- 1 2 Joan Goodchild (7 April 2014). "Elavon appoints Agcaoili as new CISO". CSO Online.
- ↑ "PHIL AGCAOILI NOMINATED TO PCI SECURITY STANDARDS COUNCIL BOARD OF ADVISORS". Elavon. Retrieved 19 May 2015.
- ↑ "Ponemon Fellows". ponemon.org.
- ↑ "Ponemon Institute Fellows". Ponemon Institute. Ponemon Institute.
- ↑ "Phil Agcaoili Nominated to PCI Security Standards Council Board of Advisors". Reuters. May 19, 2015.
- ↑ "Cloud Security Alliance About Page". Cloud Security Alliance. Cloud Security Alliance.
- ↑ "CSA Cloud Controls Matrix". https://cloudsecurityalliance.org. Cloud Security Alliance.
- ↑ "EDRM 2011-2012 Individuals". edrm.net. EDRM.
- ↑ Board of Directors | Mobile Active Defense
- ↑ "Mobile Active Defense Welcomes Phil Agcaoili of Cox Communications to the Board of Advisors". FierceTelecom.
- ↑ "Qualys News". qualys.com.
- ↑ "Phil Agcaoili: Executive Profile & Biography - Businessweek". Retrieved 13 November 2015.
- ↑ "6-Rensselaer-Phi-1990-1999.pdf e. Rensselaer Phi F1991 #438 (2).pdf" (PDF). pitausigma.net.
- ↑ "RPI Pi Tau Sigma". rpi.edu.
- ↑ "East Greenbush Education Foundation Alumni Hall of Fame Members". egedfoundation.org.
- ↑ "SECUREIT, INC. - GeorgiaCorporates – Company Profiles of Georgia". georgiacorporates.com.
- ↑ Dow Jones Newswires (6 July 1998). "VeriSign Acquires SecureIT For About $70 Million in Stock". WSJ.
- ↑ Goodchild, Joan. "State of the CSO 2012: Ready for anything". csoonline.com. CSO Magazine.
- ↑ Dow Jones Newswires (17 June 1999). "Alcatel Will Pay $180 Million To Acquire Internet Devices". WSJ.
- ↑ "Industry Experts Participate in Judges Panel for the Information Security Executive (ISE) of the Year Southeast Awards™". marketwired.com. Executive Alliance.
- ↑ Nancy Gohring (18 November 2005). "Cisco buys Scientific-Atlanta for $6.9 billion". Network World.
- ↑ "Phillip Agcaoili". gaissa.org.
- ↑ "About". cloudsecurityalliance.org.
- ↑ "Cloud Controls Matrix (CCM)". cloudsecurityalliance.org.
- ↑ "GRC Stack". cloudsecurityalliance.org.
- ↑ "CSA Security, Trust & Assurance Registry (STAR)". cloudsecurityalliance.org.
- ↑ Derek Slater (27 October 2009). "Cox Communications Names Agcaoili CISO". CSO Online.
- ↑ http://transition.fcc.gov/pshs/advisory/csric/wg-2a-members.pdf
- ↑ "CSRIC". fcc.gov.
- ↑ http://www.ncta.com/PublicationType/Letter/Joint-Letter-on-Cybersecurity-Legislation.aspx
- ↑ http://www.ncta.com/PublicationType/MiscellaneousPublication/Suggested-framework-for-cybersecurity-legislation.aspx
- ↑ Danny Yadron (19 March 2013). "Internet Providers Persuade FCC Panel Against Cybersecurity Recommendations". WSJ.
- ↑ Communications Security, Reliability and Interoperability Council III | FCC.gov
- ↑ http://transition.fcc.gov/bureaus/pshs/advisory/csric3/CSRIC_III_WG11_Report_March_%202013Final.pdf
- ↑ "Leadership - Communications Sector Coordinating Council (CSCC)". Communications Sector Coordinating Council (CSCC).
- 1 2 National Coordinating Center for Communications | Homeland Security
- ↑ "Press Releases". mediaroom.com.
- ↑ "Ponemon Institute Fellows". ponemon.org. Ponemon Institute.
- ↑ "New York Security Conference Adds Dr. Clay Wilson, Program Director for Cybersecurity at American Public University System APEI, Implant Sciences (otcqb:IMSC), Applied DNA Sciences (otcqb:APDN); Cybersecurity, Explosives Detection and DNA Based Security to Be Discussed". marketwatch.com. Marketwired via COMTEX.
- ↑ http://www.tripwire.com/state-of-security/regulatory-compliance/phil-agcaoili-nist-framework/
- ↑ http://csrc.nist.gov/cyberframework/framework_comments/20131125_phil_agcaoli_unaffiliated.pdf
- ↑ Cybersecurity Leader Offers Alternative Version to NIST Framework ~ DigitalCrazyTown
- ↑ Comments on NIST framework begin to emerge, echoing longstanding concerns
- ↑ A Look at NIST’s Preliminary Cybersecurity Framework - Secuilibrium, LLC
- 1 2 http://www.ten-inc.com/lib/2013_NIST_Town_Meeting.asp
- ↑ Uplogix Local Management Blog: NIST cybersecurity framework development continues
- ↑ New York Defense and Security Conference Features Session on Exploring the NIST Cybersecurity Framework and Implementation
- ↑ Protecting Critical Infrastructure: Input Data | Threatpost | The first stop for security news
- ↑ NIST's cyber framework moves toward implementation stage - FederalNewsRadio.com
- ↑ NIST concludes cybersecurity framework workshops as agency prepares for Feb. deadline | SmartBrief
- ↑ Establishing Stronger Standards for Data Breach Protection : Wednesday, October 08, 2014
- ↑ http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf
- ↑ "CSRIC IV Working Group Descriptions and Leadership" (PDF). http://transition.fcc.gov. FCC. Retrieved 4 September 2013.
- ↑ "About the CSA Position Paper on AICPA Service Organization Control Reports". Cloud Security Alliance.
- ↑ "CSA Drafts New SOC Position Paper". Cloud Security Alliance.
- ↑ "Leading Cloud Security Group Endorses AICPA’s Reporting Framework for Evaluating Controls Over Cloud Providers". aicpa.org. American Institute of CPAs.
- ↑ FS-ISAC : Financial Services - Information Sharing and Analysis Center
- ↑ FS-ISAC - Payments Processing Information Sharing Council (PPISC)
- ↑ "About US - PCI Security Standards Council Board of Advisors".
- ↑ "Latest News / PHIL AGCAOILI NOMINATED TO PCI SECURITY STANDARDS COUNCIL BOARD OF ADVISORS". Elavon.com. Elavon.
- ↑ http://docs.media.bitpipe.com/io_12x/io_120388/item_1061312/ISM_Dec_final.pdf
- ↑ "CSO40 Security Confab + Awards Conference". etouches.com.
- ↑ "CIO Executive Events". cioperspectives.com.
- ↑ "Evanta : CISO : Summits : Atlanta". evanta.com.
- ↑ "Advisory Council". cisoexecnet.com.
- ↑ Wisegate's Information Security Pros Join Forces to Counter Escalating Hacker Attacks
- ↑ "Executive Security Action Forum". rsaconference.com.
- ↑ "Atlanta Advisory Board - SecureWorld 2015". secureworldexpo.com.
- ↑ "Security Industry Award Winners and Experts Named as Distinguished Panel of Judges for the ISE New England Awards 2005". SYS-CON.TV. MARKET WIRE. Retrieved 2 May 2005.
- ↑ "Judges, Speakers and Award Presenters 2013". ten-inc.com. T.E.N.
- ↑ "T.E.N. Announces 2012 Information Security Executive® (ISE®) of the Decade Southeast Award Nominees". Fiserv. PRWEB. Retrieved 15 February 2012.
- ↑ "Judges, Speakers and Presenters 2010". ISE® Central 2010. T.E.N.
- ↑ "Industry Experts Participate in Judges Panel for the Information Security Executive (ISE) of the Year Southeast Awards™". MARKET WIRE. Executive Alliance. Retrieved 17 January 2006.
- ↑ T.E.N. - ISE® North America Judges, Speakers and Presenters 2011
- ↑ "Executive Council". executivecouncil.com.
- ↑ http://www.nist.gov/cyberframework/
- ↑ cloud_computing_security_&_governance-isaca.pdf - File Shared from Box
- ↑ http://www.ietf.org/mail-archive/text/capwap/2005-05.mail
- ↑ http://www.ietf.org/html.charters/capwap-charter.html
- ↑ http://www.tifaware.com/code/update-nessusrc/update-nessusrc-2.10
- ↑ update-nessusrc
- ↑ T.E.N. - ISE® Central 2009