top of page

VOLUNTEER EXPERIENCE EXAMPLES

Partial List

hotshot2 2023_edited.png

THREAT MODELING - SOCIAL WELFARE ADVOCACY GROUP

I worked with a Houston-based social justice advocacy group to conduct a threat modeling exercise, develop practical controls, and train their leadership on how to use the new technology and secure communication tools.

BOARD SERVICE - NON-PROFIT

I brought technology, security, privacy, and working with law enforcement experience to my board service with a newly formed Houston-based 501c4 organization.

BUSINESS PLAN REVIEW - TECH START UP

I provided pro bono consulting services to a few minority-owned technology start-ups and helped smaller standalone community clinics with compliance and cyber security matters. These organizations are usually below the technology poverty line and they require solutions that take into account that they can’t afford large IT staff nor technology products that are designed for large enterprises.

TEACHING AND COMMUNITY ENGAGEMENT

I publicly presented on Information Security matters as a featured speaker at multiple DHS, FBI, ISSA, AHIA, ISACA, TCCTA, HIMSS, and InfraGard events. I am also a three times finalist in the Network Forensics Puzzle Contest publishing three tools on forensicscontest.com in the process.

PROFESSIONAL EXPERIENCE EXAMPLES

Partial List

COVID-19 RAPID RESPONSE

As the CIO of a major US-based Academic Medical Center, I led the IT response to the COVID-19 global pandemic quintupling remote work capacity within one week (3/9/2020), enabling on-demand distance instructions, and reconfiguring helpdesk and call center processes to adapt to fast-changing work/teach/learn from home needs.

SECURITY, PRIVACY, AND BREACH RESPONSE

As a CISO, I led the information security strategy, governance, risk, compliance, and operations in the first part of my career with a large Academic Medical Center. I grew the department in size, capabilities, and maturity to support phenomenal business growth and to respond to escalating public and regulatory demands for robust security and compliance functions. I have also coordinated IT and non-IT efforts to respond to a data breach in 2013 and I worked with law enforcement, public affairs, the federal government, and other stakeholders to respond to cyber security incidents, address research misconduct, and mitigate maligned foreign influence.

ENTERPRISE SYSTEMS DEPLOYMENT

As the CIO of a healthcare group, I led the IT teams that migrated an on-premise EHR system to a hosted implementation with Epic, a multi-year project that introduced a leap in innovation in 2021. In my capacity as the head of IT and radio engineering for a financial advisory firm that operated a radio station, I led the re-organization of the company’s computer network infrastructure to support QoS and ultimately deliver entertainment-grade Audio and Video content. As the head of IT Infrastructure in an Oil and Gas company, I designed and managed the deployment of video streaming applications and infrastructures in the Gulf of Mexico to allow real-time collaboration between offshore ROV operators and corporate office engineers. As the CIO for a global manufacturer I led the implementation of their first ERP.

BIG DATA

I provided technology leadership, system design help, governance, and security control review for two state-wide big data research initiatives at the great state of Texas. I championed the development of both projects, but played a foundational role in the larger initiative by leading the coordination between the technology leaders at six health institutions and two medical schools across the UT System.

ARTIFICIAL INTELLIGENCE

Instituted an AI governance structure at a large enterprise, and worked with operations, the research community, and top AI vendors such as Microsoft and OpenAI to make their tools and APIs available in a HIPAA and FERPA compliant manner.

BUSINESS OPERATIONS

Negotiated a $40 million sale of an Educational Broadband Service spectrum. Worked with outside FCC attorneys, valuation firms, a major telecommunication company, an investment firm, and other stakeholders over the course of two years to maximize the selling price of the spectrum.  

ACADEMICS AND TRAINING

MASTER OF BUSINESS ADMINISTRATION (MBA)

Western Governors University of Texas - 2013

ADVANCED COMPUTER SECURITY CERTIFICATE

Stanford University - 2015

EXECUTIVE LEADERSHIP FOR INFORMATION TECHNOLOGY EXCELLENCE (ELITE)

The University of Texas at Austin - 2012

BACHELOR OF SCIENCE IN ELECTRICAL ENGINEERING (BSEE)

The University of Baghdad - 1997

CYBERSECURITY FOR CRITICAL URBAN INFRASTRUCTURE

Massachusetts Institute of Technology - 2022

DIGITAL SECURITY AND HUMAN RIGHTS

Amnesty International - 2020

CONTRACT LAW: FROM TRUST TO PROMISE TO CONTRACT

Harvard University - 2018

DATA ETHICS, AI AND RESPONSIBLE INNOVATION

The University of Edinburgh - 2020

GIAC CERTIFIED FORENSIC ANALYST (GCFA) - Expired 

GIAC Certifications - 2008

CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP)

International Information System Security Certification Consortium (ISC)² - 2004

©2024 by Amar Yousif

bottom of page