About
As the Chief Information Security Officer at SoftBank Investment Advisers, I oversee both…
Articles by Gary
-
How New CISOs Develop Their 36-Month Strategic Security Plan
How New CISOs Develop Their 36-Month Strategic Security Plan
By Gary Hayslip
-
CISO Manifesto, helping our Vendors be Partners – RSA 2024 Edition
CISO Manifesto, helping our Vendors be Partners – RSA 2024 Edition
By Gary Hayslip
-
Why CISOs are Excellent Candidates for Board Service
Why CISOs are Excellent Candidates for Board Service
By Gary Hayslip
Contributions
Activity
-
Great website for the #community, really like how they map out roles and show feeder roles into #cybersecurity https://lnkd.in/ghQ4Axb
Great website for the #community, really like how they map out roles and show feeder roles into #cybersecurity https://lnkd.in/ghQ4Axb
Shared by Gary Hayslip
-
Thank you Monica Verma for the opportunity to help you build this resource for our #community. There are so many different courses and training…
Thank you Monica Verma for the opportunity to help you build this resource for our #community. There are so many different courses and training…
Shared by Gary Hayslip
-
Excellent article by Preetika Rana of The Wall Street Journal about the growing #neurodivergent workforce and how companies are making changes to…
Excellent article by Preetika Rana of The Wall Street Journal about the growing #neurodivergent workforce and how companies are making changes to…
Shared by Gary Hayslip
Experience
Education
-
San Diego State University-California State University
-
Part of SDSU's Executive MBA program, Cohort XXII
-
-
-
-
-CNSSI - #4012 Senior Systems Managers Certification
-NSTISSI - #4015 System Certifiers Certification -
-
-
-
Licenses & Certifications
-
Certificate of Cloud Security Knowledge (CCSK)
Cloud Security Alliance
IssuedCredential ID 650184717736 -
Information Systems Security (INFOSEC) Professional #4011
National Security Telecommunications and Information Systems Security Committee - (NSTISSI)
Issued -
Senior Systems Managers Certification #4012
Committee on National Security Systems (CNSS)
Issued -
System Certifiers Certification #4015
National Security Telecommunications and Information Systems Security Committee - (NSTISSI)
Issued -
Information Systems Security Engineering Professional (CISSP-ISSEP)
(ISC)2
IssuedCredential ID 98865
Volunteer Experience
-
Tinkerer
Security Tinkerers
- Present 5 years 11 months
Science and Technology
Advancing the cybersecurity community through trust.
-
Member
Information Security Leadership Foundation
- Present 5 years 2 months
Science and Technology
The ISLF is a community of Information Security Leaders focused on collaboration, education, mentorship, and the development of the next generation of Information Security Leaders. The Foundation partners with educational programs to offer grants for students aspiring to be future security leaders. The ISLF is a 501(c)(3) not-for-profit, volunteer organization
-
Selection Committee member
EvoNexus
- Present 9 years 2 months
Economic Empowerment
EvoNexus is a non-profit technology incubator and hub for Southern California’s startup community designed to accelerate the growth and success of entrepreneurial companies.
EvoNexus is supported with Class A office space and facilities by California’s leading real estate developer, Irvine Company, and financially by global technology and life science corporations. These relationships make it possible for EvoNexus to take zero equity or fees from incubating startups and help grow…EvoNexus is a non-profit technology incubator and hub for Southern California’s startup community designed to accelerate the growth and success of entrepreneurial companies.
EvoNexus is supported with Class A office space and facilities by California’s leading real estate developer, Irvine Company, and financially by global technology and life science corporations. These relationships make it possible for EvoNexus to take zero equity or fees from incubating startups and help grow Southern California’s innovation economy. -
Official Member & Contributor
Forbes Technology Council
- Present 5 years 9 months
Forbes Technology Council is an invitation-only community comprised of leading CIOs, CTOs and technology executives.
-
Member - CISO Academy
Federal Bureau of Investigation (FBI)
- Present 5 years 8 months
The FBI Chief Information Security Officer (CISO) Academy is a unique opportunity for cyber security professionals to participate in a week-long conference with FBI Cyber Division and Supervisory Special Agents and Special Agents (CISO Academy “Ambassadors”) from the FBI's 56 field offices and Headquarters.
-
Member
Autism Society of America
- Present 24 years 6 months
Children
As a parent of two High Functioning Autistic boys I have volunteered as an assistant for numerous activities over the last 10 years to raise money for our children to do inclusion type activities such as Surf Camp, Scuba, Archery and competitive Swim. I am truly blessed to have my sons who are my best friends and I am amazed daily at how they viewed the world in which we live in.
-
Committee Member
Boy Scouts of America
- 3 years 4 months
Children
I was an Assistant Scout Master, Committee Member and Merit Badge Counselor for Troop 816. In all positions I volunteered my time to mentor young men and prepare them for the challenges and opportunities they will face in adulthood.
-
Assistant Scout Master
Boy Scouts of America
- 5 years 5 months
Children
I was an Assistant Scout Master, Committee Member and Merit Badge Counselor for Troop 816. In all positions I volunteered my time to mentor young men and prepare them for the challenges and opportunities they will face in adulthood.
Publications
-
CISO Desk Reference Guide: A Practical Guide for CISOs, Volume 2
CISO DRG Joint Venture Publishing
An easy to use guide written by experienced practitioners for recently-hired or promoted Chief Information Security Offices (CISOs), individuals aspiring to become a CISO, as well as business and technical professionals interested in the topic of cybersecurity, including Chief Technology Officers (CTOs), Chief Information Officers (CIOs), Boards of Directors, Chief Privacy Officers, and other executives responsible for information protection.
Part two of the series, this desk reference…An easy to use guide written by experienced practitioners for recently-hired or promoted Chief Information Security Offices (CISOs), individuals aspiring to become a CISO, as well as business and technical professionals interested in the topic of cybersecurity, including Chief Technology Officers (CTOs), Chief Information Officers (CIOs), Boards of Directors, Chief Privacy Officers, and other executives responsible for information protection.
Part two of the series, this desk reference guide is written specifically for CISOs, we hope this book becomes a trusted resource for you, your teams, and your colleagues in the C-suite. The different perspectives can be used as standalone refreshers and the five immediate next steps for each chapter give the reader a robust set of 45 actions based on roughly 100 years of relevant experience that will help you strengthen your cybersecurity programs. -
Taking the Leap from Military to InfoSec: Another Opportunity to Serve
ITSP Magazine "At the intersection of IT Security & Society"
I was asked to write this article to assist veterans who are transitioning into civilian life. I wanted to help them understand where to start as they come into the Cyber Community and also answer some questions for employers on why veterans make excellent employee's.
-
What Smart Cities Can Teach Enterprises About Security
Information Week, DarkReading
The more you simplify your security program while still being effective, the better, says San Diego's chief information security officer. Here's his three-step process.
-
CISO Desk Reference Guide: A Practical Guide for CISOs, Volume 1
CISO DRG Joint Venture Publishing
An easy to use guide written by experienced practitioners for recently-hired or promoted Chief Information Security Offices (CISOs), individuals aspiring to become a CISO, as well as business and technical professionals interested in the topic of cybersecurity, including Chief Technology Officers (CTOs), Chief Information Officers (CIOs), Boards of Directors, Chief Privacy Officers, and other executives responsible for information protection.
As a desk reference guide written…An easy to use guide written by experienced practitioners for recently-hired or promoted Chief Information Security Offices (CISOs), individuals aspiring to become a CISO, as well as business and technical professionals interested in the topic of cybersecurity, including Chief Technology Officers (CTOs), Chief Information Officers (CIOs), Boards of Directors, Chief Privacy Officers, and other executives responsible for information protection.
As a desk reference guide written specifically for CISOs, we hope this book becomes a trusted resource for you, your teams, and your colleagues in the C-suite. The different perspectives can be used as standalone refreshers and the five immediate next steps for each chapter give the reader a robust set of 45 actions based on roughly 100 years of relevant experience that will help you strengthen your cybersecurity programs.Other authorsSee publication -
Cyber in the City: The Art and Business of Protecting Today's Cities
United States Cybersecurity Magazine
Article written for US Cybersecurity Magazine to describe some of the mindsets CISO's use to protect today's cities and their disparate enterprise network environments.
-
Path to a Career in Cyber and Key Tools
securitycurrent
Part three of the Path to Cyber articles. This is the final one the references education websites and the process of putting together a Cyber Career Map.
-
Path to a Career in Cyber
securitycurrent
Wrote this article to describe how I used a cyber certification map to plan the certifications and training I would need for a career in Cyber Security.
-
Cyber, It's All About the Maybe
securitycurrent
As CISO, I firmly believe part of your job is to not say “No” to projects that don’t quite meet your organization’s roadmap. Instead, I believe, as a CISO your job is to say “Maybe.” This leads you to looking at proposed IT projects with a critical eye to ensure they induce the least amount of risk to your organization.
-
CISO Fundamentals
The urgent need for a unified cyber security protection profile is highlighted by recent high profile reports of companies being hacked, critical infrastructure being compromised, intellectual property (IP) being stolen, and the rise of ransomware (“CryptoLocker”). Companies are realizing that the risks associated with the loss of IP/data, money, privacy, and tarnished reputation/brand name from cyber-attacks are intensifying and accelerating in today’s hyper-connected environment. The role of…
The urgent need for a unified cyber security protection profile is highlighted by recent high profile reports of companies being hacked, critical infrastructure being compromised, intellectual property (IP) being stolen, and the rise of ransomware (“CryptoLocker”). Companies are realizing that the risks associated with the loss of IP/data, money, privacy, and tarnished reputation/brand name from cyber-attacks are intensifying and accelerating in today’s hyper-connected environment. The role of the Chief Information Security Officer (CISO) is to remain vigilant on the cyber fundamentals: malware outbreaks, data breaches, protecting data / privacy, continuous monitoring, and risk management. This article proposes an effective and affordable path to implement an adequate and well proven “due diligence” level of cyber security operations. The standard cyber security suite today can be effective – if maintained, enabling business owners to focus on business operations, mitigating critical risks, protecting privacy and minimizing legal liabilities.
We believe that businesses must understand they cannot buy cyber security, instead they must manage their cyber ecosystem using the “5Ps” of any endeavor = people, processes, policy, product and now privacy, too. The cyber solution to minimizing over 90+% of most security incidents is implementing the security basics, and doing them well. Know, maintain and monitor your security baseline, while also stabilizing the cyber environmentOther authorsSee publication
Honors & Awards
-
2018 SC Media Reboot Leadership Awards - Thought Leader
SC Media
Why nominated: After building up an innovative security program as San Diego’s CISO, Gary Hayslip has initiated an ambitious and strategic three-year plan for the Webroot where he now serves as global CISO.
Profile: Hayslip’s more than 20-year career, including advising an impressive range of VIPs in the public and private sectors, has strong roots in the U.S. Navy, where in 2008 as a postgraduate naval school student, he led a team to converge and re-architect five networks into a more…Why nominated: After building up an innovative security program as San Diego’s CISO, Gary Hayslip has initiated an ambitious and strategic three-year plan for the Webroot where he now serves as global CISO.
Profile: Hayslip’s more than 20-year career, including advising an impressive range of VIPs in the public and private sectors, has strong roots in the U.S. Navy, where in 2008 as a postgraduate naval school student, he led a team to converge and re-architect five networks into a more efficiently managed one, saving the command more than $2 million in operating costs.
Later, as San Diego’s CISO, he reportedly advised more than 40 departments on how to detect and prevent hacking attacks and developed a security program that included the first-ever partnership with five cyber starters, enabling him to create a SOC to protect the municipality’s new smart city infrastructure two years ahead of schedule.
Further contributions to San Diego include serving as an advisor to several local incubators and assisting new cybersecurity and IoT start-ups within the region. He actively mentors fledgling CISOs and also devotes time to fellow veterans transitioning from active duty to a cybersecurity career.
After moving to Webroot in April 2017, Hayslip implemented a three-year strategic plan to incorporate multiple Webroot solutions, including real-time threat intelligence, artificial intelligence and orchestration solutions to build a cyber-as-a-service security platform for client organizations.
A noted evangelist for the information security community, Hayslip has also been an advisory board member of the National Technology Security Coalition, a non-profit trade association that advocates or CISOs, since January 2018. Hayslip also authored the “CISO Desk Reference Guide: A Practical Guide for CISOs,” volumes 1 and 2, which are written to help CISOs expand their expertise and scope of knowledge.
-
Nominated for Top Tech Exec Awards of 2017
San Diego Business Journal
San Diego is home to an impressive group of information technology innovators who bolster the business, academic, governmental, and non-profit communities within our city. The Top Tech Exec Awards celebrate the unsung heroes of information technology, as these brilliant leaders and their teams serve as the behind-the-scenes forces that keep companies functioning and businesses accelerating on a daily basis.
Since 2008, Cox Business has served as Title Sponsor for an annual IT award event in…San Diego is home to an impressive group of information technology innovators who bolster the business, academic, governmental, and non-profit communities within our city. The Top Tech Exec Awards celebrate the unsung heroes of information technology, as these brilliant leaders and their teams serve as the behind-the-scenes forces that keep companies functioning and businesses accelerating on a daily basis.
Since 2008, Cox Business has served as Title Sponsor for an annual IT award event in San Diego, dedicated to spotlighting and lauding these technology trailblazers. “We at Cox Business are proud to continue bringing attention to the IT leaders of San Diego and to the exceptional work they do every day,” declared Larry Coval, senior vice president of Cox Business. “Their leadership is an inspiration, and the contributions made by these unsung heroes cannot be overstated.”
The number of information technology professionals nominated by their peers for the Top Tech Exec Awards has grown significantly year after year. An astute panel of independent judges from the business and information technology worlds carefully selects the honorees and special award honorees.
The Top Tech Exec Awards stand as San Diego’s largest annual award program celebrating the city’s most outstanding information technology executives. Each year, the competition is fierce as there are so many exceptional nominees. -
Finalist for 13th Annual Government Information Security Leadership Awards (U.S. GISLA)
(ISC)2
Technology Improvement - A U.S. federal, state or local government information security or information technology employee (examples include CIO, CTO, program/project manager, etc.) who has significantly contributed to the development of a unique information security technology improvement, program or project, on either a government-wide or agency-specific basis, within the last 12 months.
-
Nominated for Top Tech Exec Awards of 2016
San Diego Business Journal
San Diego is home to an impressive group of information technology innovators who bolster the business, academic, governmental, and non-profit communities within our city. The Top Tech Exec Awards celebrate the unsung heroes of information technology, as these brilliant leaders and their teams serve as the behind-the-scenes forces that keep companies functioning and businesses accelerating on a daily basis.
Since 2008, Cox Business has served as Title Sponsor for an annual IT award event in…San Diego is home to an impressive group of information technology innovators who bolster the business, academic, governmental, and non-profit communities within our city. The Top Tech Exec Awards celebrate the unsung heroes of information technology, as these brilliant leaders and their teams serve as the behind-the-scenes forces that keep companies functioning and businesses accelerating on a daily basis.
Since 2008, Cox Business has served as Title Sponsor for an annual IT award event in San Diego, dedicated to spotlighting and lauding these technology trailblazers. “We at Cox Business are proud to continue bringing attention to the IT leaders of San Diego and to the exceptional work they do every day,” declared Larry Coval, senior vice president of Cox Business. “Their leadership is an inspiration, and the contributions made by these unsung heroes cannot be overstated.”
The number of information technology professionals nominated by their peers for the Top Tech Exec Awards has grown significantly year after year. An astute panel of independent judges from the business and information technology worlds carefully selects the honorees and special award honorees.
The Top Tech Exec Awards stand as San Diego’s largest annual award program celebrating the city’s most outstanding information technology executives. Each year, the competition is fierce as there are so many exceptional nominees. -
"People Who Made a Difference in Security in 2015" - Difference Maker Award
SANS
Since 2011, SANS has been celebrating those "Difference Makers" whose innovation, skill and hard work have resulted in real increases in information security. There is no shortage of publicity around failures in security - constant headlines detailing breaches and vulnerabilities at companies and government agencies. However, what you never hear about are the many organizations who aren't in the news because their security staff have found ways to meet business and mission needs while…
Since 2011, SANS has been celebrating those "Difference Makers" whose innovation, skill and hard work have resulted in real increases in information security. There is no shortage of publicity around failures in security - constant headlines detailing breaches and vulnerabilities at companies and government agencies. However, what you never hear about are the many organizations who aren't in the news because their security staff have found ways to meet business and mission needs while protecting customer and business data from attackers. There are thousands of security practitioners out there who are quietly succeeding and making breakthroughs in advancing security.
https://www.sans.org/cyber-innovation-awards -
2015 Information Security Executive - ISE® "Peoples Choice" Award Winner for North America
T.E.N. – Tech Exec Networks, Inc.
T.E.N., a national technology and security executive networking organization, facilitates peer-to-peer relationships between top executives, industry visionaries and solutions providers. Nominated for numerous industry awards, T.E.N.’s executive leadership programs enable information exchange, collaboration and decision-making. Its flagship program, the nationally-acclaimed Information Security Executive® (ISE®) of the Year Program Series and Awards, is North America’s largest leadership…
T.E.N., a national technology and security executive networking organization, facilitates peer-to-peer relationships between top executives, industry visionaries and solutions providers. Nominated for numerous industry awards, T.E.N.’s executive leadership programs enable information exchange, collaboration and decision-making. Its flagship program, the nationally-acclaimed Information Security Executive® (ISE®) of the Year Program Series and Awards, is North America’s largest leadership recognition and networking program for security professionals.
-
2015 Information Security Executive - ISE® "West" Award Winner
T.E.N. – Tech Exec Networks, Inc.
T.E.N., a national technology and security executive networking organization, facilitates peer-to-peer relationships between top executives, industry visionaries and solutions providers. Nominated for numerous industry awards, T.E.N.’s executive leadership programs enable information exchange, collaboration and decision-making. Its flagship program, the nationally-acclaimed Information Security Executive® (ISE®) of the Year Program Series and Awards, is North America’s largest leadership…
T.E.N., a national technology and security executive networking organization, facilitates peer-to-peer relationships between top executives, industry visionaries and solutions providers. Nominated for numerous industry awards, T.E.N.’s executive leadership programs enable information exchange, collaboration and decision-making. Its flagship program, the nationally-acclaimed Information Security Executive® (ISE®) of the Year Program Series and Awards, is North America’s largest leadership recognition and networking program for security professionals.
-
2014 Securing Our eCity® Cybersecurity
San Diego Business Journal
http://www.sandi.net/cms/lib/CA01001235/Centricity/Domain/1/20141222_CyberSecurityAwards.pdf
More activity by Gary
-
*In my best Top of the Pops DJ voice* In at number 8, ‘Hacked: The Secrets Behind Cyber Attacks’ is storming the bestselling Business Book chart at…
*In my best Top of the Pops DJ voice* In at number 8, ‘Hacked: The Secrets Behind Cyber Attacks’ is storming the bestselling Business Book chart at…
Liked by Gary Hayslip
-
Looks like someone has a case of the Monday's. I think we as citizens should do jury duty. Thoughts on jury duty?
Looks like someone has a case of the Monday's. I think we as citizens should do jury duty. Thoughts on jury duty?
Liked by Gary Hayslip
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Gary Hayslip in United States
-
Gary Hayslip
cdl instructor at lake cumberland cdl training schools
-
Gary Hayslip
chief inspector at Tulsa Inspection Resources Inc
-
Gary Hayslip
Sales Associate at Best Buy
-
Gary Hayslip
--
4 others named Gary Hayslip in United States are on LinkedIn
See others named Gary Hayslip