Sign in to view Brian’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Brian’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Huntington Beach, California, United States
Sign in to view Brian’s full profile
Brian can introduce you to 10+ people at Southern California Edison (SCE)
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
4K followers
500+ connections
Sign in to view Brian’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Brian
Brian can introduce you to 10+ people at Southern California Edison (SCE)
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Brian
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Brian’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Experience & Education
-
Southern California Edison (SCE)
** * ***** ******** ******* *****
-
******* **********
**** ******** *********** ******* undefined undefined
View Brian’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View Brian’s full profile
-
See who you know in common
-
Get introduced
-
Contact Brian directly
Other similar profiles
-
Victor Morrison, PfMP,PMP, RMP, ACP, CISSP
Victor Morrison, PfMP,PMP, RMP, ACP, CISSP
CACI International Inc
2K followersNew Alexandria, VA -
Carl C. Manion
Carl C. Manion
Research and advisory practice leader helping companies understand emerging technologies and trends. <br><br>I'm a veteran thought leader with three decades of expertise, specializing in the convergence of Cybersecurity, Physical AI, and Industrial Autonomy. Having spent 33+ years mastering military logistics and mission-critical security, I guide enterprises through the complexities of the growing Global Attack Surface Grid. My work focuses on the end-to-end logistical integrity and defense of AI-driven systems, ensuring that as the threat landscape expands from the server room to the supply chain, operational resilience remains uncompromised.<br><br>My posts and articles are my own thoughts and may not necessarily reflect the thoughts and opinions of my employer.<br><br>My specialties include: cybersecurity, agentic AI, and physical AI with a focus on emerging tech and trends, overall. I also have extensive experience in those areas related to startups, private equity and venture-backed investments, and portfolio company environments. <br><br>More about me: Throughout my career I've worked in leadership roles with a heavy focus on security operations and consulting. I also have a strong background in secure software engineering and IT operations in large enterprise organizations. As a leader, I've been very successful in developing innovative strategies, planning solutions and services, and managing enterprise projects/programs and teams in fast-paced business environments with budget responsibility of up to $40M. <br><br>I'm a "people person" and am highly skilled and experienced at building and leading diverse, geographically distributed teams; aligning their efforts with organizational goals; managing customer relationships; and delivering valuable business results. <br><br>I'm a realist and a pragmatist. I know, from experience, that theory is good in theory, but not always in practice. <br><br>Outside of work, I enjoy spending time in the great outdoors with my family. I love hiking, backpacking, fishing, hunting and traveling to new places. I also like working on DIY projects around my house from time-to-time and rarely pass up an opportunity to build something new or find ways to make something better (I'm a firm believer in the "Never Stop Improving" concept). I also like most sports, especially college football because I love the competitive nature of it. I like a wide variety of music and appreciate art in all its forms (drawings, paintings, sculptures, etc.). I never stop pushing myself to set my goals higher, accomplish more, and do more with my life.
7K followersKnoxville, TN
Explore more posts
-
Whiz Works
2K followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/I9q5t #IAM #ZeroTrust #Security
3
-
Hussar Systems LLC | Cisco
108 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/Q1obO #IAM #ZeroTrust #Security
1
-
Chickasaw Telecom, Inc.
941 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/nq0Lr #IAM #ZeroTrust #Security
-
Solubra S.A
180 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/36byC #IAM #ZeroTrust #Security
-
American Technology Services
3K followers
Risk changes faster than your quarterly report. New misconfigurations, new exposures, new attack paths can appear in days, not months. Continuous Threat Exposure Management keeps your risk map current so you are fixing what matters now, not what mattered last quarter.
3
-
Ian Walters
Walters GRC Advisory • 1K followers
#CMS continues to fine-tune the #ARCAMPE. This time with some extra guidance on audit log capacity and retention. Coalfire keeps an eye on the changing landscape of compliance in the world of #ACA and #Medicaid 10-year retention seems a long time when compared to #HIPAA (not #HIPPA) requirements (6 years). How are you handling the increase in audit log storage required for compliance? https://lnkd.in/ejgZ4hYE
3
-
Edgescan
5K followers
The shift from technical metrics to business-aligned security measurement marks a real evolution in security leadership - moving from vulnerability counts to demonstrable risk reduction. Want to transform board-level security conversations? Contextualization is key. Mean time to remediate critical exposures tells a more compelling story than total vulnerabilities closed. Focus on metrics that demonstrate actual protection value. Business alignment makes the difference. Map security controls directly to business services and quantify protection values in terms of operational resilience and revenue assurance rather than technical debt reduction. Comparative benchmarking provides essential context. Understanding how your security posture compares to industry peers highlights areas of leadership and improvement opportunities that drive strategic investment. At Edgescan, we help security leaders translate technical findings into business risk metrics demonstrating real security ROI and enabling data-driven protection strategies. #CISOStrategy #SecurityMetrics #CyberLeadership
10
-
ISACA Greater Cincinnati Chapter
412 followers
Hundreds of vulnerabilities in 24 leading GenAI models Explore security profiles of 24 leading GenAI models, revealing hundreds of chatbot vulnerabilities with attack success rates up to 64%. Learn strategies to secure AI systems, meet compliance and close the prevention gap. https://lnkd.in/gn4BvKiQ
1
-
Cannon Fodder Security - Home of Queen City Con
1K followers
Hundreds of vulnerabilities in 24 leading GenAI models Explore security profiles of 24 leading GenAI models, revealing hundreds of chatbot vulnerabilities with attack success rates up to 64%. Learn strategies to secure AI systems, meet compliance and close the prevention gap. https://lnkd.in/gn4BvKiQ
-
CiNPA - Security SIG
76 followers
Hundreds of vulnerabilities in 24 leading GenAI models Explore security profiles of 24 leading GenAI models, revealing hundreds of chatbot vulnerabilities with attack success rates up to 64%. Learn strategies to secure AI systems, meet compliance and close the prevention gap. https://lnkd.in/gn4BvKiQ
-
Jason Basye
Concertium • 6K followers
CMMC Compliance Deadline: Are You Ready for October 1st? The DoD’s latest update to 48 CFR Part 204.75 makes it official: CMMC certification is mandatory for contractors starting October 1, 2025. If your organization handles Federal Contract Information (FCI) or Controlled Unclassified Information (CUI), you must be certified to bid, renew, or extend DoD contracts. 🎯 Don’t risk disqualification. As a CMMC Registered Practitioner Organization (RPO), Concertium helps defense contractors like you: * Assess and close compliance gaps * Build cybersecurity policies and procedures * Train your team and prepare for certification ⏳ Time is running out. Let’s get you ready before Phase 1 begins. 📅 Book your free consultation today: concertium.com/cmmc-rpo
10
-
TrollEye Security
3K followers
Most security programs don’t struggle with detection. They struggle with mobilizing to address exposures once they're identified. That’s the gap CTEM is designed to close, by replacing one-time testing and siloed tools with a continuous cycle that connects exposure, validation, and remediation before attackers act. When CTEM is operationalized through continuous testing, centralized visibility, and a strong partnership, teams can prioritize what matters, act decisively, and prove progress over time. If you’re reassessing how exposure is managed going into 2026, we help organizations operationalize CTEM through a continuous, unified, and partnership-driven approach to 360* exposure management. #CTEM #ThreatExposureManagement #SecurityStrategy #CyberRiskManagement #TrollEyeSecurity
9
1 Comment -
LogZilla Corporation
2K followers
PCI DSS. HIPAA. NIST 800-53. GDPR. SOX. Different frameworks. Different requirements. The same underlying log data. LogZilla AI Compliance maps log events across multiple frameworks at once. One analysis. Five frameworks. No manual control mapping. Audit preparation becomes structured instead of reactive. Learn how AI-driven compliance reporting simplifies multi-framework audits: https://lnkd.in/gD2G-S6J #Compliance #GRC #NIST #GDPR #SOX
5
1 Comment
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content