SlideShare una empresa de Scribd logo
1 de 15
Gregg E. Haege
    A Resume
A Summary of Gregg
                      EXECUTIVE MANAGER
• Highly accomplished visionary executive with domestic and
    international experience in running operations, cooperative
    ventures, information analysis, decision-making, budget-
    projection/-justification/ -execution.
•   Accustomed to leading diverse missions and
    workforces, presenting complex concepts to decision-
    makers, leading change, taking care of subordinates, and
    overseeing projects.
•   Outstanding verbal and written communicator up and
    down the chain of responsibility. Pragmatic and
    focused, has a penchant for decisiveness, with flexibility to
    change direction when necessary--can make hard decisions.
Gregg's Core Competencies
• Visionary Leadership
• Results-orientation
• Strategic Thinker
• Operations Management
• Operations Security
• Mentoring and Coaching
• Problem-solving
• Accomplished Spokesperson
• Change Management
Gregg's Current Work -
    National Geospatial Agency - Sta Louis, MO

Assistant Chief, Information Assurance Division


•    Serve as Deputy CEO of $18 million budget operations organization with
     108 employees, 15 sub-offices (direct and attached), conducting

•
     Information System Security and Information Assurance activities.
     Deputy responsible for all Information Assurance (IA) activities in NGA.
     Also responsible for Vulnerability Assessment (VA), Certification
     Engineering (CE), Public Key Initiative (PKI), and Communication
     Security (COMSEC) activities. During contingencies, responsible for all
     Chief Information Officer activities acting as NGA CIO, Functional
     Manager for GEOINT, Senior Agency Official for Privacy, Information

•
     Sharing Executive, and Senior Agency Official for IT Continuity.
     Directed Tiger Team that accredited 35 information systems in one
     location, of all sizes, within two weeks. Saved these systems from being
     shut down because of no accreditations. Result was uninterrupted, direct
     support to warfighters.
More NGA experience....



•    Resolved Portable Electronic Device crisis, Agency-wide. Directed team
     that accounted for and accredited all PEDs—over 5000. Result—eliminated
     vulnerabilities to networks, increased device accountability, and reinforced

•
     security of Agency data.
     Led OCIO critical support to agency Beijing Olympics efforts. Provided
     expertise, advocacy to get secure internet access equipment
     accredited, operational supporting analysts. As a result, shared in

•
     Meritorious Unit Citation from Asia-Pacific Office.
     Became Information Assurance Office and Manager (IAO and IAM) for
     agency Enhanced View Commercial Data Provider program, bringing
     critical input to NGA analysts with speedy accreditation of these systems.
     Size ($6.5 Billion) and visibility of contract grounds for my selection to
     train companies new to national security, complexity of system interfaces.
More NGA experience....



•   Undertook initiative to help bring agency into 21st
    century. Directed Working Group responsible for all
    facets of mobile device security. Marshaled all
    disciplines—Information Assurance, Operations
    Security, Physical Security, Counter-
    Intelligence, Technical Security, Intrusion
    Detection.
Gregg's Former Life
67th Information Operations Group, San Antonio, TX, 2001-2004




Commander and Deputy Commander

•   Serve as Deputy CEO of $17 million budget operations
    organization with over 700 employees, 17 sub-offices
    (direct and attached), conducting Information
    Operations and Information Warfare.
•   Full responsibility for Air Intelligence Agency
    Continental United States, Pacific, European, and
    Southwest Asia-based tactical Information Operations
    missions. Organized, trained, and equipped Information
    Operations and Information Warfare units.
More 67th Information Operations Group...


•   Diverse mission areas included Defensive Information
    Operations and Communication Security, Defensive
    Computer Network Operations, Operations Security
    (OPSEC), and Adversary Air Tactics Analysis.
•   Conducted continuous analysis of resource utilization
    and advocated for increased funding where necessary.
    Directed logistical operations to support sub-offices.
•   Provided direct and indirect cross-functional
    management and direction of COO, CFO, 32-person
    staff, and 17 sub-office managers.
More 67th Information Operations Group...



•   Reprioritized programs, cut staff travel budget, marshaled money for sub-
    offices’ IT refresh. Saved approximately 30% of total Group staff budget for
    this purpose. Priority set to producing units.
•   Prototyped persuasive briefing format to communicate Group mission--
    linked to briefings for each Group mission area.
•   Clear, requirement-based style garnered $9.2 million within first year for
    Special Operations support mission alone Guided all stages of advanced
    Operations Security concept, allowing long-term analysis and trending of
    information gathered, using 24-hour operation. Resutled in superior
    assessment of Operations Security posture, Air Force-wide.
67th Information Operations Wing,
    San Antonio, TX, 2000-2001

Director of Staff

•   Serve as Headquarters Staff Director of $35 million
    budget operations organization with over 3,000
    employees, over 50 sub-offices (direct and attached),
    conducting Information Operations and Information
    Warfare.
•   Full responsibility for organization headquarters staff of
    over 150 personnel, with direct impact on all larger
    organization operations’ support--administrative,
    financial, personnel, and logistical--current and future.
More 67th Information Operations Wing....


•   Planned, coordinated, and directed operations of
    organization staff. Advised CEO, Deputy CEO on all
    operational matters regarding operations, sub-offices, and
    staff.
•   Sub-offices conducted multi-source intelligence, Information
    Warfare, Electronic Combat, and securities operations in
    support of Information Dominance.
•   Chairman of organization’s financial Requirements Review
    Panel, responsible for determining and advocating for all
    execution of current and future funding requirements.
    Director of organization’s Crisis Action Team, conducting
    Continuity of Operations (COOP) planning and execution in
    case of natural and man-made disasters and emergencies.
More 67th Information Operations Wing....



•   Justified $2.2 million in fallout money for organization projects to
    Air Intelligence Agency. This was the most fallout money received
    in years for miscellaneous initiatives
•   Redesigned Continuity of Operations Plan (COOP). Worldwide
    missions made it highly complex. Equipped Crisis Action Team
    with computers, redundant databases, communications, and
    coordinated alternate operations locations
Gregg's Education.....


•   Master of Science in Business Continuity (MSBC), Norwich
    University, Northfield, VT, August 2011, GPA 4.0




•   Master of Arts of International Transactions (MAIT), George
    Mason University, Fairfax, VA, May 1993, GPA 3.7




•   Bachelor of Science (BS), Political Science, Southern Illinois
    University, Edwardsville, IL, June 1980, GPA 3.1
Gregg's Certifications.....


•   Disaster Recovery Institute International - Associate
    Business Continuity Professional (ABCP) – #32631 -
    since Oct 2011




•   DoDM 8570 (Information Assurance Certification) -
    GIAC Security Leadership Certificate (GSLC) – #716 -
    since May 2007
There is more than meets the eye with
Gregg......

Gregg is also a licensed Baptist Minister




                          (First Baptist Church, Belleville, IL)




Gregg enjoys reading, target shooting, and
  spending time with his wife and daughter

Más contenido relacionado

La actualidad más candente

Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Knowledge Group
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk ManagementSocial Tables
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security ManagementLuis Martins
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
Roger Sloan Resume
Roger Sloan ResumeRoger Sloan Resume
Roger Sloan ResumeRoger Sloan
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case StudyPraveen Vackayil
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramSurfWatch Labs
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 

La actualidad más candente (20)

Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
Lesson 1- Information Policy
Lesson 1- Information PolicyLesson 1- Information Policy
Lesson 1- Information Policy
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security Management
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Roger Sloan Resume
Roger Sloan ResumeRoger Sloan Resume
Roger Sloan Resume
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Practical insights in the day-to-day routine of an information security officer
Practical insights in the day-to-day routine of an information security officerPractical insights in the day-to-day routine of an information security officer
Practical insights in the day-to-day routine of an information security officer
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Root causes
Root causesRoot causes
Root causes
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence Program
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 

Destacado (9)

January 13, 2012.pub
January 13, 2012.pubJanuary 13, 2012.pub
January 13, 2012.pub
 
18 March 2012.pub
18 March 2012.pub18 March 2012.pub
18 March 2012.pub
 
December 9, 2012.pub
December 9, 2012.pubDecember 9, 2012.pub
December 9, 2012.pub
 
February 12, 2012
February 12, 2012February 12, 2012
February 12, 2012
 
Santanalopia
SantanalopiaSantanalopia
Santanalopia
 
Sunday, March 4, 2012.pub
Sunday, March 4, 2012.pubSunday, March 4, 2012.pub
Sunday, March 4, 2012.pub
 
Annual Report 2011
Annual Report 2011Annual Report 2011
Annual Report 2011
 
Ferc 1000
Ferc 1000Ferc 1000
Ferc 1000
 
January 15, 2012
January 15, 2012January 15, 2012
January 15, 2012
 

Similar a Gregg e haegevisualresume

JDF Resume Rev June 2016
JDF Resume Rev June 2016JDF Resume Rev June 2016
JDF Resume Rev June 2016Julius Foronda
 
JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5Jason Jowers
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016Ronald (RON) Ray Harris
 
C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUMECarl Cohen
 
Jeremy Rich-Resume
Jeremy Rich-ResumeJeremy Rich-Resume
Jeremy Rich-ResumeJeremy Rich
 
Formal Resume Final - Chris Hedge
Formal Resume Final - Chris HedgeFormal Resume Final - Chris Hedge
Formal Resume Final - Chris HedgeChris Hedge
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
2012 IWS Corporate Overview Updated 27 Sept 12
2012 IWS Corporate Overview   Updated 27 Sept 122012 IWS Corporate Overview   Updated 27 Sept 12
2012 IWS Corporate Overview Updated 27 Sept 12Randy Lange
 
Jg Hess Resume
Jg Hess ResumeJg Hess Resume
Jg Hess Resumejg53hess
 
John Anthony Painter
John Anthony PainterJohn Anthony Painter
John Anthony PainterJohn Painter
 
Resume Louis schwartz
Resume Louis schwartzResume Louis schwartz
Resume Louis schwartzloujswz
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownIvanti
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Jeff Chugg Professional Resume - 01-23-2017
Jeff Chugg Professional Resume - 01-23-2017Jeff Chugg Professional Resume - 01-23-2017
Jeff Chugg Professional Resume - 01-23-2017Jeff Chugg
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation Joel Okomoli
 

Similar a Gregg e haegevisualresume (20)

JDF Resume Rev June 2016
JDF Resume Rev June 2016JDF Resume Rev June 2016
JDF Resume Rev June 2016
 
JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5JowersJT_resume_BLHIv5
JowersJT_resume_BLHIv5
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
 
Ann Marie Cody Resume
Ann Marie Cody ResumeAnn Marie Cody Resume
Ann Marie Cody Resume
 
C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUME
 
McBee 8-28-2015
McBee 8-28-2015McBee 8-28-2015
McBee 8-28-2015
 
Jeremy Rich-Resume
Jeremy Rich-ResumeJeremy Rich-Resume
Jeremy Rich-Resume
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 
Formal Resume Final - Chris Hedge
Formal Resume Final - Chris HedgeFormal Resume Final - Chris Hedge
Formal Resume Final - Chris Hedge
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
2012 IWS Corporate Overview Updated 27 Sept 12
2012 IWS Corporate Overview   Updated 27 Sept 122012 IWS Corporate Overview   Updated 27 Sept 12
2012 IWS Corporate Overview Updated 27 Sept 12
 
Jg Hess Resume
Jg Hess ResumeJg Hess Resume
Jg Hess Resume
 
John Anthony Painter
John Anthony PainterJohn Anthony Painter
John Anthony Painter
 
Resume Louis schwartz
Resume Louis schwartzResume Louis schwartz
Resume Louis schwartz
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Jeff Chugg Professional Resume - 01-23-2017
Jeff Chugg Professional Resume - 01-23-2017Jeff Chugg Professional Resume - 01-23-2017
Jeff Chugg Professional Resume - 01-23-2017
 
Joe DiCristofano Resume
Joe DiCristofano ResumeJoe DiCristofano Resume
Joe DiCristofano Resume
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Gregg e haegevisualresume

  • 1. Gregg E. Haege A Resume
  • 2. A Summary of Gregg EXECUTIVE MANAGER • Highly accomplished visionary executive with domestic and international experience in running operations, cooperative ventures, information analysis, decision-making, budget- projection/-justification/ -execution. • Accustomed to leading diverse missions and workforces, presenting complex concepts to decision- makers, leading change, taking care of subordinates, and overseeing projects. • Outstanding verbal and written communicator up and down the chain of responsibility. Pragmatic and focused, has a penchant for decisiveness, with flexibility to change direction when necessary--can make hard decisions.
  • 3. Gregg's Core Competencies • Visionary Leadership • Results-orientation • Strategic Thinker • Operations Management • Operations Security • Mentoring and Coaching • Problem-solving • Accomplished Spokesperson • Change Management
  • 4. Gregg's Current Work - National Geospatial Agency - Sta Louis, MO Assistant Chief, Information Assurance Division • Serve as Deputy CEO of $18 million budget operations organization with 108 employees, 15 sub-offices (direct and attached), conducting • Information System Security and Information Assurance activities. Deputy responsible for all Information Assurance (IA) activities in NGA. Also responsible for Vulnerability Assessment (VA), Certification Engineering (CE), Public Key Initiative (PKI), and Communication Security (COMSEC) activities. During contingencies, responsible for all Chief Information Officer activities acting as NGA CIO, Functional Manager for GEOINT, Senior Agency Official for Privacy, Information • Sharing Executive, and Senior Agency Official for IT Continuity. Directed Tiger Team that accredited 35 information systems in one location, of all sizes, within two weeks. Saved these systems from being shut down because of no accreditations. Result was uninterrupted, direct support to warfighters.
  • 5. More NGA experience.... • Resolved Portable Electronic Device crisis, Agency-wide. Directed team that accounted for and accredited all PEDs—over 5000. Result—eliminated vulnerabilities to networks, increased device accountability, and reinforced • security of Agency data. Led OCIO critical support to agency Beijing Olympics efforts. Provided expertise, advocacy to get secure internet access equipment accredited, operational supporting analysts. As a result, shared in • Meritorious Unit Citation from Asia-Pacific Office. Became Information Assurance Office and Manager (IAO and IAM) for agency Enhanced View Commercial Data Provider program, bringing critical input to NGA analysts with speedy accreditation of these systems. Size ($6.5 Billion) and visibility of contract grounds for my selection to train companies new to national security, complexity of system interfaces.
  • 6. More NGA experience.... • Undertook initiative to help bring agency into 21st century. Directed Working Group responsible for all facets of mobile device security. Marshaled all disciplines—Information Assurance, Operations Security, Physical Security, Counter- Intelligence, Technical Security, Intrusion Detection.
  • 7. Gregg's Former Life 67th Information Operations Group, San Antonio, TX, 2001-2004 Commander and Deputy Commander • Serve as Deputy CEO of $17 million budget operations organization with over 700 employees, 17 sub-offices (direct and attached), conducting Information Operations and Information Warfare. • Full responsibility for Air Intelligence Agency Continental United States, Pacific, European, and Southwest Asia-based tactical Information Operations missions. Organized, trained, and equipped Information Operations and Information Warfare units.
  • 8. More 67th Information Operations Group... • Diverse mission areas included Defensive Information Operations and Communication Security, Defensive Computer Network Operations, Operations Security (OPSEC), and Adversary Air Tactics Analysis. • Conducted continuous analysis of resource utilization and advocated for increased funding where necessary. Directed logistical operations to support sub-offices. • Provided direct and indirect cross-functional management and direction of COO, CFO, 32-person staff, and 17 sub-office managers.
  • 9. More 67th Information Operations Group... • Reprioritized programs, cut staff travel budget, marshaled money for sub- offices’ IT refresh. Saved approximately 30% of total Group staff budget for this purpose. Priority set to producing units. • Prototyped persuasive briefing format to communicate Group mission-- linked to briefings for each Group mission area. • Clear, requirement-based style garnered $9.2 million within first year for Special Operations support mission alone Guided all stages of advanced Operations Security concept, allowing long-term analysis and trending of information gathered, using 24-hour operation. Resutled in superior assessment of Operations Security posture, Air Force-wide.
  • 10. 67th Information Operations Wing, San Antonio, TX, 2000-2001 Director of Staff • Serve as Headquarters Staff Director of $35 million budget operations organization with over 3,000 employees, over 50 sub-offices (direct and attached), conducting Information Operations and Information Warfare. • Full responsibility for organization headquarters staff of over 150 personnel, with direct impact on all larger organization operations’ support--administrative, financial, personnel, and logistical--current and future.
  • 11. More 67th Information Operations Wing.... • Planned, coordinated, and directed operations of organization staff. Advised CEO, Deputy CEO on all operational matters regarding operations, sub-offices, and staff. • Sub-offices conducted multi-source intelligence, Information Warfare, Electronic Combat, and securities operations in support of Information Dominance. • Chairman of organization’s financial Requirements Review Panel, responsible for determining and advocating for all execution of current and future funding requirements. Director of organization’s Crisis Action Team, conducting Continuity of Operations (COOP) planning and execution in case of natural and man-made disasters and emergencies.
  • 12. More 67th Information Operations Wing.... • Justified $2.2 million in fallout money for organization projects to Air Intelligence Agency. This was the most fallout money received in years for miscellaneous initiatives • Redesigned Continuity of Operations Plan (COOP). Worldwide missions made it highly complex. Equipped Crisis Action Team with computers, redundant databases, communications, and coordinated alternate operations locations
  • 13. Gregg's Education..... • Master of Science in Business Continuity (MSBC), Norwich University, Northfield, VT, August 2011, GPA 4.0 • Master of Arts of International Transactions (MAIT), George Mason University, Fairfax, VA, May 1993, GPA 3.7 • Bachelor of Science (BS), Political Science, Southern Illinois University, Edwardsville, IL, June 1980, GPA 3.1
  • 14. Gregg's Certifications..... • Disaster Recovery Institute International - Associate Business Continuity Professional (ABCP) – #32631 - since Oct 2011 • DoDM 8570 (Information Assurance Certification) - GIAC Security Leadership Certificate (GSLC) – #716 - since May 2007
  • 15. There is more than meets the eye with Gregg...... Gregg is also a licensed Baptist Minister (First Baptist Church, Belleville, IL) Gregg enjoys reading, target shooting, and spending time with his wife and daughter