{"id":18,"date":"2024-10-08T20:50:58","date_gmt":"2024-10-08T20:50:58","guid":{"rendered":"https:\/\/cybersecuritysanity.com\/?page_id=18"},"modified":"2026-02-23T17:12:37","modified_gmt":"2026-02-23T17:12:37","slug":"resume","status":"publish","type":"page","link":"https:\/\/cybersecuritysanity.com\/?page_id=18","title":{"rendered":"R\u00e9sum\u00e9"},"content":{"rendered":"\n<p>Steve M. Packard<br>CISSP, CISM, CCSP<br>203-815-3888 |&nbsp; <a href=\"mailto:Packard.Stephen@gmail.com\">Packard.Stephen@gmail.com<\/a>&nbsp; |&nbsp; <a href=\"https:\/\/www.linkedin.com\/in\/stephen-packard-cism-ccsp-cissp-a2426a30\/\">LinkedIn<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:22px\"><br><strong>Cyber AI Risk Management Expert<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Introduction:<\/strong> Cybersecurity and AI risk expert with 20+ years of experience evaluating complex technology risk across enterprise, cloud, and emerging AI systems. My work spans traditional cybersecurity, AI security, and advanced risk governance, with a strong focus on AI evaluation, auditing, and safe deployment of generative and machine learning systems. I combine deep technical knowledge of LLM mechanics, model behavior, and AI architecture with a pragmatic risk management mindset grounded in real-world security operations and compliance.<\/p>\n\n\n\n<p>My background uniquely extends beyond conventional cyber risk into frontier AI assessment, including early generative AI evaluation work in collaboration with developers at a frontier lab (Google Labs), where I contributed to top-down risk analysis of hallucinations, malfunctions, misuse pathways, and governance implications. I specialize in translating complex AI\/ML theory, development practices, and system behaviors into actionable risk, audit, and security controls that organizations can realistically implement.<\/p>\n\n\n\n<p>I am also an expert in cyber security in diverse settings, IAM, SOC center operations, incident response, auditing and other areas of cyber security practice.  I have been designing highly secure automated systems for more than a decade, and have an extensive background in cloud services.<\/p>\n\n\n\n<p>I&#8217;m a proficient programmer in C, C++, Java, C#, Python, PHP, SQL, html and other scripting and programing languages.  I&#8217;ve worked extensively in Microsoft ecosystems and Windows environments, as well as other corporate IT systems.  I&#8217;m familiar with most corporate, cyber and cloud tools and environments.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Innovative cybersecurity professional with 20+ years of experience<\/li>\n\n\n\n<li>CISSP, CISM, and CSSP certified<\/li>\n\n\n\n<li>Experienced working with AI developers and cutting-edge AI technology<\/li>\n\n\n\n<li>Expert in secure coding and software development<\/li>\n\n\n\n<li>Background in AI training, fine tuning, generative modeling and LLM mechanics<\/li>\n\n\n\n<li>Track record of success with ransomware defense, prevention, and recovery<\/li>\n\n\n\n<li>Served in major role in first top-down risk assessment of AI risks for Google Labs<\/li>\n\n\n\n<li>Fortune 500 level governance experience<\/li>\n\n\n\n<li>Compliance with major regulatory laws and frameworks including NIST, ISO 27000, SOX, PCI DSS, GDPR<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Professional Experience:<\/strong><\/p>\n\n\n\n<p><strong>Wiiggin and Dana, New Haven, CT\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0<\/strong>\u00a0\u00a0<strong>\u00a02025 \u20132026<\/strong><br>AI Security Manager<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Wrote AI risk and security governance<\/li>\n\n\n\n<li>Provided security oversight of AI operations<\/li>\n\n\n\n<li>Evaluated AI products for risk and security<\/li>\n\n\n\n<li>Created workflow integration plans for AI and automation<\/li>\n<\/ul>\n\n\n\n<p><strong>Deloitte Risk Financial Advisory, New York City, NY&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>&nbsp;2020 \u20132023<\/strong><br>Cyber Risk Advisory Analyst<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Provided data life cycle governance and support to fortune 50 company<\/li>\n\n\n\n<li>Conducted risk assessment for ransomware vulnerabilities of client\u2019s remote access infrastructure<\/li>\n\n\n\n<li>Provided oversight of SOC center escalations<\/li>\n\n\n\n<li>Oversaw cutting-edge assessment services to major client deploying world-class AI products<\/li>\n\n\n\n<li>Aided in firm\u2019s response to Solar Winds event, including arranging much of the PR and information response<\/li>\n\n\n\n<li>Clients included: Google, AIG, Bank of America, Synovus Bank, Exelon and BNY Melon<\/li>\n<\/ul>\n\n\n\n<p><strong>Tyehimba Enterprises, Bridgeport, CT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;2017\u2013 2019<\/strong><br>Network and Infrastructure Consultant<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Managed on-site and remote IT projects<\/li>\n\n\n\n<li>Managed multiple workstreams involving teams of 10 or more onsite installers<\/li>\n\n\n\n<li>Assisted in RFP responses and planning<\/li>\n\n\n\n<li>Conducted PCI DSS auditing and enforcement<\/li>\n<\/ul>\n\n\n\n<p><strong>Techline Computing, Shelton, CT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>&nbsp;&nbsp;2014 \u2013 2018<\/strong><br>Cloud Services Manager<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assisted clients in determining needs for cloud services<\/li>\n\n\n\n<li>Managed cloud recovery services<\/li>\n\n\n\n<li>Provided incident response to companies from one to over 500 employees<\/li>\n\n\n\n<li>Established new and innovative cloud migration services<\/li>\n<\/ul>\n\n\n\n<p><strong>Growing Possibilities, Guilford, CT&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<strong>2007 \u2013 2013<\/strong><br>Director of E-marketing &amp; Chief Information Security Officer<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Established new online sales from zero to over 1000 orders per month<\/li>\n\n\n\n<li>Setup analytics, marketing and inventory tracking systems<\/li>\n\n\n\n<li>Maintained system security for marketing system and other critical systems<\/li>\n\n\n\n<li>Enforced compliance, especially with PCI-DSS<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Education:<\/strong><\/p>\n\n\n\n<p><strong>Charter Oka State College, New Britain CT <\/strong><br>Bachelor of Science: Cyber Security &#8211; Graduated 2019<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Graduated with \u201cHonors in Scholarship\u201d, institution\u2019s equivalent of magna cum laude<\/li>\n\n\n\n<li>3.8 GPA, 3.92 GPA in Major<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Professional Certifications:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\" style=\"background-color: transparent;\">\n  <table class=\"has-fixed-layout\" style=\"background-color: transparent; border: none;\">\n    <tbody>\n      <tr>\n        <td style=\"background-color: transparent; border: none;\">\n          <strong>(ISC)\u00b2 CISSP<\/strong>\n        <\/td>\n        <td style=\"background-color: transparent; border: none;\">\n          (<a style=\"font-size: revert; font-family: inherit;\" href=\"https:\/\/www.isc2.org\/MemberVerification?LastName=Packard&amp;MemberNumber=756060\">Click to Verify<\/a><span style=\"font-size: inherit; font-weight: inherit; font-family: inherit;\"> )  <\/span>\n        <\/td>\n      <\/tr>\n      <tr>\n        <td style=\"background-color: transparent; border: none;\">\n          <strong>(ISC)\u00b2 CCSP<\/strong>\n        <\/td>\n        <td style=\"background-color: transparent; border: none;\">\n          (<a href=\"https:\/\/www.isc2.org\/MemberVerification?LastName=Packard&amp;MemberNumber=756060\">Click to Verify<\/a>)\n        <\/td>\n      <\/tr>\n      <tr>\n        <td style=\"background-color: transparent; border: none;\">\n          <strong>ISACA CISM<\/strong>\n        <\/td>\n        <td style=\"background-color: transparent; border: none;\">\n          (<a href=\"https:\/\/www.youracclaim.com\/badges\/2ec99c66-c05a-4ff2-8031-adf8ff1c5ecd\/public_url\">Click to Verify<\/a>)\n        <\/td>\n      <\/tr>\n      <tr>\n        <td style=\"background-color: transparent; border: none;\">\n          <strong>AWS Certified Cloud Practitioner<\/strong>\n        <\/td>\n        <td style=\"background-color: transparent; border: none;\">\n          (<a href=\"https:\/\/www.credly.com\/badges\/2dd7f738-eec2-48f5-b9e5-e429fc693a96\/public_url\">Click to Verify<\/a>)\n        <\/td>\n      <\/tr>\n      <tr>\n        <td style=\"background-color: transparent; border: none;\">\n          <strong>AWS Solutions Architect, Associate<\/strong>\n        <\/td>\n        <td style=\"background-color: transparent; border: none;\">\n          (<a href=\"https:\/\/www.credly.com\/badges\/3028aef4-3fde-4ba2-b352-caae9fce898d\/public_url\">Click to Verify<\/a>)\n        <\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Skills and Expertise:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI training and modification: Fine Tuning, Preference Tuning and RLHF<\/li>\n\n\n\n<li>AI model evaluation and auditing<\/li>\n\n\n\n<li>AI Agents, frameworks and multi agent strategies<\/li>\n\n\n\n<li>Langchain, MCP, A2A, N8N and automation strategies<\/li>\n\n\n\n<li>Huggingface ecosystem and models<\/li>\n\n\n\n<li>Pytorch and model development in Python<\/li>\n\n\n\n<li>AI model theory: superposition, knowledge graphs, attention, vectorization<\/li>\n\n\n\n<li>Documentation and writing of procedures for regulatory compliance<\/li>\n\n\n\n<li>Privacy governance and policy<\/li>\n\n\n\n<li>PCI DSS, CCPR, SOX, GDPR, GLBA, HIPPA and other security\/privacy regulatory frameworks<\/li>\n\n\n\n<li>NIST and ISO 27000 compliance management<\/li>\n\n\n\n<li>Sarbanes-Oxley (SOX) governance<\/li>\n\n\n\n<li>High level stakeholder management<\/li>\n\n\n\n<li>Complex incident response<\/li>\n\n\n\n<li>Crisis Management<\/li>\n\n\n\n<li>Project management<\/li>\n\n\n\n<li>Cyber security insurance<\/li>\n\n\n\n<li>Risk management<\/li>\n\n\n\n<li>Business continuity planning<\/li>\n\n\n\n<li>Crisis management<\/li>\n\n\n\n<li>Data Lifecyle management<\/li>\n\n\n\n<li>Identity and Access Management<\/li>\n\n\n\n<li>Penetration Testing<\/li>\n\n\n\n<li>Firewall administration<\/li>\n\n\n\n<li>Integration testing<\/li>\n\n\n\n<li>Change management<\/li>\n\n\n\n<li>IT asset inventory<\/li>\n\n\n\n<li>Microsoft Office (Excel, Powerpoint, Word)<\/li>\n\n\n\n<li>Programming in C, C++, JavaScript, SQL, Python, PHP, Java and others<\/li>\n\n\n\n<li>Cloud services<\/li>\n\n\n\n<li>Network administration<\/li>\n\n\n\n<li>Corporate Governance<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Steve M. PackardCISSP, CISM, CCSP203-815-3888 |&nbsp; Packard.Stephen@gmail.com&nbsp; |&nbsp; LinkedIn Cyber AI Risk Management Expert Introduction: Cybersecurity and AI risk expert with 20+ years of experience evaluating complex technology risk across enterprise, cloud, and emerging AI systems. My work spans traditional &hellip; <a href=\"https:\/\/cybersecuritysanity.com\/?page_id=18\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-18","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/pages\/18"}],"collection":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":24,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":609,"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions\/609"}],"wp:attachment":[{"href":"https:\/\/cybersecuritysanity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}