CISOs to Watch in the State of New York’s Computer & Network Security Industry

Related

Share

New York’s computer and network security sector includes managed detection and response providers, offensive security firms, cloud-native security platforms, advisory practices, and virtual Chief Information Security Officer services. Leaders in this industry operate in a unique position: they protect their own enterprises while also delivering security expertise and services to customers across sectors. The executives featured here are shaping how cybersecurity companies build trust, scale service delivery, and strengthen operational maturity.

Greg Notch — Chief Security Officer, Expel

Greg Notch currently serves as Chief Security Officer at Expel, where he oversees service delivery for the company’s managed detection and response operations, including security operations centers, customer success, corporate security, product security, governance, risk, compliance, internal information technology, and business systems.

Before stepping into the Chief Security Officer role, Notch served as Chief Information Security Officer at Expel. His progression from Chief Information Security Officer to Chief Security Officer reflects expanded executive responsibility beyond internal security into operational and service leadership—aligning corporate security, product security, and customer-facing security services within a unified strategy.

Christie Terrill — Chief Information Security Officer, Bishop Fox

Christie Terrill is Chief Information Security Officer at Bishop Fox, where she leads the firm’s internal security strategy and program. A long-standing leader within the organization, she previously helped build and expand the company’s enterprise security consulting practice and delivery excellence functions.

As Chief Information Security Officer, she led the successful completion of ISO/IEC 27001 Type 2 and SOC 2 Type 2 certifications, reinforcing the firm’s commitment to structured governance and customer confidence. Her earlier experience includes security consulting roles supporting Global 500 clients at Accenture and Ernst & Young.

Jeffrey Grim — Chief Information Security Officer, LP3

Jeffrey Grim serves as Chief Information Security Officer at LP3, providing virtual Chief Information Security Officer consulting services to managed service providers and small to medium-sized businesses. His work includes security leadership guidance, policy and procedure development, compliance management, risk assessments, vulnerability management, incident response support, and audit preparation.

Grim’s expertise spans regulatory frameworks including CMMC, GDPR, SOC 2, PCI, HIPAA, New York State Department of Financial Services requirements, and multiple National Institute of Standards and Technology special publications, reflecting a strong focus on compliance-aligned advisory services.

Aluca (Anna Maria) Lindstrom — Virtual Chief Information Security Officer, Axl.net Security

Aluca Lindstrom serves as Virtual Chief Information Security Officer at Axl.net Security. She brings experience developing and implementing security policies and procedures in multi-regulatory environments, with a focus on payment card, medical, and financial data protection.

Her accomplishments include managing Payment Card Industry initiatives for Level 1 Service Provider certification, strengthening audit readiness, and re-architecting security solutions to restore client confidence. Lindstrom’s work centers on structured governance, remediation, and sustainable compliance programs.

James Miller — Chief Information Security Officer, Cloudflare

James Miller serves as Chief Information Security Officer at Cloudflare. His career reflects executive leadership in cybersecurity and enterprise security strategy, with additional experience leading cybersecurity initiatives through his work with CyberCode Solutions.

In his Chief Information Security Officer role, Miller oversees information security strategy within a large-scale network and cloud services environment, reinforcing enterprise resilience and global security operations.

Jacob Berry — Chief Information Security Officer, Jit

Jacob Berry is Chief Information Security Officer at Jit. His background includes leadership roles across field Chief Information Security Officer functions, field engineering, advisory services, and incident response within cybersecurity-focused organizations.

With experience spanning security operations, incident response, and security engineering leadership, Berry brings a practitioner’s perspective to executive security leadership within product-driven security companies.

Josh Cedeño — Director of Digital Infrastructure and Chief Information Security Officer, Applied Visions, Inc.

Josh Cedeño serves as Director of Digital Infrastructure and Chief Information Security Officer at Applied Visions, Inc. He leads enterprise risk management, cloud security initiatives, secure software development life cycle alignment, and governance programs grounded in National Institute of Standards and Technology special publications.

His earlier experience includes network engineering, vulnerability management program development, multi-factor authentication implementation, segmentation design, and business continuity improvements—reflecting a career that spans hands-on technical engineering through executive security leadership.

Russell Nomer — Virtual Chief Information Security Officer, Dark Rock Cybersecurity

Russell Nomer serves as Virtual Chief Information Security Officer at Dark Rock Cybersecurity, providing fractional executive security leadership aligned to business objectives. His focus includes third-party risk management, governance, risk and compliance program development, incident response planning, and board-level advisory support.

With decades of experience leading enterprise security and governance programs, Nomer specializes in translating technical risk into business impact while helping regulated and growing organizations build structured, sustainable cybersecurity roadmaps.

Building the Security Industry from the Inside

Computer and network security companies occupy a unique position in the ecosystem: they design, deliver, and operationalize the very controls and services that other industries depend on. Their internal security maturity directly influences client trust, product credibility, and service reliability.

Continue the series with Cybersecurity Leaders to Watch in the State of New York’s Electronic Manufacturing Industry, where security leaders protect intellectual property, industrial systems, supplier ecosystems, and production uptime across highly distributed operational environments.