Talk to a Cybersecurity Expert.
Director, Computer Network Operations (CNO)
Ron Ringgold is a senior cybersecurity professional with over ten years of IA experience performing Certification and Accreditation (C&A) / Assessment and Authorization (A&A) activities specifically in the areas of technical testing, residual risk determination, and enterprise risk management. He provides client support in solving complex IA problems and recommending mitigations/solutions by analyzing C&A and ST&E metrics and test results and leveraging knowledge of government/industry policies such as the Federal Risk and Authorization Management Program (FedRAMP), Risk Management Framework (RMF) for DoD IT, Federal Information Modernization Act (FISMA), and National Institute of Standards and Technology (NIST) Special Publications, IA best practices, and current trends in security technology.
He has conducted over 100 security assessments, developed and assessed policy compliance for multiple programs in various roles including having served as a Delegated Authorizing Official at the NSA, Lead Security Assessment and Authorization Specialist at the HHS and ISSM at the Federal Railroad Administration Department of Transportation. Mr. Ringgold has worked in the government realm evaluating applications hosted in Cloud Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) technologies leveraged for Federal Systems. He has also provided security engineering and analysis for several Government agencies to include the Social Security Administration, NSA, DOT and HHS. He has also served as an auditor in the privacy realm, conducting audits on behalf of the Department of Health and Human Services (HHS) and Department of Transportation Federal Railroad Administration.
He is versed in TCP/IP, networking, wireless technology, firewalls, intrusion detection systems, risk, threat, and vulnerability assessments, risk mitigation; enterprise risk management; software development life cycle; security development lifecycle; change management; denial of service techniques; databases management, hack and attack methods; remote access, backup procedures, emergency response procedures, e-mail security, security laws, directives, and regulations, Common Criteria, and security modes of operation.