BizzSecure

Team

Vivek Sharma

Vivek Sharma

Chief Executive Officer

Bridge the Gap Between InfoSec and IT No Maturity Means No Security No Governance Means No Effectiveness I have extensive experience in information security and regulatory compliance. I have helped...
View Full Profile
Jamie M Contreras

Jamie M Contreras

Chief Privacy Officer

An IT GRC professional with over two decades of experience, specializing in building, assessing, and optimizing security and risk programs. The professional has a proven track record of quantifiable success,...
View Full Profile
Mark J. Johnson

Mark J. Johnson

Chief Information Security Officer

Mark J. Johnson – Cybersecurity & IT Executive Mark J. Johnson is an accomplished cybersecurity and IT executive with more than 25 years of leadership experience across U.S. federal, international,...
View Full Profile
Joseph Duah

Joseph Duah

Senior IT Audit Manager

A Senior IT Audit Manager is responsible for overseeing and leading IT audit engagements, assessing risks, developing audit scopes and plans, performing and reviewing audit procedures, and preparing detailed reports...
View Full Profile
Jason Trexler

Jason Trexler

Sr. Sales Consultant

Experienced Chief Sales Officer with 9 years in remote monitored security and over 17 years total in B2B sales with experience in Disaster Recovery, Marketing Compliance, Internet and Remote Security.
View Full Profile
Ariana Karzai

Ariana Karzai

GRC, Privacy and AI Fractional CCO

Cybersecurity, Privacy & A.I governance leader with 15 years industry experience in financial regulatory compliance, Privacy laws and regulations and all other small business related U.S. and global regulatory standards...
View Full Profile

Want to get in the team?

Submit Your Profile

Please complete this form to join our team.

Jamie M Contreras

Cybersecurity and GRC Expert

An IT GRC professional with over two decades of experience, specializing in building, assessing, and optimizing security and risk programs. The professional has a proven track record of quantifiable success, including:

  • Reduced audit findings: Liaising with external auditors to systematically decrease high-risk findings year-over-year, leading to stronger compliance postures.
  • Improved efficiency: Streamlining IT processes using frameworks like HITRUST and COBIT, reducing manual effort and saving over [X number] of hours annually.
  • Enhanced compliance and governance: Developing and implementing comprehensive security and risk programs that protected sensitive data and supported business goals.
  • Strengthened executive communication: Bridging the gap between technical teams and executive leadership by translating complex issues into actionable, strategic initiatives. An MBA and certifications, including CISM, CCSFP, and CISA, provide a strong foundation for delivering robust and compliant technology operations.”
Jamie M Contreras

Cybersecurity and GRC Expert

An IT GRC professional with over two decades of experience, specializing in building, assessing, and optimizing security and risk programs. The professional has a proven track record of quantifiable success, including:

  • Reduced audit findings: Liaising with external auditors to systematically decrease high-risk findings year-over-year, leading to stronger compliance postures.
  • Improved efficiency: Streamlining IT processes using frameworks like HITRUST and COBIT, reducing manual effort and saving over [X number] of hours annually.
  • Enhanced compliance and governance: Developing and implementing comprehensive security and risk programs that protected sensitive data and supported business goals.
  • Strengthened executive communication: Bridging the gap between technical teams and executive leadership by translating complex issues into actionable, strategic initiatives. An MBA and certifications, including CISM, CCSFP, and CISA, provide a strong foundation for delivering robust and compliant technology operations.”
Jamie M Contreras

Cybersecurity and GRC Expert

An IT GRC professional with over two decades of experience, specializing in building, assessing, and optimizing security and risk programs. The professional has a proven track record of quantifiable success, including:

  • Reduced audit findings: Liaising with external auditors to systematically decrease high-risk findings year-over-year, leading to stronger compliance postures.
  • Improved efficiency: Streamlining IT processes using frameworks like HITRUST and COBIT, reducing manual effort and saving over [X number] of hours annually.
  • Enhanced compliance and governance: Developing and implementing comprehensive security and risk programs that protected sensitive data and supported business goals.
  • Strengthened executive communication: Bridging the gap between technical teams and executive leadership by translating complex issues into actionable, strategic initiatives. An MBA and certifications, including CISM, CCSFP, and CISA, provide a strong foundation for delivering robust and compliant technology operations.”
Jamie M Contreras

Cybersecurity and GRC Expert

An IT GRC professional with over two decades of experience, specializing in building, assessing, and optimizing security and risk programs. The professional has a proven track record of quantifiable success, including:

  • Reduced audit findings: Liaising with external auditors to systematically decrease high-risk findings year-over-year, leading to stronger compliance postures.
  • Improved efficiency: Streamlining IT processes using frameworks like HITRUST and COBIT, reducing manual effort and saving over [X number] of hours annually.
  • Enhanced compliance and governance: Developing and implementing comprehensive security and risk programs that protected sensitive data and supported business goals.
  • Strengthened executive communication: Bridging the gap between technical teams and executive leadership by translating complex issues into actionable, strategic initiatives. An MBA and certifications, including CISM, CCSFP, and CISA, provide a strong foundation for delivering robust and compliant technology operations.”