top of page
W.Leach Headshot.png

WILLIAM LEACH

CISO, CIO, Cybersecurity Executive

As a Cybersecurity and IT Executive with a distinguished military background, I've spent over 20 years leading strategic IT and cybersecurity initiatives across diverse sectors like the military, banking, healthcare, and cybersecurity. I'm recognized for my ability to drive transformative strategies, enhance security postures, and ensure compliance in high-stakes environments. My expertise lies in managing complex IT operations with budgets up to $110M and leading high-performing teams exceeding 400 members. I've achieved significant cost savings through proactive risk management, adept vendor management, and smart technology consolidation. I pride myself on blending a visionary approach with practical execution to mitigate risks and optimize operations. I'm eager to lead the charge into the next wave of digital transformation and security resilience in our ever-evolving corporate landscape.

​

Currently located in Prairieville, LA.

Open to remote, on-site & hybrid.

EXPERIENCE

EXPERIENCE

Jul 2022 - Nov 2023 

CIO, SVP

75d14dd6c2891f4b7eb4a0655648be60.png

Promoted to CIO after 4 months. Oversaw a team of 27, managing an $8.2M budget to optimize IT operations and enhance project delivery. Engaged with executive leadership and vendors, establishing a PMO for agile practice integration, advancing IT infrastructure, and DevOps initiatives, including RPA and iPaaS integration.

Mar 2022 - Jul 2022 

CISO, SVP 

Led cybersecurity efforts with a $1.8M budget, addressing 150+ security needs to achieve 98% compliance and a 34% reduction in cybersecurity incidents. Managed a team of 2 to enhance the bank's security frameworks and strategy.

Oct 2017 - Mar 2022

VP of Cybersecurity

Screenshot 2024-03-05 at 10.49.04 AM.png

Managed a 7-person team with a $1.2M budget. Led the growth of the MSSP practice to millions in revenue, establishing key partnerships and enhancing cybersecurity offerings across a broad spectrum including EDR, vulnerability management, and compliance standards automation.

Apr 2015 - Oct 2017 

CISO, Executive Director

logo.jpg

Directed the creation of a new cybersecurity unit, managing HITRUST controls and a ~$1M budget. Led a 5 member team, establishing robust InfoSec and GRC platforms, significantly improving compliance and security measures.

Sep 2013 - Apr 2015

Executive Director, PMO

Orchestrated the foundation and leadership of an IT PMO, managing a $1.6M budget and a 21-member team. Led the adoption of Agile/Scrum methodologies, significantly enhancing project delivery and operational efficiency across 4 development squads.

Dec 2011 - Sep 2013

Director, Strategic IT Sourcing and Procurement

1020x172.webp

Led strategic IT sourcing and procurement with a $110M+ budget. Managed a team of 4 streamlined procurement processes, including conducting 8 RFPs for competitive bids and vendor negotiations for > $12M in contracts.

Oct 2006 - Sep 2011

VP of Operations

TFMX-Logo-2018-1920w.png

Directed operations, managing a 17-person team. Oversaw a comprehensive network infrastructure, facilitating USAC E-rate contracts and securing major automotive contracts, enhancing the company's market position.

Results

RESULTS

background-1.jpg

Successfully established 2 SOC teams comprising analysts, engineers, architects, and program managers, significantly expanding services for hundreds of customers and propelling MSSP transition to enhance acquisition potential. Additionally, offered vCISO services, substantially increasing billable contributions.

background-4.jpg

Executed 1,000+ risk assessments and system evaluations, leading 4 organizations to seamless HITRUST transitions with 900+ security controls. Conducted 50+ penetration tests/vulnerability assessments, creating and refining multiple COOP plans for federal entities and crafting 20+ business continuity and disaster recovery plans.

background-3.jpg

Orchestrated a digital overhaul integrating 80+ IT projects, improving operational efficiency by 34%, and leading initiatives in RPA/iPaaS, saving 15,000 hrs. of manual labor, eliminating 14 positions, and enhancing banking process efficiency by over 20%.

Expertise

EXPERTISE

background-2.jpg
  • Strategic Planning and Vision

  • Cybersecurity Management

  • Technology Trends and Innovation

  • IT Governance and Policy Development

  • Risk Management and Compliance

  • Leadership and Team Building

  • Vendor Management and Negotiation

  • Budgeting and Financial Management

  • Project Management and Delivery

  • Digital Transformation

  • Data Privacy and Protection

  • Cloud Computing and Infrastructure

  • Business Continuity and Disaster Recovery Planning

  • Change Management

  • Stakeholder Communication and Management

EDUCATION

EDUCATION

regis_header_photo.webp

(MS) Cybersecurity & Information Assurance

ru-logo-official_rev.png
SLU Student Union_01unionsluext-scaled.jpg

(MS) Data Science & Applied Technology

athletics-horizontal-logo.png
20230912-samford.jpg

(BS) Business Administration – Management Information Systems (MIS)

1280px-Auburn_University_primary_logo.svg.png

CERTIFICATIONS

CERTIFIATIONS
ISC2_CISSP_RGB__mark.jpeg
download.jpeg
download.png
curso-gratis-PMI-PMP-facialix.jpg
Screenshot 2024-03-05 at 5.05.46 PM.png

MEET WILLIAM

Meet Cynthia
Q & A

Q & A

Why did you choose your profession?

Choosing my profession was a journey rooted in my passion for technology, a deep-seated sense of duty, and a love for solving complex problems. Serving 20 years in electronic warfare and cybersecurity within the military honed my skills in an environment where the stakes couldn't be higher, instilling a profound commitment to protecting and securing information. This path wasn't just about embracing the ever-evolving world of technology but about being a guardian in the digital age, safeguarding the integrity and confidentiality of critical systems and data against emerging threats. My career reflects a professional choice and a personal mission to make a significant, positive impact on the world through cybersecurity, driven by an unwavering enthusiasm for technology and an innate desire to solve the unsolvable.

Who are your main influences?

My main influences are deeply rooted in the cornerstone of my faith, Jesus of Nazareth, whose teachings guide my daily actions and decisions. God, family, country, and profession form the foundation of my life, and I am committed to staying true to all. This blend of spiritual faith, dedication to loved ones, patriotic service, and professional integrity shapes who I am and how I approach every challenge and opportunity. Each influence reinforces my resolve to lead with compassion, integrity, and excellence, positively impacting everything I do.

What is your greatest accomplishment?

My greatest accomplishment involves reflecting on a journey marked by dedication, service, and continuous personal growth. Being a key stakeholder in the US Navy Reserve NMCI cutover and serving as a commanding officer before retiring from military service after 20 years are pivotal moments, showcasing my commitment to excellence and leadership in critical operations. Completing my master's degree in computer science, becoming the first in my family to do so, and achieving my CISSP in the same year underscore my relentless pursuit of knowledge and expertise. Launching and running a small service-disabled veteran-owned business, obtaining HITRUST certification in less than a year, and establishing a highly profitable line of work in cybersecurity for a managed service provider (MSP) are milestones that reflect not just my entrepreneurial spirit and technical acumen but also a steadfast dedication to advancing the cybersecurity field. Throughout it all, faithfully representing all my clientele without major incidents embodies my core values of integrity, trust, and excellence. While significant, each accomplishment collectively represents my greatest achievement: a balanced and impactful career that honors my service, furthers my profession, and stays true to my foundational beliefs in God, family, country, and service.

What tools do you use?

Describing the tools I use in my profession is like explaining the recipe for a perfect Louisiana Gumbo –a unique blend that makes it exceptional. For starters, I toss in a generous helping of Kali Linux, spicing things up with the latest in cybersecurity controls to keep the threats at bay. Then, I stir in a healthy dose of business intelligence and robotic process automation (RPA) for efficiency, sprinkling in some programming to keep the code as rich and robust as a good roux. Of course, no gumbo is complete without the secret ingredients: problem-solving and critical thinking, mixed vigorously with leadership and project management, to ensure everything simmers to perfection.

​

​This eclectic mix, much like the beloved gumbo of my home state, sets me apart in the field. It's a combination that not only packs a punch in terms of technical prowess but is also seasoned with the soft skills that make all the difference. The result? A cybersecurity professional who's as versatile and effective as gumbo is delicious and comforting. And just like gumbo, the longer I cook in this industry, the better I get.

What advice would you give someone starting your profession?

Based on my journey and the eclectic mix of experiences I've gathered along the way, my advice to someone just starting out in this profession is threefold:

​

  1. Embrace Continuous Learning: The field of cybersecurity is as dynamic as the flavors of a good gumbo – always evolving and offering new tastes. Dive into and develop skills in Kali Linux (thinking like a hacker) to the latest cybersecurity controls. Don't stop at technical skills; soak everything from business intelligence to programming, and stay updated with the latest trends and technologies.

  2. Develop a Problem-Solver's Mindset: Cybersecurity is not just about knowing the tools but understanding the puzzles they solve. Cultivate your problem-solving and critical-thinking skills. Approach each challenge like a unique recipe that requires a specific blend of ingredients to perfect. Remember, the best solutions often come from thinking outside the box, or in this case, outside the pot.

  3. Nurture Soft Skills: Technical prowess will get your foot in the door, but your leadership, communication, and project management skills will build the house. Like a well-orchestrated kitchen, success in cybersecurity requires teamwork, clear communication, and effective leadership. Never underestimate the power of these skills in advancing your career.

​

​Finally, remember the importance of serving with integrity and excellence, like faithfully representing all clientele without major incidents. Whether you're a seasoned chef in the cybersecurity kitchen or just starting to mix your first roux, the secret to success lies in a blend of continuous learning, problem-solving, and the cultivation of both hard and soft skills. And always keep the core values of God, family, country, and service close to your heart.

Interests & Hobbies

INTERESTS & HOBBIES

Exercise Equipment.jpg

WORKING OUT

Golf Course.jpg

GOLF

Travel Picture - JJT3.jpg

TRAVEL

TESTIMONIALS

Testimonials

"I fully recommend Bill as an accomplished Chief Information Security Officer (CISO), lean-minded executive and team leader. Bill and I worked together as part of the PMO group, which he directed, for eQHealth Solutions (now Kepro).

​

Bill was a critical leader to have in my effort to launch a complete new product offering in data analytics and business intelligence for the organization which generally viewed IT as a cost center. He saw the business and strategic need for cyber security as a company competency. He developed the organization's first strategic direction in cyber security and how to take us from crawling to sprinting. He put in the hard work needed to lead up the chain to gain buy-in for implementing the first cyber team, put in the initial vulnerability assessment toolsets and ensure that we were meeting the stringent healthcare and HITRUST compliance levels. More than just strategy, Bill understood what lines of effort were needed to meet our objectives and saw to it they were completed.

​

I am thankful that I got to work with Bill as I have benefited throughout my career from his example and leadership those many years ago."

Chris Holland, Technical Product Manager, SDP, APM, SPC 5, SGP, RTE, PMPO, SA, PMP

"I am delighted to provide my wholehearted recommendation for William Leach, an accomplished Chief Information Security Officer (CISO). During the time that I worked for him, he maintained an exemplary track record in overseeing Information Assurance/Cybersecurity for over 600 reserve centers. William seamlessly enforced stringent DoD-aligned assurance policies and conducted several hundred risk assessments to ensure compliance with the highest standards.

​

In his capacity as an Information Assurance Manager (IAM), William undertook responsibilities akin to those of a civilian CISO. His dedication to cybersecurity was evident in his approach to threat detection and asset protection, a commitment that significantly contributed to the overall security posture of the organization.

​

A standout accomplishment includes William’s successful transition of a decade's Electronic Warfare expertise into adept cybersecurity management. This transition not only showcased William’s versatility but also underlined his commitment to staying at the forefront of evolving security landscapes.

​

​As a leader, William implemented comprehensive training programs, enhancing the cybersecurity skills of military personnel. His strategic vision and hands-on approach were instrumental in minimizing disruptions during incidents, showcasing his ability to effectively handle crises with poise and expertise.

Devecchio Turner, PhD, Executive Director | Sr. Principal Architect @ JPMorgan Chase | Cybersecurity & Digital Resiliency

"Bill is a consummate professional having served in the military, he treats everyone with equal objectivity and with respect. Bill is a leader inside and out. He demonstrates professional courtesy, and professional language and is an excellent orator and educator. Even in an everchanging field and business model, Bill has proven his adaptability with management, provided the guidance to lead the company and his people to compete in the market, and elevated his team to a high accountability and service level.


Bill provided me with mentorship in the IT Security field as I was still adapting to the company's business model. Bill’s office was always open for discussion on how to best present a service offering, provide context around developing scope, and orchestrate statements of work as we were preparing for bids, proposals, and large contracting efforts. But to be honest, Bill always treated our client base as equal and objective to what was best for the client no matter the level of revenue they provided. Our job was to uniquely and sometimes organically work together and right size to the client’s budget and the level of maturity they could adopt.


If you are familiar with the term “leadership is an art”, that would be one way to describe the level of communication Bill provides. In the company, we had many unique personalities and highly skilled technical people. Having the ability to learn by listening was one of Bill’s skill sets as he often shared what he learned from other engineers, white papers, his personal process improvement, and continuing education as he always had continued to develop while I was working with, him and his team."

Eric F. Senior Account Manager, TrustedSec

"Bill Leach is an outstanding individual and a veteran Chief Information Security Officer (CISO) with 30 years of experience in finance, healthcare, tech, energy, retail, and government. He is skilled in IT governance, risk management, cybersecurity compliance, cost-effective procurement, and budget management. He founded a profitable cybersecurity business unit for MSSP, adept in strategic planning, policy development, and making complex IT understandable for executives. He is an experienced leader in audit and compliance, focusing on cybersecurity to improve Digital Transformation, data significance, and profitability. Additionally, he has experience in various sales roles such as Inside Sales, Business Development, Channel Sales, Account Executive, and Sales Engineer. I very highly recommend him to any job he applies for. His vast experience and great character enable him to take charge and accomplish any task he is assigned. Bill is a great problem solver as he has a knack for coming up with solutions when the answer isn’t obvious. He knows how to tackle bigger problems and how to split up each section into more manageable parts. He is great at time management and knows how to plan to make sure everything he has on his plate can get done efficiently and in a short time."

Ghassan Alkadi, PhD, Professor of Computer Science, SLU

CONTACT
bottom of page