Promote this Nomination
|Job title of nominated professional (or team name)||Director, Information Security, CISO|
|Company (where nominated professional or team is working)||Red Robin|
|Company size (employees)||27000|
In 3 bullets, summarize why this professional or team deserves recognition:
Bill has created an information security organization from nothing and established it as one of the shining examples in the restaurant industry.
Bill has built a high-functioning team and a framework for security services that have greatly improved Red Robin's security posture.
Bill has engaged the broad organization and partners with leaders to accomplish their business objectives while protecting Red Robin's most important data assets.
Bill is a leader in the restaurant and hospitality industry in information security and his vision and leadership at Red Robin has greatly improved information security maturity.
Bill’s accomplishments in this area span people, process, and technology. He built the Red Robin information security team up from a single part-time role to multiple roles focused on access control and security administration, security operations, and security architecture. Furthermore, he has engaged a traditionally passive group of stakeholders in Red Robin’s organization and energized their commitment to protecting information assets by launching the SAFE program – a cross-functional group of leaders that meet to review Red Robin’s information security strategy and prioritize investments to reduce Red Robin’s information risk.
Bill was an advocate and champion in 2015 for the move to complete point-to-point encrypted credit card transactions across all corporate Red Robin restaurants, a project that delivered ahead of schedule. Furthermore, Bill has participated in the development of the information security architecture for programs that produced Red Robin’s new HR and Marketing systems.
Most importantly, Bill’s work with Red Robin has helped to accelerate progress towards business objectives, not hinder. Oftentimes risk, compliance, and governance can obstruct and slow an organization. To the contrary with Bill’s methods. He partners with leaders from across the organization to determine best approaches to maturing information security that motivates individuals to seek him out when accomplishing big activities.