Methodology of Success
Assess
Understand
Prepare
Advise
Execute
Monitor
Repeat
What sets Erich apart from many other Chief Information Security Officers (CISOs):
I don't come from the theoretical side of cybersecurity — I come from the trenches. My career began with hands-on experience in computing infrastructure and security operations, giving me a practical, working knowledge of how systems actually run and where they fail. That perspective shapes how I lead today: with empathy for the front lines, strategic alignment with the business, and an uncompromising focus on execution.
I lead by doing. I don’t just delegate tasks — I set the tone, roll up my sleeves when necessary, and drive clarity through complexity. I’ve guided organizations through major transformation initiatives, compliance audits, and strategic realignments, always with one goal in mind: to protect the business while enabling it to grow.
Security, to me, isn’t just about locking things down — it’s about creating the confidence and stability needed for the business to move faster and smarter. I align cybersecurity with business outcomes, turning it from a perceived cost center into a competitive advantage.
My technical background is broad — I’ve worked across legacy environments, modern cloud-native platforms, and everything in between. That diversity allows me to quickly assess risk, architect resilient systems, and adapt to whatever technology stack the business depends on. I’m not locked into a single school of thought or toolset — I adapt, evolve, and deliver.
Most importantly, I have a relentless commitment to quality. Whether we’re implementing a new framework, responding to an incident, or building a security program from the ground up — I expect excellence. Not for the sake of perfectionism, but because in this field, cutting corners costs trust. And trust is non-negotiable.
Led the Zeek and Suricata system configuration standards and product lifecycle, resulting in a 20% reduction in false positive alerts for the incident response team, freeing analysts to focus on genuine threats.
Actively contributing to the Security Architecture college program as a mentor for aspiring professionals, resulting in an 80% promotion rate.
Operationalized Armis Security by enriching data integration with CMDB systems, enabling real-time asset visibility and vulnerability identification, which led to a 15% improvement in vulnerability remediation time.
Implemented a new incident response process that reduced the average incident resolution time by 25% and improved SLA adherence.
Implemented a vulnerability management program that reduced risk and attack surface by 43%.
Executed an automated security awareness training program. Reduced phishing response tendencies by 39%.
Led multiple high-priority project initiatives to early completion, consistently surpassing deadlines and boosting team efficiency.
Led and achieved the company's first HITRUST Validated Certification Assessment and SOC readiness.
Implemented and managed network security infrastructure for 15 healthcare clients, including patch management, firewall configuration, intrusion detection/prevention systems, and endpoint security. This resulted in a 99.9% network uptime and protection against evolving cyber threats.
"Cybersecurity success defies a universal blueprint; decades of victories flow from an innate talent sharpened by persistent curiosity, not minimal effort." - Erich Horst