Sign In or Use Email

Dennis Bubla

Majored in Information Management Project Management
Grantham University, Class of 2015
From Friendship, WI
Retired United States Air Force Technical Sergeant and current student at the Air University; the U.S. Air Force's center for professional military education (PME). Since 2004, I have been employed as a government civil servant manager with the Headquarters United States Air Force. I am currently a Security Control Assessor for cyber-security at HQ Air Force A1, Manpower and Personnel, Digital Transformation, Pentagon. I have the pleasure of serving and acting as the technical authority for matters pertaining to the formulations of concepts, policy, procedures, standards and criteria appropriated to the implementation and management of global Department of Defense and United States Air Force Cyber Security programs. Serving in government has been my goal since 1981, when I graduated from Adams Friendship High School, Adams, Wisconsin and became an Air Force Security Forces member. I hold an Associate of Science in Criminal Justice and Aerospace Management through Palo Alto College, San Antonio, Texas, a double Bachelors of Science degree in Management Information Systems and Computer Information Systems (2001 Magna Cum Laude) from Park University, Parkville, Missouri, a Masters of Science degree in Information Technology Management (2012 Distinguished), and a Masters of Science degree in Information Management - Project Management (2015- Distinguished) from Grantham University, Kansas City Missouri. I am a student at the United States Air Force Air University, Maxwell Air Force Base Alabama. I've been fortunate to hold international certifications for Air Force Cyber Level 2 Warfare, Computing Technology Industry Association's (CompTIA) Security+, Information Systems Audit and Control Association's Certified in Risk and Information Systems Control (CRISC), E-Commerce Council's Certified Chief Information Security Officer (C|CISO), Certified Payment Card Industry Professional (PCIP), and Certified Payment Card Industry Internal Security Assessor (ISA). The latter two certifications are a proprietary information security standard for corporations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JC Morgan Chase Bank. In my spare time, I am a product advisory member with Global Knowledge, a technology and business skills training company, headquartered in Cary, NC; an editor with the Information Systems Audit and Control Association (ISACA), an international professional association focused on technology governance, a member of the Bexar County Czech and Slovak Genealogical Society, the Wisconsin Czechs and a genealogical researcher for the Streeter Association, in Wamego, Kansas. I enjoy photography and gardening. I co-edited and authored two articles in an international cyber security journal. This was one of many collaborative work assignments but at a global level. I am the son of the late Charles C. Bubla (formerly of Big Flats), Wisconsin and Evelyn L. (Streeter) Bubla Lumby, Mauston, Wisconsin. I like to serve my community using core values of Integrity First, Service Before Self and Sustained Excellence. Professional Military Education is important to me as I understand the mission of the United States Air Force. I have three children, Sergeant US Army Josue Isaac Bubla, Jacob Isai Bubla and Francisco Emanuel Bubla.
Follow Dennis

Dennis Bubla Graduates from Grantham University

Dennis Bubla of Madison, WI graduated from Grantham University on July 24, 2012. Bubla earned a Master of Science in Information Management Technology With Distinction. Grantham University was fou...

September, 12 2012 - Grantham University
Dennis Bubla was recognized for earning an academic award
Dennis Bubla was recognized for earning an academic award Graduated with Distinction (4.0 GPA)
Summer 2015 - Added by Dennis
Dennis Bubla was recognized for graduating
Dennis Bubla of San Antonio, TX graduated from Grantham University on August 25, 2015. Bubla earned a Master of Science in Information Management Project Management Mark Scousen School of Business with Distinction (4.0 GPA).
Spring 2015 - Added by Dennis
Dennis Bubla was recognized for earning an academic award
Dennis Bubla was recognized for earning an academic award Graduated with Distinction (3.90 GPA)
Summer 2012 - Added by Dennis
Dennis Bubla was recognized for graduating
Dennis Bubla of San Antonio, TX graduated from Grantham University in 2012 earning a Master of Science in Information Management Technology in the College of Computer Science and Engineering with Distinction (4.0 GPA).
Spring 2012 - Added by Dennis
Dennis Bubla was recognized for earning an academic award
Honor Society admittance exclusively for Non-Traditional Students Pinnacle Honor Society (4-year degree program) for outstanding academic achievement, at Park University.
Spring 2001 - Added by Dennis
Dennis Bubla was recognized for graduating
Magna Cum Laude. Dennis Bubla of Madison, WI graduated from Park University in 2001 earning a double Bachelor of Science in Management Information Systems and Computer Information Systems (3.8 GPA).
Spring 2001 - Added by Dennis
Dennis Bubla was recognized for earning an academic award
Magna Cum Laude
Spring 2001 - Added by Dennis
Dennis Bubla was recognized for earning an academic award
Dean's List
Spring 1998 - Added by Dennis
Dennis Bubla was recognized for graduating
Dennis Bubla of San Antonio graduated from the Community College of the Air Force, earning an Associate Degree in Criminal Justice (3.8 GPA).
Spring 1998 - Added by Dennis
Dennis Bubla was recognized for graduating
Dennis Bubla of Adams-Friendship, WI graduated from Adams-Friendship Area Schools.
Spring 1981 - Added by Dennis
Security Control Assessor (HQ Air Force A1 Manpower and Personnel), (INFOSEC/PLCYPLN), 2210; Digital Transformation; Pentagon at Department of The Air Force

- Recommends on risk acceptance to the HQ Air Force A1 Authorization Official and provides guidance and recommendations for Air Force Manpower and Personnel assets

- As the Security Control Assessor, responsible for the validation of assets in the Air Force A1 Boundary to protect and maintain availability, integrity and confidentiality and accountability while providing sound cybersecurity criteria

- Advises Managers on the Department of Defense Risk Management Framework process

- Responsible for security validations in granting system and application Authority to Operate

- Manages contracted security validators to review security controls for Air Force assets applications and systems to produce assessment and analysis reports as requested by the Authorization Official

- Directs cybersecurity advice to the Authorization Official and respond to analytical questions from administrators and managers

- Responsible for risk acceptance recommendations coordinated through the Authorization Official for Approval to Operate

- Models through management sound cybersecurity, Risk Management Framework, assess / authorization process, systems security classification and categorization and cybersecurity application measures to protect confidentiality, integrity, and availability of systems

- Articulates Information System security concepts, standards, methods, and applications used to protect information

- Promotes knowledge of Information Technology systems, cloud computing and cybersecurity measures along with federal governance, executive orders, regulations, policies, directives, instructions governing cybersecurity functions

February 2023 - Present
Senior Lead Information Technology Compliance Manager, (INFOSEC/PLCYPLN), 2210; Joint Base San Antonio, TX at Department of The Air Force
April 2021 - February 2023
Senior Team Lead, Information Technology Compliance (INFOSEC/PLCYPLN), 2210; Joint Base San Antonio, TX at Department of The Air Force
April 2020 - April 2021
Product Advisory Panel Member (Volunteer) at Global Knowledge Inc.
December 2017 - Present
Professional Services Consultant (Volunteer) at ISACA (Information Systems Audit and Control Association)- GSU Chapter
March 2015 - Present
Information Technology Action Officer (INFOSEC/PLCYPLN), 2210; Joint Base San Antonio, TX at Department of The Air Force
September 2010 - April 2020
Security Analyst Team Lead (Information Technology), (INFOSEC/PLCYPLN), 2210; Joint Base San Antonio, TX at Department of The Air Force
February 2008 - September 2010
Secretary, San Antonio, TX at Crown Meadows Homeowners Association
January 2005 - April 2007
Security Analyst (Information Technology), (INFOSEC/PLCYPLN), 2210; Joint Base San Antonio, TX at Department of The Air Force
October 2004 - February 2008
Security Analyst (Information Technology), 2210; 59 Medical Wing, San Antonio, TX at Lockheed Martin Integrated Technology L.L.C.
October 2001 - October 2004
System Administrator (Information Technology), 0335; Joint Base San Antonio, TX at Department of The Air Force
January 1999 - August 2001
Administrative Office Manager (Security), 0086; Joint Base San Antonio, TX at Department of The Air Force
January 1994 - January 1999
Training Manager (Security), 1712; US Military Posts in Central America at Department of The Air Force
January 1990 - January 1994
Training Manager (Security), 1712; Joint Base San Antonio, TX at Department of The Air Force
August 1985 - January 1990
Law Enforcement Specialist (Security); US Military Posts in the Pacific at Department of The Air Force
July 1981 - August 1985
Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles
Contributing editor for ... Privacy breaches can lead to a series of troubling outcomes for enterprises, as well as causing significant harm to the people and relationships affected. Enterprises may suffer financial loss and reputational damage, be charged with failure to comply with regulations and legislation, and alienate key stakeholders who demand safety of personal information. The best way to avoid or mitigate the fallout from these breaches is to establish and maintain a formal privacy protection program within the enterprise. ISACA’s Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles outlines core principles that individuals and organizations can use to optimize a privacy program based on the COBIT 5 framework for governance of enterprise IT. Comprehensive application of the COBIT 5 enablers helps to build a privacy program that conforms with ISACA’s privacy principles, which align with the most commonly used privacy standards, frameworks and good practices, as well as fill in the gaps that exist among these standards. This book continues the work begun in ISACA’s publication ISACA Privacy Principles and Program Management Guide. That volume laid the groundwork for understanding the critical need for and the purpose, roles and responsibilities of an effective enterprise privacy program. This publication, which functions as a “volume 2” to ISACA Privacy Principles and Program Management Guide, takes the implementation phase of establishing a privacy program one step further by focusing on the role of the COBIT 5 enablers in the implementation process. Enablers support a holistic approach to identifying, implementing and monitoring all the components in processes and systems. In addition, ISACA has created two companion infographics. To provide a better understanding of the interaction between COBIT 5 principles and standard privacy activities in an organization, the free infographic. Connecting Privacy Activities with COBIT 5 Principles, offers a convenient way to understand COBIT’s role in developing a privacy program. Another free infographic, Privacy Behaviors at the Individual and Enterprise Levels, shows how privacy programs impact the cultures of an organization. Download your free copies today!
September 2020 - Publications
ISACA Privacy Principles and Program Management Guide
Contributing editor for.... As connected devices proliferate and the volume of data about individual users continues to increase, individuals are understandably increasingly concerned about their personal and online privacy. In response, numerous governments throughout the world have drafted legislation governing how individual privacy is treated. Navigating this landscape can be a challenging exercise – particularly given an increasingly interdependent global economy. The ISACA Privacy Principles and Program Management Guide outlines core principles that individuals and organizations can use to ensure data privacy protection. Specifically, you’ll discover the latest privacy best practices, governing regulation, and explore topics such as: •An overview of the legal models, privacy protection concepts, and the regulatory frameworks in place impacting privacy throughout the world •Privacy issues arising from new technologies including IoT, wearables, big data, mobile, and other emerging areas •The ISACA privacy principles – a set of principles designed with consideration to privacy models throughout the world and designed to provide a practical resource for organizations wishing to develop a robust privacy model •Information on privacy principle integration with - and harmonization to – the COBIT 5 framework •Practical guidance on establishing and maintaining a privacy protection program
January 2018 - Publications
Resume

Graduation

© Copyright 2024 • Merit Pages, Inc.Terms of ServicePrivacy Policy