Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Alex Sharpe

Principal at Sharpe Management Consulting LLC

Clinton, United States

Big 4 Trained Management Consulting with Real World Practical Experience

Executive, Management Consultant, Advisor
Digital Transformation, Cybersecurity, Privacy, Strategy, Operations, M&A
Speaker, Author

Work History.
Sharpe Management Consulting LLC
eForce, VP East Coast and Global Operations
The Hackett Group, Co-Founder
KPMG, Practice Leader
Booz Allen & Hamilton, Practice Leader
National Security Agency (NSA)

Formal Education.
Columbia Business School, two awards of merit
Digital Transformation, Finance, Strategy, Globalization
Value Investing
Johns Hopkins University, Masters
Systems Engineering, Operations Management, Program/ Project Management
New Jersey Institute of Technology (NJIT), BSEE
Computer Science, Math

Executive Education.
George Washington University, Engineering Economics
Carnegie Mellon University (CMU), Information Networking Institute (INI)
MIT
First Finance Institute (FFI)

Certifications.
Mergers & Acquisitions (M&A)
Blockchain Technologies: Business Innovation and Application
Business Analytics
Globalization
Cryptologic Engineer
Cybersecurity (INFOSEC) Professionalization
CMMC Assessor (pending)

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Morristown, NJ
Speaking Topics: Cybersecurity, Digital Transformation, Rise of the Remote Worker, Critical Infrastructure

Speaking Fee $1,000

Alex SharpePoints
Academic0
Author273
Influencer23
Speaker32
Entrepreneur115
Total443

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Service Provider
Email: alex@SharpeLLC.com
Theatre: Global
Media Experience: 20 years
Last Media Training: 07/16/2020
Last Media Interview: 07/03/2020

Areas of Expertise

AI 31.34
Analytics 31.71
AR/VR
Big Data
Blockchain 34.84
Business Continuity 36.95
Business Strategy 36.34
Change Management
Cloud 37.51
Cryptocurrency
Customer Experience
Cybersecurity 70.76
Design Thinking
Digital Disruption 33.47
Digital Transformation 45.64
Emerging Technology
ERP 31.16
Fintech
Future of Work 31.06
Innovation
Leadership 30.22
Management 30.77
Mobility
Open Innovation
Predictive Analytics
Risk Management 49.87
Startups
Health and Safety 31.68
Privacy 32.96
Supply Chain 32.56
Marketing 30.31

Industry Experience

Aerospace & Defense
Automotive
Consumer Products
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Insurance
Manufacturing
Media
Other
Pharmaceuticals
Professional Services
Retail
Telecommunications
Utilities
Wholesale Distribution

Please signin or signup to view publication section.

Publications

5 Advisory Board Memberships
BWG Strategy LLC
BWG Strategy
August 15, 2020
BWG is an invite-only network for senior executives across technology, media and telecom. BWG industry professionals participate in a series of roundtables discussions, which are a valuable resource for market intelligence, business development and personal / professional networking.

See publication

Tags: Cybersecurity, Digital Disruption, Digital Transformation

Advisor to Board of Directors
Toda Financial
August 02, 2020
TECHNOLOGY TO ENABLE A NEW ECONOMY

Digital assets with speed, mobility, security, privacy & clear ownership

TODA, a decentralized protocol for ownership management, enables the secure and efficient creation, ownership, and transfer of meaningful digital assets, providing a transformational digital foundation from the bottom up. TODA can represent assets in any business setting: identity, goods, services, and of course, currency. In addition to TODA, there is also the Adot Protocol, an internet application protocol that enables interoperable digital asset trade.

Our TODA-as-a-Service platform, TaaS, gives direct access to TODA and provides unprecedented trust, efficiency, and interoperability to enterprises, banks, and governments. We provide business solutions including commodity backed digital currencies, payments, remittances, loyalty, audit, regulatory supervision and supply chains.

See publication

Tags: Blockchain, Cybersecurity, Digital Transformation

2020 IT Budgets: Iteration 6 - July 2020
BWG Strategy
July 31, 2020
We directly compare results across six versions and have committed to running this report monthly through the summer of 2020. These latest results highlight trend updates and sentiment shifts across the enterprise software ecosystem.

We found more signs of stagnating budget growth in 2020. The median rate of budget growth remains at 0% YoY, in-line with our June survey.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Chair, Advisory Board
Talon Companies
June 01, 2020
Working with Talon's senior leadership to expand their services and geographic coverage.

Our highly specialized team has been doing Cybersecurity long before it became popular and mainstream. Unlike many other firms, we understand the operational needs and complexities of modern business realities. We have successfully delivered our expertise to the largest corporations, government agencies, and small to medium-sized businesses, and are ready to connect with you.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Columbia Technology Ventures
Columbia University
January 15, 2019
There has always been a special place in my heart for startups and innovative companies. As a Mentor for Columbia Technology Ventures and the IBM Blockchain Launch Accelerator, I work with startups in the areas of CyberSecurity, Artificial Intelligence (AI), and Blockchain to transform their ideas into sustainable businesses.

See publication

Tags: AI, Cybersecurity, Digital Disruption

24 Analyst Reports
Slack Outage Repercussions
BWG Strategy
January 05, 2021
13% of respondents intend to cut back or churn from their paid Slack plans if a second multi-hour outage occurs in the months ahead.

See publication

Tags: Business Continuity, Business Strategy, Digital Transformation

SolarWinds Breach Insight Report and Executive Briefing
BWG Strategy
December 21, 2020
80% of Fortune 500 Companies are affected.

We conducted an Insight Report on the recently announced SolarWinds exploit. Dozens of vendors are covered in this report, with actionable content. Security executives clarify key changes as budgets reshuffle in response to this crisis.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Solar Winds Breach - Insight Report and Executive Briefing
BWG Strategy
December 15, 2020
This 58 page report shows the impact of the breach on the software and cybersecurity industries. The report provides a nice analysis of winners, losers, and effects on IT budgets.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

BWG IT Budget Pulse Dec 2020
BWG Strategy
December 15, 2020
December showed a QoQ acceleration of IT spending by at least a margin of 2:1.

Each month, BWG surveys its IT decision-makers' network across several areas of spend to develop a time series of budget expectations for 2020 and beyond.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

BWG Insight Report IT Budget Nov 2020
BWG Strategy
November 20, 2020
The average budget in our survey is expected to expand by 2% for full-year 2020, vs expectations of a 1% contraction in our prior report.

This is BWG’s 8th IT spend report, which we developed at the onset of COVID-19 to track key spending trends. Each month, BWG surveys its network of IT decision makers across several areas of spend to develop a time series of budget expectations for 2020 and beyond.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

IT Budget Pulse Oct 2020
BWG Strategy
October 22, 2020

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Identitiy & Privileged Access Oct 2020
BWG Strategy
October 17, 2020
The report covers Okta, Ping, SailPoint, CyberArk, and Microsoft directly. Organizations in our sample are expecting a 1% YoY reduction in their enterprise security spend, compared to original expectations of 3%.

See publication

Tags: Cybersecurity, Digital Transformation, Privacy

2020 IT Budgets - Iteration 7
BWG Strategy
September 30, 2020
41% of respondents believe that 2021 spend will trend behind planned expectations, compared to 27% planning for next year to exceed planned spend targets.

This is BWG’s 7th IT spend report, which we developed at the onset of COVID-19 to track key spending trends. Each month, BWG surveys its network of IT decision makers across several areas of spend to develop a time series of budget expectations for 2020 and beyond.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Social Media Insights Report Q3
BWG Strategy
September 18, 2020
41.03% of Respondents indicated that ROAS improved on Twitter over the past 3 months, 53.85% of Respondents indicated that ROAS stayed the same and 5.13% of Respondents saw ROAS worsen.

This report focuses on key questions related to Snapchat, Pinterest, Twitter and will capture 40+ responses from global brands, agencies & social media marketing partners.

See publication

Tags: Cybersecurity, Digital Disruption, Risk Management

BWG Next-Gen Endpoint Security
BWG Strategy
August 15, 2020
This report assesses the growth and direction of endpoint security spend in 2020;

• Measure how 2021 spend outlook has changed throughout 2020.
• Understand the pace of next-gen endpoint adoption.
• Discover whether endpoint spend is displacing other enterprise security priorities (or the other way around).
• What is gaining / losing priority vs endpoint spend?
• Updated sentiment analysis across key endpoint security vendors."

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Insight Report, 2020 IT Budgets, July 2020
BWG Strategy
July 28, 2020
Insights on: We directly compare results across six versions and have committed to running this report monthly through the summer of 2020. These latest results highlight trend updates and sentiment shifts across the enterprise software ecosystem.

We found more signs of stagnating budget growth in 2020. The median rate of budget growth remains at 0% YoY, in-line with our June survey.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Amazon Insights Report
BWG Strategy
July 15, 2020
This report captured over $5B in GMV from 50 Global Merchants & Amazon focused agencies/rep firms across 10 product categories.

41.67% of Respondents indicated that Q2 Y/Y GMV growth significantly exceed beginning of the quarter expectations.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

APM Tools July 2020
BWG Strategy
July 15, 2020
This report tracks the most relevant and timely names in APM, including New Relic, Dynatrace, Datadog, AppDynamics, and Splunk, as an update to our Q1 report.

Spend growth across customers is holding stable across small, medium, and large organizations (all growing spend within 1% of original expectations.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

2020 IT Budgets: Iteration 5 - June 2020
BWG Strategy
June 30, 2020
Insights on: We directly compare results across all five versions and have committed to running this report monthly through the summer of 2020. These latest results highlight trend updates and sentiment shifts across the enterprise software ecosystem.

More than half of respondents are reporting lower growth outlook than the start of the year, and an additional 34% expect no change.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

2020 IT Budgets: Iteration 4 - May 2020
BWG Strategy
May 31, 2020
BWG conducted the fourth iteration of its IT budget survey from 5/11 to 5/15, covering the impact of COVID-19 on IT budgets. This survey is our latest addition to the series and we are beginning to see time series trends forming in the data.

Budgets continue to decelerate over time. Only 10% of respondents are expecting any sort of improvement in expectations for 2020, while 63% are reporting a slowdown (vs 18% in early March).

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

2020 IT Budgets - April 2020
BWG Strategy
April 30, 2020
BWG conducted the third iteration of its IT budget survey from 4/10 to 4/15, covering the impact of COVID-19 on spend for the balance of the year. We’ve already seen a rapid change in tone between version #1 and version #2, and found further changes in budget decision making in this run of the data.

Respondents have continued to reign in 2020 IT budget growth expectations since our second iteration of this survey on 3/27. The median expected growth rate of budgets dropped 700 basis points, from 10% YoY at the start of the year, to 3% today.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Enterprise Security COVID-19 and Work-from-Home Implications
BWG Strategy
April 15, 2020
This is BWG’s first enterprise security report since the onset of COVID-19 and we are tightly monitoring how budgets and vendor selection have evolved. This is a close look at which vendors are benefiting most from the demand for secure working from home.

IT Security Budgets are accelerating as a result of the COVID-19 crisis and the rise of working from home. The median budget is expected to grow by 18% in 2020.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

2020 IT Budgets: Iteration 2 - March 2020
BWG Strategy
March 31, 2020
The situation around COVID-19 is rapidly evolving, prompting new budget decisions. We capture new information from two weeks ago, when the first iteration of our report launched. We heard from more than 60 enterprises, resellers, and consultants in this version of the survey.

At the beginning of the year, decision makers were planning 8% median budget growth in 2020. Today, budgets are expected to tighten to 5% growth, compared to 9% (an increase) in our prior iteration.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

IT Spending and Supply Chain
BWG Strategy
March 15, 2020
Supply chain availability out of China. We are seeing an average of 69% product availability.

BWG released an Insight Report on the quickly-evolving coronavirus situation. Over 50 BWG technology executives weighed in on supply chain conditions and IT planning/budgets for 2020. We’ve included the list of questions below. The report is a combination of two surveys released to our executive community.

See publication

Tags: Cybersecurity, Digital Transformation, Supply Chain

Applications Monitoring Q1 2020
BWG Strategy
February 29, 2020

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Slack Q1 2020
BWG Strategy
February 03, 2020
Spend is expected to increase by 55% this year across the panel and could more than double over the following five years (113% additional growth).

See publication

Tags: Cybersecurity, Digital Transformation, Future of Work

Smartsheet Insight Report Q4 2019
BWG Strategy
November 15, 2019
Smartsheet is a fast growing collaboration tool that's heading towards direct confrontations with Microsoft and niche collaboration tools.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Vulnerability Management
BWG Strategy
October 31, 2019
This is a close look at the market for scanning activity and spend heading into 2020 with inputs from 30 security professionals.

Growth of total spend on VM tools is an estimated 35% for 2019, expected to grow by an additional 24% next year.

See publication

Tags: Cybersecurity, Digital Transformation, Privacy

SailPoint Insight Report
BWG Strategy
September 30, 2019
Respondents to share their candid thoughts on SailPoint and their direct competition.

SailPoint customers are “definitely” or “likely to” renew with SailPoint at the end their current agreements.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

8 Article/Blogs
USA: Is CMMC enough to protect my business? Three things to consider today
DataGuidance
January 06, 2021
In the first two articles in the series Alex Sharpe, Principal at Sharpe Management Consulting LLC discussed low-cost things you can do today and what is not readily apparent until you start moving through your assessment. In this article, Alex addresses what the Cybersecurity Maturity Model Certification ('CMMC') does not cover that you will want to consider for your business.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

USA: CMMC - what lies beneath
Data Protection Leader
November 02, 2020
In the first article in the series, USA: CMMC as competitive advantage and five things you can do today, Alex Sharpe, Principal at Sharpe Management Consulting LLC discussed why one shouldn't wait and the low-cost things you can do today to make your lives easier. In this article, Alex discusses what is not readily apparent until you start moving through your assessment. Think of it as an iceberg without the luxury liner. In the next article of the series, Alex will address what the Cybersecurity Maturity Model Certification ('CMMC') does not cover that may be critical to keeping your business, your customers and your partners secure. As always, your mileage may vary.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

"Iran and Russia Interfering with our election – What You Can Do to Protect Your Vote.”
Talon Cyber Tec
October 23, 2020
US Intelligence Officials warned, state actors from Iran and Russia are using email to “intimidate voters, incite social unrest, and damage [the election]”. Apparently, they have obtained voter registration data and are sending threatening emails.

What can we as individuals and business units do to not be a victim?

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

"Is Social Media Critical Infrastructure?"​
LinkedIN
October 22, 2020
Social Media is getting lots of attention especially with the upcoming election. Given the way it has woven its way into the way we work and live is it time to declare it Critical Infrastructure?

See publication

Tags: Business Continuity, Cybersecurity, Digital Transformation

USA: CMMC as competitive advantage and five things you can do today
OneTrust Data Guidance Insights
September 02, 2020
In this insight, Alex Sharpe, Principal at Sharpe Management Consulting LLC, who consults on cybersecurity, privacy, digital transformation, disruption, and other areas, draws on his experiences and provides a look into the Cybersecurity Maturity Model Certification, its advantages for organizations, and the key steps businesses can be taking to prepare. | Read more http://ow.ly/6jMQ50BfzRH

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Digital Transformation – Adoption Requires a Catalyst - COVID the Ultimate Digital Disruptor
LinkedIN
August 20, 2020
COVID may prove to be the ultimate digital disruptor. In weeks we experienced between 5 and 10 years of digital adoption. It also accelerated Creative Destruction by the same amount and made the Cloud, Video and Collaboration the new mission critical applications.

See publication

Tags: Business Strategy, Digital Disruption, Digital Transformation

Disruption - What a Great Time to Pivot
LinkedIN
April 22, 2020
The CORONA Virus is rocking our worlds – no doubt. It is a scary time with lots of uncertainty. History tells us times like this cause a disruption which also means opportunity. Digital Adoption and Creative Destruction are both accelerated. Sir Isaac Newton created many of his foundational works while self-isolating from the plague. Many notable and highly successful companies have been started in the midst of
disruption. Apple, 3M, Microsoft, Burger King, Disney, and CNN just to name a few. Warren Buffet started what would become Berkshire Hathaway just before a market down turn. These scary times present opportunities for those willing to ask the right questions.

See publication

Tags: Business Strategy, Digital Disruption, Digital Transformation

When Blue Skies Meet Thin Air
LinkedIN
February 18, 2020
It’s a common scenario: The strategy gurus create a brilliant strategy – bold, forward-looking, expertly presented – but it completely fails when implemented. Why? Was it all thin air? Why do brilliant strategies fail? A successful implementation means that 1) Your organization is completely aligned with the new products, services or the new way of doing business, 2) Suppliers, re-sellers, analysts, distributors, analysts and customers think of you in terms of the new strategy, and 3) The business earns more money. This article talks about what happens when execution is not addressed in the planning phases.

See publication

Tags: Business Strategy, Digital Transformation, Leadership

1 Book Chapter
Building the Corporate Intranet
Wiley
November 26, 1996
Building a corporate intranet requires integrating two very different technologies; web development tools and enterprise-wide legacy systems. Few people possess enough experience in both areas to successfully make these technologies work together. The authors, leading consultants at BSG, explain the tools and techniques necessary for building an Intranet system. This book show how to plan, design and build a corporate intranet system, including how to modify the business model, automate the business processes and the content.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

1 Industry Award
CIO Magazine Web Businenss 50/50 Award
CIO Magazine
July 01, 1999
Each year CIO magazine recognizes 50 Internet and 50 intranet/extranet sites that go beyond customary Web commerce practices to deliver outstanding business value. The Hackett Group's intranet-based knowledge management system called Mind~Share was awarded for its sophisticated knowledge engine and expansive knowledge base which seamlessly integrates structured and unstructured information to provide vital support to everyone in the company.

See publication

Tags: Analytics, Digital Disruption, Digital Transformation

1 Industry Council Member
Identity & Privileged Access
BWG Strategy
August 15, 2020
Industry survey to determine what factors and initiatives are accelerating or delaying deployments.

Organizations in our sample are expecting a 1% YoY reduction in their enterprise security spend, compared to original expectations of 3%.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

1 Influencer Award
Case Study - Pinkerton. Monitoring Global Growth with Budgeting and Forecasting
Thomson Reuters
June 30, 2016
Pinkerton was able to reduce global financial reporting from days to minutes. They also created operational dashboards so the field could manage day-to-day operations.

For more than a century, Pinkerton has been a leader in helping keep companies and their assets safe and secure. With offices on almost every continent, Pinkerton prides itself in offering innovative services, such as executive protection, corporate risk management, investigation, and employee screening.

See publication

Tags: Digital Disruption, Digital Transformation, ERP

1 Keynote
Sun Tzu and the Art of Cyber War – the Global Supply Chain
Infragard National Sector Security & Resiliency Program (NSSRP)
March 18, 2021
Cybersecurity in the supply chain is no longer just an IT problem. Maritime, intermodal, rail and port security must work as an integrated whole. Those who want to do us harm range from nation states and terrorists to criminal elements and activists. The unfortunate reality is the gains in productivity from technology have left us more exposed than ever. Those who want to do us harm have integrated cyber, kinetic, physical, and reputational threats into orchestrated attacks. Our defenses must be as deliberate as well.

See publication

Tags: Business Strategy, Cybersecurity, Supply Chain

7 Media Interviews
Are Our Elections Secure? Is Social Media Critical Infrastructure?
TechStory
November 18, 2020
What do Steve Jobs, Richard Branson, Paul Harvey, & JK Rowling all have in common? They are outstanding storytellers. TechStory shines the light on other great storytellers. In this episode we speak with Alex Sharpe. An influencer who makes complex subjects feel simple and helps us see around corners. In this episode we ask the question "Are our elections secure?" and end up pondering "Is Social Media Critical Infrastrucure?"

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Credibility Nation
THiNKaha
October 08, 2020
Interviewed by Mitchell Levy for his new book Credibility Nation. THiNKaha works with amazing thought leaders and experts to produce a compelling show for everyone. Credibility Nation is composed of humans who go about life and their business with credibility and servant leadership.

See publication

Tags: Cybersecurity, Digital Transformation, Leadership

YOU Are Even More Exposed in a Post COVID Cyber World
Talon Cyber Tec
July 28, 2020
Looking at the numbers, Small Businesses and Family Offices are the most at risk in the post Covid world. Awareness and Training remains the most cost effective form of protection.

See publication

Tags: Cybersecurity, Digital Disruption, Digital Transformation

7 techniques to build supply chain resilience
SearchERP TechTarget
May 29, 2020
In the wake of the COVID-19 pandemic, business and supply chain leaders have realized how important supply chain resiliency is. Here are seven ways to boost it.

See publication

Tags: Cybersecurity, Digital Transformation, Supply Chain

6 ways to address COVID-19 food supply chain disruptions
TechTarget SearchERP
May 07, 2020
The food supply chain may be broken, but there are initial steps companies must take in the near term. Learn how to bring order to the chaos COVID-19 has brought.

COVID-19 pandemic has highlighted a number of vulnerabilities in the food supply chain. Now, food retailers and manufacturers must act quickly to address some of these issues.

See publication

Tags: Business Continuity, Cybersecurity, Supply Chain

Classic Books on Investing and the Markets
John Kador, Wealth Management Magazine
April 03, 2020
WealthManagement.com surveyed the top investment books. In principal, investing and running a business are both about capital allocation. Given these classics a read during your self-quartantine, if you have not already.

See publication

Tags: Business Strategy, Leadership, Management

7 reasons for ERP implementation failure
SearchERP TechTarget
March 03, 2020
ERP consultants shared their analysis and takeaways from such spectacular ERP failures as National Grid, Revlon and Waste Management and gave advice on avoiding the same pitfalls.

See publication

Tags: Business Strategy, ERP, Management

4 Panels
CMMC - What it is, what it is not and dates to watch.
FBI Infragard Houston Chapter
November 17, 2020
The Department of Defense (DoD) in an effort to increase the cybersecurity posture of the US and its Allies have created the Cybersecurity Maturity Model Certification (CMMC). Anyone doing business with the DoD must be certified at a level based on the risk they present to our Critical Infrastructure (CI). This panel is part of a series sponsored by the Federal Bureau of Investigation (FBI) outreach (Infragard) to help defense contractors navigate and prepare.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Managed Security Services Forum Miami
CTG INtelligence
November 10, 2020

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

2020 CMMC PREPAREDNESS: AN ESSENTIAL GUIDE FOR CLEARED DEFENSE CONTRACTORS
Infragard
September 29, 2020
This panel discussion will focus on CMMC for small and medium sized businesses. We will provide an overview of CMMC and what it means for you. We will discuss how to prepare for the audit and certification process, avoiding the appeals process by getting it right the first time, etc. There will be a specific focus on the top five things you can do now to prepare and the top three business drivers that will reward those who start preparing now instead of waiting for the CMMC to be finalized. We will talk through the ins and outs of the CMMC criteria developed from years of street knowledge by working with the base standards. Speakers will include Alex Sharpe, a 30 year veteran Cybersecurity and Digital Transformation expert, Bob Ashcraft, CEO of CMMC-Solutions and currently working on CMMC readiness with a Prime CDC, John Callahan, Co-Director of the San Diego State University Cyber Tech Academy and Chief Technology Officer for Partnership Solutions International (PSI), Rusty Sailors, CEO of Protecting Tomorrow, etc.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

The Dangers Of A Remote Work Revolution - Cybersecurity Round-Table
Hosted by Donald Allen, DA Cybersecurity
April 02, 2020
Curated discussion between CISOs, practitioners and industry analysts about the future of cybersecurity with the rise of the remote worker.

See publication

Tags: Cybersecurity, Digital Disruption, Future of Work

2 Podcasts
TechStory Election Security - Is Social Media Critical Infrastructure?
TechStory
November 17, 2020
What do Steve Jobs, Richard Branson, Paul Harvey, & JK Rowling all have in common? They are outstanding storytellers. With this podcast, we shine the light on other great storytellers, pulling their secrets out of them and having a good time. Listening to great stories is the first step to becoming a better storyteller, yourself, so subscribe today.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

What Digital Transformation Means for Content, Automation, Privacy and Trust
Marketing Results Club
April 15, 2020
Street knowledge gained from helping CMO's realize their visions. As the world becomes more digital and more interconnected, the CMO is poised more than ever to drive value and improve the quality of life globally. Advances in technology continue to provide new opportunities. With that comes some rather thorny issues of privacy, trust, reputational risk and digital emissions.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

5 Speaking Engagements
Cybersecurity Maturity Model Certification (CMMC) – the DFAR Mandate
Infragard National Sector Security & Resiliency Program (NSSRP)
March 18, 2021
Cybersecurity in the supply chain is no longer just an IT problem. Maritime, intermodal, rail, and port security must work as an integrated whole. Those who want to do us harm range from nation states and terrorists to criminal elements and activists. The unfortunate reality is the gains in productivity from technology have left us more exposed than ever. Those who want to do us harm have integrated cyber, kinetic, physical, and reputational threats into orchestrated attacks. Our defenses must be as deliberate as well.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Adapting to Technological Change while Mitigating Cyber Threats
Infragard National Sector Security & Resiliency Program (NSSRP)
March 17, 2021
Cybersecurity in the supply chain is no longer just an IT problem. Maritime, intermodal, rail, and port security must work as an integrated whole. Those who want to do us harm range from nation states and terrorists to criminal elements and activists. The unfortunate reality is the gains in productivity from technology have left us more exposed than ever. Those who want to do us harm have integrated cyber, kinetic, physical, and reputational threats into orchestrated attacks. Our defenses must be as deliberate as well.

See publication

Tags: Business Strategy, Cybersecurity, Supply Chain

World Economic Forum, Critical Infrastructure Security and Safety
World Economic Forum, Good City Foundation
October 14, 2020
Good City Foundation is a multilateral development organization dedicated to optimizing cities as a living place for humanity. Safety and security are of paramount important to critical infrastructure, privacy and digital safety.

This forum has been rescheduled and is going virtual due to COVID-19

See publication

Tags: Cybersecurity, Digital Transformation, Health and Safety

Securing the Remote Worker in a Post COVID World
Global Security Exchange Plus (GSX) - Infragard and ASIS
September 24, 2020
The COVID19 pandemic and the rise of the remote worker has forced businesses to transform operations and rethink their cyber security practices globally. Historically, business leaders, IT professionals and security professionals have relied on a strong physical barrier. Sometimes referred to as "securing the castle." Post COVID the castle walls are more porous than even. This sessions will explore those changes and what you can do about them. We will delve into the full life cycle from risk management, protection, monitoring and incident response along with the roles played by different parts of the organization from operations to IT to HR.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Cyber Warfare in the Age of COVID-19
Global Security Exchange Plus (GSX) - Infragard and ASIS
September 24, 2020
The number of cyber attacks on a nation-state level, on US business, and on individuals has dramatically increased since the onset of the COVID19 pandemic. The cost of this could well be in the trillions of dollars, and more importantly lead to destabilization and potentially physical war in areas of the world. Explore what the dramatic and dangerous increase in cyber attacks means for US Critical Infrastructure, and how CI stakeholders can ready themselves for cyberwar in a period of restructured business models and reduced budgets.

See publication

Tags: Cybersecurity, Digital Disruption, Digital Transformation

1 Webinar
Solar Winds. Attacking the Digital Supply Chain
Infragard
February 24, 2021
Penetration of the Digital Supply Chain turned Solar Winds into a backdoor into major corporations and Government Agencies. The nature of the attack allowed the attackers to ignore many of the common defenses and highlighted weaknesses that exist in many enterprises today. Unfortunately, Digital Supply Chain attacks are nothing new. They have been written about and practiced for many years. This is just the latest escalation in the Cyber Arms Race. But why now? Come learn the history of attacks on the digital supply chain, its impact, and probably most importantly, what you can do to prevent future attacks. Come learn how complying why the plethora of laws, regulations, guidelines, and frameworks is not sufficient, and overreliance can actually cause the very problem you are trying to prevent.

See publication

Tags: Cybersecurity, Risk Management, Supply Chain

3 Whitepapers
USA: Is CMMC enough to protect my business? Three things to consider today
Data Protection Leader
February 15, 2021
In the first two articles in the series12 Alex Sharpe, Principal at Sharpe Management
Consulting LLC, discussed low-cost things you can do today and what is
not readily apparent until you start moving through your assessment. In this
article, Alex addresses what the Cybersecurity Maturity Model Certification
('CMMC') does not cover that you will want to consider for your business.

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Closing the CMO / Agency Gap: How Agencies Can Win Business and Build Stronger Client Relationships
Gerson Lehrman Group
April 12, 2010
The report, Closing the CMO / Agency Gap: How Agencies Can Win Business and Build Stronger Client
Relationships, is based on a survey of more than 80 senior marketing executives from a range of
industries who are members of Gerson Lehrman Group’s (GLG) expert network. The survey examines the
knowledge that marketing professionals expect from their agencies during both the pitch process and
after agencies are hired.

See publication

Tags: Digital Disruption, Digital Transformation, Marketing

Defense Message System (DMS) Messaging, Directory Services, and Security Services
Defense Information Systems Agency (DISA)
August 15, 1995
The Defense Messaging System (DMS) was an effort for the US and its Allies to modernize (Digitall Transformation) communications. It incorporated new processes, procedures, security architecture and the like. I was one of the systems architects and the primary contact for cybersecurity including Identity Access and Management (IDAM). This paper was subsequently presented at industry conferences.

See publication

Tags: Business Strategy, Cybersecurity, Digital Transformation

Blog

Opportunities

Contact Alex Sharpe

Media Kit

Share Profile

Contact Info

  Profile

Alex Sharpe

   Address

Clinton, United States