Dean Matthews

Cyber Risk Governance | Identity Governance and Administration

I work with a wide variety of industries & users

I have been a forward-looking cybersecurity professional, executive, seasoned technical program manager, and trusted board advisor for over 25 years – developing strategy and leading the development and implementation of technology and information security initiatives for partners in the healthcare, technology, finance, and public sector verticals.



Board Governance of Cyber Risk

Boards of directors and corporate leadership must ensure that the organizations they serve are continuously improving their cybersecurity posture in the face of ever-changing cyber threats. And addressing the essential elements of cybersecurity, from governance, strategy, and risk management to controls architecture, implementation, and management is how I can help your organization with unique insights on cyber risks and practical support.

Cyber Insurance Advisor

There’s no denying that cybersecurity risks in the workplace have increased exponentially in recent years. Allow me to serve as your cybersecurity partner and guide you through the intensive cyber insurance application process and ensure your organization has in place the proper policies and controls to keep your premiums low while mitigating your risk.

Identity Governance and Administration (IGA)

There’s no denying that cybersecurity risks in the workplace have increased exponentially in recent years. Allow me to serve as your cybersecurity partner and guide you through the intensive cyber insurance application process and ensure your organization has in place the proper policies and controls to keep your premiums low while mitigating your risk.

Identity and Access Management

With increased regulatory and legal scrutiny to diligently protect assets and data, organizations must abandon manually assigning and tracking privileges. Instead, the need to effectively and efficiency control timely user access to critical information within your organizations demands expertise in Identity and Access Management (IAM) – a framework to facilitate more granular and automated control and auditing capabilities.

Privileged Access Management

Privileged Access Management (PAM) safeguards identities with elevated access beyond regular users. By assisting clients implement a centralized PAM solution, I help clients exercise control over the elevated access and permissions and ensure only the users who require access receive it for at the right place, the right time and for the appropriate duration.

Zero Trust Architecture

A zero trust approach ensures the right resources are being delivered to the right users. By removing or restricting automatic access to any resource on your network, applying my years of experience in access management, multi-Factor Authentication (MFA) and single sign-on (SSO), I will ensure the following zero trust architecture (ZTA) principles are addressed to regulate user access and data management across your enterprise:

  • Identity as a perimeter
  • Least privilege
  • Intrinsic workload security
  • Micro-segmentation
  • Integration and automation

I possess a keen ability to establish positive C-level and boardroom relationships to effect significant change – propelling a cybersecurity risk management strategy forward while enabling organizational growth.

  • Make security a strategic business enabler
  • Align cybersecurity with business needs
  • Ensure organizational design supports cybersecurity
  • Incorporate cybersecurity expertise into board governance
  • Encourage systemic resilience and collaboration.

From governance, strategy, and risk management to controls architecture, implementation, and management, I help organizations by providing unique insights on cyber risks and practical support.