Robert Bigman
Biography
Robert Bigman recently retired from the Central Intelligence Agency (CIA), after serving a thirty-year distinguished career. Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. As an information security trailblazer, Mr. Bigman participated in developing security measures for Government computers well before the commercial industry found the Internet.
He then developed creative solutions to allow the CIA to use the Internet to further its mission without exposure. With twenty-five years of experience, Mr. Bigman worked in every area of information and data security, for the last fifteen years as the Agency's Chief Information Security Officer (CISO). As the Agency CISO, Mr. Bigman managed a large organization of technical and program officers responsible for the protection of all Agency information.
As the CISO, his responsibilities included cryptography, information security policy/processes, standards and requirements, testing, and network defense/response. Mr. Bigman also served as the Agency's designated officer for all discussions with the information security industry and its commercial partners. Mr. Bigman has contributed to almost every Intelligence Community information security policy/technical standard and has provided numerous briefings to the National Security Council, Congress, and presidential commissions.
Mr. Bigman's earlier assignments at the CIA included participation in the technical design of the Intelligence Community's first counterterrorism database and delivery of the Agency's first secure TCP/IP local and wide area network for the Counterintelligence Center. In recognition of his expertise and contributions, Mr. Bigman has received numerous CIA and Director of National Intelligence awards.
Mr. Bigman is now an independent cyber security consultant and president of 2BSecure in Bethesda, Maryland. He works with Governments and Fortune 50 corporations to help them build productive information security programs and resist sophisticated nation-state and cybercriminal penetration efforts. He has authored numerous articles on information security and is a frequent speaker at conferences and training venues.