Dallas, TX 75229 USA
+1 (214) 334-7144
josh@dfwinfosec.com

Empowering Transformation
Ensuring Trust

Accomplished cybersecurity executive, technology vanguard, and esteemed university lecturer with 17 years of technical experience, including 13 years of executive leadership. 

Connect on LinkedIn

I’m happy to add peers and colleagues on LinkedIn. If we don’t know each other already, make sure you tell me how you found me and why you would like to connect.

Check out my HIPAA Compliant ChatGPT

If you are interested in learning more about my commercial activities, please check out my HIPAA compliant healthcare AI chatbot designed for healthcare users to securely access the power of AI to improve their efficiency and quality of care.

Contact Me

For the fastest response, the best method of contact is via email. Feel free to reach out for networking opportunities, questions about cybersecurity services, speaker requests or media interviews.

About me

“Every technology decision must build customer trust and serve to catalyze the company mission.”

As Founder and CIO for FortaTech Security, I specialize in growing and leading teams that secure and digitally transform the best healthcare organizations across the nation.


In 2010, I identified UT Southwestern as a company with similar values and tremendous growth potential. I served as Chief Information Security Officer (CISO) for eight years receiving commendation by HHS, raising the Information Security program from C to an A+ effectiveness ranking, and achieving an information security maturity ranking in the second percentile across all institutions assessed by the State of Texas.


Between 2018 through 2023, I served as Associate Vice President and Chief Technology Officer (CTO), where I grew and transformed the organization’s technology infrastructure. This included leading migration to Office365 Exchange Online, implementation of Microsoft Teams and expansion of digital workspace technologies to support new hybrid and remote work models. I am supported by 120 division leaders, administrators, engineers and architects within my team.


I have an insatiable passion for learning and sharing my knowledge with others. So if you come across any great opportunities to pick up new skills or help prepare the next generation of technology innovators, I welcome any recommendations.


Outside the world of technology, I often spend my free time as an amateur pickleballer, racing high-speed drones, and flying family and friends cross-country.

Certifications

I have an insatiable passion for learning and professional growth. I attribute much of my problem solving and strategy development capability to a combination of leadership acumen and deep technical skills. 

MICROSOFT AZURE SOLUTIONS ARCHITECT EXPERT AND AI ENGINEER

This certification demonstrates subject matter expertise in designing AI, cloud and hybrid solutions that run on Microsoft Azure, including compute, network, storage, monitoring, machine learning and security. Responsibilities for this role include advising stakeholders and translating business requirements into designs for secure, scalable, and reliable Azure solutions. An Azure solutions architect partners with developers, administrators, and other roles responsible for implementing solutions on Azure. Certificants offer advanced experience and knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. A professional in this role understands how decisions in each area affect an overall solution.

CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP)

This certification is an independent information security certification governed by the International Information Systems Security Certification Consortium, commonly known as (ISC)². The (ISC)² reports 67,744 members to hold the CISSP certification in 134 countries. The CISSP was the first information security credential accredited by ANSI ISO/IEC Standard 17024:2003 accreditation and, as such, has led to industry acceptance of this global standard and its requirements. It is formally approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. The CISSP has been adopted as a baseline for the U.S. National Security Agency’s ISSEP program.

PROFESSIONAL IN HEALTHCARE INFORMATION AND MANAGEMENT SYSTEMS (CPHIMS)

The CPHIMS certification is designed to distinguish healthcare information and management systems professionals by validating the candidate’s skill, knowledge and abilities within a healthcare environment. These skills aim to make a difference within organizational structures and the community as a whole.

INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (ITIL V3 FOUNDATION)

The ITIL v3 Foundation certification demonstrates the terminology, components and concepts of the ITIL framework. It is designed for those who learn how to apply ITIL to improve service management and is ideal for IT executives working in organizations that use ITIL or seek to improve IT service management.

MICROSOFT CERTIFIED IT PROFESSIONAL (MCITP, MCSA, MCSE)

This certification confirms that the bearer of this certificate is equipped with the necessary set of skills to execute the requisite jobs demanded of an IT Administrator in a Microsoft Windows environment. MCITP Certifications are based on technical proficiency, based on Microsoft Certificate Technology Specialist Certifications or (MCTS Certificates). MCITP professionals are tested for designing, building, optimizing, building and operating technologies necessary for successfully implementing a particular project. An MCITP Credential confirms and proves knowledge and experience using Microsoft solutions and products. The MCITP Credential is continuously evolving to keep pace with the latest advancements in technology, ensuring the holder can handle the latest IT Industry.

PCI INTERNAL SECURITY ASSESSOR (PCI ISA)

Large merchants, acquiring banks and processors need to consider the PCI SSC Internal Security Assessor (ISA) Program as a means to build their internal PCI Security Standards expertise and strengthen their approach to payment data security, as well as increase their efficiency in compliance with data security standards. The ISA Program provides an opportunity for eligible internal security audit professionals of qualifying organizations to receive PCI DSS training and certification that will improve the organization’s understanding of the PCI DSS, facilitate the organization’s interactions with QSAs, enhance the quality, reliability, and consistency of the organization’s internal PCI DSS self-assessments, and support the consistent and proper application of PCI DSS measures and controls.

CERTIFIED INFORMATION SYSTEMS AUDITOR (CISA)

CISA provides a valid and reliable means for enterprises to identify technologists who are competent in incorporating privacy by design into technology platforms, products and processes, communicating with legal professionals, and keeping the organization compliant efficiently and cost-effectively. CISA proves your team has the technical skills and knowledge it takes to assess, build and implement a comprehensive privacy solution while enhancing business value, customer insights and trust—ultimately improving your organization’s image.

CERTIFIED ETHICAL HACKER (CEH)

The CEH Program certifies individuals in ethical hacking from a vendor-neutral perspective in the information security discipline. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a highly skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker to identify valid vulnerabilities and defend enterprise networks.

CAREER EXPERIENCE

UT Southwestern Medical Center

Responsible for leading the cybersecurity and technology infrastructure of UT Southwestern over 13 years of service. This includes hybrid-cloud architecture, 1.5 MW of premise data center operations, 130,000+ wired and wireless network endpoints, metro-fiber ring, 26,000 phone lines, highly virtualized application infrastructure, operation of enterprise applications and management of 200,000+ identities.

RISK MANAGEMENT

Established a formal risk management program to include vulnerability management and GRC.

SECURITY AMBASSADORSHIP

Led the program which ensures company-wide awareness of security standards and capabilities.

STRATEGY DEVELOPMENT

Established and implemented key technologies such as 2FA, IAM, SIEM, cloud email, hybrid-cloud, next-gen antivirus, and MDM. 

EXECUTIVE COMMUNICATION

Working closely with technology and business leadership to ensure all operations align with institutional risk tolerances.

CAREER EXPERIENCE

TexDoor LTD

Directed IT operations that enabled TexDoor LTD to remain the leader in its market through its technical capability and operational efficiency. My responsibilities included systems engineering, security management, IT procurement, network operations, and communicating IT opportunities to upper management.

VENDOR MANAGEMENT

Established and maintained key vendor relationships to control cost, reduce risk and ensure service excellence. 

BUSINESS CONTINUITY

Ensured capabilities and processes are in place to minimize business disruption.

PROCESS IMPROVEMENT

Implemented new workflows and protocols to better leverage technology.

POLICY DEVELOPMENT

Worked with business units to created and managed all IT policy.

Education


M.B.A. Information Technology Management

Western Governors University of Texas

Received highest academic performance rating
WGU MBA program ranked top 10% nationally by NSSE
University designated NSA Center of Academic Excellence

B.B.A. Management of Information Systems

University of Texas at San Antonio

BBA in Management of Information Systems
Graduation Cum Laude with 3.6 GPA
Lecturer for the Computer Security Assn.
Completed 100% Coursework at UTSA

Contact Me

Get in touch

Phone:

+1 (214) 334-7144

Follow me: