|
3 | 3 | <head> |
4 | 4 | <meta charset="utf-8"/> |
5 | 5 | <meta name="viewport" content="width=device-width, initial-scale=1.0"/> |
6 | | - <title>Ronnie Bailey: Lead Identity Security Architect</title> |
| 6 | + <title>Ronnie Bailey | Identity Security Director</title> |
7 | 7 | <link href="https://fonts.googleapis.com" rel="preconnect"/> |
8 | 8 | <link crossorigin="" href="https://fonts.gstatic.com" rel="preconnect"/> |
9 | 9 | <link href="https://fonts.googleapis.com/css2?family=Inter:wght@400;500;600;700&family=Courier+Prime:wght@400;700&display=swap" rel="stylesheet"/> |
|
722 | 722 | <span class="availability-text">Actively Seeking</span> |
723 | 723 | </div> |
724 | 724 | <div class="contact-icons"> |
725 | | - <a href="tel:+18046109719" title="Call me"> |
726 | | - <i class="fas fa-phone"></i> |
727 | | - </a> |
728 | 725 | <a href="mailto:opportunities@ronniebailey.cloud" title="Email me"> |
729 | 726 | <i class="fas fa-envelope"></i> |
730 | 727 | </a> |
|
756 | 753 | <section class="hero"> |
757 | 754 | <h1>Ronnie Bailey</h1> |
758 | 755 | <div class="hero-subtitle"> |
759 | | - Lead Identity Security Architect |
| 756 | + Identity Security Director |
760 | 757 | </div> |
761 | 758 | <p> |
762 | 759 | 15 years shaping how enterprise organizations secure, govern, and scale identity. Across Fortune 500 firms, federal agencies, and critical infrastructure, the work has always been the same at its core: make identity the thing that holds when everything else is under pressure. |
763 | 760 | </p> |
764 | 761 |
|
765 | 762 | <div class="hero-links"> |
766 | | - <a href="contact.html" target="_blank" class="hero-link" title="Get in touch"> |
767 | | - <i class="fab fa-github hero-link-icon"></i> |
768 | | - <span>Contact</span> |
769 | | - </a> |
770 | | - <a href="soon.html" target="_blank" class="hero-link" title="Read my IAM insights blog"> |
771 | | - <i class="fas fa-pen-nib hero-link-icon"></i> |
772 | | - <span>IAM Insights Blog</span> |
773 | | - </a> |
774 | | - <a href="https://cloudcentria.com/work.html" class="hero-link" title="View detailed case studies"> |
775 | | - <i class="fas fa-chart-line hero-link-icon"></i> |
776 | | - <span>Case Studies</span> |
| 763 | + <a href="contact.html" class="hero-link" title="Get in touch"> |
| 764 | + <i class="fas fa-envelope hero-link-icon"></i> |
| 765 | + <span>Let's Connect</span> |
777 | 766 | </a> |
778 | 767 | </div> |
779 | 768 | </section> |
780 | 769 |
|
781 | 770 | <section id="perspective" class="perspective-section"> |
782 | 771 | <h2 class="section-title">Perspective</h2> |
783 | 772 | <p> |
784 | | - To me, identity should not just be considered a product you deploy. I have come to learn that identity is a decision framework that runs underneath everything your organization does — who gets in, what they can touch, when that access ends, and what happens when something breaks. In my experience most organizations treat it as infrastructure, however the ones that get it right understand and treat it as policy. To me it is an important distinction and more of a necessity than any tool in the stack. |
| 773 | + The hardest problems in identity are rarely technical. The technical problems have answers. The hard problems are organizational: nobody owns the policy, the accountability structure was never defined, the exception became the rule, and by the time someone notices the debt is structural. |
785 | 774 | </p> |
786 | 775 | <p> |
787 | | - What I have learned across 15 years of this work is that the hardest problems in identity are rarely technical. The technical problems have answers. The hard problems are organizational: nobody owns the policy, the accountability structure was never defined, the exception became the rule, and by the time someone notices the debt is structural. My value is in knowing how to walk into an environment where identity was built by ten different people over ten years and make it coherent, defensible, and owned. |
| 776 | + My value is in knowing how to walk into an environment where identity was built by ten different people over ten years and make it coherent, defensible, and owned. |
788 | 777 | </p> |
789 | 778 | <p> |
790 | | - I think about identity security the way a good architect thinks about a building. The foundation has to be sound before you add floors. Zero Trust is often used as a buzzword but in my experience it is a posture you earn incrementally by making every access decision explicit and every privilege temporary. That work is unglamorous and it is constant however it is the difference between an organization that knows its exposure and one that finds out during an incident. |
| 779 | + Zero Trust is often used as a buzzword. In practice it is a posture you earn incrementally by making every access decision explicit and every privilege temporary. That is the difference between an organization that knows its exposure and one that finds out during an incident. |
791 | 780 | </p> |
792 | 781 | <p> |
793 | | - The most important work I do now is translate. Technology decisions that are not understood by the people who fund them get defunded when priorities shift. Risk that is not legible to a CISO or a board does not get mitigated but usually ends up inherited by the next team. My role is to ensure that doesn't happen by bridging the gap between technical realities and business decisions so they stay aligned. |
| 782 | + The most important work I do is translate. Technology decisions that are not understood by the people who fund them get defunded when priorities shift. Risk that is not legible to a CISO or a board does not get mitigated and usually ends up inherited by the next team. I own these programs end to end: governance, Zero Trust architecture, privileged access, federation, lifecycle management, and the CISO conversation that ties it all together. I can design the framework and I can also open a sign-in log and find what is breaking before it becomes an incident. |
794 | 783 | </p> |
795 | 784 | </section> |
796 | 785 |
|
@@ -836,7 +825,7 @@ <h2 class="section-title">Professional Experience</h2> |
836 | 825 | </div> |
837 | 826 |
|
838 | 827 | <div class="experience-item"> |
839 | | - <div class="job-title">Lead Identity Security Architect</div> |
| 828 | + <div class="job-title">Identity Security Director</div> |
840 | 829 | <div class="company-name"> |
841 | 830 | LexisNexis / United States Patent and Trademark Office |
842 | 831 | </div> |
@@ -1188,7 +1177,7 @@ <h2 class="section-title">Cybersecurity News & Insights</h2> |
1188 | 1177 | </div> |
1189 | 1178 |
|
1190 | 1179 | <footer> |
1191 | | - <p>© 2025 Ronnie Bailey | Lead Identity Security Architect</p> |
| 1180 | + <p>© 2025 Ronnie Bailey | Identity Security Director</p> |
1192 | 1181 | </footer> |
1193 | 1182 |
|
1194 | 1183 | <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script> |
|
0 commit comments