Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementTop Cybersecurity Leaders

Special Report

Ossie Munroe | Top Cybersecurity Leaders 2024

Defining your security leadership

By Taelor Sutherland
Ossie Munroe | Top Cybersecurity Leaders 2024

Background image / DamienGeso / iStock / Getty Images Plus via Getty Images — Headshot courtesy of Munroe

March 1, 2024

While Ossie Munroe is relatively new to the security industry, his career at Bloomberg spans three decades. Munroe joined the organization in 1990, moving through a variety of positions before transitioning into the security field in 2013.

“While my career journey within Bloomberg has seen me move between five departments since my start at the company, that bares no reflection on the company’s culture for internal career changes. Instead, this decision was driven mostly by my focus on bettering my craft in each role I held. At this point, however, I can very comfortably say that security will remain at the center of any potential career opportunities that I consider. I want to be a part of this industry for the rest of my career,” Munroe says.


CREATING A SECURITY COMMUNITY

Munroe currently works as Bloomberg’s Deputy Chief Information Security Officer (CISO). He also leads a team of Business Information Security Officers. Munroe describes his BISO team as the “connective tissue” between the business, risk and security sides of the company.

“When a line of business is looking to install a new system, modify a design or introduce new code, it’s important security is factored into those decisions. There are many different lines of businesses and technology stacks to secure,” Munroe says.

A project Munroe worked on recently was one of Bloomberg’s acquisitions.

“I was designated as the security lead for the acquisition, which involved migrating systems, data and people to Bloomberg’s environment. Understanding the security technology and controls previously in place at the acquired company and making the decision to either partially integrate with or fully adopt Bloomberg systems was pivotal to the migration effort,” Munroe says. “It was high-stakes and a lot of work packed into an accelerated timeline.”

Munroe and the project team worked hard to ensure a smooth transition. It meant a lot of long hours, but their hard work paid off.

“The project was a defining moment for me. I met some interesting people across several different departments that I don’t think I would have otherwise met, and I still maintain many of those relationships today. I’m proud of what the team was able to accomplish,” Munroe says.

In between large-scale projects, Munroe’s day-to-day responsibilities include constant security awareness.

“There are some days full of planned meetings and even still, those days involve — as anybody else in a security role will understand — a level of unpredictability. You’re always preparing, but never really know when the next big vulnerability will be announced. Whether you’re impacted or not by that vulnerability, there’s typically a level of due diligence required. Those interruptions must be factored into your planned work,” Munroe says.


BUILDING BRIDGES THROUGH MENTORSHIP

In addition to his security responsibilities, Munroe also serves as a mentor both within and outside his organization. Within Bloomberg, Munroe encourages his team members to consider him a resource when problem solving.

“My style is typically to not solve problems for individuals unless I absolutely must. It’s natural for people to sometimes feel like they’ve exhausted all possible solutions until they’re pushed a little bit further. Sometimes, when people come to you for guidance, it’s your job to just listen. Other times, the most effective method is just asking them the right questions to allow them to arrive at a conclusion themselves,” Munroe says.

Munroe also works with mentees outside of his organization, especially those coming from non-traditional backgrounds. He mentors within Minorities in Cybersecurity as well as American Corporate Partnerships, a nonprofit designed to help military members transition back to civilian life.

“I served in the military, so anything to help veterans really hits home. There’s also a program based out in New York City called Scholarship Plus, where students from low income households, whose families can’t afford the cost of college tuition, get financial assistance and opportunities to be mentored,” Munroe says. His mentorship roles range from formal panel discussions to one-on-one calls with individuals looking for advice.

Munroe’s interest in giving back in this way comes from his personal journey of learning how to solve problems on his own.

“Through my life’s journey I had to learn a lot on my own. My dedication to giving back is rooted in making sure others have the opportunities I wasn’t afforded. One of my main pieces of advice to others is to not let your past define you. The timing of this interview is quite interesting. Recently, while on vacation with my wife and daughters, we talked about what we each felt was the strongest aspect of each of us and what we struggled with the most. They came to the consensus that my willingness to try new things and push myself to uncomfortable places is the thing they most admired about me. That’s essentially me finding new paths, while also actively choosing which parts of my past get to come along for the ride. I also truly believe that, without pushing yourself to the uncomfortable places, it’s very hard for anyone to grow beyond their natural boundaries.”



← VIEW MORE 2024 TOP CYBERSECURITY LEADERS →



KEYWORDS: CIO information security security leadership security strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Sandra Cavazos — Top Cybersecurity Leaders 2025

    Sandra Cavazos — Top Cybersecurity Leaders 2025

    See More
  • Niel Harper — Top Cybersecurity Leaders 2025

    Niel Harper — Top Cybersecurity Leaders 2025

    See More
  • 2024 physical security predictions header

    Top physical security predictions for 2024

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing