Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireThe Security Benchmark ReportSecurity Leadership and ManagementCybersecurity News

Wesley Bull: Protecting Joint Ventures

By Sarah Ludwig
November 2, 2015

As a large global technology company whose products such as the Graphical Processing Unit (GPU) appear inside a wide array of other products, NVIDIA may just be “the biggest company you’ve never heard of,” says Wesley Bull, NVIDIA’s Chief Facility Security Officer (CFSO) and Head of Global Security Risk Management, Investigations and Protective Services. “While we’re well known to the gamer community, our technologies are actually involved in solving such a diverse range of technical challenges, we’re literally helping to create the future,” Bull says.

His distinction as CFSO is due to NVIDIA’s engagement in classified work for the federal government. Bull’s global responsibilities include crisis management, executive protection, intelligence, travel security, IP security, protective services worldwide, supply chain security, investigations and administering the security program for classified work with the U.S. government. “That’s where the CFSO responsibility comes in to oversee all of the government’s program requirements. That involves different security auditing and monitoring all the way through to actually helping people get their security clearances and then ensuring that they behave appropriately to keep those clearances,” says Bull.

Bull marvels at “the speed and agility of the sector and, more specifically, the company.” Besides market opportunities he sees being created at every turn by NVIDIA, “we are solving really complex problems with incredibly brilliant engineers, and that’s humbling,” he says. He feels fortunate to be able to work with people who are supporting diverse engineering challenges from cancer research to next generation visual computing to enhanced sensor technologies for automobiles.

Security at NVIDIA is quite challenging because, as a supplier of products within other products, the company has a number of joint ventures going on at any one time. This results in extremely complex security protocols. Not only might NVIDIA be dealing with pre-released and/or prototype products, but they are often working with multiple competitors at once. “We have to make sure that, for example, our lab environments are air-gapped so that we don’t have one competitor running into another competitor’s area or accidentally getting exposure to a competitor’s intellectual property,” says Bull.

The stakes increase significantly for the company when it comes to cyber threats as well because they are protecting other people’s property as well as their own. “There’s a pretty substantive insider threat or attack vector on intellectual property theft, and that’s something we have to be very, very vigilant about,” Bull says. As a result, Bull also plays a role in cybersecurity initiatives at NVIDIA and serves as the liaison for all engagements with law enforcement and U.S. intelligence community given his former work in these arenas.

Global security risk management is Bull’s team’s major focus, and he’s expanded the program scope significantly since he started. As NVIDIA began to grow rapidly and expand into many new areas in the several years before his arrival, the security program just wasn’t able to keep up. “I’m extremely happy with the excellent work by my team,” says Bull. “We’ve got some great partners across our program that have really helped us adeptly close the gaps, but there’s still a lot of work to be done.” Specifically, Bull emphasizes aligning security risk awareness in conjunction with the company focus on agility and staying scrappy. His team’s security strategy is advantageous because it’s “aligned to the business and its objectives,” he says.

The security team’s brand perception “always has room for improving” when it comes to the C-suite, peers and external stakeholders, according to Bull. “We can’t be hitting the C-suite with uncertainty, fear and doubt and coming at them with a compliance hammer. That does not comport in a technology environment where the risk appetite is much higher,” says Bull.

As for external stakeholders, “We’re working with some of the best brands in technology around the world, and, as a result of that, I think what’s been notable is that we’ve similarly developed some great relationships and strategic insights by partnering with our external stakeholders,” Bull says. This also includes law enforcement, public safety and U.S. intelligence agencies, with which the security department conducts joint trainings and briefings to advance collaboration and capabilities. “We take an all-hazards approach and align our joint training and preparedness plans to support a major incident. We are way past ‘observe & report,’” says Bull.

As is the oft-held lament among top security professionals, complacency and awareness are the most difficult parts of the job. “The fight is ensuring that despite the alignment with the business, we do have legal and fiduciary obligations with regard to security and safety,” says Bull. “We can never lose sight of the fact that we also have very specific security and protection responsibilities to the U.S. government, and it’s difficult to keep getting air time to remind people of that, despite the great work that we’re doing in terms of aligning ourselves better with the business,” he says.

 

Security Scorecard

  • Annual Revenue: $4.7 Billion
  • Security Budget:  $6.8 Million

Critical Issues

  • Cybersecurity
  • Intellectual Property Protection
  • Business Expansion – New Markets
KEYWORDS: business expansion security communications security IT security NVIDIA security security leadership security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Sounil Yu

    Sounil Yu Joins YL Ventures as Chief Information Security Officer-in-Residence

    See More
  • Ryan_Gurney

    Ryan Gurney joins YL Ventures as CISO-in-Residence

    See More
  • bottles laying on side

    Pepsi Bottling Ventures announces data breach

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing