Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementMost Influential People in SecuritySecurity Leadership and Management

Security's Most Influential People in Security 2019 - Grant Reveal

CISSP, CCSP, CISM Sr. Manager, Information Security Entergy

SEC0919-Cover-Feat13-Reveal-slide_900px
September 1, 2019

Here's More of Security's Most Influential of 2019:

  • Sam Botros
  • Elena Carrington
  • Werner Cooreman
  • J. Gregory Dunn
  • Hector Erazo
  • Karen Frank
  • Philip Halpin
  • Matthew Payne
  • Joseph Ranucci, CPP
  • Sean Sportun
  • John L. Sullivan
  • Grant Bourzikas
  • Dr. Chase C. Cunningham
  • Mark Weatherford
  • David Venable
  • JT Mendoza
  • Scott Starkey
  • Jeff Karpovich
  • Rick Lee Morris
  • Bruce Dorris
  • Michael Gips
  • Tom M. Conley
  • Roger Cressey
  • Steve Jones
  • Christina Duffey, CPP

Across his career, Grant Reveal has provided an inclusive structure for his teams, allowing for the empowerment of his employees to learn and grow and, through empowered decision making, to contribute to the success of the team and organization while also experiencing professional and personal growth.

Reveal has been an advocate across the enterprise in explaining the importance of InfoSec and how risk relates to the business while putting forth a solid track record of metrics and maturity that show a measurable return to the enterprise.

Reveal entered into his cyber career in the late 1990s where mentors were difficult to find and the path to a successful cyber career was basically uncharted. Because of this, and his passion for teaching and helping others, Reveal has committed much time to mentor and guide his employees and others whom he meets with interest and passion in the field.

Reveal participates in activities to help engage youth in both IT and cyber awareness and to show how they can translate their interest into future cyber careers. Reveal has conducted various CyberSecurity Awareness Month activities and provides Keep your Child Safe Online sessions to help foster parent and adult awareness for cyber risks.

Reveal is also an advocate for finding and encouraging non-traditional cybersecurity professionals from across all areas of business and interests. He works to train and mentor them and provide encouragement and leadership in their journey. In one example, Reveal identified a varied group of co-workers who were all new to InfoSec. He realized they lacked a common set of knowledge, which was limiting them from reaching their full potential. He volunteered his time to take them through the Security+ curriculum after business hours and help them build a foundation of cyber skills. As of this writing, three of the 13 attendees have successfully passed the Sec+ certification and are now pursuing additional learning and certification opportunities. In addition, eight employees from the training have been promoted and/or moved into new positions utilizing the skills gained through attending the sessions.

“I am proud of the impact I have had in mentoring and guiding employees and colleagues in their personal and professional development,” Reveal says. “When I first started in InfoSec, there really wasn’t a defined path and I had to find my own way more often than not. It is important to share what I have learned, assisting others along a smoother path to success and to help develop the next generation of InfoSec leaders and wrench turners so they can be better prepared than we were when we first started our journey.”

KEYWORDS: cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0919-Cover-Feat11-Bourz-slide_900px

    Security's Most Influential People in Security 2019 - Grant Bourzikas

    See More
  • SEC0919-Cover-Feat14-Weather-slide_900px

    Security's Most Influential People in Security 2019 - Mark Weatherford

    See More
  • SEC0919-Cover-Feat15-Venable-slide_900px

    Security's Most Influential People in Security 2019 - David Venable

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing