Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityThe Security Benchmark ReportSecurity Leadership and ManagementHospitals & Medical Centers

Security 500 Thought Leader Profiles

Treyler Ray: Securing the Skies

Chief Security Officer

By Diane Ritchey
SEC-1120-SEC-500-Profile-4-Slide4
November 5, 2020

Treyler Ray began his career in law enforcement with the Mississippi Bureau of Narcotics as an undercover narcotics agent. He soon moved into the special operations division where he conducted surveillance and Title III wiretaps on major drug traffickers. For eight years, he worked as a special agent with the U.S. Department of State, Bureau of Diplomatic Security. He then worked for Raytheon before finding a home at Bellflight in May 2017, as Director of Security.

Ray is the Chief Security Officer at Bell, an American aerospace manufacturer for military and commercial applications. It is headquartered in Fort Worth, Texas, with manufacturing facilities in Fort Worth and Amarillo, Texas, as well as Mirabel, Quebec, Canada. He calls his team “world class in industrial, SAP, counterintelligence and insider threats.” Ray’s team is comprised of eight personnel under his charge.

As a manufacturer of highly engineered helicopters, “air taxis,” drones and other products, the risk and security challenges are diverse. “The challenges every security element faces are the threats posed to their personnel, their property and their technology,” Ray says. “The unique risk we face at Bell is safeguarding our sensitive information and material, which consists of classified, controlled unclassified information, export-controlled, and our company’s own proprietary data/intellectual property. Bell alone has managed to produce aircraft using tiltrotor technology, a technology that represents a portfolio of incredible capabilities in the hands of U.S. and allied warfighters, and [is a] competitive advantage in the Intelligent Air Mobility arena. We see strong management of our Insider Threat and Security Education, Training and Awareness programs as imperative to our success in safeguarding the sensitive information and material resident at Bell in both our military and commercial programs.”

Mitigating the risk to the company’s sensitive technologies from foreign intelligence entities and business competitors, in order to safeguard national security capabilities and the company’s competitive advantage in the marketplace, is a difficult part of his team’s job, he says.

Ray and his team have worked hard to grow the global security function to be one of the most effective and respected functions in the company. “With the direct support of the CEO and executive team, the global security function has grown in headcount and budget and taken on new roles such as tracking employee international travel, planning for safety and security of employees traveling to hotspots around the globe, as well as significantly increasing physical security and fire protection capabilities across the company’s global facilities,” he says. “All of this against the backdrop of national security industrial and cyber programs where the security team has made even more significant gains resulting in increased confidence among our customers and government security partners.”

To ensure that position within the company, Bell Global Security measures success by constant evaluated performance by government customers and its ability to operate unencumbered, regarding physical safety concerns and administrative issues related to compliance for internal customers. “More important, due to the stringent security requirements as a defense contractor, we see ourselves as a business enabler, specializing in the ability to protect Bell, its technologies, intellectual property, employees and technical resources,” he notes. “We are focused on remaining compliant and exceeding the requirements set forth by our U.S. customers, which ultimately impacts Bell’s ability to keep and secure future contracts.”

Ray is proud of his work to align the company’s classified collateral information systems to the DoD Risk Management Framework (RMF). Bell’s Global Security team dedicated more than 400 hours to creating an accreditation package for classified systems that met both the National Industrial Security Program Operating Manual (NISPOM) and new RMF requirements, from scratch. “We accomplished this by creating, categorizing, selecting and implementing more than 1,600 test security controls,” he says.

This year, the team has focused efforts on winning the Future Long-Range Assault Aircraft (FLRAA) and Future Attack Reconnaissance Aircraft (FARA) programs. To help, the security team has been working hard to safeguard sensitive information. He says, “We are working diligently with our internal and government customers to ensure we understand the personnel, facility, information access and storage, and training requirements so that we may seamlessly support the programs over the next few years of massive anticipated growth. Specifically, we are working to ensure we have the right people in the right places at the right time, with the pertinent skillsets, trained and ready to support the company’s ramp-up to full rate production on both programs. This requires on-boarding of additional security personnel, physical security survey of new and existing facilities, accreditation of additional classified information systems and bolstering our Security Education, Training and Awareness program (regarding the handling of Controlled Unclassified Information, Defense Federal Acquisition Regulation requirements regarding unclassified networks, and the Insider Threat program), all of which are on pace to meet demand.”

In his free time, Ray says he spends all of his time with his family and his young daughter. He says, “I believe it’s the most important thing that a father can do, as they are the priority in my life.”

KEYWORDS: emergency management healthcare hospital security law enforcement security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Joshua Dean Security Magazine November 2017

    Joshua Dean: Securing the People, Securing San Antonio's Water Future

    See More
  • SEC-1120-SEC-500-Profile-7-Slide7

    Kevin Wilkes: Securing the Arts

    See More
  • Securing the Shuttle -- Behind the Scenes at Kennedy Space Center

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing