Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityThe Security Benchmark ReportSecurity Leadership and ManagementHospitals & Medical Centers

Security 500 Thought Leader Profiles

Treyler Ray: Securing the Skies

Chief Security Officer

By Diane Ritchey
SEC-1120-SEC-500-Profile-4-Slide4
November 5, 2020

Treyler Ray began his career in law enforcement with the Mississippi Bureau of Narcotics as an undercover narcotics agent. He soon moved into the special operations division where he conducted surveillance and Title III wiretaps on major drug traffickers. For eight years, he worked as a special agent with the U.S. Department of State, Bureau of Diplomatic Security. He then worked for Raytheon before finding a home at Bellflight in May 2017, as Director of Security.

Ray is the Chief Security Officer at Bell, an American aerospace manufacturer for military and commercial applications. It is headquartered in Fort Worth, Texas, with manufacturing facilities in Fort Worth and Amarillo, Texas, as well as Mirabel, Quebec, Canada. He calls his team “world class in industrial, SAP, counterintelligence and insider threats.” Ray’s team is comprised of eight personnel under his charge.

As a manufacturer of highly engineered helicopters, “air taxis,” drones and other products, the risk and security challenges are diverse. “The challenges every security element faces are the threats posed to their personnel, their property and their technology,” Ray says. “The unique risk we face at Bell is safeguarding our sensitive information and material, which consists of classified, controlled unclassified information, export-controlled, and our company’s own proprietary data/intellectual property. Bell alone has managed to produce aircraft using tiltrotor technology, a technology that represents a portfolio of incredible capabilities in the hands of U.S. and allied warfighters, and [is a] competitive advantage in the Intelligent Air Mobility arena. We see strong management of our Insider Threat and Security Education, Training and Awareness programs as imperative to our success in safeguarding the sensitive information and material resident at Bell in both our military and commercial programs.”

Mitigating the risk to the company’s sensitive technologies from foreign intelligence entities and business competitors, in order to safeguard national security capabilities and the company’s competitive advantage in the marketplace, is a difficult part of his team’s job, he says.

Ray and his team have worked hard to grow the global security function to be one of the most effective and respected functions in the company. “With the direct support of the CEO and executive team, the global security function has grown in headcount and budget and taken on new roles such as tracking employee international travel, planning for safety and security of employees traveling to hotspots around the globe, as well as significantly increasing physical security and fire protection capabilities across the company’s global facilities,” he says. “All of this against the backdrop of national security industrial and cyber programs where the security team has made even more significant gains resulting in increased confidence among our customers and government security partners.”

To ensure that position within the company, Bell Global Security measures success by constant evaluated performance by government customers and its ability to operate unencumbered, regarding physical safety concerns and administrative issues related to compliance for internal customers. “More important, due to the stringent security requirements as a defense contractor, we see ourselves as a business enabler, specializing in the ability to protect Bell, its technologies, intellectual property, employees and technical resources,” he notes. “We are focused on remaining compliant and exceeding the requirements set forth by our U.S. customers, which ultimately impacts Bell’s ability to keep and secure future contracts.”

Ray is proud of his work to align the company’s classified collateral information systems to the DoD Risk Management Framework (RMF). Bell’s Global Security team dedicated more than 400 hours to creating an accreditation package for classified systems that met both the National Industrial Security Program Operating Manual (NISPOM) and new RMF requirements, from scratch. “We accomplished this by creating, categorizing, selecting and implementing more than 1,600 test security controls,” he says.

This year, the team has focused efforts on winning the Future Long-Range Assault Aircraft (FLRAA) and Future Attack Reconnaissance Aircraft (FARA) programs. To help, the security team has been working hard to safeguard sensitive information. He says, “We are working diligently with our internal and government customers to ensure we understand the personnel, facility, information access and storage, and training requirements so that we may seamlessly support the programs over the next few years of massive anticipated growth. Specifically, we are working to ensure we have the right people in the right places at the right time, with the pertinent skillsets, trained and ready to support the company’s ramp-up to full rate production on both programs. This requires on-boarding of additional security personnel, physical security survey of new and existing facilities, accreditation of additional classified information systems and bolstering our Security Education, Training and Awareness program (regarding the handling of Controlled Unclassified Information, Defense Federal Acquisition Regulation requirements regarding unclassified networks, and the Insider Threat program), all of which are on pace to meet demand.”

In his free time, Ray says he spends all of his time with his family and his young daughter. He says, “I believe it’s the most important thing that a father can do, as they are the priority in my life.”

KEYWORDS: emergency management healthcare hospital security law enforcement security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Joshua Dean Security Magazine November 2017

    Joshua Dean: Securing the People, Securing San Antonio's Water Future

    See More
  • SEC-1120-SEC-500-Profile-7-Slide7

    Kevin Wilkes: Securing the Arts

    See More
  • Blog w/ space shuttle

    Securing the Shuttle -- Behind the Scenes at Kennedy Space Center

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing