Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceCybersecurity NewsTop Cybersecurity Leaders

Special Report

2021 Top Cybersecurity Leaders - Ira Winkler

CISO, Skyline Technology Solutions

By Maria Henriquez
SEC0321-Cover-Winkler-slide13_900px

Bio Image courtesy of Winkler — in-future / iStock / Getty Images Plus / via Getty Images

March 1, 2021

While Ira Winkler’s tenure as CISO within Skyline Technology Solutions has been short, he has made a significant impact. In October 2020, he took over a newly established security department, grown organically out of a successful network and IT services operations.

He implemented formal processes for the performance of security functions and has matured the program significantly. He standardized training and certification requirements for the team and established a vision for career progression for people wanting to pursue cybersecurity as a career.

His efforts have had a significant impact on the security of Skyline as well as its customers, and have resulted in streamlined operations within the organization as a whole. He has worked to standardize proposals, which allows for more seamless back office functions, while simplifying the work of the sales and delivery teams.

“When I arrived at Skyline, there was a very talented team that did not have their work established as repeatable processes. While the efforts are still in progress, many processes are now specifically defined with playbooks. This allows work to not only be more efficient, it provides Skyline’s customers with services that best meet their needs. Additionally, there are career paths being defined. This allows for increased employee satisfaction, which in turn provides for reduced turnover, which itself results in more consistent service to clients,” he says.

Winkler has more than three decades of information security experiences and has worked with law enforcement, performing the first studies on Information Warfare for the Pentagon, among other iconic work. He began his career at the National Security Agency, where he served in various roles as an Intelligence and Computer Systems Analyst. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland.

The project he is most proud of is when he was brought in by the CISO of a Global 5 company, who was frustrated with the lack of support he was receiving from his CEO. “The [CISO] had previously brought in the Big 4 firms to perform penetration tests, which all showed the corporate network and systems to be vulnerable. For lack of a better term, they couldn’t make a business case for improved cybersecurity efforts,” Winkler explains. “He brought me in, and as opposed to proving the networks vulnerable, I performed an espionage simulation and within three days provided the CISO with information ‘stolen’ that is worth billions of dollars to the company. The CISO took the findings to the CEO. The next week, the cybersecurity budget was increased by more than $10,000,000, and they hired CISOs for each business unit of the company. Not only did the company drastically improve its security posture, there are more than a dozen people who have established careers as a result of my work.”

Winkler is also author of six books, including “Spies Among Us” and “Advanced Persistent Security” — both of which were named to the Cybersecurity Canon Hall of Fame — and the bestseller “Through the Eyes of the Enemy.” He has won a Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards.

KEYWORDS: business continuity cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • SEC0321-Cover-Wilcox-slide12_900px

    2021 Top Cybersecurity Leaders - Spencer Wilcox

    See More
  • SEC0321-Cover-Estlick-slide6_900px

    2021 Top Cybersecurity Leaders - Dave Estlick

    See More
  • SEC0321-Cover-Grafenstine-slide8_900px

    2021 Top Cybersecurity Leaders - Theresa Grafenstine

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing