2 min read

Long View names former Telus security exec as new CISO

Long View office

IT consulting firm Long View has appointed as its security chief a long-time executive for Canadian telecommunication giants.

Long View announced that Gary Hawkings, a security technology and operations expert, will be the company’s new chief information security officer (CISO). He will be responsible for Long View’s security vision and will coordinate the firm’s development and management of its security practice.

Gary Hawkings

Gary Hawkings

“It’s our job as information security professionals to remove the stigma of security being an impediment to business,” Hawkings said in a statement. “This starts with developing clear lines of communication to create security programs that align to business priorities.”

Michel Oicle, security practice director, for Long View continues in his role as practice director providing architectural, product and technical leadership for the company’s security offerings and solution delivery. He will be reporting to Mr. Hawkings.

Prior to his appointment, Hawkings was led and developed the outsourcing business and implementation model for large scale enterprise IT security infrastructure and personnel at Telus’ Security Solutions division. He was with Telus from 2012 to 2014.

Hawkings was also senior director of information communication technology (ICT) at Bell Canada from 2004 to 2008. Prior to that, he led a team of security services professionals as the Western Canada general manager for Canadian e-business company Emergis Inc.

“Gary is a true information security professional with an excellent track record developing strategic business plans, building and managing delivery teams, and ensuring that operational environments meet or exceed security service expectations,” said Robin Bell, Long View’s Chief Technology Officer, in a statement. “We look forward to seeing Garry leverage his hard-won experience and vast industry knowledge on behalf of Long View’s customers — particularly in Hybrid IT environments, which require additional consideration for security aspects such as control and location.”

 

Leave a Reply

Your email address will not be published. Required fields are marked *

Post comment