After Google: How Program Manager Bill Poplawski Earned His CISM, Launched Consulting Firm After Retiring

Bill Poplawski is a seasoned security professional with decades of industry experience. After leaving Google in October 2017 to retire, Bill launched OBOTIS Group, a consulting firm offering information confidentiality, integrity and availability solutions to their clients.

A certified Project Management Professional (PMP) and Scrum Master, Bill enrolled in InfoSec Institute’s Certified Information Security Manager (CISM) Boot Camp to help validate his security expertise and experience as Principal Consultant at OBOTIS.

Cybersecurity Live - Boston

Before enrolling, Bill was apprehensive about studying in InfoSec Institute’s online learning center. Here’s what Bill had to say about his course and CISM exam experience.

Why Did You Decide to Earn Your CISM Certification?

Bill: I left my position at Google to retire in October, but quickly realized I wasn’t ready for retirement. I launched OBOTIS Group earlier this year, where we provide managed security services to our clients. I have a lot of knowledge and experience in information security, and earning the CISM helped tie it all together.

My background is in network protocols, so this certification was a good place to start. It demonstrates to my clients, like my PMP and Scrum Master certifications, that I have a certain amount of knowledge and experience. It helps build trust and credibility. My next goal is to earn my HITRUST certification and move into regulated spaces.

Did You Have Any Concerns About Studying Online?

Bill: Initially, I wasn’t sure what to expect — it had been a long time since I took an online course. But within the first few minutes of being online with my instructor, Leighton, I knew it was going to work for me. I felt very connected through the experience. During lecture, I could ask questions and he’d circle back to address them before moving on. It was also easy to have interactive (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: