FractionalCXO
Michael Czarnecki

Michael Czarnecki

Fractional CISO

Director, Cybersecurity & Risk @ American Express | Fractional CISO for Startups | Cloud & GRC Strategist | Threat-Informed Defense | Future CISO

New York City, United States

About

With over a decade in cybersecurity leadership, I’ve led threat assessments, risk management, and security operations for top financial institutions, including Capital One and American Express. I understand the high-stakes world of financial security—where a single breach can mean millions in loss.

•Cybersecurity Strategy & Compliance

– Aligning security with business goals to avoid regulatory pitfalls.

•Threat & Risk Management

– Assessing vulnerabilities and implementing solutions to protect high-value assets.

Experience

American Express

Senior Director of Cyber Security Risk Oversight & AI

American Express · New York, United States

Feb 2025 – Present(1 yr 3 mos)

• Oversaw second-line cybersecurity risk governance, leading the development and enforcement of a unified control taxonomy and mapping framework aligned with NIST 800-53, ISO 27001, and internal enterprise policies. • Delivered quarterly board and committee risk memos supported by automated dashboards and thematic insights covering vulnerability aging, AI usage, and EUC governance, enhancing executive decision-making and regulatory defensibility. • Executed credible challenge reviews across cloud posture, encryption lifecycle, and LLM integration, ensuring adherence to policy and proactive mitigation of risk acceptance gaps. • Led data discovery initiatives to surface control misalignments across SaaS platforms, automating evidence collection and control effectiveness assessments via ServiceNow GRC and Power BI. • Built an AI governance playbook for LLM tools (e.g., Copilot,), embedding prompt injection safeguards, access controls, and classification rules into the policy stack. • Partnered with tech and risk teams to backtest the Risk Acceptance Framework, streamlining exception handling and improving audit readiness across SOX and OCC regulatory expectations. • Co-led the enterprise migration off Archer, ensuring continuity of policy mapping, exception workflows, and validation standards in the target GRC platform.

I

Fractional CISO | Cybersecurity Advisor

Independent Consultant

Feb 2025 – Present(1 yr 3 mos)

Advising startups and growth-stage companies as a fractional CISO, helping them build and scale cybersecurity programs that align with real business risk—without the need for a full-time executive. Key focus areas: -Executive-level security strategy, board reporting, and risk governance -Threat modeling, incident response, and security architecture design -Cloud security (AWS, GCP), Zero Trust implementation, and vendor risk -Readiness for SOC2, ISO 27001, NIST CSF, and financial compliance -Coaching internal teams and bridging the gap between tech and leadership Helping early-stage orgs go from "we should do security" to “we’ve got this covered.”

Capital One

Director of Security Engineering and Operations

Capital One · New York

Nov 2020 – Feb 2025(4 yrs 4 mos)

• Pioneered the integration of Splunk SIEM and MITRE ATT&CK within Capital One, driving a 40% increase in technology adoption, ensuring security measures aligned with ISO 27001 and NIST, and reinforcing the organization's commitment to industry-leading security practices. • Transformed application lifecycle management by overseeing the security posture of over 70 global applications, reducing exceptions through rigorous vulnerability management, and implementing advanced security protocols using Tenable.io, Qualys, and CrowdStrike. • Architected a DevSecOps-driven application onboarding process, resulting in $3 million in cost savings, a 25% productivity surge, and enhanced collaboration across security, development, and operations teams. • Delivered strategic cyber threat briefings to executive leadership, offering actionable recommendations that fortified the organization's resilience against emerging threats and aligned security initiatives with business objectives. • Chaired cross-functional security forums, fostering collaboration between business and technology leaders to unify security strategies and promote a culture of shared responsibility in safeguarding critical assets. • Demonstrated a proactive approach to data protection by establishing a dedicated threat modeling team, underscoring a personal commitment to advancing the organization's security posture. • Cultivated a high-performance security team, driving productivity and professional development while instilling a culture of continuous improvement and growth. • Developed and implemented a comprehensive threat modeling framework, ensuring that all Capital One applications and technologies were rigorously evaluated against potential security threats.

Norges Bank Investment Management

Senior Manager of Cyber Security

Norges Bank Investment Management · Greater New York City Area

May 2019 – Oct 2020(1 yr 6 mos)

• Directed the implementation of SOAR solutions with Demisto, achieving a 30% improvement in incident response times and a 60% enhancement in threat detection capabilities. • Enhanced operational efficiency by 15% through the delivery of impactful security metrics, leading to a 20% reduction in SLAs and improved alignment between security operations and business objectives. • Deployed CrowdStrike Falcon EDR and conducted comprehensive risk assessments, developing NIST-aligned playbooks, policies, and procedures that resulted in a 25% improvement in incident response effectiveness. • Introduced a quantitative risk scoring system, improving risk prioritization accuracy by 25% and enabling more informed decision-making in risk mitigation strategies. • Led dynamic threat modeling sessions, ensuring real-time assessments of risks and vulnerabilities, and reducing high-risk exposure by 30%.

U.S. Department of Veterans Affairs

Senior Manager of Cyber Security

U.S. Department of Veterans Affairs

Mar 2019 – Oct 2020(1 yr 8 mos)

• Achieved a 100% audit success rate in Governance, Risk, and Compliance (GRC) by implementing RSA Archer, NIST, CIS, FEDRAMP, and PCI-DSS controls, elevating the organization's security compliance to a 95% rating. • Led the deployment of Palo Alto Networks' Next-Gen Firewalls and CrowdStrike Falcon, reducing data loss incidents by 55% and enhancing the organization's security posture through cross-functional collaboration and advanced threat detection. • Implemented agile methodologies in risk management, significantly reducing vulnerabilities with ThreatQ and Qualys, and ensuring a more responsive and adaptive security framework. • Enhanced proactive threat detection and response by incorporating MITRE ATT&CK into the security strategy, positioning the organization to better anticipate and mitigate emerging threats. • Automated regulatory compliance processes, reducing manual workload by 30% and ensuring continuous alignment with evolving regulatory requirements. • Focused on proactive data protection measures, actively monitoring and addressing vulnerabilities and threats to maintain a robust security environment.

Prudential Financial

Cyber Security Threat Intelligence Analyst

Prudential Financial · Roseland, NJ

Nov 2017 – May 2019(1 yr 7 mos)

• Enhanced cloud security by 30% through the deployment of CrowdStrike Falcon and Carbon Black CB Defense, improving real-time threat detection across AWS, Azure, and GCP environments. • Reduced incident response time by 70% by leveraging open-source technologies like Recorded Future, Wireshark, and Bro IDS, and establishing a proactive threat detection and mitigation strategy. • Facilitated strategic threat intelligence exchanges, driving the implementation of advanced mitigation strategies and strengthening the organization’s security posture. • Developed immersive security training programs, incorporating interactive simulation exercises and gamified elements, resulting in a 20% improvement in employee engagement and retention of best practices. • Translated complex cybersecurity concepts into accessible insights for executive leadership, ensuring alignment between security initiatives and broader business goals.

Realogy Holdings Corp.

IT Security Analyst

Realogy Holdings Corp. · United States

Oct 2016 – Nov 2017(1 yr 2 mos)

• Utilized DLP tools such as Risk Fabric to monitor and track data exfiltration and protect against insider threats. • Provided security support for end-users using Carbon Black for testing and problem analysis of server, desktop, and IT infrastructure, including penetration testing, Kali Linux security system, device hardening, and deployment. • Monitored network performance and provided both real-time and historical statistical reports, utilizing Splunk for data recording. • Conducted system intrusion detection using Carbon Black and ensured network, system, and data availability and integrity through preventative user endpoint security and monitoring, including NMAP, malware protection, and management maintenance and upgrades. • Coordinated with systems partners to finalize designs and confirm requirements for security development and planning. • Monitored and patched firewall network vulnerabilities for clients, servers, and applications using Qualysguard and Nessus. • Managed incident response, including logging, reporting, and resolving known threats, with a focus on monitoring and threat detection. • Analyzed vulnerabilities, malware, and e-mail and web-based threats to determine impact, write alerts and advisories, and implement remediation measures. • Coordinated change management policy, process, and integration. • Utilized Vectra to identify patterns that characterize malicious behavior within a network and detect lateral movement. • Reviewed and interpreted various system logs, including Windows System, Application, Event logs, Linux, Email, Web server, DNS, DHCP, VPN, Proxy, and IDS logs.

Bayer Pharmaceuticals

Information Security Analyst

Bayer Pharmaceuticals · United States

Nov 2013 – Sep 2016(2 yrs 11 mos)

• Comprehensive understanding of all phases of the Incident Response Life Cycle and Lockheed Martin “kill chain” methodology. • Provided security maintenance and developed bug fixes and patch sets for existing web applications, including deterrent management and control, and PRTG network monitoring/troubleshooting. • Designed strategic plans for component development practices to support future projects, including the introduction of disaster recovery options and proposals. • Diagnosed and troubleshooted UNIX and Windows processing problems, applying solutions to increase company efficiency. • Built application platform foundation to support migration from client to server, incorporating security concepts, and managed secure backup and data management using NAS devices and software. • Forensics experience with Encase, including reporting and detection. • Understanding and involvement in threat hunting and threat intelligence gathering using Recorded Future.

Novartis Pharmaceuticals

Security Specialist

Novartis Pharmaceuticals · East Hanover, NJ

Mar 2011 – Sep 2013(2 yrs 7 mos)

• Managed firewall, LAN/WLAN hardware, network monitoring, and server monitoring both on-site and off-site, including security configuration for routers, switches, load balancers, and DNScrypt secure traffic. • Implemented company policies, technical procedures, and standards to preserve the integrity and security of data, reports, and access. • Developed and implemented processes and procedures for monitoring and analyzing website performance. • Managed and supported the integration of McAfee and Systematic solutions. • Managed PC migration across different ecosystems, including Microsoft, Linux, and MAC, as well as PC software/hardware migration. • Conducted wired and wireless network snorting and logging. • Managed internal Active Directory Group Policies and enforced user security protocols. • Managed and set up the implementation of Microsoft Exchange Server, including user configuration, VNC, and OpenVPN configuration and management. • Forensics experience with Encase, including reporting and detection. • Created QualysGuard and Nessus policies for reporting and monitoring.

M

Technical Support Analyst

Michele Dimaira DMD, MS, PA · Montville, NJ

Jun 2010 – Feb 2011(9 mos)

• System updates and patches • PC migration from one platform or workstation to another • Operating system upgrade and/or Installation • Network troubleshooting, including but not limited to routers, and PC • File and/or system backup to external service or hardware • Data entry and electronic filing of records and documents • Hardware construction for PC • Proper “tune up” operating system • Installation of patches, updates and critical upgrades • Planned, installed, maintained and optimized documentation of all LAN/WAN/VPN network hardware and software systems and communication links. • Managed network LAN/WAN hardware including routers, switches, load balancers and wireless networking equipment. • Troubleshoot both client and employee interaction • Port forwarding security, both closing, opening and stealth • Firewall implementation behind/front of router • SSID broadcast hiding • WPS device connection management and deployment • Monitoring network traffic • Network systems to support confidential operations and eliminate hacking ability • IP configuration including subnet deployment for devices • Virtual troubleshooting cisco routers and switches • Virtual configuration of cisco routers and switches • Routing (CISCO CCNA) • CCNA Routing and Switching validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks • Website Redirect Managing

Education

Harvard Business School Online

Harvard Business School Online

Credential of Digital Innovation and Strategy, Digital Transformation

Jan 2025 – Jun 2025

University of Maryland Global Campus

University of Maryland Global Campus

Master's degree, Cyber Security

2019 – 2020

U

University of Maryland University College

Bachelor’s Degree, Cyber Security

2015 – 2018

County College of Morris

County College of Morris

A.S. Degree, Computer Science; Computer Science

2010 – 2014

Expertise

Specialties

LinuxAmazon Web Services (AWS)VMware Horizon ViewCrowdstrike FalconGoogle WorkplaceSecurity Incident ResponseEnterprise Solution DesignPublic TrustVendor NegotiationBusiness ResilienceGovernment ContractingSecurity AdministrationPresentationsIT ControlsKey MetricsStrategic ThinkingIndustry standardsGeneral Data Protection Regulation (GDPR)Resource AllocationRecords ManagementBusiness PlanningLegal MattersCritical ThinkingAuthentication ProtocolsTechnology EvaluationSecurity Incident ManagementCross-team CollaborationStrategic PlanningAbstractingCommunicationBuild Strong RelationshipsIntellectualManagementLeadershipConfidentialityAnalytical SkillsSecurity AssuranceRisk MetricsBenchmarkingInternal & External ClientsGIACBusiness RiskSecurity AutomationLogical SecurityCritical Incident ResponseBusiness Process ImprovementRisk ManagementCross-functional CoordinationPredictive AnalyticsEDR InvestigationsIncident ResponseSecurity TrainingSOAR ImplementationThreat AnalysisThreat Intelligence Integration:Operational EfficiencySecurity MetricsFirewall ManagementEndpoint ProtectionRisk ReductionRegulatory ComplianceSIEM ManagementCompliance ManagementThreat IntelligenceTechnology AdoptionVulnerability ManagementSecurity Architecture DesignArchitecture ReviewsTechnical ArchitectureProduct StrategyInternational StandardsCloud SecurityService-Level Agreements (SLA)Key Performance IndicatorsProject ManagementAirwatchIntellectual PropertyCybersecurity Incident ResponseVendor RelationsInformation TechnologyIT LeadershipPublic CloudWindows, Unix, Linux Mac OSX, VM, Android, IOSHardware/software DiagnosticIP setup and deploymentPC/Server RebuildProgramming and design skills – Java,C++, Java ScriptDatabase design Excel, Access,SQLData backup/retrievalDatabase and system organizationIP Management and mappingSystem maintenance and patch updatesVPN Management and Deployment both server and client endNetwork/sever maintenanceWeb creation/developmentHands on switch/router maintenance and setupRouter Setup and DeploymentSystem upgrades – Various hardware upgrades including but not limited to RAM, DCloud StorageSocial Media

Past companies

American ExpressIndependent ConsultantCapital OneNorges Bank Investment ManagementU.S. Department of Veterans Affairs

Similar executives