Fortinet names Tyson Macaulay Chief Security Strategist and VP of Consulting Services

Tyson Macaulay Fortinet

Fortinet on Monday announced that it has hired security industry veteran Tyson Macaulay as chief security strategist and vice president of consulting services.

In this newly created role, Macaulay will be a trusted advisor to C-Level enterprise customers, helping them take a holistic approach to managing their data security environments in a threat landscape that is rapidly changing and evolving.

Prior to joining Fortinet, Macauley was CTO for Telecommunications Strategy at Intel Security, where he played an instrumental role in developing security solutions and sales channels through tier-1 carriers, service providers, and telecommunications equipment manufacturers. Macaulay’s work at Intel included leading an international team of telecom account managers, engineers, and professional service consultants.

Macaulay brings extensive project experience spanning all critical infrastructure sectors, and regulatory regimes from many different nations. He has extensive experience in specialized security disciplines such as industrial control, machine-to-machine systems, and the emerging Internet of Things (IoT). Prior to Intel, Macaulay was Security Liaison Officer at Bell Canada and founded General Network Services in 1996. His career began as a research consultant for the Canadian Federal Department of Communications (DoC) on information networking, where he helped develop the first generation Internet Services for the DoC in the early 1990s.

Macaulay is a frequent industry speaker who has published five books, and over 30 periodical publications. He has several patent applications pending and is actively involved in supporting engineering and security standards through the International Standards Organization (ISO), and the Professional Engineers of Ontario (PEO). Macaulay holds a Political Science degree (Hon. BA) from Carleton University, Ottawa, Ontario.

To comment on this article and other CSO content, visit our Facebook page or our Twitter stream.
Insider: Hacking the elections: myths and realities
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.