Richard Mackey, is the Trading Technology Manager for the Volatility Arbitrage Fund at BlueCrest Capital Management. Prior to joining BlueCrest in late 2011, Richard was vice president of consulting at SystemExperts, where he led the compliance and security architecture practices. He has helped many organizations, from online retailers and application service providers to major manufacturers assess and improve their security and compliance programs. He has advised leading financial firms on overall security architecture, identity and access management, service oriented architecture, enterprise wide authentication, regulatory compliance, and secure partner management.
Prior to joining SystemExperts, he was the director of collaborative development for The Open Group (the merger of the Open Software Foundation and X/Open) where he provided technical leadership for DCE from its inception through release 1.2.
Mackey has been a frequent speaker at conferences and a regular contributor to major publications on topics such as regulatory compliance, security standards, identity management, and service-oriented architecture security. Mackey has a B.S. and M.S. in electrical and computer engineering from the University of Massachusetts at Amherst.
Contributions from Richard E. Mackey, Jr., Contributor
- Understanding the Data Accountability and Trust Act
- DATA Act protection: Effects of a federal breach notifi
- New data protection laws
- Identity lifecycle management for security and complian
- Easing the Burden
- Key elements of a HIPAA compliance checklist
- Richard Mackey: Building a framework-based compliance p
- How to apply ISO 27002 to PCI DSS compliance
- ISO 17799: A methodical approach to partner and service
- How compliance control frameworks ease risk assessment
- SOX reality check: Compliance management products
- SOX reality check: Provisioning systems
- SOX reality check: Policy tools
- Web services security obstacles
- Standards-based compliance: A how-to guide
- Legal issues
- How to guard against XML-based attacks