“I've worked with Tim in a number of different capacities for over 10 years and can say that I've seen him manage large security teams, complex controls, and wide-ranging projects. His knowledge of the information security is top-notch and his ability to think creatively about risk reduction while getting the most from the people who work for him is remarkable.”
Tim Byrd
Charlotte, North Carolina, United States
4K followers
500+ connections
About
For over 20 years, Tim has delivered results that align technology initiatives with…
Activity
-
Stacey and I had a wonderful night with some of our Brite crew at the Rochester Regional Health Gala this past Saturday. A special thanks to Kelly…
Stacey and I had a wonderful night with some of our Brite crew at the Rochester Regional Health Gala this past Saturday. A special thanks to Kelly…
Liked by Tim Byrd
-
Hemen R. Vimadalal CEO of 1Kosmos was named a finalist for the Ernst & Young Entrepreneur Of The Year 2026 New Jersey. What stands out here is how…
Hemen R. Vimadalal CEO of 1Kosmos was named a finalist for the Ernst & Young Entrepreneur Of The Year 2026 New Jersey. What stands out here is how…
Liked by Tim Byrd
-
Congratulations to 1Kosmos CEO and co-founder Hemen R. Vimadalal for being named an EY Entrepreneur of the Year 2026 New Jersey finalist 🌟 Since…
Congratulations to 1Kosmos CEO and co-founder Hemen R. Vimadalal for being named an EY Entrepreneur of the Year 2026 New Jersey finalist 🌟 Since…
Liked by Tim Byrd
Experience
Education
Patents
-
Centralized security for connected devices
Issued US 10469517
Techniques are described that generally relate to centralized vulnerability discovery and management of disparate network-connected devices. A computing device connected to a network determines vulnerabilities for devices connected to the network. The computing device identifies the devices connected to the network and determines vulnerability information for the network-connected devices using one or more remote sources of vulnerability information. For example, the computing device may access…
Techniques are described that generally relate to centralized vulnerability discovery and management of disparate network-connected devices. A computing device connected to a network determines vulnerabilities for devices connected to the network. The computing device identifies the devices connected to the network and determines vulnerability information for the network-connected devices using one or more remote sources of vulnerability information. For example, the computing device may access websites containing vulnerability or security information, e.g., by performing web searches on a periodic basis, subscribing to one or more web-based feeds of vulnerability information, or the like. The computing device performs a variety of operations (e.g., ranking vulnerabilities, applying patches, sending notifications, or the like) for the network-connected devices based on the vulnerability information.
-
Internet cleaning and edge delivery
Issued US 9,160,711
Methods, systems, and computer-readable media for implementing a cleansing farm are presented. A cleansing farm may comprise of a computing device that filters customer requests directed to an organization before they are routed internal to the organization. A cleansing farm may receive customer requests and filter the requests based on a set of filtering rules. The cleansing farm may inspect the customer request in order to determine whether it should be filtered. In an example where the…
Methods, systems, and computer-readable media for implementing a cleansing farm are presented. A cleansing farm may comprise of a computing device that filters customer requests directed to an organization before they are routed internal to the organization. A cleansing farm may receive customer requests and filter the requests based on a set of filtering rules. The cleansing farm may inspect the customer request in order to determine whether it should be filtered. In an example where the organization is a financial institution, the customer request may include confidential customer information. Accordingly, in this example, the cleansing farm may be administered by an entity that is permitted to access the confidential customer information. A visualization tool may be used to visualize a plurality of customer requests at a cleansing farm and to generate rules for filtering customer requests at a cleansing farm.
Other inventorsSee patent -
Bank Card Fraud Protection System
Issued US 7,980,464
See patentSystems and methods are provided for protecting against bank card fraud and related crimes by providing a distress/fraud trigger at bank card machines, such as automated teller machines and point-of-sale terminals. The trigger initiates certain heightened-security processes designed to stop the crime, control damage, and help apprehend the criminal. For example, in one embodiment, the trigger involves the cardholder inputting a "panic" personal identification code into the bank card machine…
Systems and methods are provided for protecting against bank card fraud and related crimes by providing a distress/fraud trigger at bank card machines, such as automated teller machines and point-of-sale terminals. The trigger initiates certain heightened-security processes designed to stop the crime, control damage, and help apprehend the criminal. For example, in one embodiment, the trigger involves the cardholder inputting a "panic" personal identification code into the bank card machine. The panic personal identification code indicates to a party involved in the bank card transaction that a fraudulent transaction may be taking place. The heightened-security processes may include, for example, displaying that the bank card machine is out-of-order, dispensing money with a GPS tracking device, requesting additional identification steps, instituting delay tactics, notifying on-site personnel, or forwarding audio or video information from the bank card machine to a bank's command center in real time or near real time
-
APPARATUS AND METHODS FOR CARD DISPENSING
Filed US 20100114767
See patentApparatus and methods for providing a card that has a stored value. The apparatus and methods may involve offering the card to a customer, applying branding information to the card, charging a customer account for the value, and dispensing the card. The stored value card may be provided by a machine to a customer. The machine may be a financial institution automated teller machine (ATM). The ATM may transmit instructions to transfer funds from the customer's to one or more of the financial…
Apparatus and methods for providing a card that has a stored value. The apparatus and methods may involve offering the card to a customer, applying branding information to the card, charging a customer account for the value, and dispensing the card. The stored value card may be provided by a machine to a customer. The machine may be a financial institution automated teller machine (ATM). The ATM may transmit instructions to transfer funds from the customer's to one or more of the financial institution's retail partners. The ATM may apply visual information to the card. The visual information may include branding information, a message or any other suitable information.
Recommendations received
1 person has recommended Tim
Join now to viewMore activity by Tim
-
I’m excited to share that I’ve started a new role as the Head of Strategic Intelligence and Operational Readiness at Global Payments Inc. The last…
I’m excited to share that I’ve started a new role as the Head of Strategic Intelligence and Operational Readiness at Global Payments Inc. The last…
Liked by Tim Byrd
-
First visit to the White House! Cyera achieved FedRAMP High and is supporting leading government agencies. We’re humbled to partner with key…
First visit to the White House! Cyera achieved FedRAMP High and is supporting leading government agencies. We’re humbled to partner with key…
Liked by Tim Byrd
-
They (I) don’t call Buffalo, NY “Miami of the North” for nothing. Nowhere I’d rather be during compliance assessment season (spring) 🦬 ☀️ 📑😎
They (I) don’t call Buffalo, NY “Miami of the North” for nothing. Nowhere I’d rather be during compliance assessment season (spring) 🦬 ☀️ 📑😎
Liked by Tim Byrd
-
𝗢𝘂𝗿 𝗴𝗼𝗮𝗹 𝗮𝘁 𝗥𝗦𝗔 𝘄𝗮𝘀 𝗰𝗹𝗲𝗮𝗿: 𝘀𝗲𝗻𝘀𝗲 𝗽𝗿𝗼𝗱𝘂𝗰𝘁-𝗺𝗮𝗿𝗸𝗲𝘁 𝗳𝗶𝘁 𝗮𝘁 𝘀𝗰𝗮𝗹𝗲. Beyond the hugs, countless…
𝗢𝘂𝗿 𝗴𝗼𝗮𝗹 𝗮𝘁 𝗥𝗦𝗔 𝘄𝗮𝘀 𝗰𝗹𝗲𝗮𝗿: 𝘀𝗲𝗻𝘀𝗲 𝗽𝗿𝗼𝗱𝘂𝗰𝘁-𝗺𝗮𝗿𝗸𝗲𝘁 𝗳𝗶𝘁 𝗮𝘁 𝘀𝗰𝗮𝗹𝗲. Beyond the hugs, countless…
Liked by Tim Byrd
-
Sleep is for the weak--RSA Conference is off to a strong start for PwC 🚀 🍸 🔥 We kicked off with a record-breaking evening at our PwC…
Sleep is for the weak--RSA Conference is off to a strong start for PwC 🚀 🍸 🔥 We kicked off with a record-breaking evening at our PwC…
Liked by Tim Byrd
-
Like so many of you, I care deeply about the work I do - but it's easy to get caught up in the pace, the pressure, and the constant pull to keep…
Like so many of you, I care deeply about the work I do - but it's easy to get caught up in the pace, the pressure, and the constant pull to keep…
Liked by Tim Byrd
-
Amazing to kick off #RSAC2026 keynoting Cloud Security Alliance’s Summit. We are the first humans to live through a “technology doubling” in our…
Amazing to kick off #RSAC2026 keynoting Cloud Security Alliance’s Summit. We are the first humans to live through a “technology doubling” in our…
Liked by Tim Byrd
-
The bonfire.... was a great night at Cyber Council 2026
The bonfire.... was a great night at Cyber Council 2026
Liked by Tim Byrd
-
Team M&T was proud to take part in our first‑ever IceCycle, joining 1,500 riders in raising a record‑breaking $915,000 for Roswell Park’s…
Team M&T was proud to take part in our first‑ever IceCycle, joining 1,500 riders in raising a record‑breaking $915,000 for Roswell Park’s…
Liked by Tim Byrd
-
Excited about the partnership team Cyera! Saviynt
Excited about the partnership team Cyera! Saviynt
Liked by Tim Byrd
-
Happy to share that I'm an IBM Champion again in 2026. It’s an honor to work with so many talented people with a passion for the z platform. Thank…
Happy to share that I'm an IBM Champion again in 2026. It’s an honor to work with so many talented people with a passion for the z platform. Thank…
Liked by Tim Byrd
-
I’m excited to share that I’ve been promoted to Senior Sales Executive at Slalom! Grateful for the opportunity to partner with clients, collaborate…
I’m excited to share that I’ve been promoted to Senior Sales Executive at Slalom! Grateful for the opportunity to partner with clients, collaborate…
Liked by Tim Byrd
-
It is a great honor to be a part of the Women’s Leadership Network at M&T Bank ! This month we are celebrating Women’s History Month by honoring the…
It is a great honor to be a part of the Women’s Leadership Network at M&T Bank ! This month we are celebrating Women’s History Month by honoring the…
Liked by Tim Byrd
-
Every year, Cycle for Survival reminds me why this fight matters. This year, it hit closer to home than ever. I rode in memory of my wife - and I…
Every year, Cycle for Survival reminds me why this fight matters. This year, it hit closer to home than ever. I rode in memory of my wife - and I…
Liked by Tim Byrd
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Tim Byrd
274 others named Tim Byrd are on LinkedIn
See others named Tim Byrd