Ben Boraas


Data Privacy Protection
Vendor Risk Management
Security Risk Assessments
Security Program Development
Secure Communications
Data Forensics and Cyber Investigations
Incident Response
Wireless Technologies
Security Awareness Training

Ben Boraas

Information Security Consultant


Ben is an accomplished and accredited information security and data privacy professional with over 15 years of experience in both the Intelligence Community (IC) and the corporate sector. Primary proficiencies include security risk assessments, security program development, secure communications, privacy risk reviews, data forensics, wireless technologies, technical surveillance counter measures, applied defensive intelligence, security awareness training, incident response, vendor risk management, privacy protection, cyber fraud, and insider threat investigations.


  • Matured cyber defense and incident-response practices for Fidelity National Financial and Raymond James Financial
  • Conducted cyber fraud and insider threat investigations
  • Established and managed secure telecommunication sites in South America, Europe, Africa, Near East, and Asia for the US Central Intelligence Agency (US CIA) for nearly four years
  • Conducted wireless technical operations targeting foreign telecommunications for the US CIA for over three years
  • Regularly briefed senior Intelligence Community (IC) leaders on technical capabilities for the US Central Intelligence Agency
  • Conducted battle zone forensic site exploitation (SITEX - documents, digital media, cellular devices) for the US Army’s National Ground Intelligence Center (NGIC)
  • Served as an instructor to US military forces on forensic site exploitation (SITEX - documents, digital media, cellular devices) for the US Army’s National Ground Intelligence Center (NGIC).
  • Drove security controls in an enterprise Bring Your Own Device (BYOD) mobile initiative for a major corporation
  • Enriched privacy protection controls and practices
  • Provided technical security and vendor requirements in enterprise projects
  • Consulted on EU privacy principles and performed data mapping exercises to determine compliance scoping
  • Enhanced security awareness training
  • Performed electronic prescriptions applications (EPCS) security audits for pharmacy and prescribing applications


  • University of Phoenix
    Master’s in Business Administration
  • University of Minnesota
    Bachelor of Arts in Criminology


  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Auditor (CISA)
  • Certified Computer Forensics Examiner (CCFE)


    • Office


    • Email