Tyson A. Martin is the creator of technology & cyber security strategies that enable key business objectives and permeate organizational culture at all levels. Tyson strongly believes that by forging strong partnerships, inside of an organization and outside of an organization, a key kinetic energy is built that reduces risk, makes an organization more resilient, and promotes innovation which increases the probability of success.
As VP & Information Security Officer for Lumber Liquidators Tyson is responsible for leading global information security and IT risk strategy.
Prior to joining Lumber Tyson was Chief Information Security Officer for Orvis, Resorts Casino Hotel and PokerStars. Tyson has also served in various IT Security and leadership roles at The Home Depot, The Kotter Group, CWC, Best Buy and Staples.
Outside of the office, Tyson is an active member in the cyber security industry. He has been an executive committee member for the National Retail Federations CISO Council since 2015 and is also a contributor to NIST National Cybersecurity Center of Excellence projects and a part of several PCI Special Interest Groups.
Tyson completed the CISO Executive Program at Carnegie Mellon University and is now an advisory board member for the Master of Science in Information Security & Assurance program at Norwich University.
CISO Executive Program
Master of Science in Information Security & Assurance Advisory Board Member
VP IT Operation & Security | Information Security Officer
Marh 2019 - Present
CISO & Head of IT Strategy, Support, Infrastructure & Architecture
April 2015 - April 2019
Chief Information Security Officer
April 2014 - April 2015
Security Architect & Engineering Manager
June 2013 - April 2014
Director of Information Strategy & Security
April 2012 - June 2013
Co-Founder & VP of IT & Security
September 2009 - February 2014 GA (Volunteer Position)
Sr. Network Infrastructure & Security Manager
December 2007 - April 2012
Microsoft Certified Special Agent
November 2005 - December 2007
August 2004 - November 2005
August 2002 - August 2004
August 2001 - September 2002
IT Intern and Digital Mapping Technician
April 1995 - September 2001
Computer Repair & Software Sales Associate
April 1993 - April 1995
Advisory Board Member - Master of Science in Information Security & Assurance Program
April 2018 - Present
Executive Committee Member of IT Security Council
June 2015 - Present
Special Interest Group Member & Nominated To The PCI Board of Advisors Ballot
January 2016 - Present
MFA & PII Tokenization Project Team Member
January 2016 - Present
Co-Founder & VP of IT Security
September 2009 - February 2014
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.
The demand for skilled information security management professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this area.
CISMs understand the business. They know how to manage and adapt technology to their enterprise and industry.
CRISC is the most current and rigorous assessment available to evaluate the risk management proficiency of IT professionals and other employees within an enterprise or financial institute.Those who earn CRISC help enterprises to understand business risk, and have the technical knowledge to implement appropriate IS controls.
This cybersecurity certification is an elite way to demonstrate your knowledge, advance your career and become a member of a community of cybersecurity leaders. It shows you have all it takes to design, engineer, implement and run an information security program. The CISSP is an objective measure of excellence. It’s the most globally recognized standard of achievement in the industry. And this cybersecurity certification was the first information security credential to meet the strict conditions of ISO/IEC Standard 17024.
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
PThe AWS Certified Solutions Architect – Professional exam validates advanced technical skills and experience in designing distributed applications and systems on the AWS platform.
The Internal Security Assessor program teaches you how to perform internal assessments for your company and recommend solutions to remediate issues related to PCI DSS compliance. Assessors are sponsored by their companies, so when you receive this qualification you will be able to act as a liaison with external PCI auditors and manage interactions with a Qualified Security Assessor (QSA).
The Payment Card Industry Professional is an individual, entry-level qualification in payment security information and provides you with the tools to build a secure payment environment and help your organization achieve PCI compliance. This renewable career qualification is not affected by changes in employment assignments and stays in effect as long as the individual continues to meet requirements. This three-year credential also provides a great foundation for other PCI qualifications.
The ECSA pentest program takes the tools and techniques learned in the Certified Ethical Hacker course (CEH) and enhances abilities into full exploitation by teaching how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning
ITIL Foundation is the lowest level of ITIL certification that a professional can attain. It covers the key principles and terms related to ITIL.
Being an LPT means that you can find chinks in the armor of defense-in-depth network security models with the help of network pivoting, making exploit codes work in your favor, or by writing Bash, Python, Perl, and Ruby scripts. The exam demands that you think on your feet, be creative in your approach, and not rely on the conventional techniques. Outsmarting and out maneuvering the adversary is what sets you apart from the crowd. This completely hands-on exam offers a challenge like no other by simulating a complex network of a multi-national organization in real time. This experience will test your perseverance and focus by forcing you to outdo yourself with each new challenge.
Together our forces are stronger than they ever will be alone. Please feel to connect with me to ask a question or just to say a quick hello.
Tyson is a true professional who gets the job done right the first time. His technical knowledge combined with his IT Security expertise are the best I have seen. He was able to bring to market a legal NJ based online casino within the deadlines while facing extremely difficult challenges. This resulted in a very secure and operational system. I would definitely like to work with Tyson once again.Donald Kneisel - VP of IT at Hard Rock Hotel Casino, Adjunct Professor Drexel University & Rutgers University
Tyson joined our company at a time that we were in sincere need to upgrade all aspect of our technology platform. From day one, he jumped in with both feet demonstrating both sophistication and passion to help anywhere he could add value. In a short period of time, Tyson has vastly improved our companywide technology platform while making it easy for our entire employee base to understand.Paul Conley - CEO Carithers Wallace and Courtenay
Tyson displayed a tremendous technical acumen as well as strong leadership and a commitment to doing things the right way. I found him to be a tremendously valuable asset to the security team and a true professional.Ahmad Hamilton - Security Architect AlgoSec
Working with Tyson is flat-out fun. He's interesting, level headed, engergetic and dependable. He has a passion for technology, and it shows in his approach to work. I look forward to having a chance to work with him in the future and highly recommend him to potential partners and employers.Chuck Ebbets - Director Tryon International Equestrian Center
Tyson from the start gave an understanding of his expertise and commitment. In addition, Tyson imparted an ability to breakdown the most complex items to C-level executives without being condescending. His advice was well received.JD Grant - Commissioner Georgia Department of Revenue
Tyson from the first day here at The Kotter Group stepped in and took off. He immediately began taking care of trouble issues that our past administrators could not handle. He is always prompt, understanding and professional. Tyson has a thirst for knowledge, he tries to really understand the issue at hand and never settles with well it just won't work. He keeps our team up to date with his latest finds and also educates us on any new information he has learned. He has been a great addition to The Kotter Group and I thoroughly enjoyed working with him.Ashley Gaines - Project Manager Xcentric
Tyson was my “IT Magician” - whenever I had a problem on my computer, he would magically make it disappear! (Never once uttering the word “user-error” - thanks Tyson!) For our entire company, his technology knowledge and experience, his patience and at-your-service attitude, and perhaps most importantly his dedication to doing whatever it took to keep our customers satisfied is simply beyond measure. To anyone reading this, I assure you it is a joy to work with Tyson Martin.Chele Anderson Snow - Global Workplace Strategy & Operations Coca-Cola
Tyson Martin has been an invaluable asset to our company. He developed process and procedures for our disaster recovery program as well as our storage and backup management. His insight into the future need and use of technology is unrivaled. It has been a true pleasure to work with Tyson.Ivan Ulloa - IT Project Manager Atlanta Braves
Tyson has distinguished himself as a true "out-of-the-box" thinker and reliable resource within the IT consulting field. I have worked with and for many professionals in the field, and Tyson is among the very best I've ever encountered. I have seen Tyson work and flourish under tremendous duress from tight client deadlines, unrealistic expectations, and even unexpected technical disasters with grace, humility, and precision. He not only offers proactive solutions for a client's current needs, but that of their future and unexpected needs as well. A consultant like Tyson is an indespensible asset to any company regardless of size and scope.Desmond Hardy - National Sales Consultant ConstructConnect
I had the priviledge of managing Tyson for 18 months. Tyson's greatest attributes were his relentless customer service skills and his relationship building skills with clients. Tyson was able to grow our Best Buy for Business sales incrementally every month leading his peer group consistently. Tyson presented himself very well and had the utmost confidence with his technical ability and communication skills. His work ethics were impeccable and his integrity was never questioned. Tyson has the capacity to perform in multiple roles whether it be for support or leadership. I would highly recommend Tyson for any position as he has the ability to adjust to any work environment.Colson Hillier - General Manager Best Buy ConstructConnect