>

Case No. CGC-13-529310 ~ CITY AND COUNTY OF SAN FRANCISCO vs. PACIFIC GAS AND ELECTRIC COMPANY

Share:

Board of Directors: Alliant Insurance Services

Board of Directors: Alliant Insurance Services

Thomas W. CorbettChairman and Chief Executive Officer
Alliant Insurance Services
Thomas Corbett serves as Chairman and Chief Executive Officer of Alliant Insurance Services, Inc. In addition, he sits on the board of directors of Alliant Insurance Services. Mr. Corbett joined Alliant in 1977 as a producer and launched the company's Newport Beach-based public entity group.
Prior to joining Alliant, Mr. Corbett was with Allendale Insurance in Los Angeles and spent three years as a loss prevention engineer at Factory Mutual Engineering Association.
Mr. Corbett is a graduate of California State University, Long Beach.
Gregory Zimmer
President
Alliant Insurance Services 
Greg Zimmer serves as President of Alliant Insurance Services, Inc. and is a member of the company’s board of directors. In conjunction with other members of senior management, Mr. Zimmer is responsible for implementing the strategic direction of the firm. He also is responsible for corporate operations and all mergers and acquisitions activity.
Prior to joining Alliant, Mr. Zimmer and his partners built a significant financial services firm that ultimately was sold to GMAC, where he served as Senior Vice President. His career also includes corporate finance and venture capital experience while serving as Vice President at Security Pacific, which ultimately merged with Bank of America.
Mr. Zimmer holds a bachelor’s degree in economics/systems science from the University of California, Los Angeles (UCLA) and a master’s degree from the Anderson Graduate School of Management at UCLA.
Ralph HurstPresident, National Brokerage Group
Alliant Insurance Services
Ralph Hurst serves as President of the National Brokerage Group for Alliant Insurance Services, Inc., and is a member of the company’s executive committee. He has played a central role in the establishment and management of several of the firm’s major programs, including the Public Entity Property Insurance Program (PEPIP), the Hospital All Risk Property Program (HARPP), and the Tribal Property Insurance Program (TPIP). Mr. Hurst joined Alliant in 1987 as a producer after a 10-year tenure with the Factory Mutual Group.
He earned a bachelor’s degree in industrial technology-fire science from California State University, Los Angeles.
James D. CareySenior Principal
Stone Point Capital
James D. Carey is a Senior Principal of Stone Point and a member of the Investment Committees of the Trident Funds. He joined Stone Point in 1997 from Merrill Lynch & Co.
Prior to joining Merrill Lynch & Co., Mr. Carey was a corporate attorney with Kelley Drye & Warren LLP. Mr. Carey is a director of a number of portfolio companies of the Trident Funds, including Alliant Insurance Services, Inc., Citco III Limited, Enstar Group Limited, the holding company of Amherst Pierpont Securities, Oasis Outsourcing Corporation, Privilege Underwriters, Inc., and Sedgwick Claims Management Services, Inc.
He holds a B.S. from Boston College, a J.D. from Boston College Law School, and an M.B.A. from the Duke University Fuqua School of Business.
Nicolas D. ZerbibSenior Principal
Stone Point Capital
Nicolas D. Zerbib is a Senior Principal of Stone Point and a member of the Investment Committees of the Trident Funds. He joined Stone Point in 1998.
Previously, he was an Analyst at Goldman, Sachs & Co. from 1993 to 1996. Mr. Zerbib is a director of a number of portfolio companies of the Trident Funds, including Alliant Insurance Services, Inc., The ARC Group, LLC, Freepoint Commodities LLC, Helios’ holding company, Hodges-Mace Holdings, LLC, NXT Capital, Inc., Preferred Concepts LLC, Privilege Underwriters, Inc., StoneRiver Group, L.P., and Yadkin Financial Corporation.
He holds a B.A. from Amherst College and an M.B.A. from the Harvard Graduate School of Business Administration.
James R. MatthewsPrincipal
Stone Point Capital
James R. Matthews is a Principal of Stone Point. He joined Stone Point in 2011 from Evercore Partners, where he was a Senior Managing Director and Co-Head of Private Equity.
Previously, Mr. Matthews was with Welsh, Carson, Anderson & Stowe, where he was a General Partner and focused on investments in the information services and business services sectors, and a General Partner of J.H. Whitney & Co. He started his career as an Analyst in the mergers and acquisitions group of Salomon Brothers Inc. Mr. Matthews is a director of Black Mountain Systems, LLC, Eagle Point Credit Company Inc., Eagle Point Credit Management LLC, Enhanced Capital Holdings, Inc., NEBCO Insurance Services, LLC, and Tree Line Capital Partners. In addition, he is a board member of Frenkel & Company and he is a former director of Bollinger, Inc., Fidelity Sedgwick Holdings, Inc., Ruesch International Inc. and Headstrong Inc.
He holds a B.S. from Boston College and an M.B.A. from the Harvard Graduate School of Business Administration.
Share:

The Metcalf Sniper Attack and the Substation Parts List

Working with the Sharepoint Server

PG&E San Bruno and CPUC
Insider betails from Pete Bennett former PG&E Programmmer.
Hired in early 2011 to work on projects connected to San Bruno explosion parallel and parallel hydrotesting program.

The 2001 NIMDA Computer Virus

The 9/11 Computer Virus and AT&T Data Breach >> more
to a 17 year FBI investigation connected to another breach at AT&T (SBC Services) where six months after the San Bruno explosion was out arresting police officers in Contra Costa County.

The Terrorists Breach

The Mother Lode of Lost Data more Valuable than Gold >> more
The Sharepoint Server Breach The substansial loss of thousands of internal PG&E documents filled with best mapping details for made to order terrorism whether it be Domestic, International or Economic.

Evidence of Breach

See the partial list of files and reasonable explantion of what was taken.



IT Security Product Specialist, Senior

Date: Nov 30, 2018
Location: San Francisco, CA, US, 94105
Company: Pacific Gas And Electric Company

Requisition ID # 18017 


Job Category : Information Technology 
Job Level : Individual Contributor
Business Unit: Gas Operations
Job Location : Concord; Concord; Sacramento; San Francisco; San Ramon
Company

Based in San Francisco, Pacific Gas and Electric Company, a subsidiary of PG&E Corporation (NYSE:PCG), is one of the largest combined natural gas and electric utilities in the United States. And we deliver some of the nation's cleanest energy to our customers in Northern and Central California. For PG&E, Together, Building a Better California is not just a slogan. It's the very core of our mission and the scale by which we measure our success. We know that the nearly 16 million people who do business with our company count on our more than 24,000 employees for far more than the delivery of utility services. They, along with every citizen of the state we call home, also expect PG&E to help improve their quality of life, the economic vitality of their communities, and the prospect for a better future fueled by clean, safe, reliable and affordable energy.

Pacific Gas and Electric Company is an Affirmative Action and Equal Employment Opportunity employer that actively pursues and hires a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, sex, age, religion, physical or mental disability status, medical condition, protected veteran status, marital status, pregnancy, sexual orientation, gender, gender identity, gender expression, genetic information or any other factor that is not related to the job.


Department Summary
The Cybersecurity team enables PG&E to achieve its mission by providing governance, oversight, and support of operational resiliency and asset safeguards in a relevant, timely and data-driven manner. The Cybersecurity team consists of security professionals in their chosen disciplines, including:
  • Cybersecurity Services
  • Risk & Strategy
  • Security Intelligence & Operations
  • Compliance 
Working together, we review the current cyber threat landscape and lend our expertise to help the company understand its security posture and act on the highest priority risks.
The Cybersecurity team takes a proactive approach to security by focusing on the cyber risks PG&E faces. Cybersecurity's methodology and framework synthesizes current legal, regulatory, and operating mandates with PG&E’s business goals and operations. By taking this information and focusing on the cyber risks unique to individual Lines of Business (LOB), Cybersecurity helps PG&E’s LOBs make informed decisions about where to invest their resources.

Position Summary
PG&E's IT Cybersecurity Security Infrastructure Team partners with various IT and BT organizations on security issues within PG&E. Work with Managers, Team Leads, Specialists, Security Teams, and Subject Matter Experts to remediate security gaps. Facilitate and assist in alerting, coordination of remediation effort, analyzing, tracking, and reporting its progress. Lead workshops, presentations, and discussions with leaders, Line of Business, and other key stakeholders. Deploy, Manage, and utilize security tools leveraged by Security Infrastructure to achieve PG&E mission.

The headquarter location may be in any of the following cities: Concord, Fairfield, Sacramento, San Francisco, or San Ramon.

Qualifications
Minimum:
  • AA/AS in Computer Science, Business, Engineering or equivalent work experience
  • Minimum of 4 years of relevant technical experience, two years of which should support or deploy Endpoint Malware Protection

Desired:
  • Bachelor of Science in Computer Science
  • 6 years of technical experience
  • Achieve positive remediation results with multiple projects and remediation efforts running simultaneously
  • Microsoft Office, Remedy, SharePoint, Security tools
  • Self-motivated
  • Able to follow Safety First principles
  • Results driven, and customer focused
  • Multi-Platform knowledge (UNIX/LINUX, Windows Servers/Desktops, Cisco hardware, etc)
  • Skilled at being team player
  • Energizes coworkers, and maintaining a positive attitude towards the team and the business directions
  • Strong analytical, critical thinking and decision-making skills
  • Familiar with one or more security controls / risk management frameworks (ISO, NIST, etc.)
  • Advanced knowledge and understanding of regulatory and compliance requirements such as SOX, NERC, CIP, EPA, etc.

Job Responsibilities

Security Controls
  • Defend systems against unauthorized access, modification and/or destruction.
  • Monitor and support Endpoint Malware Protection software; PAN Traps, McAfee, Microsoft SCEP/Defender, etc.
  • Identify security abnormalities and report violations.
  • Train peer employees in security awareness, protocols and procedures.
  • Respond immediately to security incidents and provide post-incident analysis.
  • Partner with the groups within Information/Business Technology and Lines of Businesses on security.
  • Facilitate and assist in the coordination of remediation efforts, tracking and reporting its progress.
  • Partner with Cybersecurity, Compliance teams, and other key stakeholders to alert or resolve the detected anomalies.
  • Document and manage Cybersecurity process, procedures, policies, control documentation, and etc.
  • Facilitates/Leads Root Cause Analysis.
  • Research and recommend security controls and tools upgrades.
  • Participate in Security projects.
  • Server as mentor for newer employees and/or delegate of supervisor/manager.
  • Prepare and present recommendations and alternatives to senior management.

Product Management
  • Performs product management duties over a sector of technology products or services or assigned to high profile products or services.
  • Oversee and manage the continuous product lifecycle from research, planning and implementation to retirement.
  • Introduce new innovative solutions that enhance the existing capabilities of the product(s) or service(s). Develop methods of automation and optimization.
  • Partner with peers in the accountable planning organization to develop the strategic vision and understand how it applies to the targeted products or services.
  • Understand the industry’s product positioning, the product’s key benefits, and the product’s targeted users. Partner close with the vendor to influence the product’s future capabilities.

SUPPORT
  • Work closely with IT professionals to troubleshoot and resolve complex operational issues.
  • Drive conventions and standards (such as usage or configuration) across multiple products to maximize user experience.
  • Be a third-tier support specialist to other IT professionals for escalated operational issues.


 sss
  1. , , , , ,
Share:

The 9/11 Computer Virus and AT&T Data Breach

Share:

The Peterson Family Trust - The Underlying Conspiracy


Share:

The Pipeline Inspection Process

Things are getting better
By Debbie Felix
SAN FRANCISCO — Over the past few years, PG&E customers have been hearing about how the company uses high-tech inspection tools to assess the condition of natural gas pipelines from the inside. Often called “smart pigs,” these tools travel inside pipelines to identify dents, cracks and corrosion before they become a problem.
Now, PG&E is working with a new, cutting edge technology that will look for similar signs — like corrosion or dents — on the outside of gas pipelines.
First developed for the dental industry, the 3D Toolbox is as easy to use as a digital camera.  With a click, it captures an image and provides measurements, giving PG&E real-time information about the condition of pipeline surfaces.
And it’s fast.

The 3D Toolbox allows PG&E to get detailed images of pipelines very quickly. (Photo by James Green.)
Images are captured in seconds and multiple views can be stitched together in a matter of minutes.
“The benefits of the tool are that it provides traceable, repeatable measurements. It’s simple to use and it speeds up the pipe assessment process, which could take hours or days before,” said Gerry Bong, a PG&E R&D and Innovation gas engineer. “I think as far as PG&E is concerned, this is a great opportunity to bring in cutting-edge technology, such as the 3D Toolbox, to improve the efficiency of our process.”
The 3D camera is light-weight and easy to set up at construction sites. Able to capture the same 3D measurements every time from any angle, the device is simple to operate and gives PG&E a detailed, traceable record.
Images are viewed by engineers and corrosion experts on a laptop set up at the dig site. The collected data is automatically fed into calculation tools to generate an assessment within minutes, a process that normally would take hours or even days to complete. From there, PG&E engineers can to put together a corrective action plan immediately.
“R&D and Innovation is working with PRCI (the Pipeline Research Council International) and other collaborative R&D organizations to bring new solutions into Gas Operations. What we see today is a result of this work, which we are testing,” said François Rongere, R&D and Innovation manager at PG&E.
The 3D Toolbox is just another example of the many ways PG&E is leveraging the latest technology to ensure the safety of its natural gas system for its customers.
Share:

The Southern Pacific Conspiracy and Donald Rumsfeld



The PG&E Sharepoint Server Databreach

The unknown breach of over 20,000 pages comprised of maps, pipelines, fiber optic locations, security and electric grid.
What is the the Sharepoint Server Action at is the the Sharepoint Server

Judge PG&E for yourself

Pete Bennett while contracted to PG&E was arrested in Walnut Creekon July 7, 2012 while enroute to Hillside Covenant Church Youth Meetings.   His son was taken to Hillside Covenant never to be seen again. Bennett filed kidnapping report for parental abuction, investigation ongoing.
PG&E has been fully informed, had adtBennett was unaware of the breach until he recognized files connected to the Metcalf Sniper attack.  
The Project
The Hydrotesing Project
Racketeering
Police Corruption
Collateral Victims
The Contra Costa Bar Assocation
Proposition Hate
Witness Killer and Arsonist
Public Law
Cases Cold and Closed
Amber Alert
Kinder Morgan
Share:

PG&E Data Breach Exhibits #campfire

Share:

The Untold PG&E Terrorism story

Share:

What is the the PG&E Sharepoint Server





Working with the Sharepoint Server

Details from former PG&E Programmmer hired in 2011 to assist with the San Bruno Explosion parallel to FBI was arresting police officers. .
Learn more >>

IT Security Product Specialist, Senior

Date: Nov 30, 2018
Location: San Francisco, CA, US, 94105
Company: Pacific Gas And Electric Company

Requisition ID # 18017 
Job Category : Information Technology 
Job Level : Individual Contributor
Business Unit: Gas Operations
Job Location : Concord; Concord; Sacramento; San Francisco; San Ramon
Company

Based in San Francisco, Pacific Gas and Electric Company, a subsidiary of PG&E Corporation (NYSE:PCG), is one of the largest combined natural gas and electric utilities in the United States. And we deliver some of the nation's cleanest energy to our customers in Northern and Central California. For PG&E, Together, Building a Better California is not just a slogan. It's the very core of our mission and the scale by which we measure our success. We know that the nearly 16 million people who do business with our company count on our more than 24,000 employees for far more than the delivery of utility services. They, along with every citizen of the state we call home, also expect PG&E to help improve their quality of life, the economic vitality of their communities, and the prospect for a better future fueled by clean, safe, reliable and affordable energy.

Pacific Gas and Electric Company is an Affirmative Action and Equal Employment Opportunity employer that actively pursues and hires a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, sex, age, religion, physical or mental disability status, medical condition, protected veteran status, marital status, pregnancy, sexual orientation, gender, gender identity, gender expression, genetic information or any other factor that is not related to the job.


Department Summary
The Cybersecurity team enables PG&E to achieve its mission by providing governance, oversight, and support of operational resiliency and asset safeguards in a relevant, timely and data-driven manner. The Cybersecurity team consists of security professionals in their chosen disciplines, including:
  • Cybersecurity Services
  • Risk & Strategy
  • Security Intelligence & Operations
  • Compliance 
Working together, we review the current cyber threat landscape and lend our expertise to help the company understand its security posture and act on the highest priority risks.
The Cybersecurity team takes a proactive approach to security by focusing on the cyber risks PG&E faces. Cybersecurity's methodology and framework synthesizes current legal, regulatory, and operating mandates with PG&E’s business goals and operations. By taking this information and focusing on the cyber risks unique to individual Lines of Business (LOB), Cybersecurity helps PG&E’s LOBs make informed decisions about where to invest their resources.

Position Summary
PG&E's IT Cybersecurity Security Infrastructure Team partners with various IT and BT organizations on security issues within PG&E. Work with Managers, Team Leads, Specialists, Security Teams, and Subject Matter Experts to remediate security gaps. Facilitate and assist in alerting, coordination of remediation effort, analyzing, tracking, and reporting its progress. Lead workshops, presentations, and discussions with leaders, Line of Business, and other key stakeholders. Deploy, Manage, and utilize security tools leveraged by Security Infrastructure to achieve PG&E mission.

The headquarter location may be in any of the following cities: Concord, Fairfield, Sacramento, San Francisco, or San Ramon.

Qualifications
Minimum:
  • AA/AS in Computer Science, Business, Engineering or equivalent work experience
  • Minimum of 4 years of relevant technical experience, two years of which should support or deploy Endpoint Malware Protection

Desired:
  • Bachelor of Science in Computer Science
  • 6 years of technical experience
  • Achieve positive remediation results with multiple projects and remediation efforts running simultaneously
  • Microsoft Office, Remedy, SharePoint, Security tools
  • Self-motivated
  • Able to follow Safety First principles
  • Results driven, and customer focused
  • Multi-Platform knowledge (UNIX/LINUX, Windows Servers/Desktops, Cisco hardware, etc)
  • Skilled at being team player
  • Energizes coworkers, and maintaining a positive attitude towards the team and the business directions
  • Strong analytical, critical thinking and decision-making skills
  • Familiar with one or more security controls / risk management frameworks (ISO, NIST, etc.)
  • Advanced knowledge and understanding of regulatory and compliance requirements such as SOX, NERC, CIP, EPA, etc.

Job Responsibilities

Security Controls
  • Defend systems against unauthorized access, modification and/or destruction.
  • Monitor and support Endpoint Malware Protection software; PAN Traps, McAfee, Microsoft SCEP/Defender, etc.
  • Identify security abnormalities and report violations.
  • Train peer employees in security awareness, protocols and procedures.
  • Respond immediately to security incidents and provide post-incident analysis.
  • Partner with the groups within Information/Business Technology and Lines of Businesses on security.
  • Facilitate and assist in the coordination of remediation efforts, tracking and reporting its progress.
  • Partner with Cybersecurity, Compliance teams, and other key stakeholders to alert or resolve the detected anomalies.
  • Document and manage Cybersecurity process, procedures, policies, control documentation, and etc.
  • Facilitates/Leads Root Cause Analysis.
  • Research and recommend security controls and tools upgrades.
  • Participate in Security projects.
  • Server as mentor for newer employees and/or delegate of supervisor/manager.
  • Prepare and present recommendations and alternatives to senior management.

Product Management
  • Performs product management duties over a sector of technology products or services or assigned to high profile products or services.
  • Oversee and manage the continuous product lifecycle from research, planning and implementation to retirement.
  • Introduce new innovative solutions that enhance the existing capabilities of the product(s) or service(s). Develop methods of automation and optimization.
  • Partner with peers in the accountable planning organization to develop the strategic vision and understand how it applies to the targeted products or services.
  • Understand the industry’s product positioning, the product’s key benefits, and the product’s targeted users. Partner close with the vendor to influence the product’s future capabilities.

SUPPORT
  • Work closely with IT professionals to troubleshoot and resolve complex operational issues.
  • Drive conventions and standards (such as usage or configuration) across multiple products to maximize user experience.
  • Be a third-tier support specialist to other IT professionals for escalated operational issues.


 sss
  1. , , , , ,
Share:

Supervisor Candace Anderson

https://drive.google.com/open?id=1vrrhQmeEoJ3TahVKPLcJmjd7db_78RDY 1vrrhQmeEoJ3TahVKPLcJmjd7db_78RDY 1nUljkSvPSj1Wd1RfgN2bzeKsT8-TOu38
Share:

FPPC Test

Share:

The Other Explosions

Bootstrap Thumbnail First

The Murder Trilogy

Endlessly documented events of indifference and lies.
Bootstrap Thumbnail Second

The Nordstrom Murders

My first real date with Alicia Driscoll and her daughter was a simple June picnic at her house on Norris Road. Just another Contra Costa County Murder Suicide.
Bootstrap Thumbnail Third

A Contra Costa Times Murder Link

Contra Costa Times TriValley knows the Alamo 1st Mormons who stole my legal file mid-December 2004. He was well informed of the near fatal Bennett v. Collins incident and full knowledge of the truck arson prior the Kinder Morgan explosion that killed five in November 2004. The failure leads upstream to Contra Costa District Attorney Mark Peterson (Purjury)
Share:

Jesus Soto, Senior Vice President of Gas Operations

Share:

District Attorney Mark Peterson Who? What? Why? Felony Conviction / Disbarments


Share:

Cmdr Chris Wenzel Contra Costa Sheriff Office

Share:

FBI Agent Frank Doyle Jr. Who? What? Why? Former FBI Bomb School and Perjurer

Share:

CMDR George Driscoll ~ Who? What? Why?


Share:

Pete Bennett Walnut Creek

A place holder using my name - most know I live in Walnut Creek so Pete Bennett Walnut Creek works wonders

Share:

PG&E Board of Directors

There is a long list of details of current and former members of the Board, the executive level down to the workers wearing the boots. 
Share:

PG&E Incidents

The Searchable PG&E and CalFire List.  
Share:

Title 18, U.S.C., Section 245 - Federally Protected Activities

This man signs at Gay Bars, has LGBT Friends but no longer does hang out with friends of Proposition 8.   




In August 2004, this man 1987 F-250 was targeted for his Prudential Life Insurance valued at $855,000, his $500,000 trust was forged away, and his legal files stolen by the financiers of Proposition 8, a month later a Danville Building Inspector attacked him in own home.  



Title 18, U.S.C., Section 245 - Federally Protected Activities 

1) This statute prohibits willful injury, intimidation, or interference, or attempt to do so, by force or threat of force of any person or class of persons because of their activity as:
  1. A voter, or person qualifying to vote...;
  2. a participant in any benefit, service, privilege, program, facility, or activity provided or administered by the United States;
  3. an applicant for federal employment or an employee by the federal government;
  4. a juror or prospective juror in federal court; and
  5. a participant in any program or activity receiving Federal financial assistance.
2) Prohibits willful injury, intimidation, or interference or attempt to do so, by force or threat of force of any person because of race, color, religion, or national origin and because of his/her activity as:
  1. A student or applicant for admission to any public school or public college;
  2. a participant in any benefit, service, privilege, program, facility, or activity provided or administered by a state or local government;
  3. an applicant for private or state employment, private or state employee; a member or applicant for membership in any labor organization or hiring hall; or an applicant for employment through any employment agency, labor organization or hiring hall;
  4. a juror or prospective juror in state court;
  5. a traveler or user of any facility of interstate commerce or common carrier; or
  6. a patron of any public accommodation, including hotels, motels, restaurants, lunchrooms, bars, gas stations, theaters...or any other establishment which serves the public and which is principally engaged in selling food or beverages for consumption on the premises.
3) Prohibits interference by force or threat of force against any person because he/she is or has been, or in order to intimidate such person or any other person or class of persons from participating or affording others the opportunity or protection to so participate, or lawfully aiding or encouraging other persons to participate in any of the benefits or activities listed in items (1) and (2), above without discrimination as to race, color, religion, or national origin.
Punishment varies from a fine or imprisonment of up to one year, or both, and if bodily injury results or if such acts include the use, attempted use, or threatened use of a dangerous weapon, explosives, or fire shall be fined or imprisoned up to ten years or both, and if death results or if such acts include kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill, shall be subject to imprisonment for any term of years or for life or may be sentenced to death.

Share:

multistage intrusion campaign

Share:

Department of Homeland Security

The laws controlling the investigative of purview of Department of Homeland Security require significant and immediate changes in order to protect the energy industry.  The administrative law model where the utilities can game the system for years if needed. 

The gaming resulted in devastating fires, tragedies and economic costs still being calculated.   
Share:

PG&E Announces New IT Officers

PG&E Announces New IT Officers

Release Date: August 06, 2015
Contact: PG&E External Communications (415) 973-5930
SAN FRANCISCO, Calif. — Pacific Gas and Electric Company (PG&E) today announced the appointments of Bernard Cowens as vice president and Chief Information Security Officer and Kathleen Kay as vice president, Business Technology.
Cowens and Kay, who were both elected by the Board of Directors as officers of the utility, will report to Senior Vice President and Chief Information Officer Karen Austin.
"Our ability to effectively manage and protect information is vitally important and challenging. We are very pleased to welcome Bernie and Kathy, who both have exceptionally strong backgrounds, to the PG&E team," said PG&E Corporation Chairman and CEO Tony Earley.
Cowens joins PG&E, effective Aug. 24, from his role as Chief Information Security Officer at First American Financial Corporation. Cowens has extensive experience in information technology and cyber and physical security and previously held senior and executive-level roles in the private sector and the military.
Cowens served in the military from 1980 to 2000, completing his service as Chief Technology Officer and Chief Security Officer for the Defense Intelligence Agency in Los Angeles. Thereafter, he held executive-level roles in information technology with SafeNet Inc., where he was Chief Information Officer; and PricewaterHouseCoopers LLP, where he was director of risk and security advisory services. He subsequently served in senior information security roles for Experian and the Automobile Club of Southern California before joining First American Financial Corporation.
He holds a bachelor's degree in information systems management from the University of Maryland and a master's degree in management information systems from Bowie State University.
Kay, in her new role at PG&E, effective Sept. 1, will be responsible for business technology delivery, primarily focused on PG&E’s strategic solutions such as mobile, data analytics and customer applications.
Kay had a career spanning more than two decades at General Motors. She began as an associate programmer and systems analyst and worked in progressively more responsible roles, concluding with her role as director of application development and support for OnStar.
She served as senior vice president of business technology services for Comerica Bank in Michigan from 2007 to 2012. Kay left Comerica to serve as senior vice president of application services for SunTrust Bank in Atlanta, where she also served as the executive chair for diversity.
Kay holds a bachelor's degree in computer science from Wayne State University and a master's degree in engineering science from the Rensselaer Polytechnic Institute.
About PG&E
Pacific Gas and Electric Company, a subsidiary of PG&E Corporation(NYSE:PCG), is one of the largest combined natural gas and electric utilities in the United States. Based in San Francisco, with more than 20,000 employees, the company delivers some of the nation's cleanest energy to nearly 16 million people in Northern and Central California. For more information, visit www.pge.com/ and www.pge.com/en/about/newsroom/index.page.
Share:

The Unsung Victims of Energy

Share:

I Sometimes Visit Gay Friendly Bars to Sing - Please don't hate me anymore

I know I've been targeted for hanging around my gay friends.  I know that my role in PG&E is one reason amongst others I've been targeted with tickets, fines and arrests.
Share:

Witness Intimidation to Kidnapping

Share:

HATE CRIME LAWS

PLEASE STOP BEATING ME
sexual orientation , disability, employment
I tried to run for City Council does that count?





HATE CRIME LAWS


ABOUT HATE CRIMES

Since 1968, when Congress passed, and President Lyndon Johnson signed into law, the first federal hate crimes statute, the Department of Justice has been enforcing federal hate crimes laws.  The 1968 statute made it a crime to use, or threaten to use, force to willfully interfere with any person because of race, color, religion, or national origin and because the person is participating  in a federally protected activity, such as public education, employment, jury service, travel, or the enjoyment of public accommodations, or helping another person to do so.  In 1968, Congress also made it a crime to use, or threaten to use, force to interfere with housing rights because of the victim’s race, color, religion, sex, or national origin; in 1988, protections on the basis of familial status and were added.  In 1996, Congress passed the Church Arson Prevention Act, 18 U.S.C. § 247.  Under this Act, it is a crime to deface, damage, or destroy religious real property, or interfere with a person’s religious practice, in situations affecting interstate commerce.  The Act also bars defacing, damaging, or destroying religious property because of the race, color, or ethnicity of persons associated with the property.  
In 2009, Congress passed, and President Obama signed, the Matthew Shepard and James Byrd Jr. Hate Crimes Prevention Act, expanding the federal definition of hate crimes, enhancing the legal toolkit available to prosecutors, and increasing the ability of federal law enforcement to support our state and local partners.  This law removed then existing jurisdictional obstacles to prosecutions of certain race- and religion-motivated violence.,, and added new federal protections against crimes based on gender, disability, gender identity, or sexual orientation.  Before the Civil Rights Division prosecutes a hate crime, the Attorney General or someone the Attorney General designates must certify, in writing, that (1) the state does not have jurisdiction; (2) the state has requested that the federal government assume jurisdiction; (3) the verdict or sentence obtained pursuant to state charges did not demonstratively vindicate the federal interest in eradicating bias-motivated violence; or (4) a prosecution by the United States is in the public interest and necessary to secure substantial justice.  In the seven years since the passage of the Shepard-Byrd Act, the Justice Department has charged 72 defendants and convicted 45 defendants under this statute.  In total, as of July 15, 2016, the department has charged 258 defendants for hate crimes under multiple statutes over the last seven years.

The Matthew Shepard and James Byrd Jr. Hate Crimes Prevention Act of 2009, 18 U.S.C. § 249 
The Shepard Byrd Act makes it a federal crime to willfully cause bodily injury, or attempt to do so using a dangerous weapon, because of the victim’s actual or perceived race, color, religion, or national origin. The Act also extends federal hate crime prohibitions to crimes committed because of the actual or perceived religion, national origin, gender, sexual orientation, gender identity, or disability of any person, only where the crime affected interstate or foreign commerce or occurred within federal special maritime and territorial jurisdiction.  The Shepard-Byrd Act is the first statute allowing federal criminal prosecution of hate crimes motivated by the victim’s actual or perceived sexual orientation or gender identity.

Criminal Interference with Right to Fair Housing, 42 U.S.C. § 3631
This statute makes it a crime to use, or threaten to use force to interfere with housing rights because of the victim’s race, color, religion, sex, disability, familial status, or national origin. 
Damage to Religious Property, Church Arson Prevention Act, 18 U.S.C. § 247
This statute prohibits the intentional defacement, damage, or destruction of religious real property because of the religious nature of the property, where the crime affects interstate or foreign commerce, or because of the race, color, or ethnic characteristics of the people associated with the property.  The statute also criminalizes the intentional obstruction by force, or threat of force of any person in the enjoyment of that person’s free exercise of religious beliefs.
 I don't believe in God but you can 
Violent Interference with Federally Protected Rights, 18 U.S.C. § 245
This statute makes it a crime to use, or threaten to use force to willfully interfere with any person because of race, color, religion, or national origin and because the person is participating  in a federally protected activity, such as public education, employment, jury service, travel, or the enjoyment of public accommodations, or helping another person to do so.

Conspiracy Against Rights, 18 U.S.C. § 241
This statute makes it unlawful for two or more persons to conspire to injure, threaten, or intimidate a person in any state, territory, or district in the free exercise or enjoyment of any right or privilege secured to him or her by the Constitution or the laws of the U.S.
Share:

The ENRON PAYOFF and Former DA Mark Peterson

Share:

Popular Posts

Blog Archive

Ad Home

More Links

Follow Us

No one has ever become poor by giving, Please Donate

Flickr Images

Featured

javascript:void(0)
Powered by Blogger.

Comments

Facebook

Search This Blog

Find Us On Facebook

Random Posts

Recent Posts

Header Ads

BlogRoll

Labels

Labels

Popular Posts

Recent Posts

Unordered List

  • Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
  • Aliquam tincidunt mauris eu risus.
  • Vestibulum auctor dapibus neque.

Pages

Theme Support

Need our help to upload or customize this blogger template? Contact me with details about the theme customization you need.