Rachael (pronounced ra’kel) Levitch is Chief Information Security Officer (CISO) at Charles Edda and C. Bouley since 2014. Her components of advisory include cybersecurity and performance activities, project management analysis and human performance measures, and coordination of capacity management and compliance with regulatory IT requirements (and provide acquisition of coordination services). She graduated as a student from the Toulouse Graduate School at the University of North Texas within the College of Information with a doctorate in Technologies and Performance Improvement. Her college work included performance management, training in regulatory best practices for human performance, and research methodologies to include analysis structures, research evaluation and assessment and historical recall and long-term research.


  • Assess current needs; develop, implement, and monitor a strategic, comprehensive enterprise-wide information security and risk management program to ensure the integrity, confidentiality, and availability of information owned, controlled or processed by the organization
  • Lead security strategy, prioritizing user data and application/product security, and coordinate the evaluation, deployment, and management of current and future security technologies
  • Oversee the development and enforcement of security policies and procedures based on industry-standard best practices
  • Monitor the design and implementation of disaster recovery and business continuity plans, procedures, audits, and enhancements
  • Build strong relationships within the security organization and across the enterprise in order to implement appropriate security controls to protect the enterprise and product, ensuring that user data remains the top priority
  • Partner closely with senior leadership, especially infrastructure and engineering, to ensure that all applications and platforms are developed with security in mind
  • Act as an advocate and primary liaison for the company’s security vision via regular written and in-person communications with the executive team and other leaders to develop business case justifications and cost/benefit analyses for IT spending and initiatives
  • Work closely with IT and other technology groups to fully secure information, computer, network, and processing systems This includes Windows servers, application servers, storage, database servers, file and print servers, backup services, email servers and gateways, DNS, DHCP and Active Directory

Want More?

Contact Dr. Levitch