A cyberattack can compromise your organization’s sensitive data and undermine its ability to operate effectively. Join us for an on-demand webcast on emerging cyberattack trends—and how to safeguard against them—to help decrease your organization’s risk of a breach and prevent operational downtime.
Troy understands industry-based security needs and those that are a result of the business structure. He leads teams in providing IT security and privacy assessments, disaster recovery preparation, and audits of service providers. Troy manages technology security and compliance assessments using a number of different security frameworks under both national and international regulatory standards. He leverages his security expertise to help clients identify areas of potential security weakness and to establish an enterprise-wide threat-management program.
Jon is a cybersecurity consulting manager at Moss Adams. He has been managing technical infrastructure systems and advising senior leadership on security policy and practices since 2006. Jon brings a vast knowledge of complex security requirements and specializes in vulnerability review, risk mitigation and avoidance, change management, systems and network engineering, audit compliance, and data recovery.
Registration information for this event may be shared with the event's co-hosts, speakers, and sponsors.
Please click here for additional help.