<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=363521274148941&amp;ev=PageView&amp;noscript=1">

Live Webcast On-Demand:
Why Identity Governance Really Matters


As the global Business landscape continues to shift, governing access to applications, controlling privileges that should be granted, and defining an appropriate risk tolerance is becoming even more elusive. This can be further compounded by B2E, B2B, and B2C users inadvertently misusing and mishandling data such as credentials, certificates, trade secrets, PII, PCI, and PHI.

In order to address the related financial, legal, operational, and reputational risks, Identity Governance combines a prescriptive blueprint for effectively identifying and converging the foundational pillars of IAM with a right sized and resilient GRC solution/program. Importantly, this also incorporates a Zero Trust Model of relevant security and technical controls.

As a result, organizations are able to prioritize, manage, and mitigate cyber risks that align with their business goals and objectives. 

Come join us for PART 1 of a 3 part series on Identity Governance where we further explore these issues.



Your privacy is important to us and your information will be kept confidential.

Minimize Risk. Maximize Efficiency. Maintain Compliance. Exceed Business Objectives.

About the Panelists

Chuck Crawford
CCO and Co-Founder, Fishtech Group

Chuck brings 20-plus years of infrastructure and security experience and relevant leadership to Fishtech. His talent for aligning technology to organizational strategy is exceptional.

Previously as VP of Enterprise Architecture for Fishnet Security, he helped build and manage the cloud, data center, and virtualization practice. His team bridged the gap between security and next-generation computing environments. As CISO for the University of Kansas, he built the security program for the KU campus, including risk management, compliance, forensic analysis, governance, application, and network security. As KU’s Deputy CIO, he oversaw and managed the University’s cable plant, data centers, voice systems, network, and servers.

Chuck has led several teams building data centers in public, hybrid, and private cloud design, as well as in SDN-enabled research labs and environments.

Ajoy Rao
Principal Consultant, Cyber Risk and Compliance, Fishtech Group
Ajoy began his career as an analyst in Business IT consulting, experienced professional in consulting & advisory in the areas of GRC & Business-IT alignment, and most recently as a Director at LFR; Ajoy has a passion for risk and adding value to clients. Has authored and presented papers in leading conferences/journals and has certifications in cyber risk, security, and compliance space (CRISC, CGEIT, CRMA, CISM, CISA & PCIP). Ajoy has a BS in Chemical Engineering and MS in Engineering Science from Lamar University Beaumont, TX.
Shawn Butler
Solutions Architect, Fishtech Group

Over the past 22 years, Shawn has led and supported teams in the healthcare, legal, educational, manufacturing, retail, financial, insurance, and service provider verticals as a CTO, Director of IT, Principal Architect, Principal Consultant, and Data Network Analyst.

Bob Rabbitt
Solutions Architect, Fishtech Group

Bob Rabbitt is an IT professional with more than 15 years of experience implementing IT solutions, as well as leading Project and Managed Services organizations. Bob has used his unique background in development and operations to help solve problems that impact the entire organization.

Leading Organizations to a More Secure Future