Data management strategies have become even more important with the expansion of the work from home workforce. This is becoming all the more relevant as we prepare staff to return to work inside an office environment - it is critical to understand what has been deployed, to whom, and how.
Many organizations are facing challenges around SaaS applications, especially around visibility and security into new collaboration tools currently in use. The often reactive measures many organizations have utilized to deploy these remote access solutions has put priceless data at risk.
Join members of the Fishtech team as we discuss the latest data protection strategies to meet common risks, challenges, and security gaps in organizations head-on.
Chuck brings 20-plus years of infrastructure and security experience and relevant leadership to Fishtech. His talent for aligning technology to organizational strategy is exceptional.
Previously as VP of Enterprise Architecture for Fishnet Security, he helped build and manage the cloud, data center, and virtualization practice. His team bridged the gap between security and next-generation computing environments. As CISO for the University of Kansas, he built the security program for the KU campus, including risk management, compliance, forensic analysis, governance, application, and network security. As KU’s Deputy CIO, he oversaw and managed the University’s cable plant, data centers, voice systems, network, and servers.
Chuck has led several teams building data centers in public, hybrid, and private cloud design, as well as in SDN-enabled research labs and environments.
Experience with institutional and large enterprise sales acquisition and revenue cycle process and strategy, Tim brings a unique blend of technical leadership in both military and commercial endeavors, and deep technical/hands-on experience.
Bryan Hutchinson has 20 years’ experience as an Information Technology and security professional, working as a Security Engineer and Architect in the petrochemical and energy sector. He has experience with the migration and deployment of endpoint security, proxy, and firewall technologies. He also specializes in optimizing current technology deployments to maximize value.