<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=363521274148941&amp;ev=PageView&amp;noscript=1">

Back to the Office: Data Protection Strategies


Data management strategies have become even more important with the expansion of the work from home workforce.  This is becoming all the more relevant as we prepare staff to return to work inside an office environment - it is critical to understand what has been deployed, to whom, and how. 

Many organizations are facing challenges around SaaS applications, especially around visibility and security into new collaboration tools currently in use. The often reactive measures many organizations have utilized to deploy these remote access solutions has put priceless data at risk. 

Join members of the Fishtech team as we discuss the latest data protection strategies to meet common risks, challenges, and security gaps in organizations head-on.

THU 4/30/20


Your privacy is important to us and your information will be kept confidential.

Minimize Risk. Maximize Efficiency. Maintain Compliance. Exceed Business Objectives.

About the Panelists

Chuck Crawford
CCO and Co-Founder, Fishtech Group

Chuck brings 20-plus years of infrastructure and security experience and relevant leadership to Fishtech. His talent for aligning technology to organizational strategy is exceptional.

Previously as VP of Enterprise Architecture for Fishnet Security, he helped build and manage the cloud, data center, and virtualization practice. His team bridged the gap between security and next-generation computing environments. As CISO for the University of Kansas, he built the security program for the KU campus, including risk management, compliance, forensic analysis, governance, application, and network security. As KU’s Deputy CIO, he oversaw and managed the University’s cable plant, data centers, voice systems, network, and servers.

Chuck has led several teams building data centers in public, hybrid, and private cloud design, as well as in SDN-enabled research labs and environments.

Craig George
Solutions Architect
Over 10 years’ experience in assisting Fortune 500 companies with digital transformation, cyber defense, and cloud migration strategies by providing thought leadership through highly regulated and transformational environments.

Expertise includes service management, project management, governance, compliance, risk management, infrastructure, and information security with specialties in incident response, vulnerability management and security solution/tool implementation and analysis.
Ajoy Rao
Principal Consultant, Cyber Risk and Compliance
Ajoy began his career as an analyst in Business IT consulting, experienced professional in consulting & advisory in the areas of GRC & Business-IT alignment, and most recently as a Director at LFR; Ajoy has a passion for risk and adding value to clients. Has authored and presented papers in leading conferences/journals and has certifications in cyber risk, security, and compliance space (CRISC, CGEIT, CRMA, CISM, CISA & PCIP). Ajoy has a BS in Chemical Engineering and MS in Engineering Science from Lamar University Beaumont, TX.
Philip Costanzo
Security Consultant, Enterprise Architecture
Philip Costanzo has 15 years’ experience as an Information Technology and security professional and has worked as a consultant in the financial industry and local government. He has experience analyzing customer needs and developing plans for configuration and deployment of firewalls, endpoint protection, and DLP solutions. Philip has extensive knowledge of firewalls, SIEM, vulnerability and threat management, endpoint solutions and security awareness and training
Tim Dentry
Solutions Architect, CISSP

Experience with institutional and large enterprise sales acquisition and revenue cycle process and strategy, Tim brings a unique blend of technical leadership in both military and commercial endeavors, and deep technical/hands-on experience. 


Bryan Hutchinson
Solutions Architect

Bryan Hutchinson has 20 years’ experience as an Information Technology and security professional, working as a Security Engineer and Architect in the petrochemical and energy sector. He has experience with the migration and deployment of endpoint security, proxy, and firewall technologies. He also specializes in optimizing current technology deployments to maximize value.


Exec Team Shot (3)