Has your company been on an acquisition spree? Has anyone been thinking about the Information protection risks associated with this? Are you worried about the new risk? This presentation will help you understand an approach to evaluating risks related to acquisitions. You will leave this talk with a practical and proven approach to present to management to enable you to review new acquisitions. Download Mitch’s Presentation
Mitchell Greenfield is currently an Information Security Manager for Humana Enterprise Information Security. He conducts ethical hacking and penetration testing for Humana, including business partners and acquisitions. Mitch is a Certified Ethical Hacker (CEH), Certified Security Analyst (ECSA), Licensed Penetration Tester (LPT) and Certified Information Security Auditor (CISA). Mitch is currently a Vice President of Programming for the Kentuckiana chapter of ISACA and holds an MS in Information Systems and a BS in Informatics from Indiana University – Bloomington.
Scott MacArthur is an Information Security Architect for Humana’s Enterprise Information Security department. He responsible for the management of the Assurance function which is chartered to assess IT risk across applications, networks and all acquisitions. In addition, Scott is responsible for penetration testing and ethical hacking at Humana. Scott is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Certified Security Analyst (ECSA), Licensed Penetration Tester (LPT) and Certified Information Security Auditor (CISA). Scott is currently President of Kentuckiana chapter of ISACA and holds an MS in Information Systems from Indiana University, Bloomington.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek