Ted Dziekanowski is a veteran of cybersecurity with over 40 years' experience of the design, delivery, oversight and assurance of cybersecurity and risk management systems. Ted's area of expertise is the management of risk in Information Technology developed over the years. He is an experienced systems Auditor and Integrator giving him a unique insight as to the challenges associated with developing an eGRC program that satisfies the compliance requirements faced by organizations of all types and sizes.He is an internationally recognised cybersecurity, risk management and Information system auditor. A highly respected security trainer, authorized to train ISACA CISA, CISM, CRISC, ISC2 CAP, CCSP, and CISSP. He holds DoD secret clearance and has taught causes for a broad range of public and private sector (available on request).
Ted has a proven record providing training to a very broad range of public and private sector client including the U.S. States Army, Navy, Air Force, Marine Corp, Defense Intelligence Agency, NSA, DHS, U.S. Treasury, DoA, DoJ, DoL, Federal Reserve Bank of the U.S, Boeing, Lockheed Martin, Northrop Grumman, General Dynamics, General Electric, Microsoft, Verizon, AT&T, IBM, HP, SAP, Cisco, Dell, VMWare, Blackberry. Wells Fargo, Charles Schwab, PNC Bank, JPM, Goldman Sachs, Options Clearing Corporation, AIG, Bank of Canada, MasterCard, Bank of New York Mellon, Prudential Insurance, Bloomberg, Blue Cross Blue Shield of NJ, CVS Health. PWC, EY, Booze Allen, Deloitte. Health Canada, Home Depot, Nestle, M&M Mars, MIT Lincoln Labs, Johnson and Johnson, Merck, Novartis and Lowes to name a few.
Part 4 of this 4 Part series. As persons have sprinted to move to the cloud in an attempt to shift cybersecurity liability, a perfect storm actually arose. The presenters begin with an organization’s legal and ethical responsibilities, explain ...
Part 3 of this 4 Part series. Building on Parts 1 and 2, Part 3 of this series represents a deeper dive into the nuances of the SEC Cyber Proposal, EU NIS 2, EU DORA, and ONCD Strategy. Once the foundation has been laid, the presenters will explain h...
Part 2 of this 4 Part series. As threats to national security and critical infrastructures grow, so does coordination between countries in thwarting cybercriminals. Additionally, nations around the world continue implementing new laws and regulations...
Part 1 of this 4 Part series. Neither cybersecurity nor risk management are evaporating. To the contrary, their emphasis is becoming more pronounced. This webinar takes a practical approach that considers businesses of all sizes, publicly traded, pri...