Insights
Deal Team M&A Insights Through Mid-2024
Read MoreIn the digital age, the volume of data being collected, stored, and processed by companies and organizations has grown exponentially. This includes personal data, which can range from basic identification information to more sensitive details like health records or financial transactions. With the rise in cyber threats and data breaches, coupled with concerns about how organizations exploit personal data, there's been a growing demand from the public, advocacy groups, and governments for stronger data protection and privacy measures.
During the webinar, we discussed the evolution of Cybersecurity and how compliance continues to evolve. Attendees also learned about an organization's risks and challenges and how to stay ahead of compliance requirements.
If you missed the live event, the presentation can be found below.
Luke Nelson | Managing Director | UHY Consulting
Luke Nelson is a Managing Director for UHY Consulting with 20 years of experience, focusing on Cybersecurity Solutions and Technology Risk solutions. Luke is responsible for providing all aspects of Cyber, Security, and Risk programs inclusive of leveraging new technological advancements, such as artificial intelligence (AI), cloud-based scalability, and advanced mathematical techniques along with optimized visualizations to deliver enhanced decision-making capabilities. He also supports Securities and Exchange Commission (SEC) compliant financial statements and Internal Control Over Financial Reporting (ICOFR) external audit opinions for publicly traded companies.
Fred Charlot | Director | Cybersecurity and Risk
Fred Charlot is a Director for UHY Consulting focusing on Cybersecurity Solutions and Technology Risk solutions. He has deep experience in Digital Forensics and Incident Response (DFIR), cloud-based security, regulatory compliance (PCI, ISO, NIST, etc.), and risk management, delivering enhanced decision-making capabilities to the firm’s clients. Fred supports executives in analyzing their business plans to reassess strategies and focus on a performance and risk-aligned prioritized agenda. He brings over 20 years of experience managing, performing, and delivering information technology security solutions.