Cybersecurity for CFOs

Start time:
On Demand
Duration:
1 hour
Location:
Online
Contact:
Stephanie Asa, Moss Adams, 425-551-5775
Cost to attend:
Complimentary

Join us for a webcast on information security in the virtual selling environment. We’ll cover topics including the pros and cons of the automobile dealer industry’s transition to doing business online, cybersecurity threats to be aware of, steps to increase cybersafety, and measures you can take to help keep your dealership safe.

This webcast is part of our Fuel for Growth: 2020 Webcast Series.

Watch Now

Speakers

Jason Miller, President/CEO, DealerOps

Jason is an automotive industry veteran with experience both as a controller for one of the nation’s largest automotive groups and as the CEO of the industry’s most innovative performance reporting platform. Seeking to tackle many of the issues automotive groups face in the real world, Jason founded DealerOps with the mission to help dealerships alleviate the headaches he often experienced in the field.

Troy Hawes, Senior Director, Moss Adams

Troy has been providing IT consulting services since 2001. Troy serves clients in a variety of industries including communications and media, utilities and critical infrastructure, health care, and higher education. He is adept at working with the specialty IT compliance and security needs of SEC registrants, private businesses, government and tribal entities. Troy has extensive experience managing and leading technology security and compliance assessments using a number of different security frameworks including NIST Cybersecurity Framework, NIST Special Publication 800-53, ISO 27002, Cloud Controls Matrix, HIPAA Privacy and Security Rules, Payment Card Industry Data Security Standards (PCI DSS), and others. He also has deep experience managing and leading IT security audits and assessments, social engineering campaigns and penetration testing, PCI DSS audits, HIPAA security and privacy assessments, disaster recovery planning, alternatives analysis, network design and implementation, IT co-sourcing, and SOC audits. He frequently leverages his security expertise to determine areas of potential security weakness and infrastructure needs.

Applicable Industries