Following an 18-year career in senior IT management positions across healthcare, medical device and the pharmaceutical industries, Greg transitioned to build the Security, Audit and Compliance department for a popular Raleigh-based MSP. He moved on to do the same for a national MSP servicing clients in all regions of the U.S. Those experiences exposed Greg to a broad spectrum of regulations, compliance initiatives and the gritty world of fighting threat actors. His primary career objective is to help customers reduce risk to their IT systems and data. Greg brings a wealth of security, audit, and compliance experience to Tego including identifying risk through assessment and mitigation, providing systems security management, internal audit and governance solutions, leading SOC 2, Type 2 attestation and ISO 27001 certification initiatives and managing client CMMC, PCI, HIPAA, SOX, GDPR and CCPA programs.Greg is an ISACA Certified Information Systems Auditor (CISA) and a Certified Data Privacy Solutions Engineer (CDPSE). He recently became a CMMC-AB Registered Practitioner allowing Tego to become a CMMC-AB Registered Provider Organization positioning us to assist our many customers in the Defense Industrial Base navigate the strict requirements of the Defense Acquisition Regulations Supplement (DFARS).

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent news posts

This is a sample blog post title.
Featured Image

Data Connectors Partners Join Multi-Sector Ransomware Task Force – Data Connectors

This is a sample blog post title.
Featured Image

Third Party Risk Assessment Gains Importance Following Log4j – Data Connectors

This is a sample blog post title.
Featured Image

Cybersecurity Industry Leaders Respond to Colonial Pipeline Ransomware Attack – Data Connectors

This is a sample blog post title.
Featured Image

Weekly Partner Roundup: The Data Edition – Data Connectors

This is a sample blog post title.
Featured Image

Virtual Exhibit Booth Improvements: New Features and How to Use Them – Data Connectors

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today