Our Trace3 security leaders are hosting a six week preparation program covering all six domains in the Certified Cloud Security Professional (CCSP) exam. The CCSP designation is a global standard for demonstrating the knowledge and understanding to secure assets in the cloud environment. Join us as we sponsor your journey through training and certification.
You can expect an overview of the cloud security market, an introduction to cloud concepts, architecture, and design, cloud data security basics, an overview of cloud platform and infrastructure security, a review of cloud application security, a look at cloud security operations, and the legal, risk, and compliance considerations in a cloud environment.
A hands-on, results-oriented senior information technology and business professional with over 20 years of experience leading global teams in the successful delivery of technology solutions that enable business value. Healthcare industry expertise coupled with Big 4 consulting leadership across financial, retail, and government sectors. A proven record of accomplishment in quickly assessing technology and security program maturity and developing multiyear road maps to achieve desired outcomes. A reputation for building programs and teams using a business-minded approach. Accomplished IT and security program designer utilizing practical solutions that deliver rapid return on investment.
Mark supports our multiple strategic enterprise account teams across Trace3, focusing on the growth of relevant Security services and solutions for our clients. Mark joined Trace3 having been the CISO and SVP of Mega plan IT, LLC for the past 2 ½ years, responsible for technical strategy, vCISO advisory services and business development. A former CISO at Qualys and at Fiserv, Mark focused on achieving business-aligned Cyber Security and Incident Response capabilities. With over 25+ years of experience leading enterprise security teams, delivering security consulting services and supporting security products, Mark has built and developed effective information security functions, establishing the right blend of technical, administrative and physical controls while providing stakeholders such as executive management, IT leadership and legal counsel visibility into real business threats and opportunities.Register Now!
Most recent video
Please fill out the form below to request access to all Cloud Security Legends content. Your request will be reviewed by our team, and if approved you will be contacted via email with further instructions on accessibility.