Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.
Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.
Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.
Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.
In this webinar, DataBank's CISO will addresses how Identity Access Management (IAM) technologies can be used to initiate, record, and manage user identities and their access permissions to provide oversight and visibility into all aspects of the company user base.
Businesses and organizations are under increased regulatory scrutiny when it comes to protecting access to critical information. Identity Access Management (IAM) technologies can be used to initiate, record, and manage user identities and their access permissions to provide oversight and visibility into all aspects of the company user base. It is important for IT leaders to have a comprehensive system to control user access by identifying users and their roles, updating as needed, assigning levels of access, and protecting sensitive data within the system with the appropriate security measures. These tightly controlled and automated systems align with the increasing security requirement.
All Industries.
CFO’s, CTO’s, CISO’s, CIO’s, IT Directors, Compliance, and Security Professionals
Mark serves as DataBank’s Chief Information Security Officer and is responsible for developing and maintaining the company’s security program road map and data center compliance programs. He brings over 30 years of extensive information security and information technology experience in a wide range of industries and institutions. Mr. Houpt holds an MS-ISA (Masters Information Security and Assurance), numerous security and technical certifications (CISSP, CEH, CHFI, Security +, Network+) and qualified for DoD IAT Level III, IAM Level III, IASAE Level II, CND Analyst, CND Infrastructure Support, CND Incident Responder, and CND Auditor positions and responsibilities.
Mark is an expert in understanding and the interpretation of FedRAMP, HIPAA and PCI-DSS compliance requirements. He is an active member of ISC2, ASIS International, COMPTIA, IAPP, and ISACA, among other leading national and international security organizations. Mark drives DataBank’s information security and compliance initiatives to ensure that the company’s solutions continuously meet rigorous and changing compliance and cyber-security standards.
Discover the DataBank Difference today:
Hybrid infrastructure solutions with boundless edge reach and a human touch.