Tom DeSot

2757 0

Tom DeSot, EVP & Chief Information Officer of Digital Defense, Inc.

Tom DeSot is the Chief Information Officer of Digital Defense, Inc. He is charged with developing and maintaining relationships with influential industry and market regulators, identifying key integration and service partnerships and serving as the prime regulatory compliance resource for external and internal contacts. He also serves as the company’s internal auditor on security-related matters.

Prior to joining Digital Defense, DeSot served as vice president of information systems for a mid-tier financial institution in San Antonio, TX. While there, he was responsible for managing numerous institution-wide projects ranging from information security initiatives, to the Y2K program and the installation and implementation of both home banking and bill pay products. DeSot also managed the institution’s ATM and debit card program, as well as all ATM network activities.

DeSot holds a bachelor’s degree in applied arts and sciences from Texas State University and is a master’s candidate in information assurance at Southern New Hampshire University. He is heavily involved in San Antonio’s information security community and has served on the board of directors for the Alamo Chapter of Information Systems Audit and Control Association and was a founding board member of the Alamo Chapter of the Information Systems Security Association. He is also a former Supervisory/Audit Committee Chairman for a mid-tier financial institution and now serves on their Board of Directors as the chairman of their Governance Committee. 

DeSot also serves on an information security curriculum advisory panel for Texas A&M University, San Antonio and is a member of the North San Antonio Chamber of Commerce IT Committee and has delivered classroom and symposium presentations on cybersecurity and cyber ethics at the University of Texas at San Antonio.

He holds the National Security Agency’s INFOSEC Assessment Methodology Certification and is formally trained in the OCTAVE Risk Assessment Methodology.

Articles By Tom DeSot

What Is A Certified Information Systems Auditor (CISA) Designation?

Being Prepared For Iranian Cyber Attacks


Articles by Tom DeSot

Posts not found