Paul Feather, CISA

 

Experience you can trust

The information technologists at your company know all too well the compliance challenges and requirements. With over 20 years of experience in Technology, we can offer a comprehensive and hands-on IT compliance consulting that make the most of the latest applications to support your compliance efforts. Our people are focused on making things happen, on getting the job done, and getting it done right. People and teams are expected and encouraged to be open, honest, and candid with their perspectives. We deeply value diversity in thought and talents. We value respect, teamwork, innovation and a focus on business outcomes. When you put your trust in us you will gain the expertise of a seasoned IT auditor that has exceeded client expectations since 2004 across multiple industries. 

 

Innovation

We understand that yesterday's solutions often represent today's dilemmas. Therefore, we view each engagement as a fresh opportunity for continuous internal control improvements. We believe that the results will maximize cost-effectiveness, efficiency, and productivity of your compliance activity and internal IT staff. Realizing the rapid pace of new innovative product solutions reaching the marketplace, and the ever-changing compliance requirements, we take pride in our extensive education and continuous training to keep us on top of the ever-changing compliance landscape. We balance our creative entrepreneurial spirit with a focus on discipline, quality, and deep capabilities.

 

 

Appreciation

We realize that companies have many options when selecting a service provider. We are committed to being your service provider of choice. Thank you for taking the time to learn about our company, we look forward to working with you!

 

 

 

Certifications and Association Memberships

 

 

Member and Certified Infomation Systems Auditor (CISA)  March 2005 – Present 

ISACA® is a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management, and governance. 

Member: Feb 2017 - Present

The North Texas Chapter of the Information Systems Security Association (ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. It was founded in 1984 and provides a venue for practitioners to Develop and Connect with other North Texas Cybersecurity Leaders.  For the events calendar, please see: ntxissa.org/events

Member:  November 2013 – Present 

The ACFE is the world's largest anti-fraud organization with more than 75,000 members, the ACFE is reducing business fraud worldwide and inspiring public confidence in the integrity and objectivity within the profession.

Member: March 2008 to Present

The High Technology Crime Investigation Association (HTCIA) was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes. An organization that aspires to help all those in the high technology field by providing extensive information, education, collective partnerships, mutual member benefits, astute board leadership and professional management.

Certification: April 2008 to October 2010

Past EnCase® Certified Examiner (EnCE®), extensive knowledge in the use of Guidance Software’s EnCase® computer forensic software. The EnCE® certification acknowledges that professionals have mastered digital computer investigation methodology as well as the use of EnCase® during complex computer examinations.  Recognized by both the law enforcement and corporate communities as a symbol of in-depth computer forensics knowledge.

 

 

Channel Partners 

 

HOSTING

The cloud is crowded with hundreds of providers claiming to deliver secure, compliant managed cloud hosting solutions. Yet only 20 are selected by Gartner for inclusion in its annual Magic Quadrant for Cloud-Enabled Managed Hosting. HOSTING is consistently recognized in this prestigious industry report that focuses on a provider’s ability to execute and completeness of vision. More info on HOSTING

GRC without the cost and complexity. Allgress solution converges disparate risk silos across global enterprise networks to automate governance, risk, and compliance management processes. Powered by the patented Allgress Business Risk Intelligence engine and CISO reporting tools provide customers with heat maps and compliance assessment reports that reveal a comprehensive, immediate and intuitive picture of their organizations' security and compliance risk posture. More info on Allgress.

The Elemental solution provides a fully automated platform that unifies the key technologies required to effectively manage cybersecurity configuration, security policy lifecycle, compliance while mitigating IT risk. This comprehensive approach enables organizations to realize their internal cybersecurity and compliance goals with an extensive library of security controls and policy templates via automated implementation, monitoring, and enforcement of security policies, more info on Elemental Cybersecurity

Process Delivery Systems is a consulting firm that helps organizations eliminate confusion from process complexity. The results are improved communications, and more consistently predictable and higher quality outcomes. We identify, document, optimize, and deliver processes, along with linked associated resources, and end-to-end accountabilities in customized visually intuitive and operationally consumable web platforms, more info on Process Delivery Systems

Telarus is the largest privately-held technology services distributor (master agent) in the United States.  With a dynamic community of sources for data, voice, cloud, and managed services through a robust portfolio of 160+ leading service providers, more info on Telarus

Omnicron Security was created with one principal in mind:  All businesses deserve the opportunity to secure themselves against cyber-criminals.  Before now, the market only addressed the Enterprise market and the small guys were basically on their own against a sophisticated, motivated and persistent enemy.  

Cyber attacks occur every 39 seconds.   43% of cyber attacks are against small businesses

60% of small businesses that experience a data breach close within one year.  More info on Omnicron Security

Print Print | Sitemap
IT Compliance Services by Compu-Netics, LLC - All Rights Reserved © 2019