Jason Scott appointed as Chief Information Security Officer at Sectigo – Intelligent CISO

Published:

spot_img

Sectigo Appoints Jason Scott as Chief Information Security Officer

Jason Scott has been named as the new Chief Information Security Officer (CISO) at Sectigo, a leading provider of certificate lifecycle management solutions. With over 20 years of experience, including leadership roles at top global organizations such as Capgemini, Chevron, and the US Army, Jason brings a wealth of expertise to his new role.

In his new position, Jason will be responsible for overseeing all aspects of cybersecurity at Sectigo, including data, infrastructure, network, applications, and products. His extensive background in cybersecurity and his strategic vision will be key assets in protecting Sectigo’s critical infrastructure and ensuring the company’s continued growth and success.

Prior to joining Sectigo, Jason served as a colonel and principal architect for the US Army Cyber Command, where he played a crucial role in reshaping the organization’s cyber operations and defenses. His leadership acumen and dedication to mission success have earned him numerous accolades and recognition for his contributions to national security.

Mark Bilger, Sectigo’s Chief Product and Engineering Officer, expressed his excitement about having Jason join the team, citing his experience in managing cyber threats for large enterprises and government entities with a global reach. Jason’s expertise in cybersecurity strategy, threat protection, and risk mitigation will be invaluable in enhancing Sectigo’s security posture and protecting its customers and employees.

Sectigo’s cloud-native, CA-agnostic certificate lifecycle management solutions offer more than 50 leading technology integrations from a single pane of glass, providing customers with secure and scalable solutions backed by Sectigo’s two decades of experience as a trusted certificate authority. Jason’s appointment further strengthens Sectigo’s commitment to delivering the simplest, most secure, and most scalable CLM solutions to customers around the world.

spot_img

Related articles

Recent articles

Attackers Exploit Cloudflare Zero-Day to Bypass WAF Using ACME Certificate Validation

Understanding the Cloudflare Zero-Day Vulnerability In the rapidly evolving landscape of web security, vulnerabilities can pose significant risks to both service providers and their customers....

Language as Vulnerability: Unpacking the Google Gemini Calendar Exploit

Understanding the Google Gemini Vulnerability: A New Era of Cyber Threats Introduction to the Vulnerability In recent years, cybersecurity teams have devoted considerable efforts to strengthen...

Salalah Mills Opens $65 Million Bakery Plant in Khazaen Economic City

Bakery Manufacturing Plant Launches in Khazaen Economic City Introduction to the New Facility The Food Development Company, a key subsidiary of Salalah Mills Company, has recently...

Turning Insights Into Action

20 Jan From Insight to Action Join the pivotal event where security experts unite to lead the future. The Security Middle East Conference is emerging as...