Michael Meyer CISSP, CISM, CRISC, CISA
Cherry Hill, New Jersey, United States
31K followers
500+ connections
About
I turn AI ambition into production reality inside regulated, high-stakes environments…
Articles by Michael Meyer CISSP, CISM, CRISC,
Activity
-
I am thrilled to announce that Molly Dodge from the Federal Reserve Bank of Philadelphia is joining our panel, "Building Your Brand: Strategies for…
I am thrilled to announce that Molly Dodge from the Federal Reserve Bank of Philadelphia is joining our panel, "Building Your Brand: Strategies for…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
I recently led a micro-case where executive cyber leadership turned a board crisis into a strategic advantage. The board initially misunderstood…
I recently led a micro-case where executive cyber leadership turned a board crisis into a strategic advantage. The board initially misunderstood…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
Experience
Education
-
Georgetown University
-
Activities and Societies: Chosen as one of the HOYA Professional 30 for 2018! The mission of The Hoya Professional 30 is to recognize and highlight the student professionals who exemplify leadership and excellence at Georgetown University’s School and show leadership! Won the Graduate School Wildcard round to gain entry to Georgetown Entrepreneurship Challenge (GEC)! And selected in 2020 as one of 4 for an in-depth "Ask The Entrepreneur" Video Series that is a powerful learning tool for future SCS entrepreneurs!
Georgetown University’s Master of Professional Studies in Technology Management prepares you to become a forward-thinking and effective technology leader. You’ll master not only the critical-thinking strategies needed to analyze and address evolving business needs but also the management expertise that prepares you to inspire teams and drive innovation. Our program brings together focused coursework and practical, hands-on experience. You’ll have the opportunity to engage with some of the…
Georgetown University’s Master of Professional Studies in Technology Management prepares you to become a forward-thinking and effective technology leader. You’ll master not only the critical-thinking strategies needed to analyze and address evolving business needs but also the management expertise that prepares you to inspire teams and drive innovation. Our program brings together focused coursework and practical, hands-on experience. You’ll have the opportunity to engage with some of the nation’s leading industry experts and organizations through real-world client work, guest lectures, case studies, and networking events.
-
-
-
-
-
-
Licenses & Certifications
-
-
-
-
-
CIPP/US (Certified Information Privacy Professional / US)
IAPP - International Association of Privacy Professionals
Issued -
CIPM (Certified Information Privacy Manager)
IAPP - International Association of Privacy Professionals
Issued -
-
-
-
Volunteer Experience
-
Speaker
BSides South Jersey
- 1 month
Science and Technology
Speaking Topic - The Secret Threats All Around Us
We are under continuous threats from our adversaries not through open war, but through quiet, persistent campaigns designed to impact how we think, what we trust, and how we live our lives. Operatives target information systems, industries and businesses at all levels, without most of us ever noticing. College campuses are not on the sidelines; they are one of their primary targets. These efforts rarely make headlines; in fact, they seem…Speaking Topic - The Secret Threats All Around Us
We are under continuous threats from our adversaries not through open war, but through quiet, persistent campaigns designed to impact how we think, what we trust, and how we live our lives. Operatives target information systems, industries and businesses at all levels, without most of us ever noticing. College campuses are not on the sidelines; they are one of their primary targets. These efforts rarely make headlines; in fact, they seem small and are easy to miss as background noise. Taken together, however, they represent a constant strategic threat that operates below the level of national awareness but directly affects us, impacts what you are learning and all of our futures.
https://bsidessouthjersey.org/index.html -
Panel Speaker - What You’re Missing by Sticking With an Outdated System
AccountsRecovery.net
- 1 month
Science and Technology
This was a candid conversation about the hidden price of legacy technology and why “good enough” is often the biggest competitive risk of all. We’ll dig into the costs most operators don’t measure but absolutely should, what happens when a high-performing collector is forced to work inside an outdated system, how legacy platforms affect hiring, retention, and motivation, and why patching together a Frankenstein stack of plug-ins can quietly become more expensive than replacing the core. We’ll…
This was a candid conversation about the hidden price of legacy technology and why “good enough” is often the biggest competitive risk of all. We’ll dig into the costs most operators don’t measure but absolutely should, what happens when a high-performing collector is forced to work inside an outdated system, how legacy platforms affect hiring, retention, and motivation, and why patching together a Frankenstein stack of plug-ins can quietly become more expensive than replacing the core. We’ll also explore the warning signs that your organization is already falling behind, what a true rebuild-from-scratch mindset reveals, and how to lead change when the people closest to the work may feel they have the most to lose.
-
Panel Speaker - Separating AI Fact From Fiction and Hype From Reality
AccountsRecovery.net
- 1 month
Science and Technology
This webinar provides a grounded perspective on the role of AI in the contact center space, cutting through the hype to focus on what it actually takes to implement effectively. The discussion emphasizes that AI is only as strong as the data and context behind it, highlighting the need for clean, organized, and accessible information rather than fragmented legacy systems. It also identifies regulation and compliance as key barriers to adoption, noting that progress will depend on clear and…
This webinar provides a grounded perspective on the role of AI in the contact center space, cutting through the hype to focus on what it actually takes to implement effectively. The discussion emphasizes that AI is only as strong as the data and context behind it, highlighting the need for clean, organized, and accessible information rather than fragmented legacy systems. It also identifies regulation and compliance as key barriers to adoption, noting that progress will depend on clear and enforceable guidelines. Ultimately, the takeaway is that while AI holds significant promise, real success will come from disciplined data management, realistic expectations, and thoughtful execution not just enthusiasm for the technology itself.
-
Panel Speaker - How to Become an Innovator and Disruptor in Your Office
AccountsRecovery.net
- 1 month
Science and Technology
Spoke about how innovation almost always starts with the people closest to the work. We will discuss how to frame disruption as something teams can actually practice, and do... not just talk about.
LinkedIn post: 👉 How to Become an Innovator 💡 and Disruptor ⚡ in Your Office
In this wide-ranging panel session, we will cover topics such as:
* How to turn front-line pain points into an actual innovation roadmap
* A simple framework leaders can use to drive disruption without…Spoke about how innovation almost always starts with the people closest to the work. We will discuss how to frame disruption as something teams can actually practice, and do... not just talk about.
LinkedIn post: 👉 How to Become an Innovator 💡 and Disruptor ⚡ in Your Office
In this wide-ranging panel session, we will cover topics such as:
* How to turn front-line pain points into an actual innovation roadmap
* A simple framework leaders can use to drive disruption without creating chaos.
* Concrete steps you can take in the next 90 days to start innovating from inside your own operation.
If you’re serious about modernizing 🤖 and rethinking what’s possible 🧩, I’d love to see you there!
-
Speaker - How Homomorphic Encryption Unlocks Privacy
SecureWorld
- 1 month
Science and Technology
Spoke on Homomorphic Encryption: Exploring the Past, Present, and Future of Privacy-Preserving Computation. Delivered a comprehensive presentation on homomorphic encryption (HE)—a groundbreaking cryptographic method that allows computation on encrypted data without ever needing to decrypt it. The session began with a historical overview of HE’s theoretical origins, tracing its evolution from early academic concepts to modern implementations.
I covered all three primary categories of…Spoke on Homomorphic Encryption: Exploring the Past, Present, and Future of Privacy-Preserving Computation. Delivered a comprehensive presentation on homomorphic encryption (HE)—a groundbreaking cryptographic method that allows computation on encrypted data without ever needing to decrypt it. The session began with a historical overview of HE’s theoretical origins, tracing its evolution from early academic concepts to modern implementations.
I covered all three primary categories of homomorphic encryption:
Partially Homomorphic Encryption (PHE)
Somewhat Homomorphic Encryption (SHE)
Fully Homomorphic Encryption (FHE)
Each was analyzed in terms of structure, functionality, and computational trade-offs. I also highlighted major players in the field—including IBM, Microsoft, AWS, Zama, and Duality Technologies. Examined the ways in which they are pushing the boundaries of encrypted computation for secure data analytics, finance, AI, and cloud security. -
Speaker - Rowan Tech Day. Spoke about Security and Threats in the Real World
Rowan University
- 1 month
Science and Technology
Spoke to the CS club students in the security and technology majors. Delivered the session “Real World Security” guiding students through real world threats and what businesses can do to defend against it. Provided career advise as well for what they will be doing when they start out in the security field. Hosted an interactive Q&A on the real world of security, giving students a frank assessment of the current state of security…
Spoke to the CS club students in the security and technology majors. Delivered the session “Real World Security” guiding students through real world threats and what businesses can do to defend against it. Provided career advise as well for what they will be doing when they start out in the security field. Hosted an interactive Q&A on the real world of security, giving students a frank assessment of the current state of security. https://csm.rowan.edu/departments/cs/news/articles/tech-day-2025-article.html
-
Speaker - The Use Cases, Opportunities, Controls and Best Practices of AI.
The Forwarders List of Attorneys
- 1 month
Science and Technology
Spoke about AI on a panel with Regina Slowey. The panel was about use cases, opportunities, controls and best practices of AI. We focused on how to use ChatGPT and its capabilities to improve processes and provide information.
-
Speaker - How You Can Decide What Technology Investments That Will Give You the Biggest Bang for Your Buck and Future-Proof Your Company
AccountsRecovery.net
- 1 month
Science and Technology
Spoke on a panel with two others at ARMTECH in Nashville, TN. Our topic was How you can decide what technology investments that will give you the biggest bang for your buck and help you future-proof your company
-
Speaker - Future of Technology
AccountsRecovery.net
- 1 month
Science and Technology
I was excited to speak at the first ever ARMTech Conference! I spoke on a panel with industry heavyweights - Tim Collins (Indebted), Pran Navanandan (Halsted) and Dennis Barton (Barton Law, LLC). Sharing insights on the future of technology within the ARM industry was a great experience. It provided us with substantial opportunities to explore the transformative impact of technology upon the industry and to look ahead at what the future would bring.
-
Speaker - Composable Business Concepts and using Creativity and Technology to Rethink Digital Workflows
Creatio
- 1 month
Science and Technology
Spoke two different times at Creatio's global conference in Chicago in a battle of opinions about Composable Concepts for Business. IBM Coined the term in 2014 and composable / modular enterprises are the wave of future. Also spoke in a fire side chat along with Erik Hale about creativity and technology and how to rethink digital workflows with no-code.
-
Featured Speaker Philadelphia - Social Media Threats to Security Staff
SecureWorld
- 1 month
Science and Technology
Technology in the security space is rapidly improving, policies and procedures are becoming standardized, security awareness training is being expanded and is now commonplace. So what is the next weakest link in an organization's security posture? Security Staff and especially their management are fast becoming the newest and weakest link in the security process. They know where the weaknesses, gaps, and vulnerabilities are at in the company. They are hardened targets, but the attackers will…
Technology in the security space is rapidly improving, policies and procedures are becoming standardized, security awareness training is being expanded and is now commonplace. So what is the next weakest link in an organization's security posture? Security Staff and especially their management are fast becoming the newest and weakest link in the security process. They know where the weaknesses, gaps, and vulnerabilities are at in the company. They are hardened targets, but the attackers will try to compromise them regardless because the payoff is so huge. So they will employ new and more sophisticated methods than before via social media and gaming to get to their targets.
-
Speaker - Rockies - Deception Technology Levels the Playing Field
SecureWorld
- 1 month
Science and Technology
Speaker - How Deception Technology Works to Level the Playing Field
The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discover what has been breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and…Speaker - How Deception Technology Works to Level the Playing Field
The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discover what has been breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and associated damage. Discover how using this technology allows the tables to be turned around onto the attackers.
https://events.secureworldexpo.com/agenda/rockies-2021/ -
Speaker - Global IBM Community Day - How We Built a Conversational Call Center
IBM
- 1 month
Science and Technology
This time, users take the stage. We are uniting over a dozen IBM user groups on IBM Expert TV with five conference tracks featuring expert advice, lessons, demos, keynotes, feedback sessions, and more. Get an in-depth look at the IBM technologies you use every day, start a conversation, ask questions, or find new user groups to connect with and grow your skills. Presented how we used IBM Watson technology to create our Intelligent Voice Agent.
-
Speaker - Global Finserv Industry Event - Accelerate Innovation with No-Code Strategies and Best Practices
Creatio
- 1 month
Science and Technology
This premier event on how no-code development approach will redefine the future of the financial services industry is taking place online on October 5, 2021.
The first of its kind virtual conference is fully focused on how no-code technologies can help financial services companies accelerate innovation and significantly improve the efficiency of front and middle-office. It will introduce world-class strategies and practical cases that showcase how to apply the no-code approach to…This premier event on how no-code development approach will redefine the future of the financial services industry is taking place online on October 5, 2021.
The first of its kind virtual conference is fully focused on how no-code technologies can help financial services companies accelerate innovation and significantly improve the efficiency of front and middle-office. It will introduce world-class strategies and practical cases that showcase how to apply the no-code approach to different modern banking functions
https://finance.yahoo.com/news/creatio-announces-finserv-industry-event-120000638.html -
Thinking Differently About Thinking Differently - Interviewed by Erin Kerr
insideARM
- 1 month
Science and Technology
What does trying to write with your non-dominant hand have to do with the ARM industry? Join Erin Kerr as she discusses that, and more, with Michael Meyer, Chief Risk and Innovation Officer at MRS BPO. Some highlights include: What kind of risk tolerance makes sense? How to encourage your employees to think differently?
What key phrase might alert you that changes need to be made to a process or department…What does trying to write with your non-dominant hand have to do with the ARM industry? Join Erin Kerr as she discusses that, and more, with Michael Meyer, Chief Risk and Innovation Officer at MRS BPO. Some highlights include: What kind of risk tolerance makes sense? How to encourage your employees to think differently?
What key phrase might alert you that changes need to be made to a process or department.
https://www.insidearm.com/news/00047653-thinking-differently-about-thinking-diffe/ -
Speaker - Multi-Cloud Identity Access Management - Myths, Reality & Risks
SecureWorld
- 1 month
Science and Technology
Michael Meyer discusses and debunks the common myths about Multi-Cloud Identity Authorization Management (IAM). He will also delve into the inherent risks that are present, and discuss key strategies to reduce them and increase your organization’s security posture.
https://events.secureworldexpo.com/details/mid-atlantic-2021/
Led Advisory Council Roundtable
How Secure, Really, Are Your Vendors?
Featured…Michael Meyer discusses and debunks the common myths about Multi-Cloud Identity Authorization Management (IAM). He will also delve into the inherent risks that are present, and discuss key strategies to reduce them and increase your organization’s security posture.
https://events.secureworldexpo.com/details/mid-atlantic-2021/
Led Advisory Council Roundtable
How Secure, Really, Are Your Vendors?
Featured Presenter
https://events.secureworldexpo.com/details/mid-atlantic-2021/
-
Speaker - How I Got X-Ray and Thermal Vision Across our Public Cloud
Orca Security
- 1 month
Science and Technology
Michael Meyer, Chief Risk and Innovation Officer at MRS BPO, a leading full-service accounts receivable management firm with an impressive roster of Fortune 50 clients. Michael needed to detect all important risks across a variety of custom-built web apps as well as a newly deployed customer portal built on AWS. Yet he could only get 20% visibility with AWS native tooling. He knew AWS GuardDuty and Inspector would never give him the breadth and depth of coverage he was looking for.…
Michael Meyer, Chief Risk and Innovation Officer at MRS BPO, a leading full-service accounts receivable management firm with an impressive roster of Fortune 50 clients. Michael needed to detect all important risks across a variety of custom-built web apps as well as a newly deployed customer portal built on AWS. Yet he could only get 20% visibility with AWS native tooling. He knew AWS GuardDuty and Inspector would never give him the breadth and depth of coverage he was looking for.
Michael will be joined by Patrick Pushor, Technical Evangelist at Orca Security. It’s going to be a fast-paced session as Michael takes you through his “notes from the field”, best practices, and pitfalls to avoid in securing public cloud infrastructure. Get ready to ask your toughest cloud security questions as we discuss:
- 5 risks hiding inside every public cloud estate
- How to get instant-on, workload-level visibility across 100% of your AWS, Azure, and GCP assets
- The power of addressing both the control plane and data plane at once
- Pros and cons of different cloud security tools: traditional agent-based tools and scanners, CWPP (cloud workload protection platforms), and CSPM (cloud security posture management)
https://www.brighttalk.com/webcast/18490/437856/how-i-got-x-ray-and-thermal-vision-across-our-public-cloud-infrastructure -
Speaker - How Deception Technology Works to Level the Playing Field
SecureWorld
- 1 month
Science and Technology
The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discovers what has breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and associated damage. Discover how using this technology allows the tables to be…
The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discovers what has breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and associated damage. Discover how using this technology allows the tables to be turned around onto the attackers.
https://events.secureworldexpo.com/agenda/new-york-philadelphia-2020/ -
Creative Thinking is the Key to Survival - Interviewed by CEO of InsideARM Stephanie Eidelman
insideARM
- Present 5 years 11 months
Science and Technology
Michael is one of those rare people who think so creatively that you only recognize the wisdom of what he said long after your conversation. He sees connections and trends before most people recognize them. We had a 20-minute conversation about the future of technology. That's Michael's secret sauce. He constantly looks outside the industry for inspiration.
https://insidearm.com/news/00046480-00046478-creative-thinking-key-to-surviva/
-
Speaker - How to Build an AI Application from the Ground Up
IBM
- 1 month
Science and Technology
IBM asked me to speak on camera for a 30-minute video. This video is about what it takes to build an AI application from the ground up. This includes building a multi-disciplinary team that thinks outside of the box and one that can tolerate a lot of failures and yet keeps going no matter what. In February 2020, it was featured on the IBM Watson Home Page!
-
Panel Member - AI and the Future of Work Executive Exchange
IBM
- 1 month
Science and Technology
On a panel with Humana to discuss how we are transforming customer experiences with Watson and scaling AI in our enterprise. These experiences range from empowering agents to servicing customers and how we are optimizing customer service experiences using Watson's AI technology.
https://www.ibm.com/watson/future-of-work-full
-
Panel Member - Talking with AI - Data and AI Conference - Miami
IBM
- 1 month
Science and Technology
Brian Loveys (Watson Assistant product manager) moderated a panel with myself, Arun Bala (InsurBot.ai), Jasmeet Singh (Cardinal Health) about how we are using Watson Assistant for Voice Interaction (WAVI) as a first line of defense to improve customer experience and enhancing employee engagement. We also talked about how reports showing that 64% of today's customers are expecting personalized, real-time responses at any time, so it's no wonder that nearly two-thirds of professionals point…
Brian Loveys (Watson Assistant product manager) moderated a panel with myself, Arun Bala (InsurBot.ai), Jasmeet Singh (Cardinal Health) about how we are using Watson Assistant for Voice Interaction (WAVI) as a first line of defense to improve customer experience and enhancing employee engagement. We also talked about how reports showing that 64% of today's customers are expecting personalized, real-time responses at any time, so it's no wonder that nearly two-thirds of professionals point to AI as their most important investment for next year. We believe that Voice interfaces will be at the top of many businesses list -- in fact, Gartner predicts that, by 2023, 25 percent of interactions with applications will be via voice, up from under 3 percent in 2019. We talked about how Watson Assistant for Voice Interaction is empowering enterprises of all sizes, across industries, to solve customer problems on any channel: whether its voice or text.
-
Speaker - How We Built an Intelligent Voice Agent Using IBM Watson
Voicebot.ai
- 1 month
Science and Technology
Spoke alongside Alex and Erin about how we built our Intelligent Voice Agent using IBM Watson with Machine Learning at Voice 19 (World's Largest Voice Conference at NJIT in Newark, NJ). Our session was very well attended, with so many questions afterward that we had to continue answering them in the hallway! Great experience and we loved sharing the incredible voice technology that we use every day!
-
Panel Member - Two Panels (Payment Innovation / AI Security), Panel Moderator (IoT)
Opal Group
- 1 month
Science and Technology
Financial Payments - Discussed core banking applications and why they wouldn't be updated soon. Covered the role of FinTech in bringing change to the transfer of money which included an interesting debate about how Blockchain would or wouldn't be used to help change and improve the speed of money transfer.
Security Panel - Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and…Financial Payments - Discussed core banking applications and why they wouldn't be updated soon. Covered the role of FinTech in bringing change to the transfer of money which included an interesting debate about how Blockchain would or wouldn't be used to help change and improve the speed of money transfer.
Security Panel - Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and in general, how AI works and what AI isn't used for along with the current state of the art in AI. We had an interesting and thought-provoking give and take about Quantum technology and some of its impacts, along with discussing problems that multiple AI tools cause in the workplace.
Moderated a Panel on IoT and Wireless - this panel covered everything from Cars to Satellites in space and coming constellations of satellites to help provide connectivity for new types of IoT services. -
Speaker - 1st Party Conference - Forewarned is Forearmed Panel
insideARM
- 1 month
Science and Technology
Member of a three-person main session panel led by TransUnion. The session was about where the economy has been, what's changed both at a macro and micro level and how technology can play an important role to help us plan and prepare for future operational strategies.
-
Speaker - Plugging The Holes Left by the Internet of Things (IoT)
SC Media
- 1 month
Science and Technology
Participated in a two-person panel discussing the security of IoT devices. We've all heard how IoT technologies have and will continue to cause massive challenges to the execution and maintenance of security controls for organizations. How can security teams translate this knowledge into the real implementation of plans and policies to address the security vulnerabilities wrought by IoT-related technologies being leveraged in their organization’s building, products and more?
Gain a more…Participated in a two-person panel discussing the security of IoT devices. We've all heard how IoT technologies have and will continue to cause massive challenges to the execution and maintenance of security controls for organizations. How can security teams translate this knowledge into the real implementation of plans and policies to address the security vulnerabilities wrought by IoT-related technologies being leveraged in their organization’s building, products and more?
Gain a more comprehensive view of your companies' risk postures when it comes to current and future IoT developments. By harnessing sound security hygiene now, you can make sure IoT convergence is a positive game changer for your organization as opposed to yet one more risk needing mitigation.
https://www.risksecconference.com/InfoSecConferences/?ref=infosec-conferences.com
-
Speaker - How We Built a Conversational AI Voice Agent with IBM Watson Technology
IBM
- 1 month
Science and Technology
Presented a session at IBM's Think in San Francisco (IBM's Flagship Technology Conference) on how we developed a Conversational AI Voice Agent with Machine Learning (ML) for our call center using IBM Watson as its core technology. This presentation and associated demo highlighted the challenges and competitive environment that drove MRS to design, architect and build it in house. The presentation also included the AI Voice Agent's financial successes to date, current plans, and our future…
Presented a session at IBM's Think in San Francisco (IBM's Flagship Technology Conference) on how we developed a Conversational AI Voice Agent with Machine Learning (ML) for our call center using IBM Watson as its core technology. This presentation and associated demo highlighted the challenges and competitive environment that drove MRS to design, architect and build it in house. The presentation also included the AI Voice Agent's financial successes to date, current plans, and our future roadmap.
-
Speaker - Why We Use Twilio
Twilio Inc.
- 1 month
Science and Technology
Interviewed on stage at the Twilio Partner Networking Event in NYC. Discussed why we used Twilio, its advantages and how we had integrated it into our environment.
-
Speaker - Creating a Viable Disaster Recovery Plan
ACA International, the Association of Credit and Collection Professionals
- 1 month
Science and Technology
The natural disasters of 2017 battle-tested many organizations' disaster recovery and business continuity plans. Leslie Bender, Esq. from BCA Financial, Michael Meyer from MRS BPO, and Bryan Albertson from Harris and Harris will share best practices as well as review how many common DR/BC tactics performed in the aftermath of Hurricane Irma. This session will provide both a strategic overview as well as practical steps every company can take to ensure a workable business continuity plan to…
The natural disasters of 2017 battle-tested many organizations' disaster recovery and business continuity plans. Leslie Bender, Esq. from BCA Financial, Michael Meyer from MRS BPO, and Bryan Albertson from Harris and Harris will share best practices as well as review how many common DR/BC tactics performed in the aftermath of Hurricane Irma. This session will provide both a strategic overview as well as practical steps every company can take to ensure a workable business continuity plan to protectc their business.
-
Cyber Security Summit Panel Member - Machine Learning and AI
Opal Group
- 1 month
Science and Technology
Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and in general, how AI works and what AI isn't used for along with the current state of the art in AI. We had an interesting and thought-provoking give and take about bias in AI and some of its impacts, along with debating if AI would be able to at some point in the future take on more roles in an organization or be able to run an…
Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and in general, how AI works and what AI isn't used for along with the current state of the art in AI. We had an interesting and thought-provoking give and take about bias in AI and some of its impacts, along with debating if AI would be able to at some point in the future take on more roles in an organization or be able to run an entire business.
-
Speaker - 1st Party Conference - Innovation
the iA institute
- 1 month
Education
Panel Speaker about how AI and Innovation will change and affect the industry for the positive and the not so positive. Discussed finding a #BetterWay and discussed strategies that will be impactful around consent management. We also discussed where innovative ideas come from and how they are built by others into ideas that are implemented all around us.
-
Speaker - Information Security
Verizon Wireless
- 1 month
Science and Technology
Presented Secrets of Security. The speech covered Physical, Information, Employee and Vendor Security. Topic highlights included: Internal and External Firewalls, Digital Surveillance Cameras, Network Infiltration, Data Exfiltration, Encryption, Deception Technologies, Defense in Depth, Vulnerability Scans, Penetration Testing and Security Standards.
Discussed specifics of a recent notable hack and how it could have been prevented. -
Advisory Board Member
BillingTree
- 2 years 1 month
Education
The BillingTree Advisory Board members are an esteemed chosen group of BillingTree clients, senior leadership, and leading industry professionals that influence, shape, and provide innovative thought guidance for BillingTree’s strategic product roadmap, go-to-market initiatives, and professional service offerings.
The board members are specifically chosen and appointed based on their subject matter expertise in different categories that include financial services, payments, banking, credit…The BillingTree Advisory Board members are an esteemed chosen group of BillingTree clients, senior leadership, and leading industry professionals that influence, shape, and provide innovative thought guidance for BillingTree’s strategic product roadmap, go-to-market initiatives, and professional service offerings.
The board members are specifically chosen and appointed based on their subject matter expertise in different categories that include financial services, payments, banking, credit unions, security, and innovation to keep us at the forefront of emerging technology trends. The members are a diverse group by design which ensures that their expertise provides us the widest possible thought leadership--anywhere in the industry. -
Speaker - 1st Party Summit - Top 30 Security and Audit Questions
insideARM
- 1 month
Science and Technology
Presented the top 30 Security and Audit Questions that are asked during on-site audits and shown in RFI's and RFP's. Explained the strength and weaknesses of different security standards and what they mean.
Reviewed the different types of audit questions that are asked during audit visits along with what the best answers were for those questions. Co-presented with Bryan Albertson from RevSpring. -
Steering Committee Member - Innovations Council
insideARM
- Present 9 years 5 months
Science and Technology
Advancements in technology and creative approaches to old issues will be essential to success in the face of increasing regulation. And because the smartest minds will be more powerful together than on their own in developing today’s and tomorrow’s most innovative solutions. The council is a forum for a select group of senior technology, operations, and compliance executives to shape understandings of the BIG technology issues to redefine industry.
-
Industry Advisory Council
RevSpring
- 1 year 8 months
Education
Selected to provide insights on the industry and markets, focusing on both present day and looking ahead to the future. These insights covered security, technical improvements and advances, regulatory predictions, acquisitions and business expansion possibilities.
-
Speaker - 1st Party Summit - CallMiner Voice Analytics and FidoTrack Gamification
insideARM
- 1 month
Education
Opened Session for Callminer and FidoTrack because we are working with both of these great vendors to connect their systems together using APIs. This API connection will enable call center agents to obtain a real-time scoring and obtain points towards their game play.
-
Speaker - Secure, Simple and Seamless Enterprise Document and File Sharing Protection using DRM
MIDTECH CIO IT Summit
- 1 month
Science and Technology
Presented a way to safeguard the Company or Organization’s documents against the threats that Insiders or Hackers pose. Explained how Digital Rights Management (DRM) provides an easy to use and robust solution to protect against theft of documents or files.
-
Steering Committee Member
Consumer Relations Consortium
- Present 11 years 10 months
Education
This committee proactively engages with regulators (CFPB, FCC, FTC) and consumer advocacy groups to bridge the gap of understanding and expectations often present with consumers. Members also actively participate in best practice sub-groups by conference call, and on a quarterly basis, meet in person to discuss compliance challenges, changing trends, and new technologies.
-
Speaker - Compliance is Fun and Exciting
Northeast Utilities Conference
- Present 10 years 8 months
Education
A light-hearted look at why Compliance is so important to utilities in general and how to safeguard their company's financial divisions.
-
Speaker - How to Prevent a Data Breach
American Association of Healthcare Administrative Management
- 1 month
Education
Different ways that breaches occur and the methods that individuals and organizations can use to prevent a data breach from occurring.
-
Speaker - The Global State of Information Security Survey 2014 Roundtable
PwC
- 1 month
Education
Panel member along with with CIO/CSO Magazine at Villanova College in PA. Topic - Defending Yesterday - While organizations have made significant security improvements, they have not kept pace with today's determined adversaries. Discussed the results of the most recent PwC Information Security survey.
-
CRISC Student Guide and Test Reviewer (QAE and QAT)
ISACA
- 3 years
Education
Worked with the CRISC team at ISACA onsite and off-site to help review and provide questions for the student guide. In 2013 CRISC Certification Program was named a Gold Winner by SC Magazine.
-
Industry Advisory Council
Experian
- 5 years 1 month
Science and Technology
Experian created a team of industry experts to help find, explore and define new ideas. This council made up of industry visionaries with deep experience to help guide the company into new products, service offerings and markets.
-
Industry Advisory Council
LexisNexis
- 3 years 1 month
Science and Technology
LexisNexis created a team of industry visionaries to help identify new products that could be brought to market quickly and help transform and evolve their existing products into market leaders.
-
Industry Advisory Council
DAKCS Software Systems
- 4 years 1 month
Science and Technology
Dakcs created an advisory team from its customers to help create new solutions and guide it in the market place. Each member was a representative and voice for other customers in that region of the country.
-
Speaker
insideARM
- 1 month
Science and Technology
Michael is one of those rare people who think so creatively that you only recognize the wisdom of what he said long after your conversation. He sees connections and trends before most people recognize them. We had a 20-minute conversation about the future of debt collection technology but we didn't once mention debt collection. That's Michael's secret sauce. He constantly looks outside the industry for…
Michael is one of those rare people who think so creatively that you only recognize the wisdom of what he said long after your conversation. He sees connections and trends before most people recognize them. We had a 20-minute conversation about the future of debt collection technology but we didn't once mention debt collection. That's Michael's secret sauce. He constantly looks outside the industry for inspiration.
https://insidearm.com/news/00046480-00046478-creative-thinking-key-to-surviva/
-
Advisory Board Member - Cyber Security Advisory Board
Pace University - Seidenberg School of Computer Science and Information Systems
- Present 5 years 11 months
Science and Technology
Pace University and the Seidenberg School have been committed to cybersecurity education and research for over 10 years. We have established collaborations with faculty at academic institutions locally, regionally, nationally, and internationally, and with professionals in the cybersecurity space in private and public sectors. As we continue to strengthen our cybersecurity programs and prepare to address the needs of our students and the industry in the future, we strive to achieve sustainable…
Pace University and the Seidenberg School have been committed to cybersecurity education and research for over 10 years. We have established collaborations with faculty at academic institutions locally, regionally, nationally, and internationally, and with professionals in the cybersecurity space in private and public sectors. As we continue to strengthen our cybersecurity programs and prepare to address the needs of our students and the industry in the future, we strive to achieve sustainable and high-impact success. To that end, we established a cybersecurity advisory group of industry leaders and experts to provide programmatic guidance in several areas, including: curriculum, co-curricular activities, research, and outreach. The group meets semi-annually (fall/spring).
Publications
-
Innovation is Everything!
CIO Review
See publicationThink quick, what company comes to mind when you think of a company that embodies innovation? Did you think of Apple, Amazon, Google, Microsoft, Tesla, or another technology company? Why do most people consider the large tech companies to be the most innovative? Is it because we can see the changes happening frequently each year with new product models they produce or is it their impact on our lives? Or could it be the number of patents granted recently? If it was the number of patents granted…
Think quick, what company comes to mind when you think of a company that embodies innovation? Did you think of Apple, Amazon, Google, Microsoft, Tesla, or another technology company? Why do most people consider the large tech companies to be the most innovative? Is it because we can see the changes happening frequently each year with new product models they produce or is it their impact on our lives? Or could it be the number of patents granted recently? If it was the number of patents granted recently, then as an example in 2015, the top five companies receiving patents in order would be Samsung, IBM, Canon, LG Electronics, and Google.
-
Strong Security - Technology Isn't Everything
Enterprise Security Magazine
See publicationHow many times have you heard--buy this technology and all of our (and your) worries and problems go away? Maybe it sounded like this instead--this is the latest and greatest technology; we need it to solve every security issue. So, will any, one technology completely secure a business? How can I break this gently to you - NO! To completely secure a business (if that is even possible) requires multiple layers of defenses using different tools, techniques, and technologies. These layers…
How many times have you heard--buy this technology and all of our (and your) worries and problems go away? Maybe it sounded like this instead--this is the latest and greatest technology; we need it to solve every security issue. So, will any, one technology completely secure a business? How can I break this gently to you - NO! To completely secure a business (if that is even possible) requires multiple layers of defenses using different tools, techniques, and technologies. These layers need to be woven and interlocked together to create a true "defense in depth". The goal of "defense in depth" is to reduce the overall surface areas to attack and minimize the weaknesses for attackers to discover and penetrate.
-
What You Need to Know About AWS - India Version
CIO Review India
See publicationAmazon Web Services (AWS) are becoming an integral part of every life in many companies and governments around the world. While everyone has heard of AWS and knows a little about it, there is a lot more to AWS than most of us are aware of. This article explores the 90 various services and picks the top 20 that most businesses need to know about.
-
Crisis Management = Brand and Profit Protection
Consultants Review
See publicationCrisis Management is often considered the most important kind of public relations because in a moment an organization or brand that took years, decades or even a century to build can be lost or strengthened. The difference between death or survival are the decisions that management makes. The best decisions are made by organizations that are ready for a crisis by expecting them to occur and planning for them. These organizations practice two kinds of crisis planning. Risk management and…
Crisis Management is often considered the most important kind of public relations because in a moment an organization or brand that took years, decades or even a century to build can be lost or strengthened. The difference between death or survival are the decisions that management makes. The best decisions are made by organizations that are ready for a crisis by expecting them to occur and planning for them. These organizations practice two kinds of crisis planning. Risk management and Crisis management.
-
Are Your Disaster Recovery Files Really Secure in the Cloud?
Enterprise Services Outlook Magazine
-
Bringing Call Centers (and jobs) back to the US
Enterprise Services Outlook Magazine
Honors & Awards
-
Won the Graduate School Wildcard round and Gained Entry into Georgetown Entrepreneurship Challenge (GEC)
Georgetown University
Michael Meyer won the Graduate School Wildcard round to gain entry to Georgetown Entrepreneurship Challenge (GEC)! He did a great job presenting his company Debt Challenge and received a $2,500.00 prize for his efforts.
https://scs.georgetown.edu/news-and-events/article/7521/georgetown-entrepreneurs-plan-help-people-need -
Hoya Professional 30 - Students on the Rise - 2018
Georgetown University
Founded in 2015, the mission of The Hoya Professional 30 is to recognize and highlight the student professionals who exemplify leadership and excellence at Georgetown University’s School of Continuing Studies, and who have made outstanding contributions to their industries and communities.
https://blogs.commons.georgetown.edu/hoya-professional-30/michael-meyer-2/
-
Army Achievement Medal
U.S. Army
-
Scholastic Excellence
US. Army
Languages
-
English
-
Organizations
-
Blockchain Council
-
- Present -
InfraGard
Member
- Present -
IAPP
Member
- Present -
ISACA
Member
- Present -
ISC2
Member
- Present
Recommendations received
3 people have recommended Michael Meyer CISSP, CISM, CRISC,
Join now to viewMore activity by Michael Meyer CISSP, CISM, CRISC,
-
With the DTR acquisition, we aren’t just adding features; we’re collapsing the distance between legacy rails and the future of digital asset…
With the DTR acquisition, we aren’t just adding features; we’re collapsing the distance between legacy rails and the future of digital asset…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
We’re proud to share that CAS Co-founder & managing partner Michael Lamm has been elected to represent the Affiliate Division of ACA International on…
We’re proud to share that CAS Co-founder & managing partner Michael Lamm has been elected to represent the Affiliate Division of ACA International on…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
Your best collector just lost to an AI. Not on every account. But on enough of them. It has faster responses. More consistent follow-ups. No sick…
Your best collector just lost to an AI. Not on every account. But on enough of them. It has faster responses. More consistent follow-ups. No sick…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
🎓 Proud to announce our new University Certification Course — "Executive Program in AI Governance" — and it's exceeding expectations! In a world…
🎓 Proud to announce our new University Certification Course — "Executive Program in AI Governance" — and it's exceeding expectations! In a world…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
Bakkt has officially completed its acquisition of Distributed Technologies Research (DTR), marking a significant milestone in the company’s strategic…
Bakkt has officially completed its acquisition of Distributed Technologies Research (DTR), marking a significant milestone in the company’s strategic…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
There’s something so powerful and irreplaceable about getting into the same room together. 💚💙 Last week in City of Greenville, South Carolina, we…
There’s something so powerful and irreplaceable about getting into the same room together. 💚💙 Last week in City of Greenville, South Carolina, we…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
FTC releases report confirming that nearly 30% of people who reported losing money to a scam said it began on social media. Estimates of losses…
FTC releases report confirming that nearly 30% of people who reported losing money to a scam said it began on social media. Estimates of losses…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
If you are in the PA area and attending SecureWorld, you should stop by to see this panel discussion. #SecureWorld, #AITG, #HumanThreat, #AI
If you are in the PA area and attending SecureWorld, you should stop by to see this panel discussion. #SecureWorld, #AITG, #HumanThreat, #AI
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
Secureworld Philly is coming up. Hope to see you there!! https://lnkd.in/eXyQKNCC
Secureworld Philly is coming up. Hope to see you there!! https://lnkd.in/eXyQKNCC
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
-
The conference run doesn't stop with Las Vegas 🏜️! Next week, the Bakkt team is headed to Consensus in Miami 🌴 Andrew Sabola, Jacquelyn Caine…
The conference run doesn't stop with Las Vegas 🏜️! Next week, the Bakkt team is headed to Consensus in Miami 🌴 Andrew Sabola, Jacquelyn Caine…
Liked by Michael Meyer CISSP, CISM, CRISC, CISA
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content