Michael Meyer CISSP, CISM, CRISC, CISA

Michael Meyer CISSP, CISM, CRISC, CISA

Cherry Hill, New Jersey, United States
31K followers 500+ connections

About

I turn AI ambition into production reality inside regulated, high-stakes environments…

Articles by Michael Meyer CISSP, CISM, CRISC,

  • Girls in STEM

    Girls in STEM: A Starting Place It’s no surprise that we are living in the era of technology, data, and knowledge…

    6 Comments
  • AWS Fargate is Revolutionary

    AWS has created yet another revolutionary service called Fargate. Amazon is always pushing the boundary of what's…

    3 Comments

Activity

Join now to see all activity

Experience

  • Spring Oaks Capital, LLC Graphic

    Spring Oaks Capital, LLC

    Chesapeake, Virginia, United States

  • -

  • -

  • -

    Cherry Hill, New Jersey, United States

  • -

  • -

    Cherry Hill, NJ

  • -

    New York City Metropolitan Area

  • -

    New Brunswick, New Jersey, United States

  • -

    Cherry Hill, NJ

  • -

    Cherry Hill, NJ

  • -

    Cherry Hill, NJ

  • -

    Maple Shade, NJ

  • -

    Cherry Hill, NJ

  • -

    Cherry Hill, NJ

  • -

    Fort Devens, MA., Korea and Ft. Lewis WA. (High Technology Test Bed)

Education

  • Georgetown University Graphic

    Georgetown University

    -

    Activities and Societies: Chosen as one of the HOYA Professional 30 for 2018! The mission of The Hoya Professional 30 is to recognize and highlight the student professionals who exemplify leadership and excellence at Georgetown University’s School and show leadership! Won the Graduate School Wildcard round to gain entry to Georgetown Entrepreneurship Challenge (GEC)! And selected in 2020 as one of 4 for an in-depth "Ask The Entrepreneur" Video Series that is a powerful learning tool for future SCS entrepreneurs!

    Georgetown University’s Master of Professional Studies in Technology Management prepares you to become a forward-thinking and effective technology leader. You’ll master not only the critical-thinking strategies needed to analyze and address evolving business needs but also the management expertise that prepares you to inspire teams and drive innovation. Our program brings together focused coursework and practical, hands-on experience. You’ll have the opportunity to engage with some of the…

    Georgetown University’s Master of Professional Studies in Technology Management prepares you to become a forward-thinking and effective technology leader. You’ll master not only the critical-thinking strategies needed to analyze and address evolving business needs but also the management expertise that prepares you to inspire teams and drive innovation. Our program brings together focused coursework and practical, hands-on experience. You’ll have the opportunity to engage with some of the nation’s leading industry experts and organizations through real-world client work, guest lectures, case studies, and networking events.

  • -

    -

  • -

    -

Licenses & Certifications

Volunteer Experience

  • BSides South Jersey Graphic

    Speaker

    BSides South Jersey

    - 1 month

    Science and Technology

    Speaking Topic - The Secret Threats All Around Us
    We are under continuous threats from our adversaries not through open war, but through quiet, persistent campaigns designed to impact how we think, what we trust, and how we live our lives. Operatives target information systems, industries and businesses at all levels, without most of us ever noticing. College campuses are not on the sidelines; they are one of their primary targets. These efforts rarely make headlines; in fact, they seem…

    Speaking Topic - The Secret Threats All Around Us
    We are under continuous threats from our adversaries not through open war, but through quiet, persistent campaigns designed to impact how we think, what we trust, and how we live our lives. Operatives target information systems, industries and businesses at all levels, without most of us ever noticing. College campuses are not on the sidelines; they are one of their primary targets. These efforts rarely make headlines; in fact, they seem small and are easy to miss as background noise. Taken together, however, they represent a constant strategic threat that operates below the level of national awareness but directly affects us, impacts what you are learning and all of our futures.

    https://bsidessouthjersey.org/index.html

  • AccountsRecovery.net Graphic

    Panel Speaker - What You’re Missing by Sticking With an Outdated System

    AccountsRecovery.net

    - 1 month

    Science and Technology

    This was a candid conversation about the hidden price of legacy technology and why “good enough” is often the biggest competitive risk of all. We’ll dig into the costs most operators don’t measure but absolutely should, what happens when a high-performing collector is forced to work inside an outdated system, how legacy platforms affect hiring, retention, and motivation, and why patching together a Frankenstein stack of plug-ins can quietly become more expensive than replacing the core. We’ll…

    This was a candid conversation about the hidden price of legacy technology and why “good enough” is often the biggest competitive risk of all. We’ll dig into the costs most operators don’t measure but absolutely should, what happens when a high-performing collector is forced to work inside an outdated system, how legacy platforms affect hiring, retention, and motivation, and why patching together a Frankenstein stack of plug-ins can quietly become more expensive than replacing the core. We’ll also explore the warning signs that your organization is already falling behind, what a true rebuild-from-scratch mindset reveals, and how to lead change when the people closest to the work may feel they have the most to lose.

  • AccountsRecovery.net Graphic

    Panel Speaker - Separating AI Fact From Fiction and Hype From Reality

    AccountsRecovery.net

    - 1 month

    Science and Technology

    This webinar provides a grounded perspective on the role of AI in the contact center space, cutting through the hype to focus on what it actually takes to implement effectively. The discussion emphasizes that AI is only as strong as the data and context behind it, highlighting the need for clean, organized, and accessible information rather than fragmented legacy systems. It also identifies regulation and compliance as key barriers to adoption, noting that progress will depend on clear and…

    This webinar provides a grounded perspective on the role of AI in the contact center space, cutting through the hype to focus on what it actually takes to implement effectively. The discussion emphasizes that AI is only as strong as the data and context behind it, highlighting the need for clean, organized, and accessible information rather than fragmented legacy systems. It also identifies regulation and compliance as key barriers to adoption, noting that progress will depend on clear and enforceable guidelines. Ultimately, the takeaway is that while AI holds significant promise, real success will come from disciplined data management, realistic expectations, and thoughtful execution not just enthusiasm for the technology itself.

  • AccountsRecovery.net Graphic

    Panel Speaker - How to Become an Innovator and Disruptor in Your Office

    AccountsRecovery.net

    - 1 month

    Science and Technology

    Spoke about how innovation almost always starts with the people closest to the work. We will discuss how to frame disruption as something teams can actually practice, and do... not just talk about.

    LinkedIn post: 👉 How to Become an Innovator 💡 and Disruptor ⚡ in Your Office
    In this wide-ranging panel session, we will cover topics such as:
    * How to turn front-line pain points into an actual innovation roadmap
    * A simple framework leaders can use to drive disruption without…

    Spoke about how innovation almost always starts with the people closest to the work. We will discuss how to frame disruption as something teams can actually practice, and do... not just talk about.

    LinkedIn post: 👉 How to Become an Innovator 💡 and Disruptor ⚡ in Your Office
    In this wide-ranging panel session, we will cover topics such as:
    * How to turn front-line pain points into an actual innovation roadmap
    * A simple framework leaders can use to drive disruption without creating chaos.
    * Concrete steps you can take in the next 90 days to start innovating from inside your own operation.

    If you’re serious about modernizing 🤖 and rethinking what’s possible 🧩, I’d love to see you there!

  • SecureWorld Graphic

    Speaker - How Homomorphic Encryption Unlocks Privacy

    SecureWorld

    - 1 month

    Science and Technology

    Spoke on Homomorphic Encryption: Exploring the Past, Present, and Future of Privacy-Preserving Computation. Delivered a comprehensive presentation on homomorphic encryption (HE)—a groundbreaking cryptographic method that allows computation on encrypted data without ever needing to decrypt it. The session began with a historical overview of HE’s theoretical origins, tracing its evolution from early academic concepts to modern implementations.

    I covered all three primary categories of…

    Spoke on Homomorphic Encryption: Exploring the Past, Present, and Future of Privacy-Preserving Computation. Delivered a comprehensive presentation on homomorphic encryption (HE)—a groundbreaking cryptographic method that allows computation on encrypted data without ever needing to decrypt it. The session began with a historical overview of HE’s theoretical origins, tracing its evolution from early academic concepts to modern implementations.

    I covered all three primary categories of homomorphic encryption:
    Partially Homomorphic Encryption (PHE)
    Somewhat Homomorphic Encryption (SHE)
    Fully Homomorphic Encryption (FHE)

    Each was analyzed in terms of structure, functionality, and computational trade-offs. I also highlighted major players in the field—including IBM, Microsoft, AWS, Zama, and Duality Technologies. Examined the ways in which they are pushing the boundaries of encrypted computation for secure data analytics, finance, AI, and cloud security.

  • Rowan University Graphic

    Speaker - Rowan Tech Day. Spoke about Security and Threats in the Real World

    Rowan University

    - 1 month

    Science and Technology

    Spoke to the CS club students in the security and technology majors. Delivered the session “Real World Security” guiding students through real world threats and what businesses can do to defend against it. Provided career advise as well for what they will be doing when they start out in the security field. Hosted an interactive Q&A on the real world of security, giving students a frank assessment of the current state of security…

    Spoke to the CS club students in the security and technology majors. Delivered the session “Real World Security” guiding students through real world threats and what businesses can do to defend against it. Provided career advise as well for what they will be doing when they start out in the security field. Hosted an interactive Q&A on the real world of security, giving students a frank assessment of the current state of security. https://csm.rowan.edu/departments/cs/news/articles/tech-day-2025-article.html

  • The Forwarders List of Attorneys Graphic

    Speaker - The Use Cases, Opportunities, Controls and Best Practices of AI.

    The Forwarders List of Attorneys

    - 1 month

    Science and Technology

    Spoke about AI on a panel with Regina Slowey. The panel was about use cases, opportunities, controls and best practices of AI. We focused on how to use ChatGPT and its capabilities to improve processes and provide information.

  • AccountsRecovery.net Graphic

    Speaker - How You Can Decide What Technology Investments That Will Give You the Biggest Bang for Your Buck and Future-Proof Your Company

    AccountsRecovery.net

    - 1 month

    Science and Technology

    Spoke on a panel with two others at ARMTECH in Nashville, TN. Our topic was How you can decide what technology investments that will give you the biggest bang for your buck and help you future-proof your company

  • AccountsRecovery.net Graphic

    Speaker - Future of Technology

    AccountsRecovery.net

    - 1 month

    Science and Technology

    I was excited to speak at the first ever ARMTech Conference! I spoke on a panel with industry heavyweights - Tim Collins (Indebted), Pran Navanandan (Halsted) and Dennis Barton (Barton Law, LLC). Sharing insights on the future of technology within the ARM industry was a great experience. It provided us with substantial opportunities to explore the transformative impact of technology upon the industry and to look ahead at what the future would bring.

  • Creatio Graphic

    Speaker - Composable Business Concepts and using Creativity and Technology to Rethink Digital Workflows

    Creatio

    - 1 month

    Science and Technology

    Spoke two different times at Creatio's global conference in Chicago in a battle of opinions about Composable Concepts for Business. IBM Coined the term in 2014 and composable / modular enterprises are the wave of future. Also spoke in a fire side chat along with Erik Hale about creativity and technology and how to rethink digital workflows with no-code.

  • SecureWorld Graphic

    Featured Speaker Philadelphia - Social Media Threats to Security Staff

    SecureWorld

    - 1 month

    Science and Technology

    Technology in the security space is rapidly improving, policies and procedures are becoming standardized, security awareness training is being expanded and is now commonplace. So what is the next weakest link in an organization's security posture? Security Staff and especially their management are fast becoming the newest and weakest link in the security process. They know where the weaknesses, gaps, and vulnerabilities are at in the company. They are hardened targets, but the attackers will…

    Technology in the security space is rapidly improving, policies and procedures are becoming standardized, security awareness training is being expanded and is now commonplace. So what is the next weakest link in an organization's security posture? Security Staff and especially their management are fast becoming the newest and weakest link in the security process. They know where the weaknesses, gaps, and vulnerabilities are at in the company. They are hardened targets, but the attackers will try to compromise them regardless because the payoff is so huge. So they will employ new and more sophisticated methods than before via social media and gaming to get to their targets.

  • SecureWorld Graphic

    Speaker - Rockies - Deception Technology Levels the Playing Field

    SecureWorld

    - 1 month

    Science and Technology

    Speaker - How Deception Technology Works to Level the Playing Field

    The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discover what has been breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and…

    Speaker - How Deception Technology Works to Level the Playing Field

    The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discover what has been breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and associated damage. Discover how using this technology allows the tables to be turned around onto the attackers.

    https://events.secureworldexpo.com/agenda/rockies-2021/

  • IBM Graphic

    Speaker - Global IBM Community Day - How We Built a Conversational Call Center

    IBM

    - 1 month

    Science and Technology

    This time, users take the stage. We are uniting over a dozen IBM user groups on IBM Expert TV with five conference tracks featuring expert advice, lessons, demos, keynotes, feedback sessions, and more. Get an in-depth look at the IBM technologies you use every day, start a conversation, ask questions, or find new user groups to connect with and grow your skills. Presented how we used IBM Watson technology to create our Intelligent Voice Agent.

  • Creatio Graphic

    Speaker - Global Finserv Industry Event - Accelerate Innovation with No-Code Strategies and Best Practices

    Creatio

    - 1 month

    Science and Technology

    This premier event on how no-code development approach will redefine the future of the financial services industry is taking place online on October 5, 2021.

    The first of its kind virtual conference is fully focused on how no-code technologies can help financial services companies accelerate innovation and significantly improve the efficiency of front and middle-office. It will introduce world-class strategies and practical cases that showcase how to apply the no-code approach to…

    This premier event on how no-code development approach will redefine the future of the financial services industry is taking place online on October 5, 2021.

    The first of its kind virtual conference is fully focused on how no-code technologies can help financial services companies accelerate innovation and significantly improve the efficiency of front and middle-office. It will introduce world-class strategies and practical cases that showcase how to apply the no-code approach to different modern banking functions

    https://finance.yahoo.com/news/creatio-announces-finserv-industry-event-120000638.html

  • insideARM Graphic

    Thinking Differently About Thinking Differently - Interviewed by Erin Kerr

    insideARM

    - 1 month

    Science and Technology

    What does trying to write with your non-dominant hand have to do with the ARM industry? Join Erin Kerr as she discusses that, and more, with Michael Meyer, Chief Risk and Innovation Officer at MRS BPO. Some highlights include: What kind of risk tolerance makes sense? How to encourage your employees to think differently?
    What key phrase might alert you that changes need to be made to a process or department…

    What does trying to write with your non-dominant hand have to do with the ARM industry? Join Erin Kerr as she discusses that, and more, with Michael Meyer, Chief Risk and Innovation Officer at MRS BPO. Some highlights include: What kind of risk tolerance makes sense? How to encourage your employees to think differently?
    What key phrase might alert you that changes need to be made to a process or department.
    https://www.insidearm.com/news/00047653-thinking-differently-about-thinking-diffe/

  • SecureWorld Graphic

    Speaker - Multi-Cloud Identity Access Management - Myths, Reality & Risks

    SecureWorld

    - 1 month

    Science and Technology

    Michael Meyer discusses and debunks the common myths about Multi-Cloud Identity Authorization Management (IAM). He will also delve into the inherent risks that are present, and discuss key strategies to reduce them and increase your organization’s security posture.
    https://events.secureworldexpo.com/details/mid-atlantic-2021/

    Led Advisory Council Roundtable
    How Secure, Really, Are Your Vendors?

    Featured…

    Michael Meyer discusses and debunks the common myths about Multi-Cloud Identity Authorization Management (IAM). He will also delve into the inherent risks that are present, and discuss key strategies to reduce them and increase your organization’s security posture.
    https://events.secureworldexpo.com/details/mid-atlantic-2021/

    Led Advisory Council Roundtable
    How Secure, Really, Are Your Vendors?

    Featured Presenter
    https://events.secureworldexpo.com/details/mid-atlantic-2021/

  • Orca Security Graphic

    Speaker - How I Got X-Ray and Thermal Vision Across our Public Cloud

    Orca Security

    - 1 month

    Science and Technology

    Michael Meyer, Chief Risk and Innovation Officer at MRS BPO, a leading full-service accounts receivable management firm with an impressive roster of Fortune 50 clients. Michael needed to detect all important risks across a variety of custom-built web apps as well as a newly deployed customer portal built on AWS. Yet he could only get 20% visibility with AWS native tooling. He knew AWS GuardDuty and Inspector would never give him the breadth and depth of coverage he was looking for.…

    Michael Meyer, Chief Risk and Innovation Officer at MRS BPO, a leading full-service accounts receivable management firm with an impressive roster of Fortune 50 clients. Michael needed to detect all important risks across a variety of custom-built web apps as well as a newly deployed customer portal built on AWS. Yet he could only get 20% visibility with AWS native tooling. He knew AWS GuardDuty and Inspector would never give him the breadth and depth of coverage he was looking for.

    Michael will be joined by Patrick Pushor, Technical Evangelist at Orca Security. It’s going to be a fast-paced session as Michael takes you through his “notes from the field”, best practices, and pitfalls to avoid in securing public cloud infrastructure. Get ready to ask your toughest cloud security questions as we discuss:
    - 5 risks hiding inside every public cloud estate
    - How to get instant-on, workload-level visibility across 100% of your AWS, Azure, and GCP assets
    - The power of addressing both the control plane and data plane at once
    - Pros and cons of different cloud security tools: traditional agent-based tools and scanners, CWPP (cloud workload protection platforms), and CSPM (cloud security posture management)

    https://www.brighttalk.com/webcast/18490/437856/how-i-got-x-ray-and-thermal-vision-across-our-public-cloud-infrastructure

  • SecureWorld Graphic

    Speaker - How Deception Technology Works to Level the Playing Field

    SecureWorld

    - 1 month

    Science and Technology

    The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discovers what has breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and associated damage. Discover how using this technology allows the tables to be…

    The greatest threat to an enterprise is the length of time it takes to uncover an attack and then discovers what has breached. Deception Technology provides a unique way to find, identify, and enable a quick response to hacking without delays. This technology provides an early warning system that can function at multiple levels to serve as a sophisticated tripwire, which helps mitigate or prevent theft of data and associated damage. Discover how using this technology allows the tables to be turned around onto the attackers.

    https://events.secureworldexpo.com/agenda/new-york-philadelphia-2020/

  • insideARM Graphic

    Creative Thinking is the Key to Survival - Interviewed by CEO of InsideARM Stephanie Eidelman

    insideARM

    - Present 5 years 11 months

    Science and Technology

    Michael is one of those rare people who think so creatively that you only recognize the wisdom of what he said long after your conversation. He sees connections and trends before most people recognize them. We had a 20-minute conversation about the future of technology. That's Michael's secret sauce. He constantly looks outside the industry for inspiration.
    https://insidearm.com/news/00046480-00046478-creative-thinking-key-to-surviva/

  • IBM Graphic

    Speaker - How to Build an AI Application from the Ground Up

    IBM

    - 1 month

    Science and Technology

    IBM asked me to speak on camera for a 30-minute video. This video is about what it takes to build an AI application from the ground up. This includes building a multi-disciplinary team that thinks outside of the box and one that can tolerate a lot of failures and yet keeps going no matter what. In February 2020, it was featured on the IBM Watson Home Page!

  • IBM Graphic

    Panel Member - AI and the Future of Work Executive Exchange

    IBM

    - 1 month

    Science and Technology

    On a panel with Humana to discuss how we are transforming customer experiences with Watson and scaling AI in our enterprise. These experiences range from empowering agents to servicing customers and how we are optimizing customer service experiences using Watson's AI technology.
    https://www.ibm.com/watson/future-of-work-full

  • IBM Graphic

    Panel Member - Talking with AI - Data and AI Conference - Miami

    IBM

    - 1 month

    Science and Technology

    Brian Loveys (Watson Assistant product manager) moderated a panel with myself, Arun Bala (InsurBot.ai), Jasmeet Singh (Cardinal Health) about how we are using Watson Assistant for Voice Interaction (WAVI) as a first line of defense to improve customer experience and enhancing employee engagement. We also talked about how reports showing that 64% of today's customers are expecting personalized, real-time responses at any time, so it's no wonder that nearly two-thirds of professionals point…

    Brian Loveys (Watson Assistant product manager) moderated a panel with myself, Arun Bala (InsurBot.ai), Jasmeet Singh (Cardinal Health) about how we are using Watson Assistant for Voice Interaction (WAVI) as a first line of defense to improve customer experience and enhancing employee engagement. We also talked about how reports showing that 64% of today's customers are expecting personalized, real-time responses at any time, so it's no wonder that nearly two-thirds of professionals point to AI as their most important investment for next year. We believe that Voice interfaces will be at the top of many businesses list -- in fact, Gartner predicts that, by 2023, 25 percent of interactions with applications will be via voice, up from under 3 percent in 2019. We talked about how Watson Assistant for Voice Interaction is empowering enterprises of all sizes, across industries, to solve customer problems on any channel: whether its voice or text.

  • Voicebot.ai Graphic

    Speaker - How We Built an Intelligent Voice Agent Using IBM Watson

    Voicebot.ai

    - 1 month

    Science and Technology

    Spoke alongside Alex and Erin about how we built our Intelligent Voice Agent using IBM Watson with Machine Learning at Voice 19 (World's Largest Voice Conference at NJIT in Newark, NJ). Our session was very well attended, with so many questions afterward that we had to continue answering them in the hallway! Great experience and we loved sharing the incredible voice technology that we use every day!

  • Opal Group Graphic

    Panel Member - Two Panels (Payment Innovation / AI Security), Panel Moderator (IoT)

    Opal Group

    - 1 month

    Science and Technology

    Financial Payments - Discussed core banking applications and why they wouldn't be updated soon. Covered the role of FinTech in bringing change to the transfer of money which included an interesting debate about how Blockchain would or wouldn't be used to help change and improve the speed of money transfer.

    Security Panel - Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and…

    Financial Payments - Discussed core banking applications and why they wouldn't be updated soon. Covered the role of FinTech in bringing change to the transfer of money which included an interesting debate about how Blockchain would or wouldn't be used to help change and improve the speed of money transfer.

    Security Panel - Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and in general, how AI works and what AI isn't used for along with the current state of the art in AI. We had an interesting and thought-provoking give and take about Quantum technology and some of its impacts, along with discussing problems that multiple AI tools cause in the workplace.

    Moderated a Panel on IoT and Wireless - this panel covered everything from Cars to Satellites in space and coming constellations of satellites to help provide connectivity for new types of IoT services.

  • insideARM Graphic

    Speaker - 1st Party Conference - Forewarned is Forearmed Panel

    insideARM

    - 1 month

    Science and Technology

    Member of a three-person main session panel led by TransUnion. The session was about where the economy has been, what's changed both at a macro and micro level and how technology can play an important role to help us plan and prepare for future operational strategies.

  • SC Media Graphic

    Speaker - Plugging The Holes Left by the Internet of Things (IoT)

    SC Media

    - 1 month

    Science and Technology

    Participated in a two-person panel discussing the security of IoT devices. We've all heard how IoT technologies have and will continue to cause massive challenges to the execution and maintenance of security controls for organizations. How can security teams translate this knowledge into the real implementation of plans and policies to address the security vulnerabilities wrought by IoT-related technologies being leveraged in their organization’s building, products and more?
    Gain a more…

    Participated in a two-person panel discussing the security of IoT devices. We've all heard how IoT technologies have and will continue to cause massive challenges to the execution and maintenance of security controls for organizations. How can security teams translate this knowledge into the real implementation of plans and policies to address the security vulnerabilities wrought by IoT-related technologies being leveraged in their organization’s building, products and more?
    Gain a more comprehensive view of your companies' risk postures when it comes to current and future IoT developments. By harnessing sound security hygiene now, you can make sure IoT convergence is a positive game changer for your organization as opposed to yet one more risk needing mitigation.

    https://www.risksecconference.com/InfoSecConferences/?ref=infosec-conferences.com

  • IBM Graphic

    Speaker - How We Built a Conversational AI Voice Agent with IBM Watson Technology

    IBM

    - 1 month

    Science and Technology

    Presented a session at IBM's Think in San Francisco (IBM's Flagship Technology Conference) on how we developed a Conversational AI Voice Agent with Machine Learning (ML) for our call center using IBM Watson as its core technology. This presentation and associated demo highlighted the challenges and competitive environment that drove MRS to design, architect and build it in house. The presentation also included the AI Voice Agent's financial successes to date, current plans, and our future…

    Presented a session at IBM's Think in San Francisco (IBM's Flagship Technology Conference) on how we developed a Conversational AI Voice Agent with Machine Learning (ML) for our call center using IBM Watson as its core technology. This presentation and associated demo highlighted the challenges and competitive environment that drove MRS to design, architect and build it in house. The presentation also included the AI Voice Agent's financial successes to date, current plans, and our future roadmap.

  • Twilio Inc. Graphic

    Speaker - Why We Use Twilio

    Twilio Inc.

    - 1 month

    Science and Technology

    Interviewed on stage at the Twilio Partner Networking Event in NYC. Discussed why we used Twilio, its advantages and how we had integrated it into our environment.

  • ACA International, the Association of Credit and Collection Professionals Graphic

    Speaker - Creating a Viable Disaster Recovery Plan

    ACA International, the Association of Credit and Collection Professionals

    - 1 month

    Science and Technology

    The natural disasters of 2017 battle-tested many organizations' disaster recovery and business continuity plans. Leslie Bender, Esq. from BCA Financial, Michael Meyer from MRS BPO, and Bryan Albertson from Harris and Harris will share best practices as well as review how many common DR/BC tactics performed in the aftermath of Hurricane Irma. This session will provide both a strategic overview as well as practical steps every company can take to ensure a workable business continuity plan to…

    The natural disasters of 2017 battle-tested many organizations' disaster recovery and business continuity plans. Leslie Bender, Esq. from BCA Financial, Michael Meyer from MRS BPO, and Bryan Albertson from Harris and Harris will share best practices as well as review how many common DR/BC tactics performed in the aftermath of Hurricane Irma. This session will provide both a strategic overview as well as practical steps every company can take to ensure a workable business continuity plan to protectc their business.

  • Opal Group Graphic

    Cyber Security Summit Panel Member - Machine Learning and AI

    Opal Group

    - 1 month

    Science and Technology

    Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and in general, how AI works and what AI isn't used for along with the current state of the art in AI. We had an interesting and thought-provoking give and take about bias in AI and some of its impacts, along with debating if AI would be able to at some point in the future take on more roles in an organization or be able to run an…

    Discussed security applications and fit of AI for different purposes within a company and in general. Talked about what AI is currently used for in cybersecurity and in general, how AI works and what AI isn't used for along with the current state of the art in AI. We had an interesting and thought-provoking give and take about bias in AI and some of its impacts, along with debating if AI would be able to at some point in the future take on more roles in an organization or be able to run an entire business.

  • Speaker - 1st Party Conference - Innovation

    the iA institute

    - 1 month

    Education

    Panel Speaker about how AI and Innovation will change and affect the industry for the positive and the not so positive. Discussed finding a #BetterWay and discussed strategies that will be impactful around consent management. We also discussed where innovative ideas come from and how they are built by others into ideas that are implemented all around us.

  • Speaker - Information Security

    Verizon Wireless

    - 1 month

    Science and Technology

    Presented Secrets of Security. The speech covered Physical, Information, Employee and Vendor Security. Topic highlights included: Internal and External Firewalls, Digital Surveillance Cameras, Network Infiltration, Data Exfiltration, Encryption, Deception Technologies, Defense in Depth, Vulnerability Scans, Penetration Testing and Security Standards.
    Discussed specifics of a recent notable hack and how it could have been prevented.

  • BillingTree Graphic

    Advisory Board Member

    BillingTree

    - 2 years 1 month

    Education

    The BillingTree Advisory Board members are an esteemed chosen group of BillingTree clients, senior leadership, and leading industry professionals that influence, shape, and provide innovative thought guidance for BillingTree’s strategic product roadmap, go-to-market initiatives, and professional service offerings.
    The board members are specifically chosen and appointed based on their subject matter expertise in different categories that include financial services, payments, banking, credit…

    The BillingTree Advisory Board members are an esteemed chosen group of BillingTree clients, senior leadership, and leading industry professionals that influence, shape, and provide innovative thought guidance for BillingTree’s strategic product roadmap, go-to-market initiatives, and professional service offerings.
    The board members are specifically chosen and appointed based on their subject matter expertise in different categories that include financial services, payments, banking, credit unions, security, and innovation to keep us at the forefront of emerging technology trends. The members are a diverse group by design which ensures that their expertise provides us the widest possible thought leadership--anywhere in the industry.

  • insideARM Graphic

    Speaker - 1st Party Summit - Top 30 Security and Audit Questions

    insideARM

    - 1 month

    Science and Technology

    Presented the top 30 Security and Audit Questions that are asked during on-site audits and shown in RFI's and RFP's. Explained the strength and weaknesses of different security standards and what they mean.
    Reviewed the different types of audit questions that are asked during audit visits along with what the best answers were for those questions. Co-presented with Bryan Albertson from RevSpring.

  • insideARM Graphic

    Steering Committee Member - Innovations Council

    insideARM

    - Present 9 years 5 months

    Science and Technology

    Advancements in technology and creative approaches to old issues will be essential to success in the face of increasing regulation. And because the smartest minds will be more powerful together than on their own in developing today’s and tomorrow’s most innovative solutions. The council is a forum for a select group of senior technology, operations, and compliance executives to shape understandings of the BIG technology issues to redefine industry.

  • RevSpring Graphic

    Industry Advisory Council

    RevSpring

    - 1 year 8 months

    Education

    Selected to provide insights on the industry and markets, focusing on both present day and looking ahead to the future. These insights covered security, technical improvements and advances, regulatory predictions, acquisitions and business expansion possibilities.

  • insideARM Graphic

    Speaker - 1st Party Summit - CallMiner Voice Analytics and FidoTrack Gamification

    insideARM

    - 1 month

    Education

    Opened Session for Callminer and FidoTrack because we are working with both of these great vendors to connect their systems together using APIs. This API connection will enable call center agents to obtain a real-time scoring and obtain points towards their game play.

  • Speaker - Secure, Simple and Seamless Enterprise Document and File Sharing Protection using DRM

    MIDTECH CIO IT Summit

    - 1 month

    Science and Technology

    Presented a way to safeguard the Company or Organization’s documents against the threats that Insiders or Hackers pose. Explained how Digital Rights Management (DRM) provides an easy to use and robust solution to protect against theft of documents or files.

  • Consumer Relations Consortium Graphic

    Steering Committee Member

    Consumer Relations Consortium

    - Present 11 years 10 months

    Education

    This committee proactively engages with regulators (CFPB, FCC, FTC) and consumer advocacy groups to bridge the gap of understanding and expectations often present with consumers. Members also actively participate in best practice sub-groups by conference call, and on a quarterly basis, meet in person to discuss compliance challenges, changing trends, and new technologies.

  • Speaker - Compliance is Fun and Exciting

    Northeast Utilities Conference

    - Present 10 years 8 months

    Education

    A light-hearted look at why Compliance is so important to utilities in general and how to safeguard their company's financial divisions.

  • Speaker - How to Prevent a Data Breach

    American Association of Healthcare Administrative Management

    - 1 month

    Education

    Different ways that breaches occur and the methods that individuals and organizations can use to prevent a data breach from occurring.

  • PwC Graphic

    Speaker - The Global State of Information Security Survey 2014 Roundtable

    PwC

    - 1 month

    Education

    Panel member along with with CIO/CSO Magazine at Villanova College in PA. Topic - Defending Yesterday - While organizations have made significant security improvements, they have not kept pace with today's determined adversaries. Discussed the results of the most recent PwC Information Security survey.

  • ISACA Graphic

    CRISC Student Guide and Test Reviewer (QAE and QAT)

    ISACA

    - 3 years

    Education

    Worked with the CRISC team at ISACA onsite and off-site to help review and provide questions for the student guide. In 2013 CRISC Certification Program was named a Gold Winner by SC Magazine.

  • Experian Graphic

    Industry Advisory Council

    Experian

    - 5 years 1 month

    Science and Technology

    Experian created a team of industry experts to help find, explore and define new ideas. This council made up of industry visionaries with deep experience to help guide the company into new products, service offerings and markets.

  • LexisNexis Graphic

    Industry Advisory Council

    LexisNexis

    - 3 years 1 month

    Science and Technology

    LexisNexis created a team of industry visionaries to help identify new products that could be brought to market quickly and help transform and evolve their existing products into market leaders.

  • DAKCS Software Systems Graphic

    Industry Advisory Council

    DAKCS Software Systems

    - 4 years 1 month

    Science and Technology

    Dakcs created an advisory team from its customers to help create new solutions and guide it in the market place. Each member was a representative and voice for other customers in that region of the country.

  • insideARM Graphic

    Speaker

    insideARM

    - 1 month

    Science and Technology

    Michael is one of those rare people who think so creatively that you only recognize the wisdom of what he said long after your conversation. He sees connections and trends before most people recognize them. We had a 20-minute conversation about the future of debt collection technology but we didn't once mention debt collection. That's Michael's secret sauce. He constantly looks outside the industry for…

    Michael is one of those rare people who think so creatively that you only recognize the wisdom of what he said long after your conversation. He sees connections and trends before most people recognize them. We had a 20-minute conversation about the future of debt collection technology but we didn't once mention debt collection. That's Michael's secret sauce. He constantly looks outside the industry for inspiration.
    https://insidearm.com/news/00046480-00046478-creative-thinking-key-to-surviva/

  • Pace University - Seidenberg School of Computer Science and Information Systems Graphic

    Advisory Board Member - Cyber Security Advisory Board

    Pace University - Seidenberg School of Computer Science and Information Systems

    - Present 5 years 11 months

    Science and Technology

    Pace University and the Seidenberg School have been committed to cybersecurity education and research for over 10 years. We have established collaborations with faculty at academic institutions locally, regionally, nationally, and internationally, and with professionals in the cybersecurity space in private and public sectors. As we continue to strengthen our cybersecurity programs and prepare to address the needs of our students and the industry in the future, we strive to achieve sustainable…

    Pace University and the Seidenberg School have been committed to cybersecurity education and research for over 10 years. We have established collaborations with faculty at academic institutions locally, regionally, nationally, and internationally, and with professionals in the cybersecurity space in private and public sectors. As we continue to strengthen our cybersecurity programs and prepare to address the needs of our students and the industry in the future, we strive to achieve sustainable and high-impact success. To that end, we established a cybersecurity advisory group of industry leaders and experts to provide programmatic guidance in several areas, including: curriculum, co-curricular activities, research, and outreach. The group meets semi-annually (fall/spring).

Publications

  • Innovation is Everything!

    CIO Review

    Think quick, what company comes to mind when you think of a company that embodies innovation? Did you think of Apple, Amazon, Google, Microsoft, Tesla, or another technology company? Why do most people consider the large tech companies to be the most innovative? Is it because we can see the changes happening frequently each year with new product models they produce or is it their impact on our lives? Or could it be the number of patents granted recently? If it was the number of patents granted…

    Think quick, what company comes to mind when you think of a company that embodies innovation? Did you think of Apple, Amazon, Google, Microsoft, Tesla, or another technology company? Why do most people consider the large tech companies to be the most innovative? Is it because we can see the changes happening frequently each year with new product models they produce or is it their impact on our lives? Or could it be the number of patents granted recently? If it was the number of patents granted recently, then as an example in 2015, the top five companies receiving patents in order would be Samsung, IBM, Canon, LG Electronics, and Google.

    See publication
  • Strong Security - Technology Isn't Everything

    Enterprise Security Magazine

    How many times have you heard--buy this technology and all of our (and your) worries and problems go away? Maybe it sounded like this instead--this is the latest and greatest technology; we need it to solve every security issue. So, will any, one technology completely secure a business? How can I break this gently to you - NO! To completely secure a business (if that is even possible) requires multiple layers of defenses using different tools, techniques, and technologies. These layers…

    How many times have you heard--buy this technology and all of our (and your) worries and problems go away? Maybe it sounded like this instead--this is the latest and greatest technology; we need it to solve every security issue. So, will any, one technology completely secure a business? How can I break this gently to you - NO! To completely secure a business (if that is even possible) requires multiple layers of defenses using different tools, techniques, and technologies. These layers need to be woven and interlocked together to create a true "defense in depth". The goal of "defense in depth" is to reduce the overall surface areas to attack and minimize the weaknesses for attackers to discover and penetrate.

    See publication
  • What You Need to Know About AWS - India Version

    CIO Review India

    Amazon Web Services (AWS) are becoming an integral part of every life in many companies and governments around the world. While everyone has heard of AWS and knows a little about it, there is a lot more to AWS than most of us are aware of. This article explores the 90 various services and picks the top 20 that most businesses need to know about.

    See publication
  • Crisis Management = Brand and Profit Protection

    Consultants Review

    Crisis Management is often considered the most important kind of public relations because in a moment an organization or brand that took years, decades or even a century to build can be lost or strengthened. The difference between death or survival are the decisions that management makes. The best decisions are made by organizations that are ready for a crisis by expecting them to occur and planning for them. These organizations practice two kinds of crisis planning. Risk management and…

    Crisis Management is often considered the most important kind of public relations because in a moment an organization or brand that took years, decades or even a century to build can be lost or strengthened. The difference between death or survival are the decisions that management makes. The best decisions are made by organizations that are ready for a crisis by expecting them to occur and planning for them. These organizations practice two kinds of crisis planning. Risk management and Crisis management.

    See publication
  • AI and the Intelligent Cloud

    Enterprise Services Outlook Magazine

  • Bringing Call Centers (and jobs) back to the US

    Enterprise Services Outlook Magazine

Join now to see all publications

Honors & Awards

  • Won the Graduate School Wildcard round and Gained Entry into Georgetown Entrepreneurship Challenge (GEC)

    Georgetown University

    Michael Meyer won the Graduate School Wildcard round to gain entry to Georgetown Entrepreneurship Challenge (GEC)! He did a great job presenting his company Debt Challenge and received a $2,500.00 prize for his efforts.

    https://scs.georgetown.edu/news-and-events/article/7521/georgetown-entrepreneurs-plan-help-people-need

  • Hoya Professional 30 - Students on the Rise - 2018

    Georgetown University

    Founded in 2015, the mission of The Hoya Professional 30 is to recognize and highlight the student professionals who exemplify leadership and excellence at Georgetown University’s School of Continuing Studies, and who have made outstanding contributions to their industries and communities.
    https://blogs.commons.georgetown.edu/hoya-professional-30/michael-meyer-2/

  • Army Achievement Medal

    U.S. Army

  • Scholastic Excellence

    US. Army

Languages

  • English

    -

Organizations

  • Blockchain Council

    -

    - Present
  • InfraGard

    Member

    - Present
  • IAPP

    Member

    - Present
  • ISACA

    Member

    - Present
  • ISC2

    Member

    - Present

Recommendations received

3 people have recommended Michael Meyer CISSP, CISM, CRISC,

Join now to view

More activity by Michael Meyer CISSP, CISM, CRISC,

View Michael Meyer CISSP, CISM, CRISC,’s full profile

  • See who you know in common
  • Get introduced
  • Contact Michael Meyer CISSP, CISM, CRISC, directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses