{"id":3719,"date":"2023-10-20T19:07:25","date_gmt":"2023-10-20T23:07:25","guid":{"rendered":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/?page_id=3719"},"modified":"2024-03-29T11:22:44","modified_gmt":"2024-03-29T15:22:44","slug":"advisors","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/advisors\/","title":{"rendered":"ITACS Industry Advisory Council"},"content":{"rendered":"<p>The ITACS Industry Advisory Council members provide guidance to Temple University&#8217;s ITACS program&#8217;s directors and instructors and mentor our IT Audit and Cyber Security (ITACS) graduate and undergraduate students.<\/p>\n<p>Jason Lindsley is Chair of Information Technology Auditing and Cyber Security (ITACS) Graduate Program&#8217;s Industry Advisory Council.<\/p>\n<p>The ITACS&#8217; council&#8217;s members include the following IT risk management, audit and cyber security industry leaders:<\/p>\n<ul>\n<li>Antonio Crespo, Arkema, Regional CISO &#8211; Americas<\/li>\n<li>Shaun Moody, Chubb, SVP IT Audit<\/li>\n<li>Alan Phan, Chubb, AVP IT Audit<\/li>\n<li>Vik Patel, Comcast, SVP &#8211; Technology, Comcast Global Audit<\/li>\n<li>Jeremy Davis, Comcast, Engagement Executive &#8211; Technology, Comcast Global Audit<\/li>\n<li>Sudhanshu Kairab, Comcast, SVP Cybersecurity Governance, Risk Compliance<\/li>\n<li>Jaspreet Marad, Comcast, Engagement Manager &#8211; Technology, Comcast Global Audit<\/li>\n<li>Claude Knight, EY, Managing Director, -Cyber Security<\/li>\n<li>Jodie Lash, FanDuel, Cybersecurity Senior Director<\/li>\n<li>Don Price, JP Morgan Chase, Executive Director &#8211; Corporate Audit<\/li>\n<li>Ajanta Jain, Cenlar FSB, Director Information Security &#8211; Cyber GRC<\/li>\n<li>David Lingenfelter, Penn National Gaming and Hollywood Casinos, Director of Information Security<\/li>\n<li>Pervez Bamji, Pitney Bowes, VP and General Auditor<\/li>\n<li>Ravi Sharma, Pitney Bowes, Manager &#8211; Technology Audit<\/li>\n<li>Leonard Nelson, Rowan University, Director of Information Security<\/li>\n<li>Jace Park, RSM US LLP, Consulting Risk Manager<\/li>\n<li><strong>Jason Lindsley<\/strong>, TD Bank, AVP, Platform and Technology Risk Services and Cyber Assurance<\/li>\n<li>Larry Brandolph, Temple University, VP for Information Technology and Privacy Officer<\/li>\n<li>Jarred Bernstein, USAA, IT Security and Risk Management Audit Director<\/li>\n<li>Philip Taddeo, Vanguard, Director &#8211; Technology Audit<\/li>\n<li>Thu Nguyen, Wells Fargo, AVP &#8211; Integrated and Compliance Audit<\/li>\n<\/ul>\n<p>Temple University MIS Department&#8217;s ITACS Program&#8217;s Council Members:<\/p>\n<ul>\n<li>David Lanter, Assistant Professor and Director of ITACS Graduate Programs<\/li>\n<li>Marie-Christine Martin, Assistant Professor and Director of Masters Programs<\/li>\n<li>Mart Doyle, Associate Professor and Chair<\/li>\n<li>Joe Allegra, Senior Associate Director<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The ITACS Industry Advisory Council members provide guidance to Temple University&#8217;s ITACS program&#8217;s directors and instructors and mentor our IT Audit and Cyber Security (ITACS) graduate and undergraduate students. Jason Lindsley is Chair of Information Technology Auditing and Cyber Security (ITACS) Graduate Program&#8217;s Industry Advisory Council. The ITACS&#8217; council&#8217;s members include the following IT risk [&hellip;]<\/p>\n","protected":false},"author":29750,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-3719","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-XZ","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/users\/29750"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/comments?post=3719"}],"version-history":[{"count":13,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3719\/revisions"}],"predecessor-version":[{"id":3924,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3719\/revisions\/3924"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/media?parent=3719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}