Scott Ashton is a skilled professional, who works in Amlaw 20 Law Firm as a Senior Director of Information Security from 2019. Scott gained professional experience in more than eight positions at various companies. Scott Ashton went to the Regis University and got education there. This expert has professional qualifications: Cissp, Cism, and Cicp. New York, New York is the area, where this expert was lastly known to be located. The professional's phone number and email can be easily accessed through SoftwareOfficial on demand.
Name variants:
Scotty Ashton
Last updated Jun 17, 2024
Contact Information
Last Update
Jul 6, 2022
Email
sc**@ropesgray.com, hs**@gmail.com
Location
New York, NY
Company
Amlaw 20 Law Firm
Workplace
Senior Director of Information Security
Work History
Information Security Manager
New York
Debevoise & Plimpton LLP is a premier law firm with market-leading practices, a global perspective and strong New York roots. Our clients look to us to bring a distinctively high degree of q...
Apr 2013 — Aug 2015
Vice President, Information Security
901 Arch St, Philadelphia, PA 19107
Police and Fire Federal Credit Union is a full-service retail financial institution with $4 billion in assets. Employing 500 full and part-time employees with 10 locations across the Delawar...
Sep 2007 — Mar 2013
Network Security Administrator
750 Brunswick Ave, Trenton, NJ 08638
Capital Health System, Inc., is a not-for-profit, integrated health care delivery system consisting of two hospitals (each licensed for approximately 300 beds), multiple physician practices ...
Dec 2004 — Sep 2007
Lan Systems Administrator
750 Brunswick Ave, Trenton, NJ 08638
Jan 2002 — Dec 2004
Desktop Support Specialist Ii
750 Brunswick Ave, Trenton, NJ 08638
Jul 2001 — Dec 2001
Occupations
Executive
Senior Director
Security
Lawyer
Law Specialist
Director
Senior Manager
Operations Manager
Lawyer
Skills
Information Security
Information Security Management
Vulnerability Management
Network Security
Security Awareness
Risk Management
Penetration Testing
Computer Security
Ips
Vulnerability Assessment
Governance
Cissp
Business Continuity
Security Audits
Cism
Security Operations
It Audit
Intrusion Detection
Risk Assessment
Data Security
Security Policy
Enterprise Risk Management
Architecture
Physical Security
Vulnerability Scanning
Security Management
Encryption
Ceh
Web Application Security
Ids
Cobit
Nessus
Architectures