Certified Cybersecurity Consultant Dave Hatter Earns CISSP, CCSP and Other Security Certifications

Certified Cybersecurity Consultant Dave Hatter

It’s not as simple as studying for an exam and passing a test. To become a certified cybersecurity consultant at the level that Intrust’s Dave Hatter recently achieved takes years of real-world, hands-on experience. 

No wonder that so many local and regional news outlets reach out to Dave for their pieces on cybersecurity. But as talented a presenter as Dave is, he’s even more in his element bringing the latest in security strategy and technology to the Intrust IT team and clients.

Dave recently earned some of the most advanced security related IT certifications:

Dave is a lifelong learner and he’s passionate about cybersecurity. He continuously seeks to improve his skills and understanding of the ever-changing cybersecurity landscape. Staying at the cutting edge of the industry is his overriding goal, for himself, his team and all his Intrust IT clients.

Earning these credentials shows that Dave has what it takes to effectively design, implement and manage a best-in-class cybersecurity program. The CISSP certification is particularly prestigious and is considered by many to be the world’s premier cybersecurity certification.

(We’ve always known that Dave has what it takes, but it’s so nice to see that others recognize it as well).

Congratulations, Dave, from the entire Intrust family. Watch each video and make simple, everyday changes that will help reduce your risks of hacks, breaches and cyber attacks.

P is for Passwords

5 things you can do today to keep your company safe

I is for Insurance and Investments

3 easy things you can do to reduce your risk

E is for Employees

4 ways employees can keep your company safe Get Free Access

Posted in
Intrust IT Intrustimonials

Intrust Man

Intrust Man may be small, but he is mighty smart. You can trust this clever cartoon hero to provide news you can use.

Share this Blog

Enterprise Password Management Promo Wide

Is Your Name or Birthday a Part of Your Password?

If so, you’re a part of the 59 percent of people who don’t follow proper password hygiene. More than 70 percent of passwords are used for more than one system, meaning if cybercriminals crack one, they can access a lot more accounts.

Our free Enterprise Password Management Guide will give you the best password hygiene practices to help you secure your computer and your business.

Download the Guide

Explore the Latest Trends in IT

Business-Continuity-Plan-Template-for-Municipalities-Intrust-IT

Business Continuity Plan Template for Municipalities

Municipalities are facing increasing cyber attacks.  With cybercrime rates soaring and municipalities ranking as prime targets, the need for robust...
Cybersecurity Strategies for Municipalities 8 Expert Tips - Intrust IT

Cybersecurity Strategies for Municipalities: 8 Expert Tips

Municipalities tasked with safeguarding sensitive data and critical infrastructure are increasingly the targets of cyberattacks. Municipalities often handle a vast...
Business Continuity Guide for City Managers - Intrust IT

Business Continuity Guide for City Officials

The resilience of a city's operations hinges on its ability to effectively weather unforeseen challenges. From natural disasters to cyber...
Integrating AI for Enhanced Security - Intrust IT

Integrating AI for Enhanced Security

Organizations face an unprecedented array of cybersecurity threats, and now, cybercriminals are actively leveraging artificial intelligence (AI) to help create...
Cybersecurity for Small Businesses Threat Management Strategies - Intrust IT

Cybersecurity for Small Businesses: Threat Management Strategies

The threat of cybercrime looms larger than ever before. With each passing year, we witness a staggering rise in cyberattacks,...
The Crucial Role of Data Backup in Business Continuity and Disaster Recovery - Intrust IT

The Crucial Role of Data Backup in Business Continuity and Disaster Recovery

Data is the lifeblood of any modern business operation. All organizations rely heavily on digital information, from customer and financial...