Certified Cybersecurity Consultant Dave Hatter Earns CISSP, CCSP and Other Security Certifications

Certified Cybersecurity Consultant Dave Hatter

It’s not as simple as studying for an exam and passing a test. To become a certified cybersecurity consultant at the level that Intrust’s Dave Hatter recently achieved takes years of real-world, hands-on experience. 

No wonder that so many local and regional news outlets reach out to Dave for their pieces on cybersecurity. But as talented a presenter as Dave is, he’s even more in his element bringing the latest in security strategy and technology to the Intrust IT team and clients.

Dave recently earned some of the most advanced security related IT certifications:

Dave is a lifelong learner and he’s passionate about cybersecurity. He continuously seeks to improve his skills and understanding of the ever-changing cybersecurity landscape. Staying at the cutting edge of the industry is his overriding goal, for himself, his team and all his Intrust IT clients.

Earning these credentials shows that Dave has what it takes to effectively design, implement and manage a best-in-class cybersecurity program. The CISSP certification is particularly prestigious and is considered by many to be the world’s premier cybersecurity certification.

(We’ve always known that Dave has what it takes, but it’s so nice to see that others recognize it as well).

Congratulations, Dave, from the entire Intrust family. Watch each video and make simple, everyday changes that will help reduce your risks of hacks, breaches and cyber attacks.

P is for Passwords

5 things you can do today to keep your company safe

I is for Insurance and Investments

3 easy things you can do to reduce your risk

E is for Employees

4 ways employees can keep your company safe Get Free Access

Posted in
Intrust IT Intrustimonials

Intrust Man

Intrust Man may be small, but he is mighty smart. You can trust this clever cartoon hero to provide news you can use.

Share this Blog

Enterprise Password Management Promo Wide

Is Your Name or Birthday a Part of Your Password?

If so, you’re a part of the 59 percent of people who don’t follow proper password hygiene. More than 70 percent of passwords are used for more than one system, meaning if cybercriminals crack one, they can access a lot more accounts.

Our free Enterprise Password Management Guide will give you the best password hygiene practices to help you secure your computer and your business.

Download the Guide

Explore the Latest Trends in IT

Securing Our Cities Cybersecurity Protection for Local Governments - Intrust IT

Securing Our Cities: Cybersecurity Protection for Local Governments

As a city or municipality manager, you understand that the security of your community extends far beyond physical borders. With...
Manufacturing and IoT Securing Connected Devices

Manufacturing and IoT: Securing Connected Devices

You're the operations manager of a cutting-edge manufacturing facility, overseeing a production floor buzzing with activity. Your team relies on...
Small Business Cyber Security Toolkit

Small Business Cyber Security Toolkit: The Tools You Need to Stay Protected

With great power comes great responsibility, especially when it comes to running a business and protecting your digital assets. As...

Business Continuity Plan Template for Municipalities

Municipalities are facing increasing cyber attacks.  With cybercrime rates soaring and municipalities ranking as prime targets, the need for robust...
Cybersecurity Strategies for Municipalities 8 Expert Tips - Intrust IT

Cybersecurity Strategies for Municipalities: 8 Expert Tips

Municipalities tasked with safeguarding sensitive data and critical infrastructure are increasingly the targets of cyberattacks. Municipalities often handle a vast...
Business Continuity Guide for City Managers - Intrust IT

Business Continuity Guide for City Officials

The resilience of a city's operations hinges on its ability to effectively weather unforeseen challenges. From natural disasters to cyber...