This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
As CIO, DeSot is charged with key industry and market regulator relationships, public speaking initiatives, key integration and service partnerships, and regulatory compliance matters. Additionally, DeSot serves as the company’s internal auditor on security-related matters. Prior to Digital Defense, DeSot was Vice President of Information Systems for a mid-tier financial institution. DeSot holds a Master of Science degree in Information Technology with a concentration in Information Security from Southern New Hampshire University and a Bachelor of Arts in Applied Arts and Sciences from Texas State University (summa cum laude). He also holds the National Security Agency’s INFOSEC Assessment Methodology Certification and is formally trained in the OCTAVE Risk Assessment Methodology. DeSot currently serves on the information security curriculum advisory panels for St. Mary’s University – San Antonio, Texas A&M University-San Antonio and Hallmark University – San Antonio. He is as active member of the North San Antonio Chamber of Commerce IT Committee, and has delivered cybersecurity and cyber-ethics presentations at the University of Texas at San Antonio.
Of late, much has been written regarding the dangers of electronic voting machines and how their security controls are either lacking or non-existent, leading to potential voter fraud or changes in how ballots are cast