![](https://i0.wp.com/www.paulbergman.org/wp-content/uploads/2023/02/cropped-PaulB-052-Square.jpg?resize=512%2C512&ssl=1)
Paul Bergman is a strategic business leader with global experience in healthcare, consulting, and telecommunications. As an expert in cybersecurity, Paul speaks at events across the US and England advocating for stronger cybersecurity in small and mid-sized businesses as the most vulnerable facet of the economy. He is also a proponent for cyber-risk management and oversight in the corporate boardroom.
Paul was an executive director of McGregor & Associates, Inc. In this capacity he served as cybersecurity and strategic IT expert on the board. Responsible for HIPAA compliance of over 3 million health care records, he managed security incidents as well as providing a full range of strategy, operations, change management, and information technology solutions to the Healthcare industry. His board service culminated with the sale of the company and exceptional value realization to the shareholders.
After his work on the sale, Paul co-Founded Secure7X, a cybersecurity and IT consulting firm which currently enjoys growing market capitalization in the SaaS and consulting space. Paul sold his ownership stake in 2018 to focus on speaking, security consulting, and board leadership.
Paul is an accomplished information security leader with a track record of integration of operations and information technology. As a member of the strategic planning team at Kryptos Logic, globally known for finding the “kill-switch” for the WannaCry ransomware and a high-end cybersecurity firm, he helped develop web-based, B2B product offerings focused on delivering cutting edge security analysis and standards-based reporting.
As Director of International Business Development at Worldcom, Paul managed the operational start-up of five international joint ventures, where he managed budgets ranging from $5M to $440M. In this role he lived in Japan, England, and Canada. He managed network deployments into England, Spain, and Germany all from his home base in London.
He holds an MBA in International Business, a BA in Economics, is a Digital Director Network boardroom Qualified Technology Expert (QTE) and is a certified Cybersecurity Information Systems Security Professional (CISSP) by ISC2.
- Drive-By URLs: What are they?In the ever-evolving landscape of cybersecurity threats, drive-by URLs have emerged as a significant concern…
- Beware of Fake CrowdStrike Fixes: A New Malware and Wiper ThreatIn the rapidly evolving world of cybersecurity, threat actors are constantly devising new methods to…
- Ransomware targets Small and Medium-Sized BusinessesThe latest Microsoft Digital Defense Report 2023 sheds light on the evolving landscape of ransomware…
- Unlocking the Power of Windows Quick AssistIn the rapidly evolving world of remote work and digital collaboration, tools that facilitate seamless…
- How does the iPhone Protect youThe Apple iPhone is designed with robust security and privacy features to protect user information,…
- Understanding Security Concerns with TikTok: How to Stay Safe While Enjoying the AppWith the ever-increasing popularity of TikTok, security concerns have risen to the forefront. While the…
- Understanding How TikTok Can Exploit User Data: Why You Should Be ConcernedI understand that TicTok is emerging as a major marketing tool. Business owners use TikTok…
- Why Allowing Your PC to Reboot for Patches is Crucial for SecurityAs a computer user, you might find those frequent notifications about updates and patches to…
- Espionage: Why US Companies Should Pay Attention to Breaches in AsiaIntroduction As cyber espionage campaigns targeting telecom operators intensify, US companies need to be vigilant….
- What is IOC Pivoting?IOC Pivoting refers to a method used in cybersecurity for threat detection and analysis. IOC…
- Addressing the Critical PHP VulnerabilityThe Health Sector Cybersecurity Coordination Center (HC3) recently issued an alert regarding a critical vulnerability…
- The Resurgence of the 911 S5 BotnetThe 911 S5 botnet, notorious for its massive network of over 19 million compromised devices…
- Drive-By URLs: What are they? - July 26, 2024
- Beware of Fake CrowdStrike Fixes: A New Malware and Wiper Threat - July 25, 2024
- Ransomware targets Small and Medium-Sized Businesses - July 25, 2024