About Scott Sykes
Scott Sykes is the Chief Information Security Officer (CISO) at Asurity Technologies, where he leads efforts to secure the organization’s infrastructure, safeguard data, and ensure compliance with rigorous regulatory standards. With over 15 years of experience in information security, Scott has become a leading voice in advancing cybersecurity practices that align with public interest technology principles, focusing on ethics, inclusivity, and collaboration.
Scott’s extensive background includes building global security programs from the ground up and interfacing with regulatory entities across the United States and European Union. His areas of expertise encompass Security Operations Centers, Governance, Risk, and Compliance (GRC), audits, application security, infrastructure security, and customer delivery. Prior to his role at Asurity, Scott served as CISO at Netcracker Technology and Tata Communications, where he led compliance initiatives for stringent U.S. Department of Justice mandates. His career also includes impactful roles at Lucent Technologies, Capital One, and Genworth, where he specialized in network consulting, security strategy, and web security management.
An electrical engineering graduate of the University of Delaware, Scott further expanded his expertise with an MBA from the UCLA Anderson School of Management. He holds several industry-leading certifications, including CISSP, CISSP-ISSAP, CISM, CISA, and CCSP, underscoring his commitment to staying at the forefront of the rapidly evolving cybersecurity landscape.
At CPIT, Scott Sykes integrates the principles of public interest technology into his role by developing ethical cybersecurity frameworks that address both organizational needs and societal impact. His leadership ensures that CPIT’s cybersecurity solutions safeguard systems while advancing equity and accountability. By proactively identifying risks associated with emerging technologies, Scott champions strategies that mitigate harm to vulnerable communities and foster inclusive technology practices.
Scott’s work exemplifies CPIT’s mission to create secure, equitable, and human-centered technological advancements. His focus on bridging the gap between innovation and responsibility strengthens CPIT’s ability to deliver solutions that protect organizations and uphold the public good, ensuring that cybersecurity not only defends but also empowers.
Expertise
Cybersecurity Leadership
Governance, Risk, and Compliance (GRC)
Security Operations
Infrastructure and Application Security
Risk Assessment and Mitigation
Audit and Regulatory Compliance
Client and Stakeholder Engagement