Ping Identity has announced the appointment of Corridor of Fame CIO Paul Martin to its board of directors.
Martin will enable the security organization enhance its management system and IT innovation. He joins with a robust track file as an IT leader, having gained a selection of accolades. This consists of getting named to the CIO Corridor of Fame by CIO Magazine in 2017 and being awarded the 2020 Chicago CIO of the Calendar year Management ORBIE Award.
His most new posture was as CIO and senior vice-president for healthcare enterprise Baxter Global Inc., where he was liable for its international IT system, operations, security and processes. He has also held IT management roles at Rexam PLC, CIT Group, BNSF Railway and Frito-Lay Inc.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Commenting on the appointment, Andre Durand, CEO of Ping Id, said: “Few CIOs can match Paul’s established observe record of innovating IT alternatives that create bottom-line profitability and stakeholder worth. His in depth expertise in the CIO group will deliver higher insight to Ping Technology’s leadership, and additional champion our clients all through all business operations.”
Martin is also a board member for Unisys Company and Baxter Credit history Union as perfectly as getting a trustee at Hurry University Healthcare Heart and Ravinia Competition.
The appointment of Martin is the hottest step taken by Ping Id to extend its business during recent months. In October, it appointed Emma Maslen as its vice-president and standard manager for EMEA and APAC to increase its international operations, and in November introduced the acquisition of dynamic authorization company Symphonic Application.
Some parts of this posting are sourced from:
www.infosecurity-magazine.com