![A Roadmap for CMMC 2.0 Compliance for DoD Contractors](https://www.kiteworks.com/wp-content/uploads/2022/09/A-Roadmap-for-CMMC-2.0-Compliance-for-DoD-Contractors-560x360.jpg)
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Patrick Spencer
![Patrick Spencer, Vice President, Corporate Marketing, Kiteworks Patrick Spencer, Vice President, Corporate Marketing, Kiteworks](/wp-content/uploads/2022/04/patrick-spencer_480x480-2.webp)
Patrick Spencer, Vice President, Corporate Marketing, Kiteworks
Patrick is charged with building thought leadership and communications programs that increase brand awareness and engagement and propel lead-generation programs, engaging with and mobilizing Kiteworks’ thousands of customers and partners via a multi-touch advocacy strategy, and operationalizing SEO strategies and marketing processes. He has nearly two decades of experience in various senior marketing roles within cybersecurity at Contrast Security, Fortinet, and Symantec. At Contrast Security, he worked with Contrast Labs to institute data science strategies to mine product data used to produce thought leadership reports that were pivotal competitive differentiators and demand-generation vehicles.
Patrick is the recipient of numerous corporate, industry, and media awards, having served as the editor in chief and publisher for various digital publications and initiatives such as CIO Digest at Symantec, The CISO Collective at Fortinet, and the Inside AppSec Podcast at Contrast Security. He holds a doctorate from the University of Durham and two masters and a bachelor’s degree from Abilene Christian University.
![A Roadmap for CMMC 2.0 Compliance for DoD Contractors](https://www.kiteworks.com/wp-content/uploads/2022/09/A-Roadmap-for-CMMC-2.0-Compliance-for-DoD-Contractors-560x360.jpg)
![Protecting Sensitive Content Communications Is More Important Than Ever [Kiteworks 2024 Report]](https://www.kiteworks.com/wp-content/uploads/2024/06/Protecting-Sensitive-Content-Communications-Is-More-Important-Than-Ever-Kiteworks-2024-Report-560x360.jpg)
Protecting Sensitive Content Communications Is More Important Than Ever [Kiteworks 2024 Report]
![Navigating PCI Compliance: Essential Tips for Secure File Transfers](https://www.kiteworks.com/wp-content/uploads/2023/11/Navigating-PCI-Compliance-Essential-Tips-for-Secure-File-Transfers-1-560x360.jpg)
Secure File Transfer Strategies for PCI Compliance
![NIST CSF 2.0: The Ultimate Guide to Managing Sensitive Content Communications Risk](https://www.kiteworks.com/wp-content/uploads/2024/05/NIST-CSF-2.0-The-Ultimate-Guide-to-Managing-Sensitive-Content-Communications-Risk-1-560x360.jpg)
NIST CSF 2.0: The Ultimate Guide to Managing Sensitive Content Communications Risk
![8 Critical Data Security Takeaways From RSA Conference 2024](https://www.kiteworks.com/wp-content/uploads/2024/05/8-Critical-Data-Security-Takeaways-From-RSA-Conference-2024-2-560x360.jpg)
8 Critical Data Security Takeaways From RSA Conference 2024
![Strategies on How to Use Regulatory Compliance and Cybersecurity Frameworks](https://www.kiteworks.com/wp-content/uploads/2023/01/Strategies-on-How-to-Use-Regulatory-Compliance-and-Cybersecurity-Frameworks-560x360.jpg)
Regulatory Compliance and Cybersecurity Standards Drive Risk Management
![Mitigating the Risk of Software Supply Chain Attacks: Insights From the Dropbox Sign Breach](https://www.kiteworks.com/wp-content/uploads/2024/05/Mitigating-the-Risk-of-Software-Supply-Chain-Attacks-Insights-From-the-Dropbox-Sign-Breach-3-560x360.jpg)
Mitigating the Risk of Software Supply Chain Attacks: Insights From the Dropbox Sign Breach
![Insights on Sensitive Content from Verizon’s DBIR 2024](https://www.kiteworks.com/wp-content/uploads/2024/05/Insights-on-Sensitive-Content-from-Verizons-DBIR-2024-560x360.jpg)
Insights on Sensitive Content from Verizon’s DBIR 2024
![NSA’s Advancing Zero Trust Maturity Throughout the Data Pillar: A Comprehensive Guide](https://www.kiteworks.com/wp-content/uploads/2024/04/NSAs-Advancing-Zero-Trust-Maturity-Throughout-the-Data-Pillar-A-Comprehensive-Guide-2-560x360.jpg)
NSA’s Advancing Zero Trust Maturity Throughout the Data Pillar: A Comprehensive Guide
![Understanding the Biden Executive Order on Securing Sensitive Personal Data](https://www.kiteworks.com/wp-content/uploads/2024/04/Understanding-the-Biden-Executive-Order-on-Securing-Sensitive-Personal-Data-560x360.jpg)
Understanding the Biden Executive Order on Securing Sensitive Personal Data
![Beyond Anti-Piracy: How DRM Protects Your Business](https://www.kiteworks.com/wp-content/uploads/2024/03/Beyond-Anti-Piracy-How-DRM-Protects-Your-Business-560x360.jpg)
Beyond Anti-Piracy: How DRM Protects Your Whole Business
![CMMC Compliance for Automotive Manufacturers](https://www.kiteworks.com/wp-content/uploads/2024/04/CMMC-Compliance-for-Automotive-Manufacturers-560x360.jpg)
CMMC Compliance for Automotive Manufacturers
![DFARS Compliance Starts With NIST 800-171](https://www.kiteworks.com/wp-content/uploads/2024/04/DFARS-Compliance-Starts-With-NIST-800-171-560x360.jpg)
DFARS Compliance Starts With NIST 800-171
![CMMC for IT Professionals An Implementation Guide for Compliance](https://www.kiteworks.com/wp-content/uploads/2024/01/CMMC-for-IT-Professionals-An-Implementation-Guide-for-Compliance-560x360.jpg)
CMMC for IT Professionals: An Implementation Guide for Compliance
![Does DRM Actually Work?](https://www.kiteworks.com/wp-content/uploads/2024/03/Does-DRM-Actually-Work-560x360.jpg)