
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Patrick Spencer

Patrick Spencer, Vice President, Corporate Marketing, Kiteworks
Patrick is charged with building thought leadership and communications programs that increase brand awareness and engagement and propel lead-generation programs, engaging with and mobilizing Kiteworks’ thousands of customers and partners via a multi-touch advocacy strategy, and operationalizing SEO strategies and marketing processes. He has nearly two decades of experience in various senior marketing roles within cybersecurity at Contrast Security, Fortinet, and Symantec. At Contrast Security, he worked with Contrast Labs to institute data science strategies to mine product data used to produce thought leadership reports that were pivotal competitive differentiators and demand-generation vehicles.
Patrick is the recipient of numerous corporate, industry, and media awards, having served as the editor in chief and publisher for various digital publications and initiatives such as CIO Digest at Symantec, The CISO Collective at Fortinet, and the Inside AppSec Podcast at Contrast Security. He holds a doctorate from the University of Durham and two masters and a bachelor’s degree from Abilene Christian University.


Data Sovereignty Best Practices

Data Sovereignty for Healthcare Organizations

End-to-End Security: Exploring Its Meaning and Importance

10 Best Secure File Transfer Practices for Regulatory Compliance

Secure File Transfer for HIPAA Compliance: A Comprehensive Guide

Effective User Access Management for Secure File Sharing

Secure File Transfer: How UK Enterprises Can Guard Against Data Breach

Secure File Sharing for NHS Staff in Adherence to Data Privacy Regulations and Best Practices

Decoding Secure File Transfer Protocols: Which One is Best for Your UK Business?

3 Cost Amplifiers and Data Breach Risk in IBM’s 2023 Cost of a Data Breach Report

Mastering Security Risk Management: A Comprehensive Guide for UK Businesses

4 File and Email Communication Takeaways From the 2023 Verizon DBIR

How AI Is Being Used in Cybersecurity and Cybercrime [a Checklist]
