As the Vice President and Head of Identity and Access Management (IAM) at AT&T, Jon Deats plays a pivotal role in shaping the cybersecurity landscape of one of the largest telecommunications companies in the world. With a robust background in cybersecurity, Jon leverages his extensive...
As the Vice President and Head of Identity and Access Management (IAM) at AT&T, Jon Deats plays a pivotal role in shaping the cybersecurity landscape of one of the largest telecommunications companies in the world. With a robust background in cybersecurity, Jon leverages his extensive experience to implement cutting-edge security controls that protect both enterprise and customer identities. His strategic foresight and transformative leadership have been instrumental in driving key projects that enhance the security posture of AT&T, ensuring that critical assets are safeguarded against evolving threats.
Jon's expertise in information security management is complemented by his proficiency in enterprise risk management and operational risk management, allowing him to navigate the complexities of IAM in a dynamic environment. His hands-on experience with penetration testing and intrusion detection systems (IDS) enables him to identify vulnerabilities and proactively mitigate risks, reinforcing AT&T's commitment to maintaining the highest standards of security.
Under Jon's guidance, AT&T has embarked on several innovative initiatives aimed at streamlining access management processes while enhancing user experience. By integrating advanced analytics and machine learning into IAM frameworks, he has not only improved operational efficiency but also fortified defenses against potential breaches. As a Certified Information Systems Security Professional (CISSP), Jon remains dedicated to fostering a culture of security awareness and resilience within the organization, ensuring that AT&T continues to lead the charge in protecting sensitive information in an increasingly interconnected world. His vision and expertise position him as a key player in the ongoing evolution of cybersecurity practices, making a significant impact on the industry at large.