CJ Hurd

CJ Hurd

CJ Hurd is SVP of the Virtual Chief Information Security Officer (CISO) program with Compass IT Compliance. CJ holds over 20 years of experience across the information technology and cybersecurity landscape. He retired from the Coast Guard in 2018 after 21 years of active-duty service, where he was named the Coast Guard's Information Security Officer of the year in 2015, 2016, and 2017, as well as being named the Department of Homeland Security’s Information Security Officer of the year in 2016. CJ holds the Certified Information Systems Security Professional (CISSP) and Certified Data Privacy Solutions Engineer (CDPSE) certifications. In his role at Compass IT Compliance, CJ leads a team of Virtual CISOs that work with organizations of all sizes and across varying industries to develop, implement, enhance, and manage their cybersecurity programs. Serving as an organization’s Virtual CISO, members of CJ’s team oversee the strategic and operational aspects of the Information Security Program as well as work to identify and remediate realized or potential security threats within an organization’s environment.

Posts by CJ Hurd

Essential Elements of an Effective Virtual CISO (vCISO) Program

Effective vCISO Program

In today's digital world, organizations face more cyber threats than ever before. With attacks becoming increasingly complex and frequent, businesses need strong cybersecurity leadership to stay ahead. That's where a Virtual Chief Information Security Officer (vCISO) comes in—a smart …

Read Story

Nobody Is Exempt from Vendor Security Questionnaires

Vendor Management

Increased supply chain and vendor breaches have underscored the critical importance of vendor security questionnaires for safeguarding organizational security. These questionnaires have emerged as essential tools for organizations to evaluate the security practices of their third-part …

Read Story

How Data Classification Can Combat Data Sprawl & Enhance Efficiency

Data Classification

Data sprawl is a pervasive issue in modern organizations, characterized by the uncontrolled and often chaotic growth of data across various systems and storage solutions. As businesses accumulate vast amounts of data, the challenges of managing, securing, and utilizing this informatio …

Read Story

How Much Does a SOC 2 Audit Cost?

Calculating SOC 2 Cost

Navigating the financial intricacies of a SOC 2 audit requires precise planning and a deep understanding of the factors that influence its cost. From the size and complexity of your organization to the scope and depth of the audit itself, multiple elements can affect the financial res …

Read Story

vCISO vs. CISO: What's the Difference?

CISO Executive Meeting

The changing nature of security has resulted in the rise and development of important positions focused on protecting sensitive data. Alongside the role of the Chief Information Security Officer (CISO) a newer role has emerged; the Virtual CISO (vCISO). Although both roles aim to impr …

Read Story

SOC 1 vs SOC 2 Reports - What's the Difference?

SOC Reports

As the landscape of modern business shifts, one thing becomes clearer: outsourcing is not just a fleeting trend, but a strategic move adopted by companies across industries. With this increasing reliance on third-party services, there emerges an unprecedented need for more rigorous me …

Read Story

Subscribe by email