• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Arraya’s Cyber Security Director Presents to Area’s Top Financial Services Professionals

August 11, 2017 – Tom Clerici, Arraya Solutions’ Director, Cyber Security, recently was given the opportunity to lead a pair of sessions at Vizo Financial’s 2017 IT and Security Conference. This annual event brings together IT and security professionals representing credit unions and financial services organizations from across the Mid-Atlantic region. Attendees are able to learn about the year’s most important technological advances and the latest tactics employed by cyber criminals directly from real world security leaders.

The first of Clerici’s two presentations detailed the anatomy of a ransomware attack. During this session, Clerici dissected an attack from the initial infection all the way through the multiple possible resolutions. He also provided attendees with actionable strategies they could use to prevent a ransomware attack in the first place.

During his second presentation, Clerici broke down what goes into developing, implementing, and maintaining a security program. He addressed some of the most common questions and sticking points encountered by those in the early stages of rolling out a security program. The issues covered included how to prioritize assets, what to make of professional certifications, how to handle vulnerability management, and much more.

“I chose these topics because, in terms of ransomware, there’s almost nothing that’s more top of mind in the industry right now,” Clerici noted. “As for the session on Information Security Programs, the topic offered a good mix of technical and nontechnical content concerning how to start building toward a more mature security posture.

“It was a pleasure to attend Vizo’s 2017 IT & Security Conference,” he added. “The attendees I encountered were engaged and extremely motivated to overcome the cyber security challenges facing them on a daily basis. I believe the sessions presented will put them on a path to do just that.”

Vizo’s 2017 IT & Security Conference took place from August 7-9. It was held at The Central Hotel in Harrisburg, PA.

Interested in hearing Tom Clerici speak? Join us on September 14, 2017 at The Hub in Conshohocken, PA for Arraya Solutions’ Identifying, Monitoring, and Analyzing Security Threats seminar. During this event, attendees will explore what it takes to better understand, monitor, and control their information systems through discussions and demonstrations led by Clerici and Arraya’s Cyber Security Practice. Register here.

###

Media Contact:

Erin Steinmetz
Director, Marketing and Communications
610-684-8605, esteinmetz@arrayasolutions.com

Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}