Warren Averett’s Paul Perry featured in Cybersecurity Table of Experts

Written on February 28, 2019

Warren Averett’s own Paul Perry was recently featured as a contributor to the Birmingham Business Journal’s (BBJ) Table of Experts Series in the Insights into Cybersecurity segment.

The BBJ’s Table of Experts Series highlights expertise from local professionals about important topics in the business community. In the Insights into Cybersecurity edition of the series, Paul, along with four other industry experts in Birmingham, spoke to common questions about cybersecurity and what businesses should know and do to keep their companies secure.

In the BBJ’s feature, Paul noted, “The outlook is that we can never go on the offensive, we always have to be on the defensive. And, as the cyber criminals get better, we have to keep up with them…As the world becomes smaller as we’re connecting through technology, it just opens us up more for that type of outlook. We just have to keep doing something proactive every single day, keep educating the masses on the right things and wrong things to do, and be diligent with what we have.”

Paul Perry has been with the Firm since 2004 and is a Member and the practice leader of the Risk, Security and Controls Group. Paul and his team focus on cybersecurity, information technology related projects, risk assessments, internal controls, internal audit and control-related projects, including Service Organizations Control engagements. Paul is also the leader of the Firm’s Data Analysis Group, a team of individuals within the Firm who provide data analysis solutions to both internal and external clients. Paul has earned the Certified Information Technology Professional (CITP) certification, which is awarded to CPAs who possess both information technology and business expertise.

Cybersecurity remains a priority for Warren Averett, both as we seek to support our clients’ growth in a world of changing technology and as we seek to improve our own organization into the future. If you would like to read the Insights into Cybersecurity feature in full, you can access it here.

Back to Resources
Top