Jordan Avnaim

Jordan Avnaim
CISO, Entrust Inc.Jordan Avnaim was recently named Entrusts CISO. With more than 20 years of experience leading information security functions and influencing change and enterprise digital transformation, Jordan is helping scale and mature Entrust’s information security program for both corporate and commercial portfolios. Prior to Entrust, Avnaim worked for The Capital Group Companies, where he was responsible for leading various information security, technology risk and technology audit functions over his tenure. Previously at Deloitte & Touche, Avnaim led delivery of specialized security and risk consultative services to C-suite executives and clients across the globe.
Round table contributions
The security marketplace has its share of buzzwords, which are words or phrases that become popular and widely used in a specific industry. Buzzwords can be useful for conveying complex ideas quickly,...
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department tran...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
News mentions
The security marketplace has its share of buzzwords, which are words or phrases that become popular and widely used in a specific industry. Buzzwords can be useful for conveying complex ideas quickly,...
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department tran...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
Key people from Entrust Inc.
Security experts
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download