bryce-austin
Bryce Austin is the founder of TCE Strategy, a technology and cybersecurity consulting company. Previously he served as CIO and CISO of Digineer, a technology consulting firm based in the Twin Cities. From April 2013 to January 2014, he led technology program management for Target Corporation in the retail stores space, and his previous positions include Vice President, CIO and CISO of Wells Fargo Business Payroll Services. Bryce's major projects included a $35 million web services project as a part of Wells Fargo's website development, scalability, and performance testing of existing systems to increase their client load by over 1000%, and a mobile computing project to perform electronic signature capture of client documents. He has a background in financial services, consulting, software development, and retail sectors. Bryce's areas of expertise include performance and scalability testing, mobile device technologies, infrastructure planning, security analysis, compliance management, program management, advanced user authentication techniques, disaster recovery solutions, technology compliance, Basel and SOX compliance, mobile-device management (MDM) systems, mobile device security, personnel management, vendor negotiation, product management, program management, and payroll systems. He is CISM, MCSE, MCSA, CCNA, A+, Six Sigma Green Belt, and ITIL Foundations certified.

No books available at this time

Have Questions?

The Ostrich Effect

Bryce Austin

The Ostrich effect: How proper communication with the C-Suite will lead to good decisions around technology and cybersecurity.

In the wake of well publicized security breaches that disrupted business in some of the world’s largest companies, technology leaders are in need of an “executive presence” in the boardroom more than ever. How do we talk about technical issues to non-technical executives? How do we secure the funding we need to keep our companies safe? This presentation will focus on ideas to engage the hearts and minds of non-technical executives on how to keep the bad guys out and not let your company be the next headline about a cybersecurity incident.

what you get

  • Last up to one hour
  • Allow for up to 200 connections into the Cast (a connection is a login from a unique location)
  • Include the two-way video experience (including interactive HD streaming video and audio) and dedicated support