CTOs on the Move

ControlCase

www.controlcase.com

 
ControlCase is a global provider of IT Governance, Risk Management and Compliance (IT GRCM), CaaS, Card Discovery solutions. Part of @inc 5000
  • Number of Employees: 250-1000
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details
Mark Smith
Chief Risk Officer - Information Security Profile

Similar Companies

Blockchains

We believe it is an individual`s fundamental right to own and control their digital identity and that the decentralized nature of Web3 creates an opportunity for everyone to own and control their identity, data, finances, creations, and future. To ensure that the individual is paramount in Web3, we are developing a suite of applications to enable everyone to safely engage, take part, and transact in the emerging, decentralized world of the internet. Our platform centers on Web3 Identity and leverages that identity to provide individuals with secure digital asset storage and recovery, access to decentralized finance, the ability to prove ownership of their creations, and gateways to digital interactions and experiences – all to empower and benefit every Web3 user. We are committed to an interoperable Web3 ID that can be a user`s identity wherever they go in the emerging Web3 world.

Implementation Factory Inc

Implementation Factory Inc is a Framingham, MA-based company in the Software and Internet sector.

Secure64 Software Corporation

Secure64 Software Corporation is one of the leading providers in Software and Internet. It is based in Greenwood Vlg, CO. To find more information about Secure64 Software Corporation, please visit www.secure64.com.

TheWireGuys

The Lehigh Valleys high definition surveillance systems experts. Unlike other companys that sell "cookie cutter" systems and/or sell surveillance systems as an afterthought we custom design every system for our customers needs. If you are unhapp...

Fortify Software

Fortify's Business Software Assurance products and services protect companies from the threats posed by security flaws in business-critical software applications.