Speaker Profile
CEDRICK RANDOLPH
Cedrick Randolph is a seasoned cybersecurity strategist and secure code evangelist with over a decade of experience designing and implementing comprehensive security programs across healthcare, government, and enterprise environments. With deep expertise in reverse-engineering attack vectors and building resilient application infrastructures, Cedrick is known for translating complex security challenges into actionable solutions.
He has secured cloud environments for multinational clients and currently teaches cloud compliance at the university level, blending academic rigor with real-world application. Cedrick also specializes in aligning Governance, Risk, and Compliance (GRC) initiatives with broader business strategies—helping organizations turn regulatory obligations into strategic advantages.
A trusted advisor to small and mid-sized enterprises, Cedrick has successfully guided dozens of organizations through NIST and ISO-based compliance audits. He regularly leads national workshops on risk management and continues to advocate for a proactive, integrated approach to cybersecurity awareness.
With a passion for education and empowerment, Cedrick bridges the technical and strategic dimensions of cybersecurity, equipping leaders, developers, and risk professionals with the tools they need to protect what matters most.

Cedrick Randolph
August 13 2025
01 : 00 PM EST
60 Minutes
From Policy to Practice: Driving Cyber Awareness Across Your Business
Cybersecurity is no longer just the responsibility of IT departments—it’s a business-wide imperative that depends on every employee making secure choices daily. Despite the proliferation of security policies and compliance requirements, many organizations find themselves vulnerable not because of technical flaws, but due to human error. The reality is clear: policies alone won’t protect your business unless..

Cedrick Randolph
September 10 2025
01 : 00 PM EST
60 Minutes
Defending Your Code: Business Strategies for Web And Application Security
Despite advances in cloud infrastructure, DevOps practices, and agile development, application vulnerabilities remain one of the leading causes of data breaches worldwide. Often, the gap lies not in the capabilities of development teams, but in the misalignment between business strategy and secure development practices. That’s where this session, “Defending Your Code: Business Strategies for Web & Appli..

Cedrick Randolph
October 15 2025
01 : 00 PM EST
60 Minutes
The Cloud Security Equation: Balancing Protection in Shared Environments
Cloud computing has transformed how businesses deploy, manage, and scale their digital infrastructure. But with increased flexibility comes greater responsibility. While cloud providers offer powerful security tools and infrastructure, the onus is still on the customer to configure them correctly, enforce proper access controls, and ensure compliance with regional and industry-specific regulations.In “The C..

Cedrick Randolph
November 12 2025
01 : 00 PM EST
60 Minutes
Compliance And Risk Management 101: Using NIST and ISO to Protect Your Business
Cybersecurity compliance isn’t just about checking boxes—it’s about building a business that can withstand evolving threats, earn customer trust, and respond confidently to audits and assessments. Yet for many small and medium-sized enterprises (SMEs), knowing where to begin can be daunting. What does a good control look like? How do frameworks like NIST and ISO apply to a business that doesn’t have a full-..

Cedrick Randolph
December 10 2025
01 : 00 PM EST
60 Minutes
Bridging the Gap: Governance, Risk And Compliance for Business Success
The traditional view of Governance, Risk, and Compliance (GRC) is no longer sufficient in a world where disruption is the norm and agility is the expectation. Regulatory pressures, third-party dependencies, cybersecurity threats, and ESG concerns are no longer operating in isolation—they are interwoven and impact every layer of business. Organizations that fail to approach GRC as an integrated, strategic fu..