Page 22 - index
P. 22
About the Authors
SCOTT M. HIGGINS, CISA, CRISC, CRMA
Scott has over 30 years of industry and advisory services experience,
providing a unique combination of capabilities in compliance (internal audit,
Sarbanes-Oxley, NAIC Model Audit Rule), operations (business process
transformation, operational effectiveness), technical (Information Technology),
and managerial (budgeting, forecasting, human capital development).
Scott’s major areas of focus include overseeing all Information Technology (IT)
external Audit support, Service Organization Control (SOC) reports, IT due
diligence, IT Internal Audit, as well as other IT consulting including IT assurance services.
Scott has led internal audit co-source engagements in a number of industries (health care and
P&C insurance, REIT, financial services, manufacturing, distribution, service), providing financial
monitoring and business process effectiveness, as well as managing extensive portfolios of risk-
based assessments including business process transformation, IT strategy and governance, system
development life cycle, change management, network security, telecommunication security, and
vendor audits. Scott holds a BS in Computer Science from DeSales University, an MBA from
Moravian College, and a Masters Certificate in Project Management from Stevens Institute of
Technology. He is a Certified Information Systems Auditor (CISA); is Certified in Risk and
Information Systems Control (CRISC) designations by ISACA; and is Certified in Risk Management
Assurance (CRMA) by the IIA.
CONTACT
WeiserMazars LLP
Scott M. Higgins | Director
501 Office Center Drive, Suite 300
Fort Washington, PA 19034
(P) 267.532.4325
(Email) [email protected]
MOISES BRITO, CPA, CISA, CIPP/US
Moises has spent over six years providing consulting, project management
and audit services to a range of clients in the technology, retail, financial
services, health care, higher education, real estate and not-for-profit sectors.
He performs IT effectiveness reviews, control design, systems development,
change and logical access management, disaster recovery, Payment Card
Industry (PCI) assessments, and statement on controls (SOC) I and II
including Privacy Assurance and Maturity, as well as vulnerability, penetration,
social engineering and cyber security enhancement studies. These reviews include inspecting
technical IT databases such as Oracle, MySQL, DB2, middleware and evaluating the
22 Cyber Warnings E-Magazine – September 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide