Tom Neclerio

Conquest Cyber, bringing decades of experience in all cyber security, cloud, and risk management disciplines for federal, defense, and their industrial base partners, as well as highly regulated industries including healthcare, financial services, and critical infrastructure.  We are experts in cloud technologies, governance, risk, compliance, asymmetric warfare, counterterrorism, emergency management and cybersecurity. Conquest combines agility, capability, dedicated leadership involvement, and a deep technical bench. Our team collaborates with small businesses and global enterprises to give our clients a deep understanding of how security concerns and Federal mandates impact IT governance processes and secure digital transformation.  

As SVP of Security Strategy and CISO, Tom is responsible for the operational oversight and strategic vision of the Conqueest Cyber's service portfolio of compliance solutions. Tom is a recognized leader in the information security field with over 24 years of diverse experience including several leadership positions within publically traded companies and large global managed security firms. Tom has served half of his career as an internal CISO and the other half of his career providing security services to large regulated organizations. 

Tom has a proven record in the design, development, management, and support of compliant solutions for highly regulated fortune 500 companies. This mix of experience has allowed Tom to develop security services at Conquest that address the daily pains that most security teams experience when building and maintaining security and compliance programs.

Tom has developed a deep understanding of risk management and security regulations including CMMC, GLBA, HIPAA, SEC, FRNA, SOX, and PCI compliance. As a frequent speaker and participant at National Conferences and Security roundtables, Tom is able to effectively build trust and credibility as the subject matter expert in many security topics. In addition, Tom holds numerous security certifications including CISSP, CGEIT and CRISC