BP

Bruce Phillips

SVP & Chief Information Security Officer at west, A WFG Company at WESTprotect
On the record
Share profile 
Link:
Bio
Edit

Bruce Phillips, CISSP is senior vice president and chief information security officer for WEST, a Williston Financial Group company, which creates industry-leading technology to streamline and fully integrate the real estate process. He is responsible for the company’s information security practice, as well as its litigation and forensic support services.

Bruce has more than 30 years of experience in the financial services, insurance, title and escrow, real estate, healthcare and defense industries. His key areas of expertise include data protection, risk management, cybersecurity and technology. Bruce provides knowledgeable assistance to lenders, real estate agents, and title and escrow companies recovering from a data breach, and offers guidance on regulatory compliance, strategic planning and processes and procedures. He also advises lenders, real estate agents, and title and escrow companies on how to avoid phishing scams as well as what steps to take if they have already been a victim of a scam.

Bruce is a sought-out speaker on information security, data protection, risk management and litigation support. He is a Certified Information Systems Security Professional (CISSP) and is a member of the Information Systems Security Association (ISSA) ®.

Employment
Sign up to view all
Recent Quotes
Sign up to view all
  • Prevention is the best defense against cyberattacks, said Bruce Phillips, senior vice president and chief information security officer at WEST, a WFG company. To protect themselves, title companies and agents need a comprehensive plan in place, he told The Title Report.

    “This includes creating and implementing an Incidence Response Plan, as well as putting fail-safes in place to ensure that they have access to their data and systems on at least a limited basis during times of crisis,” he said. “These systems and data sources should be independent of the company’s main systems and data storage providers, as well as directly accessible. Data protection techniques such as data encryption should also be implemented.”