PRESS

Press

PRESS 01.11.2024Philadelphia Business Times Philadelphia tech startup tapped for Meta-driven AI regulation program A less than 6-year-old Philadelphia-based startup has been tapped as part of

Read More »

Proud to have lended a hand to our friends at Nuventive in achieving SOC2 Compliance. Read more.  

TRUST WEEK 2022 (May 23-26, Atlanta) is coming up, looking forward to meeting industry professionals and talking about the current and future state of data privacy. If you are going to be there, we would love to meet up with you and talk about how we can help.

Really proud of having Matthew B. Davis, MS, MS as part of our team. This is a great example of how to solve the “resource gap” in cybersecurity. View Link.

Our very own Matthew B. Davis, MS, MS made a very well dressed appearance at IAPP – International Association of Privacy Professionals Global Privacy Summit. Hit the link to get Matthew’s 10 Take Aways. 

Congratulations to the Giorgio Foundation for raising $250k+ in their effort to fund research into ending NF1. Zaviant Consulting is proud to sponsor these important efforts alongside New PigNPC, Inc.Fulton Bank, and UPMC among others.

To learn more about NF1, The Giorgio Foundation, and to donate to this important cause visit here.

Comstar Technologies Announces Partnership with Zaviant Consulting. Read more. 

We are thrilled to announce our newest partnership with Everest Discovery LLC. Everest’s team of e-Discovery and Digital Forensic experts are leaders in their field and bring a plethora of experience collecting and attributing data from electronic devices, which investigators can utilize to stop hackers and other cybercriminals from compromising an organization’s digital infrastructure.  We are thrilled to announce our newest partnership with Everest Discovery LLC. Everest’s team of e-Discovery and Digital Forensic experts are leaders in their field and bring a plethora of experience collecting and attributing data from electronic devices, which investigators can utilize to stop hackers and other cybercriminals from compromising an organization’s digital infrastructure.