Security

Aaron Weismann, Chief Information Security Officer, Main Line Health

Cover Your Assets: The Difficulties of Securing IoT

By Aaron Weismann, Chief Information Security Officer, Main Line Health Securing the biomedical Internet of Things (IoT) in healthcare is ...
Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global

From Gatekeepers to Strategists: How CISOs Can Lead the Cybersecurity Evolution

By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global Recently, we have seen a ...
Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce

Smart grid security: Ensuring the security and privacy of information transmitted and stored in smart grid systems

Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce The energy landscape is transforming significantly, with smart ...
Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute

The U.S. Acts to Prevent Kaspersky from Becoming a Cyber Trojan Horse

By Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute The Biden administration announced on June 20th an immediate ...
Faris Faris, Chief Information & Technology Officer, Distribution & Supply Chain Systems Expert

Insights on Cyber-Security, Prevention, and Preparation

By Faris Faris, Chief Information & Technology Officer, Distribution & Supply Chain Systems Expert In my role as CIO/CTO, I ...
Dr. Brian Gardner, Chief Technology & Information Security Officer, City of Dallas

Guarding the Dragon’s Den: Local Government Mitigation for today’s targeted Critical Infrastructure

By Dr. Brian Gardner, Chief Technology & Information Security Officer, City of Dallas Recently, FBI Director Wray testified before a ...
Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global

Blue, Red, and Purple Approach

By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global In the past decade, ...
Shefali Mookencherry, Chief Information Security & Privacy Officer, University of Illinois Chicago

The Challenges Amongst Cybersecurity, Privacy, and Artificial Intelligence

By Shefali Mookencherry, Chief Information Security & Privacy Officer, University of Illinois Chicago Just the other day, I was reading ...
Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH

The Evolution and Importance of Cybersecurity in the Digital Age

By Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH In an era where the digital landscape is continuously evolving, Cybersecurity has ...
Wael Younan, Chief Information Officer/Chief Information Security Officer, CalOptima

Redefining Cyber Risk for Modern Information Security Programs

By Lester Godsey, Chief Information Security Officer, Maricopa County The following is the definition of cyber risk, per ChatGPT: “ ...
Gary Trautmann, Senior Cyber Security Advisor to Mongolian Armed Forces Cyber Command, Sincerus Global

Regionalization of Cyber Security Defense

My Experience as Regional Cyber Security Chief for the US Army Regional Network Center By Gary Trautmann, Senior Cyber Security ...
Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global

A Dive Into The TPRM Landscape

By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global Corporate organizations have historically ...
Todd Broccolo, Senior Director – Head of Workplace Technology Engineering & Operations, First Republic

What does a one-device policy mean to you?

By Todd Broccolo, Senior Director - Head of Workplace Technology Engineering & Operations, First Republic In the last few years, ...
Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute

Ukraine’s Battle against Russian Cyber Aggression

By Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute In the first week of January 2024, hackers allegedly ...
Christopher Frenz, Information Security Officer/AVP of IT Security, Mount Sinai South Nassau

Measuring Control Efficacy: Time for Metrics and not “Meh”-trics

By Christopher Frenz, Information Security Officer/AVP of IT Security, Mount Sinai South Nassau Almost everyone in the security industry will, ...
Cynthia Baughman, Water Utilities Technology Director, City of Garland

The Future of Water: Technology Innovations in the Water Sector

By Cynthia Baughman, Water Utilities Technology Director, City of Garland Water is a necessity for sustaining human life. Water is ...
Marquese Davis, Heathcare IT Executive

Navigating the Digital Minefield: The Perils of Personal Identifiable Information

By Marquese Davis, Heathcare IT Executive In today's interconnected world, the sanctity of Personal Identifiable Information (PII) stands at the ...
Randall Jackson, Chief Information Security Officer – Income Research + Management

Securing Tomorrow: The State of Cybersecurity in the Financial Services Sector

By Randall Jackson, Chief Information Security Officer – Income Research + Management Introduction In an era dominated by digital transactions ...
V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science; Buffet Faculty Fellow, Northwestern University

U.S. Companies Need More Authority to Open Covert Channels to Deter IP Theft

By V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science; Buffet Faculty Fellow, Northwestern University This past Friday, November 3, ...
Othello Dixon, Information Security Officer, Virginia Department of Health

Exploring Risk Assessment and Management, Challenges, Emerging Technology and Multilayered Defense

By Othello Dixon, Information Security Officer, Virginia Department of Health Risk Assessment & ManagementRisk assessment and management aim to reduce, ...
David Bader, Distinguished Professor and Director, Institute for Data Science, New Jersey Institute of Technology

Cybersecurity Challenges in the Age of Generative AI

By David Bader, Distinguished Professor and Director, Institute for Data Science, New Jersey Institute of Technology Cybersecurity professionals will not ...
Erik Johnson, Director of Reliability Analysis, ReliabilityFirst

Changes aren’t permanent, but change is’: Adaptability is crucial to keep up with the evolving world of information security

By Erik Johnson, Director of Reliability Analysis, ReliabilityFirst In the world of information security, we have talked about the increasing ...
Tj Houston, Cyber Security Instructor, Ashland County-West Holmes Career Center

High School Cyber Education: The Key to Securing Our Digital World

By Tj Houston, Cyber Security Instructor, Ashland County-West Holmes Career Center Let’s face it, as a society, we are spending ...
Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland

Unseen Threats: Local Vulnerabilities and the Strategic Threats Lurking in National Critical Functions

By Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland In March of ...
Brennan Lodge, Adjunct Professor, Information Technology & Data Analytics, New York University

Forging the Future: Elevating Cybersecurity Defense with Analyst Wisdom through Generative AI

By Brennan Lodge, Adjunct Professor, Information Technology & Data Analytics, New York University Cybersecurity professionals have long been embroiled in ...
Eddie Myers, Crothall Healthcare Director of Cybersecurity

Tackling Cybersecurity for Medical Devices

By Eddie Myers, Crothall Healthcare Director of Cybersecurity (Healthcare Technology Solutions Division) The rapid digitization of the healthcare industry has ...
Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce

Mitigating Cybersecurity Risks in Low Visibility Environments

By Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Introduction In today's interconnected world, where digital ...
Glenn Schmitz, CISO, Virginia Department of Behavioral Health and Developmental Services

Achieving Data Security and Analytics with AI

By Glenn Schmitz, CISO, Virginia Department of Behavioral Health and Developmental Services In 2020 the world changed when COVID began ...
Nick Janka, Chief Cyber Architect, Lockheed Martin

Enterprise Cyber Resilience: A Leadership Mindset, Business Model, and GRC Framework

By Nick Janka, Chief Cyber Architect, Lockheed Martin I. CYBERSECURITY VS. CYBER RESILIENCE Cyber resilience, when implemented correctly, enables the ...
Cary K. Jim, Ph.D., Data & Analytics Manager, The ASSISTments Foundation

Data Infrastructure for Analytics in Education

Cary K. Jim, Ph.D., Data & Analytics Manager, The ASSISTments Foundation With the growing interest in migrating information systems to ...
Ron Zochalski, CTO & CISO, Lake County Government

Cyber vs Physical Security: Shouldn’t we take cybersecurity and data privacy as seriously as physical security? WE NEED BOTH!

By Ron Zochalski, CTO & CISO, Lake County Government I have the current rare responsibility of leading building technology and ...
Andres Calderon, Cyber Resilience Officer, Centura Health

Cybersecurity Risky Business

By Andres Calderon, Cyber Resilience Officer, Centura Health The risk-based approach is a widely adopted method for addressing cybersecurity challenges ...
Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University

The Benefits of Having a Growth Mindset in Cybersecurity

By Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University In 2006, Carol S. Dweck set out ...
Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce

Cybersecurity and Artificial Intelligence: Enhancing the Cybersecurity Posture.

By Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Cybersecurity has become a critical topic for ...
David Stucky, Business Information Security Analyst (Cyber Information Assurance Analyst), Penn State University

A Need for the Cyber Security Strategic Business Partner

By David Stucky, Business Information Security Analyst (Cyber Information Assurance Analyst), Penn State University Information Security’s beginnings are well rooted ...
Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH

The Challenge of Retaining Information Security Personnel

By Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH In today's digital era, information security personnel are highly sought-after professionals in ...
George Irungu, Former CISO, Summa Health

Identity in the modern Enterprise

By George Irungu, Former CISO, Summa Health Identity has become the currency of trade in the digital world. It is ...
Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University

Three key Types of Security Controls to Consider when Assessing a Data Center

By Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University Data centers are essential to modern businesses, ...
Frederick Scholl, Cybersecurity Program Director, Quinnipiac University

Make Cybersecurity a Team Sport

By Frederick Scholl, Cybersecurity Program Director, Quinnipiac University Last month’s National Cybersecurity Awareness theme was “See Yourself in Cyber”. I ...
Mehran Basiratmand, Chief Information Security, Consultant

The Market Trend in Recruiting  vCISO Firms

By Mehran Basiratmand, Chief Information Security, Consultant In the past two years, technology adoption, innovation, and organizational transformation have accelerated ...