Security

Wael Younan, Chief Information Officer/Chief Information Security Officer, CalOptima

Redefining Cyber Risk for Modern Information Security Programs

By Lester Godsey, Chief Information Security Officer, Maricopa County The following is the definition of cyber risk, per ChatGPT: “ ...
Gary Trautmann, Senior Cyber Security Advisor to Mongolian Armed Forces Cyber Command, Sincerus Global

Regionalization of Cyber Security Defense

My Experience as Regional Cyber Security Chief for the US Army Regional Network Center By Gary Trautmann, Senior Cyber Security ...
Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global

A Dive Into The TPRM Landscape

By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global Corporate organizations have historically ...
Todd Broccolo, Senior Director – Head of Workplace Technology Engineering & Operations, First Republic

What does a one-device policy mean to you?

By Todd Broccolo, Senior Director - Head of Workplace Technology Engineering & Operations, First Republic In the last few years, ...
Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute

Ukraine’s Battle against Russian Cyber Aggression

By Carlos G. Sháněl, Director, Center for Cybersecurity Studies, Casla Institute In the first week of January 2024, hackers allegedly ...
Christopher Frenz, Information Security Officer/AVP of IT Security, Mount Sinai South Nassau

Measuring Control Efficacy: Time for Metrics and not “Meh”-trics

By Christopher Frenz, Information Security Officer/AVP of IT Security, Mount Sinai South Nassau Almost everyone in the security industry will, ...
Cynthia Baughman, Water Utilities Technology Director, City of Garland

The Future of Water: Technology Innovations in the Water Sector

By Cynthia Baughman, Water Utilities Technology Director, City of Garland Water is a necessity for sustaining human life. Water is ...
Marquese Davis, Heathcare IT Executive

Navigating the Digital Minefield: The Perils of Personal Identifiable Information

By Marquese Davis, Heathcare IT Executive In today's interconnected world, the sanctity of Personal Identifiable Information (PII) stands at the ...
Randall Jackson, Chief Information Security Officer – Income Research + Management

Securing Tomorrow: The State of Cybersecurity in the Financial Services Sector

By Randall Jackson, Chief Information Security Officer – Income Research + Management Introduction In an era dominated by digital transactions ...
V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science; Buffet Faculty Fellow, Northwestern University

U.S. Companies Need More Authority to Open Covert Channels to Deter IP Theft

By V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science; Buffet Faculty Fellow, Northwestern University This past Friday, November 3, ...
Othello Dixon, Information Security Officer, Virginia Department of Health

Exploring Risk Assessment and Management, Challenges, Emerging Technology and Multilayered Defense

By Othello Dixon, Information Security Officer, Virginia Department of Health Risk Assessment & ManagementRisk assessment and management aim to reduce, ...
David Bader, Distinguished Professor and Director, Institute for Data Science, New Jersey Institute of Technology

Cybersecurity Challenges in the Age of Generative AI

By David Bader, Distinguished Professor and Director, Institute for Data Science, New Jersey Institute of Technology Cybersecurity professionals will not ...
Erik Johnson, Director of Reliability Analysis, ReliabilityFirst

Changes aren’t permanent, but change is’: Adaptability is crucial to keep up with the evolving world of information security

By Erik Johnson, Director of Reliability Analysis, ReliabilityFirst In the world of information security, we have talked about the increasing ...
Tj Houston, Cyber Security Instructor, Ashland County-West Holmes Career Center

High School Cyber Education: The Key to Securing Our Digital World

By Tj Houston, Cyber Security Instructor, Ashland County-West Holmes Career Center Let’s face it, as a society, we are spending ...
Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland

Unseen Threats: Local Vulnerabilities and the Strategic Threats Lurking in National Critical Functions

By Charles Harry, PhD, Director, Center for the Governance of Technology and Systems (GoTech), University of Maryland In March of ...
Brennan Lodge, Adjunct Professor, Information Technology & Data Analytics, New York University

Forging the Future: Elevating Cybersecurity Defense with Analyst Wisdom through Generative AI

By Brennan Lodge, Adjunct Professor, Information Technology & Data Analytics, New York University Cybersecurity professionals have long been embroiled in ...
Eddie Myers, Crothall Healthcare Director of Cybersecurity

Tackling Cybersecurity for Medical Devices

By Eddie Myers, Crothall Healthcare Director of Cybersecurity (Healthcare Technology Solutions Division) The rapid digitization of the healthcare industry has ...
Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce

Mitigating Cybersecurity Risks in Low Visibility Environments

By Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Introduction In today's interconnected world, where digital ...
Glenn Schmitz, CISO, Virginia Department of Behavioral Health and Developmental Services

Achieving Data Security and Analytics with AI

By Glenn Schmitz, CISO, Virginia Department of Behavioral Health and Developmental Services In 2020 the world changed when COVID began ...
Nick Janka, Chief Cyber Architect, Lockheed Martin

Enterprise Cyber Resilience: A Leadership Mindset, Business Model, and GRC Framework

By Nick Janka, Chief Cyber Architect, Lockheed Martin I. CYBERSECURITY VS. CYBER RESILIENCE Cyber resilience, when implemented correctly, enables the ...
Cary K. Jim, Ph.D., Data & Analytics Manager, The ASSISTments Foundation

Data Infrastructure for Analytics in Education

Cary K. Jim, Ph.D., Data & Analytics Manager, The ASSISTments Foundation With the growing interest in migrating information systems to ...
Ron Zochalski, CTO & CISO, Lake County Government

Cyber vs Physical Security: Shouldn’t we take cybersecurity and data privacy as seriously as physical security? WE NEED BOTH!

By Ron Zochalski, CTO & CISO, Lake County Government I have the current rare responsibility of leading building technology and ...
Andres Calderon, Cyber Resilience Officer, Centura Health

Cybersecurity Risky Business

By Andres Calderon, Cyber Resilience Officer, Centura Health The risk-based approach is a widely adopted method for addressing cybersecurity challenges ...
Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University

The Benefits of Having a Growth Mindset in Cybersecurity

By Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University In 2006, Carol S. Dweck set out ...
Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce

Cybersecurity and Artificial Intelligence: Enhancing the Cybersecurity Posture.

By Dr. Luis O. Noguerol, Information System Security Officer, U.S. Department of Commerce Cybersecurity has become a critical topic for ...
David Stucky, Business Information Security Analyst (Cyber Information Assurance Analyst), Penn State University

A Need for the Cyber Security Strategic Business Partner

By David Stucky, Business Information Security Analyst (Cyber Information Assurance Analyst), Penn State University Information Security’s beginnings are well rooted ...
Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH

The Challenge of Retaining Information Security Personnel

By Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH In today's digital era, information security personnel are highly sought-after professionals in ...
George Irungu, Former CISO, Summa Health

Identity in the modern Enterprise

By George Irungu, Former CISO, Summa Health Identity has become the currency of trade in the digital world. It is ...
Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University

Three key Types of Security Controls to Consider when Assessing a Data Center

By Guy Albertini, Associate Vice President and Chief Information Security Officer, Rutgers University Data centers are essential to modern businesses, ...
Frederick Scholl, Cybersecurity Program Director, Quinnipiac University

Make Cybersecurity a Team Sport

By Frederick Scholl, Cybersecurity Program Director, Quinnipiac University Last month’s National Cybersecurity Awareness theme was “See Yourself in Cyber”. I ...
Mehran Basiratmand, Chief Information Security, Consultant

The Market Trend in Recruiting  vCISO Firms

By Mehran Basiratmand, Chief Information Security, Consultant In the past two years, technology adoption, innovation, and organizational transformation have accelerated ...
John Wensveen, Chief Innovation Officer, NSU & Executive Director, Alan B. Levan | NSU Broward Center of Innovation, Nova Southeastern University

Protecting Your Organization with These Top Cybersecurity Tips

By John Wensveen, Chief Innovation Officer, NSU & Executive Director, Alan B. Levan | NSU Broward Center of Innovation, Nova ...
Gerald Caron, Chief Information Officer, U.S. Department of Health and Human Services (HHS)

Implementing A Zero Trust Mindset

By Gerald Caron, Chief Information Officer, U.S. Department of Health and Human Services (HHS) Times are changing and we no ...
Crystal Pitts, Chief Information Security Officer, North Carolina Department of Commerce, Division of Employment Security

Cybersecurity With a Mix of Challenges

By Crystal Pitts, Chief Information Security Officer, North Carolina Department of Commerce, Division of Employment Security Cybersecurity is a hot ...
Marc Ashworth, Senior Vice President and Chief Information Security Officer, First Bank

The Importance of Utilizing Your Professional Networks to Collaborate Against Cyber Criminals

By Marc Ashworth, Senior Vice President and Chief Information Security Officer, First Bank The need of individuals for fresh water ...
Dr. Mehran Basiratmand, Former Chief Technology Officer & Executive Director, Florida Atlantic University | CIO Strategic Advisor, Enabling Technologies Corp

Navigating the Cyber Security Insurance Market

By Dr. Mehran Basiratmand, Former Chief Technology Officer & Executive Director, Florida Atlantic University | CIO Strategic Advisor, Enabling Technologies ...
Michael Deutsch, Chief Information Officer / Chief Information Security Officer, NYC Department of Youth and Community Development

A Panic Attack and a Dream: a Cybersecurity Saga

By Michael Deutsch, Chief Information Officer / Chief Information Security Officer, NYC Department of Youth and Community Development Come along ...
Todd Ryan, Chief Information Officer, Hillsborough County Sheriff's Office

Refining the human element in support of cyber defense

By Todd Ryan, Chief Information Officer, Hillsborough County Sheriff's Office With the recent release of Verizon's 2022 Data Breach Investigations ...
Ben Ferris, Cybersecurity Manager, Newport News Shipbuilding, A Division of HII

Organization – The Overlooked Security Control

By Ben Ferris, Cybersecurity Manager, Newport News Shipbuilding, A Division of HII A few years ago, a well-known university, which ...
Nick Ryan,  Director, Enterprise Technology Security & Risk, Baker Tilly US

Cyber Insurance – The Catalyst for Better Cybersecurity Across the Globe

By Nick Ryan, Director, Enterprise Technology Security & Risk, Baker Tilly US This last decade has been a learning exercise ...