Dan Lohrmann

Contributing Writer


Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.

Dan Lohrmann joined Security Mentor, Inc. in August 2014, and he currently serves as the CSO and Chief Strategist for this award-winning training company. Lohrmann is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. Read Dan's full bio

May 22, 2016

Beyond Spear Phishing: How to Address Whaling and More

First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know.

March 31, 2016

Could the Election Be Hacked?

Renewed emphasis is being placed on vulnerabilities associated with voting machines.

January 26, 2016

5 Steps to Speeding Up Smart Government (by Slowing Down)

If you want to increase innovation, many experts suggest slowing down first.

September 3, 2015

The Security Paradox

Why breach prevention and response strategies are both essential.

July 15, 2015

Can Cybercompetitions Help Grow Local Security Talent?

Hiring cybersecurity staff is difficult, but federal, state and local governments are working with nonprofits to encourage the development of cybersecurity skills through individual and team competitions.

April 10, 2015

5 Ways to Reduce Data Loss in the Cloud

You can’t secure the entire cloud, but you can take steps to secure your data.

January 15, 2015

Cybersecurity in 2025

What gaps in virtual protection must be addressed?

November 20, 2014

3 Ways to Strengthen Security Without Stifling Innovation

You want the masses behind your security efforts and helping the team identify the bad apples, but not stifling innovators who make a positive difference.

September 28, 2014

The Secrets of Innovation: Government Leaders Need to Think Like Entrepreneurs

The speaker was Facebook VP Vaughan Smith. "We all know that innovation is key to success, but how do we innovate at Facebook? The first key to innovation is moving fast, very fast," he said.

August 15, 2014

Cybersecurity's History Provides Lessons for the Future

How things like the NSA, 9/11 and Y2K have influenced where security is headed.

May 15, 2014

How Vulnerable Is America’s Power Grid?

The Metcalf incident is a wake-up call for better critical infrastructure protection.

February 25, 2014

Can We Secure the Internet of Things?

Bracing ourselves for the onslaught of Internet-connected devices.

August 6, 2013

Fending Off Cyberattacks 24/7

Does your government need a 24/7 security operations center?

June 7, 2013

Ransomware: The New Cyberthreat

Ransomware is a scary evolution of online fraud — and you must prepare to deal with it.

February 11, 2013

Are Data Breaches Inevitable?

Small security breaches occur in government more often than many people are aware of.

November 26, 2012

5 Mobile Security Trends and Actions to Consider

New devices mean new policies for governments to enact.

March 22, 2012

Lawsuits Challenge Privacy Policies

Internet privacy has long been a hot-button issue. Central questions are being asked about who owns what data, how that data can be used by various companies to target individuals in marketing and whether users can opt-in or opt-out of various data-sharing approaches. Just as in other areas of life in America in 2012, these questions are often end up being settled in the courts.

February 6, 2012

3 Roads to Executive Buy-in for Cybersecurity

3 tips for getting the go-ahead on security projects.

November 11, 2011

6 Ways to Balance Fun, Productivity and Security at Work

Government agencies can maintain security but still avoid being no-fun zones.

May 3, 2011

Michigan County Takes Internet Safety to Residents

The Washtenaw County, Mich., Cyber Citizenship Coalition is a grass-roots effort that ensures residents use technology safely and securely.

February 11, 2011

Benchmarking Technology Cost and Service Levels (Opinion)

Comparing public- and private-sector IT services is essential for effective leadership.

December 16, 2010

Governments Struggle to Gain Trust in Online Identity Management (Opinion)

Many challenges remain to establishing digital identities, but state and local governments must act quickly.

October 18, 2010

Undercover CTO Part 2: Spending Time on the Front Lines (Opinion)

Learning about an organization from the inside out.

August 2, 2010

Undercover CTO: Spending Time on the Front Lines (Opinion)

Michigan chief technology officer learns about an organization from the inside out.

July 18, 2010

The Information Technology Infrastructure Library Can Track Your Enterprise (Opinion)

Government IT professionals need an all-encompassing, prioritized perspective to successfully address complex system issues.

March 24, 2010

Is Cloud Computing More Secure? (Opinion)

The more you specify unique security requirements, the harder it becomes to obtain the benefits of cloud computing.

February 5, 2010

Ready for Your Budget Emergency? (Opinion)

Emergency management's scenario-based planning is for budgets too.

January 10, 2010

South Africa's Infrastructure Lesson (Opinion)

South Africa's preparation for the 2010 World Cup provides valuable lessons for IT leaders.

September 24, 2009

States Must Share Intranet Bandwidth With Local Governments for Higher Speeds and Big Savings (Opinion)

Michigan shares digital infrastructure with Oakland County for cheaper, faster connections.

August 17, 2009

CTO Strategies for Virtualization in Government IT (Opinion)

Opportunities, challenges and recommendations for virtualizing IT in the public sector.

July 15, 2009

Economic Stimulus: Five Tips for Better Government IT Projects (Opinion)

IT project management strategies for state and local governments.

May 6, 2009

Michigan's New Chief Technology Officer Gives Survival Tips

Dan Lohrmann gives six tips on handling a new information technology job in government.

April 6, 2009

Advice: Technology Vendor Contracts -- Is the Right Security Built In?

Contractors must make security a priority.

December 22, 2008

Four Government Security Mistakes to Avoid

Michigan CISO Dan Lohrmann discusses security challenges.

October 19, 2008

Seven Habits of Online Integrity

CIOs have a role in strengthening cyber-ethics.

October 2, 2008

How Safe is Cloud Computing?

Utility computing can consolidate IT departments, but raises security questions.

June 25, 2008

IT Security: Improve Control of Identities

Good e-government starts with good identity management.

April 13, 2008

Disaster Recovery Plans: Four Steps Toward Improvement

Build technology recovery into broader emergency response efforts.

January 2, 2008

Sharing With ISAC

The road to better information security, ironically, passes through better information sharing.

October 12, 2007

Does MyGovernment Use MySpace?

Web 2.0 security is not an oxymoron.

November 18, 2003

Blackout 2003

When the lights went out in Michigan.