Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.
Dan Lohrmann joined Security Mentor, Inc. in August 2014, and he currently serves as the CSO and Chief Strategist for this award-winning training company. Lohrmann is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. Read Dan's full bio.
If you want to increase innovation, many experts suggest slowing down first.
Why breach prevention and response strategies are both essential.
Hiring cybersecurity staff is difficult, but federal, state and local governments are working with nonprofits to encourage the development of cybersecurity skills through individual and team competitions.
You can’t secure the entire cloud, but you can take steps to secure your data.
You want the masses behind your security efforts and helping the team identify the bad apples, but not stifling innovators who make a positive difference.
The speaker was Facebook VP Vaughan Smith. "We all know that innovation is key to success, but how do we innovate at Facebook? The first key to innovation is moving fast, very fast," he said.
How things like the NSA, 9/11 and Y2K have influenced where security is headed.
The Metcalf incident is a wake-up call for better critical infrastructure protection.
Bracing ourselves for the onslaught of Internet-connected devices.
Does your government need a 24/7 security operations center?
Ransomware is a scary evolution of online fraud — and you must prepare to deal with it.
Small security breaches occur in government more often than many people are aware of.
New devices mean new policies for governments to enact.
Internet privacy has long been a hot-button issue. Central questions are being asked about who owns what data, how that data can be used by various companies to target individuals in marketing and whether users can opt-in or opt-out of various data-sharing approaches. Just as in other areas of life in America in 2012, these questions are often end up being settled in the courts.
3 tips for getting the go-ahead on security projects.
Government agencies can maintain security but still avoid being no-fun zones.
The Washtenaw County, Mich., Cyber Citizenship Coalition is a grass-roots effort that ensures residents use technology safely and securely.
Comparing public- and private-sector IT services is essential for effective leadership.
Many challenges remain to establishing digital identities, but state and local governments must act quickly.
Learning about an organization from the inside out.
Michigan chief technology officer learns about an organization from the inside out.
Government IT professionals need an all-encompassing, prioritized perspective to successfully address complex system issues.
The more you specify unique security requirements, the harder it becomes to obtain the benefits of cloud computing.
Emergency management's scenario-based planning is for budgets too.
South Africa's preparation for the 2010 World Cup provides valuable lessons for IT leaders.
Michigan shares digital infrastructure with Oakland County for cheaper, faster connections.
Opportunities, challenges and recommendations for virtualizing IT in the public sector.
IT project management strategies for state and local governments.
Dan Lohrmann gives six tips on handling a new information technology job in government.
Contractors must make security a priority.
Michigan CISO Dan Lohrmann discusses security challenges.
Utility computing can consolidate IT departments, but raises security questions.
Good e-government starts with good identity management.
Build technology recovery into broader emergency response efforts.
The road to better information security, ironically, passes through better information sharing.