July 25, 2015    /    by

Talking Cyber: Ten Tips for Conference Speakers, Supervisors and Parents

Talking about security in effective ways is hard – whether the audience is an auditorium full of professionals or a small room at home with a few children. Here are some tips to help.

talking to a wall

Credit: Shutterstock/retrorocket READ MORE

July 19, 2015    /    by

Do You Really Know Your Network?

How well do you know your IT infrastructure? Who is communicating with whom across your network backbone? What systems are bandwidth starved? With legacy systems, PII data, hundreds of networks, complicated databases, hybrid clouds, data warehouses, countless mobile devices and outsourced functions needing 7x24 access, how do you determine what's truly secure? As we prepare for the new Internet of Things (IoT) era, here are some questions that need answers now.

women with door

Credit Shutterstock/Fotovika READ MORE

July 12, 2015    /    by

The Big Halt: 7 Lessons from Recent Computer Outages

On July 8, 2015, a string of major computer outages occurred at approximately the same time - grabbing global media attention. Significant operational disruptions occurred as a result of computer incidents at the New York Stock Exchange (NYSE), the Wall Street Journal (WSJ) and United Airlines. The nation briefly 'woke-up' to our reliance on technology and got a small taste of the fear that may come if a cyberattack cripples critical infrastructure. What lessons can we learn from these incidents? How can public and private-sector enterprises better prepare for more inevitable disruptions?


Credit: AP/Seth Wenig READ MORE

July 5, 2015    /    by

Should We Start Over with the Internet?

Network failures. Colossal data breaches. Global online privacy problems. The bad news reignites debate. Do Internet troubles necessitate a new start? Is it time to push the 'reset' button? But others say that cyberspace is improving and will go much further -- even solving a long list of historic problems. One thing is indisputable: The Internet is changing rapidly before our eyes.


Credit: Shutterstock/Christian Delbert READ MORE

June 28, 2015    /    by

False Alert: Can You Really Trust that Tweet for Emergency Communications?

A recent article in The New York Times describes a highly coordinated disinformation campaign using social media. This scary development raises new questions about the reliability of alerts and other emergency communications that rely on social media platforms. Will disinformation campaigns become a growing trend that will undermine recent advances in spreading important information during emergencies?

Twitter pic

Over the past few years, there has been skyrocketing growth in the use of social media to get the word out during emergency situations. From fires to disease outbreaks to police shootings, more and more people turn to Twitter, Facebook or other social media sites to get the latest updates on incidents from reliable sources and "friends." READ MORE

June 21, 2015    /    by

Data Breach: Why We Need a Scale

Data breaches are becoming much more common. Most states have laws mandating the public disclosure of data breaches where personally identifiable information (PII) is at risk. Cyberinsurance policies even cover data breach costs. However, not all data breaches are the same. We need a data breach scale. Here's why...


“We have a confirmed data breach.” Those are the words that no security or technology professional wants to hear. READ MORE

June 13, 2015    /    by

Top Strategies from Ohio Government's Technology and Security Leaders

We are continuing the series of interviews with top CIOs and CISOs from around the nation regarding the best state and local government cybersecurity strategies. This week, we turn toward the Buckeye State to learn from two respected executive leaders. At a time when the federal government is reeling from a major OPM data breach, this security discussion has never been more important.

Ohio Leaders

Ohio CIO Stu Davis (left) with CISO David Brown   credit: Ohio State Government READ MORE

June 6, 2015    /    by

A Life of Lies and Spies: Interview with Author Alan B. Trabue on his Real-Life CIA Adventures

Alan B. Trabue worked for the CIA for over 38 years, and he has hundreds of true stories to tell about domestic and foreign agents and lies and spies. He has just published an amazing book that tells about his career as a covert operations polygraph interrogator with exciting travels all over the world. For anyone who is interested in polygraph exams or for those who are intrigued by the complexities of intelligence operations around the world, you must read this book. Here is a brief book preview and an interview with the author of 'A Life of Lies and Spies.'

Lies and Spies book cover

America loves reading spy-thrillers and watching James Bond movies. From Tom Clancy to Daniel Silva novels and from James Bond to the Bourne film series, we can never seem to get enough action-packed adventure. But it is rare to get a glimpse of what really goes on behind the scenes at the CIA and around the world in the global intelligence community. READ MORE

May 30, 2015    /    by

Interview with Retiring MS-ISAC Founder Will Pelgrin and Incoming CIS CEO Jane Lute

Will Pelgrin started the MS-ISAC more than a decade ago, and he is a leading voice in government cyberdefense. Tomorrow is his last day with the Center for Internet Security, and I caught up with him and new CEO Jane Lute to discuss the past, the present and the future of global cybersecurity -- especially within governments.

Will Pelgrin

William F. Pelgrin   Credit: Center for Internet Security READ MORE

May 25, 2015    /    by

Smart Cities Resources: Who, What, When, Where and How?

Everyone is talking about smart cities. And yet, new public- and private-sector questions are emerging as more organizations engage with this global technology megatrend. So how can you take these opportunities to the next level? Who are the leaders within this hot Internet of Things (IoT) category? Which academic studies and white papers offer best practices and the most helpful resources to take your region to the next level? What cyber-risks are emerging? Here are answers and resources to consider.

connected cityMost large urban areas like (and want) the label “smart city,” but what does that really mean? When and where will smarter things start to happen? Who is offering the latest white papers and how can you engage with public- and private-sector organizations? Where can you go for thoughtful answers?

These are just a few of the questions that I wanted to answer as I researched the latest government technology infrastructure trends around the world. I captured some of what I have learned so far in this blog, in the hope that an initial primer will help teams around the world as they investigate best practices within smart cities. READ MORE