Clickability tracking pixel

Dan Lohrmann

Contributing Writer

Building effective virtual government requires new ideas, innovative thinking and hard work. From cybersecurity to cloud computing to mobile devices, Dan discusses what’s hot and what works.

April 1, 2021

Why Security Chiefs and State Auditors Should Be Friends

State auditors and chief information security officers should work together to identify gaps in government IT systems and strengthen the state's overall cybersecurity posture.

January 5, 2021

10 Dos and Don'ts for Government Cybersecurity Leaders

The new decade offers more challenges for cybersecurity leaders than ever, from tracking evolving threats to navigating budget constraints. Keep these best practices in mind for effective security management.

October 1, 2020

Should Government IT Be Hiring Hackers — and Pirates?

When filling out cybersecurity teams, character, passion and diversity top experience, and hiring a technologist who thinks outside the box could be a better move than opting for a government security veteran.

July 1, 2020

How Security Leaders Can Answer Tough Questions in a Crisis

Unexpected situations can bring unforeseen questions, especially when tensions and stakes are high. But a little preparation goes a long way. Here are three tips for navigating difficult questions, no matter their source.

April 1, 2020

Five Ways to Address Insider Cybersecurity Threats

Security chiefs spend a lot of time thinking about how to fend off attacks that come from outside their own systems, but threats from inside organizations can be just as devastating if the right measures aren’t in place.

January 6, 2020

Adaptability Key to Staying Current with Security Trends

As a new decade dawns and new tech emerges how will you keep up with the changes? Here are three ways to continue growing as a cybersecurity leader and keeping your agency safe in an uncharted future.

October 1, 2019

5 Ways Cybersecurity Chiefs Can Support Emerging Tech

New technologies will only continue making their way into government IT shops, and CISOs cannot always be the ones to say “no.” A smart management approach will ensure smooth adoption with cybermeasures in place.

July 1, 2019

Cybersecurity Leaders Prepare for a New Decade of Threats

The security challenges governments face continue to evolve. And while the stakes are higher than ever before, the responsibilities of public- and private-sector chief information security officers remains the same.

April 1, 2019

Three Key Decisions Cybersecurity Leaders Need to Make

A chief information security officer’s success rides on how they address a few crucial issues, like when to stop an IT project in the name of cybersecurity and whether the staff they hire is accountable and trustworthy.

January 1, 2019

7 Tips for New Cybersecurity Leaders in Their First 100 Days

The beginning of a new security chief's tenure is critical. From opening lines of communication to creating a strategic plan, here are seven dos — and three don’ts — for successfully navigating a new position.

October 1, 2018

5 Cybertransition Tips for Incoming Administrations

Best practices for cyberleaders anticipating administration changes this November.

July 1, 2018

Climbing the Ladder of Technology Leadership

There's no one path to a career at the top of the heap.

April 2, 2018

Securing the Smart City

As cities grow smarter and more connected, what implications does that have for cybersecurity?

January 8, 2018

5 Ways to Initiate Communication about Cybersecurity

Well-planned cybersecurity roadshows can help get agencies on board and up to speed.

October 1, 2017

3 Ways to Fight the Cybertalent War

Getting and keeping top cybersecurity staff in government isn't always easy, but there are strategies available to build your workforce.

July 3, 2017

3 Ways to Stop Business Email Compromise

As scammers target legacy tech, government agencies must get savvy.

March 29, 2017

Cybersecurity Has a Metrics Problem — Here’s What You Can Do About It

Is your metrics program coordinated with decision-making?

January 13, 2017

Serverless Computing Is a Growing Trend — Here’s What You Need to Know

Serverless computing allows a true platform-as-a-service environment, letting developers focus on coding rather than back-end operations.

October 21, 2016

3 Ways to Better Predict the Future in Your Enterprise

Data can help governments solve specific problems and prepare for major events.

July 6, 2016

Can Cybersecurity Insurance Improve Threat Management?

Many people and organizations think cybersecurity insurance can improve the cyberdefense status quo for the public and private sectors. But is that really the case?

May 22, 2016

Beyond Spear Phishing: How to Address Whaling and More

First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know.

March 31, 2016

Could the Election Be Hacked?

Renewed emphasis is being placed on vulnerabilities associated with voting machines.

January 26, 2016

5 Steps to Speeding Up Smart Government (by Slowing Down)

If you want to increase innovation, many experts suggest slowing down first.

September 3, 2015

The Security Paradox

Why breach prevention and response strategies are both essential.

July 15, 2015

Can Cybercompetitions Help Grow Local Security Talent?

Hiring cybersecurity staff is difficult, but federal, state and local governments are working with nonprofits to encourage the development of cybersecurity skills through individual and team competitions.

April 10, 2015

5 Ways to Reduce Data Loss in the Cloud

You can’t secure the entire cloud, but you can take steps to secure your data.

January 15, 2015

Cybersecurity in 2025

What gaps in virtual protection must be addressed?

November 20, 2014

3 Ways to Strengthen Security Without Stifling Innovation

You want the masses behind your security efforts and helping the team identify the bad apples, but not stifling innovators who make a positive difference.

September 28, 2014

The Secrets of Innovation: Government Leaders Need to Think Like Entrepreneurs

The speaker was Facebook VP Vaughan Smith. "We all know that innovation is key to success, but how do we innovate at Facebook? The first key to innovation is moving fast, very fast," he said.

August 15, 2014

Cybersecurity's History Provides Lessons for the Future

How things like the NSA, 9/11 and Y2K have influenced where security is headed.

May 15, 2014

How Vulnerable Is America’s Power Grid?

The Metcalf incident is a wake-up call for better critical infrastructure protection.

February 25, 2014

Can We Secure the Internet of Things?

Bracing ourselves for the onslaught of Internet-connected devices.

August 6, 2013

Fending Off Cyberattacks 24/7

Does your government need a 24/7 security operations center?

June 7, 2013

Ransomware: The New Cyberthreat

Ransomware is a scary evolution of online fraud — and you must prepare to deal with it.

February 11, 2013

Are Data Breaches Inevitable?

Small security breaches occur in government more often than many people are aware of.

November 26, 2012

5 Mobile Security Trends and Actions to Consider

New devices mean new policies for governments to enact.

March 22, 2012

Lawsuits Challenge Privacy Policies

Internet privacy has long been a hot-button issue. Central questions are being asked about who owns what data, how that data can be used by various companies to target individuals in marketing and whether users can opt-in or opt-out of various data-sharing approaches. Just as in other areas of life in America in 2012, these questions are often end up being settled in the courts.

February 6, 2012

3 Roads to Executive Buy-in for Cybersecurity

3 tips for getting the go-ahead on security projects.

November 11, 2011

6 Ways to Balance Fun, Productivity and Security at Work

Government agencies can maintain security but still avoid being no-fun zones.

May 3, 2011

Michigan County Takes Internet Safety to Residents

The Washtenaw County, Mich., Cyber Citizenship Coalition is a grass-roots effort that ensures residents use technology safely and securely.

February 11, 2011

Benchmarking Technology Cost and Service Levels (Opinion)

Comparing public- and private-sector IT services is essential for effective leadership.

December 16, 2010

Governments Struggle to Gain Trust in Online Identity Management (Opinion)

Many challenges remain to establishing digital identities, but state and local governments must act quickly.

October 18, 2010

Undercover CTO Part 2: Spending Time on the Front Lines (Opinion)

Learning about an organization from the inside out.

August 2, 2010

Undercover CTO: Spending Time on the Front Lines (Opinion)

Michigan chief technology officer learns about an organization from the inside out.

July 18, 2010

The Information Technology Infrastructure Library Can Track Your Enterprise (Opinion)

Government IT professionals need an all-encompassing, prioritized perspective to successfully address complex system issues.

March 24, 2010

Is Cloud Computing More Secure? (Opinion)

The more you specify unique security requirements, the harder it becomes to obtain the benefits of cloud computing.

February 5, 2010

Ready for Your Budget Emergency? (Opinion)

Emergency management's scenario-based planning is for budgets too.

January 10, 2010

South Africa's Infrastructure Lesson (Opinion)

South Africa's preparation for the 2010 World Cup provides valuable lessons for IT leaders.

September 24, 2009

States Must Share Intranet Bandwidth With Local Governments for Higher Speeds and Big Savings (Opinion)

Michigan shares digital infrastructure with Oakland County for cheaper, faster connections.

August 17, 2009

CTO Strategies for Virtualization in Government IT (Opinion)

Opportunities, challenges and recommendations for virtualizing IT in the public sector.

July 15, 2009

Economic Stimulus: Five Tips for Better Government IT Projects (Opinion)

IT project management strategies for state and local governments.

May 6, 2009

Michigan's New Chief Technology Officer Gives Survival Tips

Dan Lohrmann gives six tips on handling a new information technology job in government.

April 6, 2009

Advice: Technology Vendor Contracts -- Is the Right Security Built In?

Contractors must make security a priority.

December 22, 2008

Four Government Security Mistakes to Avoid

Michigan CISO Dan Lohrmann discusses security challenges.

October 19, 2008

Seven Habits of Online Integrity

CIOs have a role in strengthening cyber-ethics.

October 2, 2008

How Safe is Cloud Computing?

Utility computing can consolidate IT departments, but raises security questions.

June 25, 2008

IT Security: Improve Control of Identities

Good e-government starts with good identity management.

April 13, 2008

Disaster Recovery Plans: Four Steps Toward Improvement

Build technology recovery into broader emergency response efforts.

January 2, 2008

Sharing With ISAC

The road to better information security, ironically, passes through better information sharing.

October 12, 2007

Does MyGovernment Use MySpace?

Web 2.0 security is not an oxymoron.

November 18, 2003

Blackout 2003

When the lights went out in Michigan.

E.REPUBLIC Platforms & Programs