Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.
During his distinguished career, he has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.
Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprisewide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.
He currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and nonprofit institutions.
He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD for You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington, D.C., to Moscow.
He holds a master's degree in computer science (CS) from Johns Hopkins University in Baltimore, and a bachelor's degree in CS from Valparaiso University in Indiana.
Follow Lohrmann on Twitter at: @govcso
A string of new domestic and international cyberwarnings are raising new questions and alarm bells regarding global critical infrastructure protection, and the definition of what is considered critical is expanding.
In conjunction with its annual conference held this past week, the National Association of State Chief Information Officers (NASCIO) has issued several timely reports that are worth reviewing. Here’s a roundup.
State government unemployment systems are under attack from fraudulent applications, as Pandemic Unemployment Assistance programs nationwide are being targeted by cybercriminals. And the situation is only getting worse.
The Department of Homeland Security recently issued a report offering a functional approach to critical infrastructure risk management. The deputy associate director of the National Risk Management Center explains more.
What country does elections best? With all the focus on securing the upcoming U.S. elections, let’s take a look at elections in Estonia with Joseph Carson, a global cybersecurity expert who lives there.
As schools reopen across America, millions of students are still learning (or not) via the Internet. And while the virtual experience has delivered mixed results, almost everyone is struggling with online security.
Global hiring experts declare huge shortages of cybersecurity professionals, so why are some qualified people still having such a hard time finding a job or even getting an interview? Let’s explore.
In this exclusive interview, James Collins, chief information officer (CIO) for the state of Delaware, shares insights from his extraordinary career in government technology leadership.
What are current trends for ransomware attacks in 2020? How has COVID-19 impacted these cyberthreats? What are the warning signs to watch out for? Let’s explore.
The Cybersecurity Maturity Model Certification (CMMC) is a certification and compliance process developed by the Department of Defense (DoD). Taiye Lambo explains what is included, and how it can help your organization.
Around the world, cyberdefense policies and strategies are rapidly evolving. Is now the time for the public and private sectors to adapt and change as well? Here are some options.
As the world watched, the leaders of the largest tech companies across the globe gave testimony to Congress on many topics. Here’s what happened, what’s next and recommendations for governments and non-profits to consider.
The U.S. Department of Energy wants to lead the global race to use quantum computing for a new era of communications. The DOE released a blueprint for a new quantum Internet with stronger security, higher speeds and more.
As Elon Musk prepares to roll out new advances in Neuralink’s brain-computer interface in order to cure diseases and expand human capabilities, the privacy, security and ethical implications of chip implants are set to explode. Let’s explore.
State and local governments face an uncertain future as they battle through the ramifications of our ongoing COVID-19 pandemic. So what will the new normal look like, and how can we get there? Here is a helpful guide.
State and local governments are facing budgets cuts, furlough days, tough project decisions and more, but we’ve seen similar situations before. Here’s what we can learn from previous tough times.
How has COVID-19 changed the global cybersecurity landscape? Are previous security predictions and trends still valid? What’s new? Here’s a midyear forecast refresh outlining the future amid the coronavirus pandemic.
As international attention and media coverage increasingly focuses on the 2020 U.S. presidential election, election security measures will take center stage. Where are the resources?
From hashtags to Twitter posts and from Anonymous hacktivists to personal Facebook postings the Floyd protests are everywhere in cyberspace. What can we learn? Where is this heading?
Over the past week, multiple global business leaders warned of a coming cyberattack with devastating impacts. Is this just FUD or current reality? Let’s explore.
As I read the new book, “Cyber Warfare — Truth, Tactics, and Strategies” by Chase Cunningham, global cyberattacks can be seen all around us now, if we look in the right places. Here’s my review of the topic, and the book.
While cyberspace has been a digital savior during this pandemic, with an unprecedented increase in working from home, video chat and ordering goods online, a surge in cybercrime and fraud tell another story.
In this exclusive interview, Mississippi CIO Craig Orgeron and CISO Jay White offer their perspectives on how technology and security are shaping the response to the global coronavirus pandemic.
What can security and technology pros learn for this global pandemic? I asked Dr. Wendy Ng, an industry expert in both biosafety and cybersecurity, for lessons we can learn.
As the governments lift stay-at-home emergency orders, organizations are grappling with what it means to reopen offices. What will change? Will telework be the new normal? Let's explore.
This second edition book provides a great cybersecurity overview for technology and security professionals as well as a needed comprehensive guide for new cyber pros entering the security field.
In this exclusive interview with Egress CEO Tony Pepper, we discuss how artificial intelligence (AI) and machine learning can improve your email security and prevent data breaches.
Will there be a new round of infrastructure projects coming soon? If so, what do the proposals over past few years teach us about what may be included? Let’s explore.
As conferences and travel are canceled due to the COVID-19 pandemic, life changes for all of us. Here’s one example where sharing actually increased and professional connections grew.
From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how the coronavirus creates new opportunities for cybercriminals.
A landmark cybersecurity strategy was just released containing recommendations to defend the U.S. from cyberattacks. Here’s what you need to know about the Cyberspace Solarium Commission.
The National Governors Association, the National Association of State Chief Information Officers and other key organizations released guidance for our COVID-19 emergency. Here’s a roundup of resources.
How are state and local governments responding to COVID-19? From public health actions to directives for staff, what emergency response steps and risks should be considered? Here’s a coronavirus playbook roundup.
Fears of the coronavirus made the recent RSA Conference in San Francisco different than any previous security conference. Here are RSAC 2020 details and future questions.
The new book “Cyber Minds” offers insights on cybersecurity perspectives and recommendations across the cloud, data, AI, blockchain and IoT. The interviews make this book a must read for cyber and technology pros.
The events that unfolded this past week with the Iowa Democratic caucus app are unprecedented. But putting politics aside, what can we learn about launching important apps? What is the true cost when an app fails?
As new global stories emerge by the hour on the coronavirus, bad actors are (again) trying to confuse online updates with phishing scams and destructive malware. Here’s why action is required now.
What were the top security blog posts in 2019? The metrics tell us what cybersecurity and technology infrastructure topics were most popular in the past year.
In this exclusive interview, Ervan Rodgers II describes actions from his first year as state government CIO in Ohio and shares key state technology strategies for the '20s.
U.S. state and local governments and critical infrastructure operators are on high alert for cyberattacks following recent events in Iraq and Iran.
We have reached the end of an era with Star Wars Episode IX being released. Here's my personal look back at more than 40 years of movies with a few technology-career and even life lessons to take away from a big fan.
Another eventful year online, with more data breaches, malware battles and identity thefts. But the surge in successful, targeted ransomware attacks against governments and hospitals is the top 2019 cybersecurity story.
Whether you call them cybersecurity forecasts, online risk trends or security predictions, here’s a roundup of what our top security companies, industry experts and tech magazines are saying about the year (and decade) ahead. How can you prepare for 2020?
The promises of blockchain technology are vast, but the results to date have not met expectations. So where is blockchain heading, and when will we be there?
What might happen if a nation-state really did launch a serious cyberattack against the United States? This intriguing novel explores what a 'Cyber Pearl Harbor' might look like.
If opinion polls are correct, the upcoming United Kingdom general election on December 12 could finally make Brexit a reality. But what happens to European cybersecurity cooperation? Let’s explore.
The Internet turned 50 years old this year. So where are we heading in the next 50 years? Here’s a look at the excellent report from Pew Research and Elon University surveying global experts.
We all have professional blind spots. Nevertheless, studies show that technology professionals often underestimate the harm that these weaknesses can cause your career, if not addressed. So what can be done?
New lingo, new analytics, and another surge in online holiday sales is expected this November and December. How can you benefit and stay safe in cyberspace as you shop? Let’s explore.
As we wrap up another National Cyber Security Awareness Month and head into a new decade, it’s time to look back and forward to ask what it will take to move the cybersecurity action needle in America?
A new report highlights the many benefits and risks that enterprises face regarding ‘shadow IT,’ unmanaged IoT devices and implementing new (not approved) technology. Let’s explore.
This book is packed with great information on myriad 21st-century Internet security, data privacy and cybersafety topics. I highly recommend it for everyone who’s trying to protect themselves in cyberspace — all of us.
As state CIOs, public-sector thought leaders and tech companies descend on Nashville for the 2019 NASCIO Annual Conference, we examine why the nonprofit has thrived for half a century — and the bright future ahead.
'Cyber Risk Leaders' by Shamane Tan explores the art of communicating with executives, shares tips on navigating through corporate challenges and reveals what the C-Suite seeks in professional partners.
Ahead of the start of weeklong global climate change protests that began on Sept. 20, Amazon, Google, AT&T and other technology companies pledged unprecedented new commitments to renewable energy.
Oakland County, Mich.’s technology leader for 18+ years retired at the end of August. Bertolini is globally recognized a top local government CIO. Here, we get a glimpse of what we can learn from his experience.
The multi-year rise in data breaches, ransomware attacks and insider threats has led to a surging global need for cybersecurity leaders to save the day. But here’s why the CISO ideal is harder than ever to deliver.
Digital Kazakhstan offers a fascinating case study on how leading countries around the world are adapting to digital transformation, as well as the cyberchallenges that come with 21st-century innovation.
How does cybersecurity work get done in the federal government? Ryan Tappis, a trusted industry expert as a managing director of consulting firm Northramp, describes current 'inside the Beltway' security lessons.
As the summer winds down, there is no better time to reconsider how you plan future vacations. Here’s why. Hint: Public-sector employees may need to take more high-quality time off, like their private-sector counterparts.
Another major power outage, this time affecting the United Kingdom's National Grid, causes public outrage and many unanswered questions. What can we learn, and relearn, from this incident?
In an interview with Teri Takai, who’s the former CIO for the U.S. Department of Defense and for the states of California and Michigan, we explore how local governments can tackle the growing cyberthreat.
The National Governors Association held their summer meeting for 2019 in Salt Lake City, Utah, this past week. Dramatically improving our nation’s infrastructure tops the list of priorities. What’s next?
Details from recent data breaches as well as results from several security industry studies raise new (and old) questions about insider threats within organizations. What can be done? Let’s explore.
The National Governors Association released an issue brief examining state cyber disruption response plans. State and local governments should review this report to improve their preparedness for cyberattack disruptions.
‘The Spy’ offers a real-life, high-stakes spy story. We get a glimpse at NSA history in the ‘70s and ‘80s, learning about rivalries, motivations and persistence that continue to drive 21st-century global espionage.
Most security leaders change organizations every few years. The reality is that people leave jobs for many reasons. Here’s why this often becomes a problem for enterprises, the CISO or both.
Operation Snap in Wales improved road safety and reduced fatalities by 40%. By enabling secure public reporting of road traffic offenses using videos and photos, Welsh police overcame budget cuts while improving results.
North Dakota is implementing unified cybersecurity across the 7 branches of government. Sean Wiese, North Dakota CISO, explains how this new, singular approach is breaking-down silos and redefining shared cyberservices.
The 2020 election security topic has risen to become the top cybersecurity agenda item for federal, state and local governments. Here’s a round-up of new bills, reports and more on securing the voting process.
As the ongoing impacts of the ransomware attack against the city of Baltimore worsen, the blame game has reached national news headlines. Let’s explore some of the precedent-setting issues involved.
Will Facebook’s plans to introduce ‘GlobalCoin’ next year result in a surge of new cryptocurrency offerings? Many experts believe so, and here’s why.
As state government leaders left Shreveport, Louisiana, this week to return home, there was a sense of how far the nation has come regarding cybersecurity — tempered by a recognition of how much more needs to be done.
In this exclusive interview with Patrick Hale, the award-winning CIO from VITAS Healthcare in Miami, we cover health-care innovation, technology, virtual reality solutions, cybersecurity and so much more.
As the Presidential Executive Order on America’s Cybersecurity Workforce was released this week, students around the country were celebrating another year of cyber competitions. Here’s how the two topics come together.
An exclusive interview with Jeanette Manfra of the DHS Cybersecurity and Infrastructure Security Agency. She discusses current cyberthreats, actions and strategic plans for defending the U.S. from cyberattacks.
Despite the growing number of data breaches, cyberattacks, privacy issues and other problems associated with technology, Americans remain optimistic on technology and innovation, according to a new report.
As we head into the day that federal income taxes are due in the USA, new research shows that identity theft is becoming easier, cheaper and more prevalent in 2019 via the dark web. Let’s explore.
Here are three basic questions that security leaders need to keep coming back to in order to assess enterprise security culture and ongoing cyber-risk.
After more destructive attacks globally against critical infrastructure, the stakes are growing for the public and private sector regarding ransomware. Let’s explore the latest malware, including LockerGoga.
As we head into the 2020s, most cities strive for the label “smart city.” But what does that mean and where is this trend going? Here’s your roundup of smart city developments, plans and ongoing challenges.
As part of its enterprise IT transformation, New York state radically transformed its cybersecurity efforts. In this exclusive interview with CISO Deborah Snyder, we see how her team implemented their impressive program.
The 2019 version of RSA Conference in San Francisco has come and gone. Here are some of the product and session highlights, major themes and excellent resources to dig deeper into myriad cybersecurity and technology topics.
The National Governors Association held its 2019 Winter Meeting in Washington, D.C., this past week, and the top focus was on infrastructure. And yet, a deeper look shows the vital role of technology, cybersecurity, partnerships and much more.
Despite a growing number of security incidents and headline data breaches, many security and technology professionals express the view that their government or company or nonprofit organization doesn't make cybersecurity a priority. Here's how you can help.
Another day, another data breach. But what are the trends? Here’s a closer look at Risk Based Security’s 2018 data breach report, along with some analysis, wider context and thoughts on what we can learn from the metrics.
The Internet of Things (IoT) is growing exponentially. But security and privacy concerns are piling up at the same time. How can we understand where this trend is heading? Here's what we can learn from the history of the cloud.
Global business and government leaders are urging more optimism and trust in their technologies as we head into the 2020s, but the public and private sectors face a technology trust deficit. Let’s explore.
Calling all governments: We have a serious Domain Name Systems (DNS) problem. The public (and private) sector must take action now.
Lear Corporation is a leading global supplier of automotive seating systems and electrical systems. And Lear executives, staff and contractors also understand the importance of cybersecurity. CISO Earl Duby shows us how that works so well at Lear.
In one of the best security presentations of 2018, Nick Drage explains how to improve cyberdefense using NFL (American football) strategies and tactics. I interviewed him to learn more.
What were the top security blog posts in 2018? The metrics tell us what cybersecurity and technology infrastructure topics were most popular in the past year.
It’s time for the cybersecurity industry’s annual predictions, online threat forecasts and cybersecurity trend reports. Here’s your roundup of top insights from the leading security companies and cyber experts for 2019 and into the 2020s.
2019 will bring some exciting new technology stories. How will your home and office get smarter? What else can we anticipate?
Will remote work dramatically change the 2020s? Disruption is already beginning. Let’s explore future trends for digital nomads and everyone else — including the cybersecurity implications of our changing workforce habits.
As we look back at the top security stories of the past year, 2018 will be remembered as the year that privacy topics kept showing-up in headlines as never before. Here’s a year-end round-up of 2018’s top cyberstories.
How can individuals and small businesses respond if they become a victim of online crimes? How can law enforcement help? Kristin Judge, founder, CEO and president of the Cybercrime Support Network, answers these questions in an exclusive interview.
Some say we will all, eventually, be chipped. Others say — never! Let the privacy, legal, technical, professional, medical, security, political, religious and ‘oh so personal’ battles begin.
From the initial vision to the public-private investment to the plans for the future, the Georgia Cyber Center (GCC) is unique, significant and even special. In this interview with Georgia CIO Calvin Rhodes, we explore how the GCC happened, why the project became so successful and what’s planned for the future.
November marks 10 years since my book, Virtual Integrity: Faithfully Navigating the Brave New Web, was published. One huge fact is even clearer today than a decade ago: Virtual actions dramatically affect offline life. Here's why we need the 7 habits of online integrity now more than ever.
The 2018 midterm elections are just days away, and many in America have cast their ballots in early voting. So where are we on election security, following the 2016 Russian attempts to influence our election results? Here’s a round-up of the latest national media headlines, investigative reports and front-line analysis regarding our 2018 election security.
The survey results from two major government studies were released at the National Association of State CIOs (NASCIO) Annual Conference in San Diego this past week. The technology and cybersecurity results signal major change is coming — in many diverse ways. Here’s what you need to know as we head into 2019.
As we head toward 2020, cloud computing security continues to rapidly evolve around the globe. With an exponential growth in enterprise data moving to the cloud, and a surge in cyberattacks occurring at the same time, what protection steps are leading organizations taking now? How are best practices being implemented by federal, state and local governments to ensure compliance? Let’s explore.
Technology and security pros generally view audits as bad news, especially when material findings are released to the public. Nevertheless, audit reports can also offer unique opportunities to improve. Here are some silver linings to consider.
David O’Berry is a leading cyberexpert, the former agency CIO in South Carolina government and an experienced thought leader in cutting-edge cybersecurity areas, including election security. In this exclusive interview, I ask him about federal, state and local cyberpreparedness regarding the upcoming 2018 and 2020 elections.
The new White House cybersecurity strategy makes one message clear: America will not sit back and watch when attacked in cyberspace. On the contrary, in areas ranging from critical infrastructure to space exploration to intellectual property protection, the USA will respond offensively as well as defensively in cyberspace. Here’s what you need to know about President Trump’s new cyber strategy.
Missouri’s state government cybersecurity leader for most of the past decade is leaving his role this week and moving to the private sector. Michael Roling has been recognized as one of the top security leaders in the nation. Here are some top lessons learned along with an exclusive interview highlighting his career and accomplishments within Missouri government.
As the country prepared for another massive hurricane to strike the U.S. last week, a different type of storm threat emerged as the greatest concern for the Carolinas. What can we learn?
New congressional hearings this past week on a variety of technology issues may mean more regulation is coming soon. From data privacy to social media influence in elections to biased search results, where is this discussion heading? Let’s explore.
A new guide covering a summary of data breach laws in every state and territory was recently released by Digital Guardian. The guide attempts to answer questions like: How do state laws protect you? Here are the details.
Pastors, churches and other faith-based groups are the latest target of phishing scams nationwide. Here’s what you need to know and why we all need to be vigilant and spread the word.
CISO Michael Geraghty wears many hats with one challenging mission: to defend New Jersey’s digital density. He directs the NJCCIC — a one-stop shop for cybersecurity information sharing, threat analysis and incident reporting. And his team does so much more — offering global reach and meaningful cyberimpact. Here’s how.
How can the public sector attract and retain cybertalent? That question is getting harder to answer with recent private-sector initial public offerings (IPOs) of stock, company takeovers and a hot stock market for cybersecurity firms.
There were two major cybersecurity summits in the USA this past week, but only one central message. Whether talking elections and a new DHS risk management center in New York City or discussing cars and trucks and autonomous vehicles in Detroit, cyber-risk management took center stage.
Security awareness programs cannot solve all your cyberproblems. Many security awareness training programs have significant flaws and fail to deliver on initial promises. But these program faults can be avoided or corrected. Here is the way to address concerns and make your security awareness program a fundamental strength within a comprehensive security program.
Our civil discourse in the United States has dramatically worsened. Online name-calling, cyberstalking, harassment, cyberbullying and worse are now showing up on American streets in everyday life. With midterm elections coming soon and a new Supreme Court nominee currently being considered, some predict the situation to worsen further — both online and offline. Where can we turn for potential answers? Here’s how the controversial Tim Tebow provides a role model that can help.
The newly updated book, 'Borderless Behavior Analytics — Second Edition: Who's Inside? What're They Doing?' has recently been released. I strongly urge technology, security and business leaders to read this book. Here’s why this second edition is another 'must-read.'
Current Tenable Chairman and CEO Amit Yoran’s career is beyond impressive. Yoran is a cybersecurity rock star. In this exclusive interview, we provide a glimpse into his security past, Tenable’s current technology priorities and future cybertrends. His immediate focus: Critical infrastructures are facing daily cyberattacks and our cyberexposure to system vulnerabilities must be an urgent priority.
After a family vacation out East, here are some observations, tips and reminders about using your tech devices on the road. How can we enable online security while enjoying family fun at the same time? What advice helps keep data on your personal (and professional) laptops, smartphones and other devices safe at the beach, in airports, visiting hotels and more?
What language does your organization use (both internally and externally) to talk about security incident response? Was that recent cyberevent an incident or a data breach or both? How do you know? Who decides on required actions — both formally and informally? Let’s explore.
Mike Lettman, the state chief information security officer (CISO) in Arizona, has a wealth of cybersecurity experience across multiple states. In this exclusive interview, Mike discusses what’s hot in his state government cyberefforts and points to what’s next to keep constituent data safe.
The No. 1 global sporting event, which only comes around once every four years, is about to begin in Russia. Billions of people are expected to be watching and commenting and clicking on all things football (soccer) over the next month. But with all the fun, and money and attention, there are criminals preparing as well. Let’s explore the FIFA World Cup cyberthreats and what can be done about security.
What works (and what generally doesn’t work) to help obtain the needed dollars, staff and other resources for an effective, ongoing, culture-changing, cybersecurity program? Let’s take another look at answers to this important question.
GDPR-mania has arrived. With the new European Union (EU) law taking effect on May 25, 2018, the Internet will never be quite the same. Opinions on GDPR are all over the map, and lawsuits have already been filed. Here’s a media roundup on what organizations in the USA and around the world are saying, and doing and planning regarding GDPR.
The U.S. National Institute of Standards & Technology (NIST) recently released version 1.1 of the Cybersecurity Framework, and the security industry response is stronger than ever. Here are the facts — along with a front-line expert interview on what public- and private-sector organizations are doing now to plan and implement the new guidance.
Top auto industry and government leaders are coming together for an important automotive cybersecurity summit in Detroit. The 2nd Billington Automotive Cybersecurity Summit is set for Aug. 3, 2018.
What sets a CISO apart? Or, more broadly, how can we differentiate one tech CxO from another? What standards or metrics can business executives use for evaluating technology and security leaders? Here is my ‘easy-to-use’ but ‘hard-to-excel-at’ formula for grading security and technology leadership performance.
Another National Association of State CIOs (NASCIO) Midyear conference has come and gone in 2018. What did we learn and where can we go from here?
Another action-packed RSA Conference wrapped up this week in San Francisco. What is clear is that our cybersecurity industry is a work in progress on many levels. Here are some conference highlights and top-notch cybersecurity content to ponder.
With technology changing so rapidly all around us, how can we think about the ethical implications of what is now becoming possible? With big data analytics, machine learning and artificial intelligence (AI) growing so fast, can we agree on inappropriate uses? Are privacy regulations even workable? Will hackers just go around the rules? Let’s explore.
Technology professionals often have a hard time presenting important online safety topics to the masses. Key ‘cyber hygiene’ messages are usually ignored. Here are some tips to help — and reasons to keep trying.
Are the privacy issues at Facebook the tip of a larger iceberg? Who might be next? Will more whistleblowers emerge who reveal client data misuse?
After a self-driving Uber SUV fatally struck a pedestrian last weekend in Arizona, global attention is concentrated on the future of autonomous vehicles. Here is a summary of what happened, the public reaction and some of the tough questions that need to be addressed moving forward to build trust.
In an unprecedented move this past week, the US CERT revealed details of Russian hacking of U.S. critical infrastructure operators, including energy, nuclear, water, aviation, and critical manufacturing facilities. What was announced and where is this heading next? Most important, how can your public- or private-sector organization respond? Let’s explore.
What works in training students to protect enterprises from data breaches? How can experienced cyberpros practice defending their networks from emerging cyberthreats? Where are the right tools, effective processes and hands-on techniques combined to simulate real-world challenges faced from hackers? The answer may be at a cyber range near you. Here’s why the trend is exploding.
How reliable and resilient is our nation’s critical energy infrastructure? How must we improve amid growing concerns regarding cyberthreats? What are the greatest vulnerabilities? How are physical threats, natural disasters and cyberthreats to energy being addressed? Let’s explore.
Protecting the integrity of elections is a hot topic. From cyberattacks to fake news influencing public opinion to other forms of external manipulation that could undermine democracies, voting security has risen to become a top issue for global governments. Here’s what you need to know and potential next steps for the public and private sectors.
President Trump formally unveiled his new infrastructure plan this past week. So what’s in it and where will infrastructure improvements likely go next? Here’s a roundup of coverage, related alternatives and thoughts on next steps.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) started a mentoring program in 2012, and this nationwide career-enhancing strategy for security leaders has grown to become stronger than ever. Here are the details on how the mentoring program works and interviews on the benefits with government mentors and mentees. Most important, why you should care and how to get involved.
The 2018 Winter Olympics are about to start in South Korea. The world will be watching from before the opening ceremonies this week to the closing ceremonies at the end of the month. My prediction: There will be surprise network impacts. Here’s what you need to know to keep your online connections working, safe and secure.
As we attempt to connect our government technology dots over the past few years, there are many enduring themes and disruptive topics that keep showing up. So what was hot in 2017 that will endure well into 2018 and beyond? Here’s my rundown of technology trends that both elected leaders and government CxOs keep talking about — with highlights from the joint NASCIO/PTI Technology Forecast for 2018.
The false missile alert that was sent out from emergency management personnel in Hawaii last week sparked an initial public panic, national outrage, global media coverage and numerous government investigations. Official inquiries are ongoing and many more reports are coming, but what do we know so far? Here are the details and some of the lessons that we can take away.
How can you enhance your security career prospects? What are the top cybersecurity certifications and why do they help? Are employers requiring security certifications? To answer these questions and much more on cybersecurity certifications, I turned to Jay Bavisi, who is a top global expert on cybersecurity certifications and the founder and president of the EC-Council Group.
What were the top cybersecurity blog posts in 2017? The numbers don’t lie, and the metrics tell us what topics readers liked, and shared, and commented on, and viewed the most in the past year. Here are the top cyberblogs, with special emphasis on how cybersecurity impacted technology infrastructure and government technology people, cyberstories, along with societal impacts.
What will happen in cyberspace in 2018? How will technology impact the real world over the next year? Once again, the cybersecurity industry is full of security predictions, cybersecurity trend reports, cyber forecasts, IT security analysis and red-hot security examples to allow everyone to try to connect the dots to the future. Here’s your annual security industry prediction roundup from the top cybersecurity experts, magazines, companies, analysts and more.
How can we provide better security for Internet of Things (IoT) devices? Yevgeny Dibrov writes that cybersecurity can be improved solely with technology improvements. I disagree. Here’s why I believe removing people from IoT security is ‘mission impossible.’
As 2017 draws to a close, the record-breaking hurricane season tops the list of stories that we will ponder for decades. Nevertheless, the new cyberstorms in 2017 were just as potent, striking at the heart of our financial system with more unprecedented data breaches, cyberextortion, CEO fraud and fake news that undermined trust in virtually every area of life. Here’s your year-end cybersecurity and infrastructure roundup of the top online stories — and one attempt to connect the dots.
By Jan. 1, 2018, government contractors who work for the Department of Defense (DoD) or the intelligence community are mandated to comply with a NIST special publication 800-171. In addition, these security guidelines from NIST provide a meaningful road map for other government organizations and contractors regarding cybersecurity protections. Here’s an exclusive expert interview that offers details to help.
Another major data breach stunned the world in November, but this incident was unique in several ways. What can we all learn from the Uber data breach? Here’s an industry roundup of security analysts’ lessons learned from Uber, as well as my top takeaways for all of us.
What's really going on with data breaches, hackers and cybersecurity? The online world is dramatically changing all around us, so how can we understand recent hacking events? Football can help, here's why.
How can you stay secure online (and offline) as you shop this holiday season? Whether at home or work, whether braving the mall crowds on Black Friday or surfing the Net on Cyber Monday, what should you watch out for? Here’s a roundup of some of the best advice I’ve seen from credible sources.
What actions do organizations need to take to prepare for cybersecurity incidents? The National Institute of Standards and Technology (NIST) has answers in Special Publication 800-184, titled: 'Guide for Cybersecurity Event Recovery.' Here’s an exclusive interview with one of the authors.
A new survey by Gemalto indicates that 96% of enterprises and 90% of consumers lack confidence in the security of Internet of Things (IoT) devices. The majority of 1,050 IT and business decision-makers and over 10,500 consumer respondents favor more government regulations to protect data across the IoT ecosystem.
Hurricane Maria brought unprecedented devastation to Puerto Rico, and the majority of residents are still without power. Nevertheless, with new federal aid and some of the world’s top technology leaders getting involved, the hope for a better tomorrow is now returning.
The Department of Homeland Security (DHS) has mandated that all federal executive branch agencies implement Domain-based Message Authentication, Reporting and Conformance (DMARC) to improve email security. In the same directive, DHS also mandated better Web security protections be put into place. I believe state and local governments should follow the lead of their federal counterparts and make implementing DMARC a priority. Here’s why.
Where can public-sector organizations go to find best practices regarding people, process and technology? How can governments successfully partner with the private sector in repeatable ways? Some of the best answers come from the National Association of State Chief Information Officers (NASCIO).
There is a new debate about the old topic of working from home. What’s trending: a revisit of the pros and cons of telework. Should we go back to the way we were, with more time spent in offices, or do something else? Let’s explore.
We have witnessed headline-grabbing data breaches at Equifax, the Securities and Exchange Commission (SEC) and Deloitte in the past month. Many other global companies and governments have seen massive security incidents over the past few years. There are endless lessons learned, but very few talk about this cyber blind spot that impacts us all.
Hacking back has been in the news a lot in 2017, with new proposed legislation that would legalize forms of a more “active defense” for companies. When added to the flurry of ‘hack back’ activity that is below the public radar right now, it seems likely that some form of legalization is inevitable. Let’s explore.
Two historic hurricanes affected two of our most populated states in America in the past month. It’s still early, but what can we say about city, state and federal government emergency management lessons learned so far?
As all eyes turned toward the Caribbean and Florida this week in essential preparation for Hurricane Irma, Equifax announced a different kind of unprecedented ‘incident’ that could significantly impact half of the U.S. population. Here’s what you need to know and how to respond to protect your identity and your family.
One week after Hurricane Harvey hit Texas, there is a mix of weariness and determination in southeast Texas. As the water recedes, the scale of the devastation is becoming clearer. Nevertheless, the heartwarming stories from brave responders bring hope for the long recovery effort ahead.
Illinois state government has launched a 2017-2019 cybersecurity strategy that is both bold and ambitious. Here is what state Chief Information Security Officer (CISO) Kirk Lonbom had to say about where the state is now and where it is going regarding government cyberdefense.
Why is cybersecurity culture so important to organizational success? How can you build a culture of effective security? What are the actions, tips and steps that can help strengthen your cyberculture? Here's a primer.
A 2017 State of Cybersecurity Metrics Annual Report was recently released by Thycotic, and this new survey provides excellent insights into a disturbing lack of cybersecurity metrics worldwide. Most organizations are failing at cybersecurity metrics, planning and performance. Here are the report details — and what you can do to succeed by improving metrics and your overall cyberdefense results.
Law enforcement and global IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections. Here’s how your organization can benefit from the ‘No More Ransom’ project. Also, what can you do if you are held for ransom?
Employees at Three Square Market, a technology company in Wisconsin, will have a small chip injected in their hands this week for security convenience. But where is this biohacking trend heading? Is there a microchip implant in your future?
With the death of traditional security architectures, what new cyberstrategies can protect global enterprises moving forward? This book offers an impressive lineup of global CIO and CISO luminary experts who provide thoughtful answers and insightful perspectives on the coming era of user and entity behavior analytics (UEBA) and identity analytics (IdA).
Coordinated vulnerability disclosure programs, often called “bug bounty” programs, will become much more widely adopted over the next few years. Here’s an exclusive interview with Marten Mickos, a leading cyber industry expert, to explain why bug bounties are growing fast — and how your organization can benefit.
As new reports surfaced about hackers targeting nuclear facilities and as significant cyberattacks continue to escalate in 2017, what lessons can governments learn from recent events? Most important, how can states prepare for this ‘new normal’ in cyberspace? Here are seven actions to reconsider.
Ransomware that is also a ‘wiper attack’ is being called Petya by some, NotPetya by others and other names such as ExPetya or Petrwrap or GoldenEye. But regardless of the name, this nasty cyberattack was wreaking havoc across the globe for days. Was this really sabotage in disguise? Where is this trend heading? Let’s explore.
California banned state-funded travel to four more states this week over what they deem to be discriminatory laws in Alabama, Kentucky, South Dakota and Texas. But what wider impacts might this action have on a diverse range of topics — from out-of-state collegiate sport competitions to government technology partnerships nationwide? Let’s explore.
The technology trend is clear. The continued growth in cloud computing adoption is impressive in both the public and private sectors. And yet, many organizations still hold back for security reasons. Here are seven tips for moving enterprise data to the cloud securely.
Recent surveys reveal that millennials strongly value new experiences and making lasting memories. I saw this trend in a business trip with my daughter more than a decade ago. Here is a true story that touches on careers in government, travel, one millennial daughter and Father's Day.
Every technology leader wants a security-aware, cyber-savvy enterprise culture. But what does that mean and how can we get there? There is an ongoing debate regarding security awareness training techniques, engagement and overall effectiveness. Let’s explore.
In the days following the terrorist bombing in Manchester, England, the worldwide reactions and dramatic events offer important lessons for the future. So what online and offline responses can we observe and learn from after such a terrorist attack?
The Institute for Critical Infrastructure Technology recently published a fascinating report on insider threats. This excellent white paper defines insider threat categories, offers deep Web screenshots, recommendations and resources to help.
After months of speeches, numerous cyber discussions and plenty of draft documents, President Trump signed an executive order on cybersecurity this week. Here is a roundup of the details, industry reactions and next steps.
Digital transformation is all the rage. Tech-driven business innovation is happening all around us. But how do game-changing technology investments get implemented in real life? Where are examples of success? Here are practical answers from a top business transformation expert.
How can we build more trust in future election results? Can we securely move to online voting to increase voter turnout? Some experts think that blockchain technology is part of the answer, and this interview with Votem CEO Pete Martin covers where we are and where we are heading to secure the vote.
I recently asked a group of leading CISOs and security industry CEOs what new security topics and technologies were hot right now. What did they say?
Back in early March, a bipartisan group introduced the State Cyber Resiliency Act. If passed and funded, the legislation would provide grants for state and local governments to improve cybersecurity protections and incident response. Here’s what you need to know.
Over the past few weeks, President Trump’s trillion-dollar infrastructure plan has been getting plenty of global media attention. Here are some of the latest developments, along with recent statements regarding what’s included.
Ransomware attacks are grabbing many headlines. Here are several recent public-sector ransomware incidents, along with what steps you can take to protect your enterprise.
Is your metrics program coordinated with decision-making?
America’s JobLink (AJL), a multi-state, Web-based system that links job-seekers with employers around the country, has been hacked. Here’s what you need to know.
Distributed denial of service (DDoS) attacks are accelerating around the globe. A new report highlights that the scale of the cyberdefense problem is growing. What can be done?
There are currently two radically different views regarding the Internet of Things (IoT) in our world. One is bright. The other is dark. Which one will win out? Can they come together — somehow? Here are two opposing perspectives — followed by a potential third way.
The National Governors Association (NGA) 2017 Midyear meeting was held last weekend in Washington, D.C., and the top priorities included cybersecurity and innovative infrastructure strategies in the states. Here are top highlights and several next steps.
The U.S. Department of Energy released an alarming report in January 2017, saying that the U.S. electric grid is in imminent danger from a cyberattack. So where have we been, where are we now, and where are we going regarding smart grid security?
What tips and techniques help parents teach their kids online? Where can cybersecurity professionals turn for resources to train teens about ethical hacking? How can we address cybersafety in new ways moving forward? Here are some answers from the 2017 RSA Conference Cyber Village.
A new Intel Security cloud report reveals that cloud computing adoption is growing rapidly in government and elsewhere all over the world. At the same time, CIOs are struggling to keep enterprise data safe in the cloud. Here is what you need to know.
Fake news is now headline news. Add in fake apps and fake websites, and governments have a huge credibility problem. What can the public sector do? Let’s explore what you can do for real.
What's hot right now in cyber? I asked four leading state government chief information security officers (CISOs) about emerging cyberthreats, their state’s top cyberproject priorities for the coming year and for their views on the future outlook for cybersecurity executives. Here’s what they said.
What has President Trump already said and done regarding cybersecurity? How should our 45th president address our many online problems at home and abroad? Why am I more optimistic than most commentators about our new leader’s pragmatic approach to cyber? Here’s why.
The 2016 U.S. presidential election shined a light on outdated election technology. So what steps must be taken and what technology upgrades are needed to restore the public trust in how we select our government leaders? Going further, how can all government service kiosks be made more secure and reliable? Let’s explore.
What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here’s a roundup of what our top industry experts, security companies and tech magazines are saying about the year ahead — and what you can do to prepare.
What cybersecurity blog posts were most popular in calendar year 2016? The numbers don’t lie, and the metrics tell us what readers liked, and shared, and commented on, and viewed the most in the past year.
In 2016, hacktivists took center stage. Hacktivism disrupted many global causes — providing new online missions with anti-establishment goals that wounded public credibility and trust. Here’s a cyber roundup highlighting major international activities online, and how they impacted news headlines in the past year.
As recounts in states wind to a close, courts wrap up their legal cases and electors prepare to assemble to formally declare Donald Trump the next president of the United States, what lessons have we learned from the 2016 recount process?
What is a formal ‘vulnerability disclosure program,’ and why is it needed in a government near you? Watch this CSPAN panel discussion and learn.
With suspicions of hacking, Jill Stein is asking for a recount of the votes cast in Wisconsin, Pennsylvania and Michigan. This is a bad idea. Here are 10 reasons why.
After the election, many government technology executives are in a period of transition. Whether you are coming or going or not sure, most public sector IT leaders are now asking: Where next?
I'm expecting more surprises from President-elect Trump, this time on cybersecurity policy. Here's why.
Despite reports of rigged elections, vote flipping, election fraud, domestic and foreign hacking and much more, you can trust the counting of the votes in America. Here’s why.
After the Mirai botnet was recently used to bring down large portions of cyberspace, there have been new calls for regulating Internet of Things (IoT) devices. Since the voluntary IoT security approach is clearly failing, what can we expect moving forward? Are better standards needed? Should government mandate more security for IoT devices for consumer protection? Let’s explore.
Regardless of who wins, this presidential election campaign has highlighted a series of data leaks with personal information about candidates that will be remembered far after voting is over. New norms are developing regarding online privacy and radical transparency that question the boundaries of hacker ethics in our globally connected world. Many are asking: Will personal privacy even survive in the years to come?
As the public and private sectors struggle to find technology and security professionals with the right talent, skills, integrity, work ethic, perseverance and attitude to excel in the 21st century, I strongly urge you to consider ‘Hiring Our Heroes.’ This effective fellowship program helps military veterans transition into civilian life, and offers so much more. Here’s what you need to know and how your organization can benefit from this outstanding program.
The Cloud Security Alliance working group on the Internet of Things (IoT) released new guidance this week for securing the IoT product ecosystem. The 80-plus page guide is titled: 'Designing and Developing Secure IoT Products.' The report offers 13 recommendations to raise the overall security level of IoT products and services.
Another massive, headline-grabbing data breach was announced this week from Yahoo. What have we learned, and what wider security industry questions just keep resurfacing?
During a keynote session at their annual conference this week in Orlando, the National Association of State CIOs (NASCIO) released their biennial survey results on state cybersecurity. While the overall report trends (compared with the previous three surveys) seemed encouraging, many attendees asked me if the real situation was as positive as the data seemed to imply. Let’s explore the state CISO survey answers and the rest of the story.
Even the best customer service organizations in the world make common online and call center mistakes. Public- and private-sector organizations cannot rest on past successes to ensure future client satisfaction. Here’s a simple case study that shows what to do, and not do, regarding people, process and technology.
How can a government CISO get executive buy-in to obtain authority, autonomy and budget? What are the keys to success in the public sector? What are examples of important cybersecurity projects that are ongoing in major U.S. cities like Atlanta? Here is an exclusive interview with former Atlanta CISO Taiye Lambo.
Steven Fox is a top government cybersecurity expert, Distinguished Fellow with the Ponemon Institute and frequent speaker at top security events all over America. In this exclusive interview, Steven shares several low-tech but sophisticated social engineering techniques that hackers use to gain (unauthorized) privileged access into government systems and large and small company networks. Most important, what can we do to prevent fraud and respond to incidents that do occur?
How do you build a 'smart city?' What innovative factors lead to award-winning smarter technology examples to emulate? Which European city is the smartest? Let’s explore.
Most experts believe the good guys continue to fall further behind in our global hacker wars. So how did we get to this point in cyberspace? Most important, where can you go for help in this new Wild West online?
Do you unplug when you go on vacation? How about placing boundaries or time limits on your children’s screen time? What can be done to help? Is it time to schedule a digital detox?
What's happening with millennials in government? Are new strategies needed to attract and retain young people into public-sector jobs? Let's explore.
In 2016, hacktivism has become a mainstream force impacting millions of global lives. ‘Hacking for a cause’ has now become a weapon that transcends far beyond ‘antisocial geek misfit’ boundaries. From the DNC email hack to the Panama Papers, a surge in new hacktivism is now the top anti-establishment online tool for achieving a diverse set of causes around the globe.
As the world looks forward to the 2016 Summer Olympic Games in Brazil, a long list of problems and solutions have received media attention. But regardless of what happens in the arenas, is your organization prepared? Here’s a primer on potential online trouble spots and how you can prepare.
Top auto industry companies have announced coordinated vulnerability disclosure programs. This use of ‘bug bounties’ to encourage global hackers to help identify security holes points to the future of critical infrastructure protection. Here’s what’s happening now with crowdsourcing vulnerability management, and why the entire cybersecurity industry is taking notice.
Over the past few months, several random events got me thinking a lot more about data backups — again. I know, I know — a boring topic that you already dealt with years ago. You are tempted to just move on. But for your own good, please read this.
More and more devices are plugging into your government’s corner of the Internet of Things (IoT), but are we truly implementing the right projects in 'smart' ways? Here’s what you need to know about the state of smart cities opportunities along with some potholes to avoid and questions to be answered.
The people of the United Kingdom (UK) have voted to leave the European Union (EU). But what does Brexit mean for technology and security professionals around the world in the public and private sectors?
What can we learn from the tragic global events of the past 10 days? The use of social media is front and center in tracking online and offline crimes, especially terrorist activity. How can we prepare for tomorrow?
Bold claims are again being made by hot new startups and the technology giants about the coming age of augmented reality (AR) and virtual reality (VR) applications. While most of the focus has been on gaming, retail and travel, the impact for governments could be huge. Here’s why.
What are the top cyberthreats currently impacting public- and private-sector enterprises? Here are the questions that cybersecurity industry experts are talking about.
A new cutting-edge technology event with cybersecurity solutions for connected and autonomous cars is being organized by Billington CyberSecurity. The cyber summit will include CEOs in the auto industry as well as top government and technology leaders from around the world.
First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know.
How do you secure your home or small business network? A recently released book by Terence L. Sadler offers practical, helpful answers.
The National Association of State Chief Information Officers (NASCIO) held their Midyear Conference in Baltimore this past week. There were plenty of hot topics on the agenda, including: enabling innovation through agile software development, the continuing need for procurement reform and a big push on cybersecurity.
On June 23, the world will be watching as the citizens of the UK decide whether to remain in the EU. The ramifications of this vote go far beyond Great Britain or Europe. History shows us that American interests and our future security are directly tied to this “special relationship.” Here’s why you should care what happens.
Will you buy another desktop computer or laptop? Or, can your smartphone meet your technology needs? Should your business continue buying PCs? The IT infrastructure industry is divided, but the answer affects more than you think. Here’s why.
April is Autism Awareness Month, and there are plenty of new developments to highlight. The number of private-sector initiatives is amazing, but can governments do more? What can innovative technologies do to aid early intervention for autism spectrum disorders? Currently technology is playing a significant role for adults with autism. That being said, should governments be doing more to hire and help these talented individuals with technical skills? Here’s my view.
You’ve probably heard the phrase “innovate or die.” But not everyone got the memo. So how does innovation really work in practical terms at the office? Regardless of whether you tend to be an innovator or protector, here are seven ways to help your business and career.
As the government pay gap grows larger with the private sector, where will the next generation of government cybersecurity leadership come from? What's the best background to enable success? Who should consider government cybersecurity roles? The public and private sectors are battling a growing list of global cyberthreats. With more data breaches, cyberattacks targeting critical infrastructure and new Internet of Things vulnerabilities, the competition for competent cybersecurity increases.
The rise in ransomware has taken a dramatic turn for the worse in 2016. Several hospitals recently declared states of emergency. Meanwhile, thousands of global businesses and consumers are now becoming victims of hacking attacks leading to extortion. This very serious situation requires the immediate attention of everyone from PC owners to small businesses to the large governments. Here’s the problem and what actions you must take now to protect yourself.
We’re in mid-March, which means the NCAA College Basketball Tournament is in full swing. But there is more than one way to bust your March Madness bracket, and cybercrooks are also working overtime to grab a piece of the cash. Here’s how (and why) major sporting events are top targets for global hackers.
This is a tale of two studies. The first report from the Governing Institute was sponsored by the National Cyber Security Alliance (NCSA) and AT&T, and covers the intriguing results of a state government legislative survey on cyber. The second reports offers a “Data Breach Digest” from Verizon which elaborates on 18 different data breach scenarios worth considering. Both reports are free and bring excellent recommendations and worthwhile opportunities.
As I flew back to Michigan after another RSA Conference this week, I thought about the highlights, takeaways and major themes in the security industry right now. At the same time, I couldn’t help but look back and reflect on the past several RSA Conferences in San Francisco on a personal level. Bottom line: These RSA Conferences tell quite a bit about where we have been and where are we heading in cyberspace — on both a personal and industry level.
Everybody loves their smartphone, with global adoption soaring and new helpful apps popping up daily. Faster speeds, new models and plenty of competition to lower prices make your mobile device the center of technology innovation. But is there an ‘Achilles Heel’ to watch out for? The answer is yes — and here’s what you can do to help protect yourself.
Scott Schober is small business owner who tells intriguing stories about how his company was hacked — and what happened next. This easy-to-read book is a good primer on the importance of online security for business owners, but it also shows how easily identity theft can happen to anyone, even a cybersecurity expert. Best of all, this book offers practical security advice with helpful steps that we all can follow to secure our corner of cyberspace.
With the exponential growth in data breaches over the past few years, the concept of ‘hacking back’ is growing in popularity. Proponents ask: If I can use a gun for self-defense in my home, why can’t I similarly ‘hack back’ against attackers who invade my cyberspace? Let’s examine that premise from different perspectives.
Does using ‘smart’ devices mean that our inboxes will be even more overflowing with more email? For now, probably.
An exclusive interview with Dr. Phyllis Schneck, deputy under secretary for Cybersecurity and Communications for the National Protection and Programs Directorate within the U.S. Department of Homeland Security.
What is the new Global Cyber Alliance (GCA)? Why is it important? Here is an exclusive interview with GCA co-founder and chair Will Pelgrin, as well as the new CEO and president of GCA — Phil Reitinger.
#OpFlint promises online attacks against Michigan Gov. Rick Snyder’s administration in response to the water emergency in the city of Flint.
The 2016 edition of the Consumer Electronics Show (CES) just wrapped-up as the North American International Auto Show sprang into full swing. So what do they tell us about the state of cybersecurity for the exploding Internet of Things (IoT) market?
You are next in line on your organization's depth chart. For a long time, you just wait in the wings for your opportunity to lead. For years, you watch, and learn, and practice, and occasionally get a few opportunities to show what you can do. And then, you get promoted. New management elevates you to #1. But can you succeed? You make a lot of early mistakes. Critics outnumber supporters. Nevertheless, you overcome and excel. How? There are important career lessons to learn from Kirk Cousins
What were the most popular ‘Lohrmann on Cybersecurity and Infrastructure’ blogs written in 2015? Viewer metrics are in, and they tell an interesting story. Here are the results, along with some intriguing trends and links to the top content.
More security predictions than ever before. As I examined hundreds of expert forecasts for 2016 and beyond, with cyber trends and predicted technology events from top companies, it is hard to be optimistic about our online situation. And yet, the combined predictions tell us an important story about online life. So where is cyberspace heading? What surprises await us? Here's your annual one-stop roundup of what security experts are telling us will happen next.
Something new, even unprecedented, happened this year in our cyber world. The most noteworthy data breaches were not focused on financial data. Here’s a data breach recap from 2015 – along with my views on what these events tell us.
The FirstNet Board approved the release of an RFP to build, operate and deploy a nationwide public safety broadband network this week. Meanwhile, the Department of Homeland Security Science and Technology Directorate named 10 people to a new Interoperability Advisory Panel. So are next-generation interoperable communications for nationwide first-responders finally getting close?
What is the current situation regarding cybersecurity in Latin America? To answer this question, I turned to Mr. Carter Schoenberg, who is a respected industry security expert who recently started a cybersecurity company in Panama. Here’s the informative interview.
The holiday season has arrived and so have the opportunities for Internet deals, sending and receiving holiday cards and many more online activities. Nevertheless, with the good comes the bad – as phishing scams, one-time bargains that are too good to be true and other cyber traps can lead to major headaches. Here are five common online mistakes to avoid as we head towards another New Year’s Eve.
The recent round of global terrorist attacks have reignited the homeland security versus personal privacy debate. Law enforcement officials point to the apparent use of encryption by ISIS terrorists as proof that encrypted communications need “back doors” to protect the public. But many security experts disagree. So what is the future for encrypted communication as we head into 2016?
Advanced cyberthreats, zero-day exploits, sophisticated malware, ransomware and more. These are just a few of the daily challenges that enterprises face as they try to protect their network endpoints each and every day. How can it be done? Enter next-generation endpoint security products and services. Here’s an overview.
Where is Florida heading regarding cybersecurity in government? What are the top priorities and hot projects? Hear what the Florida state CIO and CISO have to say in this exclusive interview.
Emerging cyberthreats are a hot topic at cybersecurity summits, in executive boardrooms and remain a top priority with back-office security teams. Here's what you need to know about where we've been, where we are and where online security threats are going.
From smart drones to smart homes to smart cars that drive themselves, the world is dramatically changing all around us. So are governments ready to take advantage of these new innovative opportunities emerging within the Internet of Things (IoT)? Or, as almost everything gets connected to the Internet, could these newly connected devices become “Trojan Horses” that inadvertently bring the next generation of data breaches? What’s being done globally in the public sector with IoT right now?
The National Association of State Chief Information Officers (NASCIO) held its annual conference in Salt Lake City, Utah, this past week. So what were the highlights? From the Internet of Things (IoT) to cloud computing to data center consolidation, which projects, technologies and issues rose to the top of the agenda? Most important, what’s on the minds of government CIOs, and what projects are they actually implementing as we move into 2016?
It is October, so National Cybersecurity Awareness Month (NCAM) is front and center from sea to shining sea. But attention on information security, along with events and helpful publications, have evolved over the years. It’s time to take another look at the new resources along with helpful tools and relationships that can last long after your Halloween candy runs out.
North Carolina Gov. Pat McCrory just established the new Department of Information Technology as the single source of accountability and authority over state government technology projects. State CIO Chris Estes will lead the consolidation effort, along with executive support from his leadership team, including Chief Information Risk Officer Maria Thompson. So who are these leaders? What are their plans and priorities? Where are they heading regarding information security? These are just a few of the questions answered in this exclusive interview.
A new 'understanding' on cybersecurity was announced this past week during Chinese President Xi Jinping's formal state visit. But while this agreement certainly offers a positive step forward for security in cyberspace, many questions remain unanswered.
Elected officials often fail to prioritize cybersecurity until after a data breach when it's too late. So what are the important security issues and actions that are needed by state and local elected officials right now? A new guide by Governing magazine and CGI was just released to answer that question.
On the 14th anniversary of 9/11/01, there are plenty of reasons to be thankful regarding public safety in America. And yet, there is also a growing list of cyberthreats that are grabbing news headlines almost daily. To help understand where we are today and where we are going regarding federal government cybersecurity initiatives, I interviewed Dr. Andy Ozment, the U.S. Department of Homeland Security assistant secretary, who is the new point person for the National Cybersecurity and Communications Integration Center.
Lockheed Martin recently released new open source tools to help defend enterprises from cyberattacks. The system, called Laika BOSS, offers a malware detection and analysis framework for security analysts to share intelligence with other cyber defenders worldwide. Here's my interview with leading cyberexperts who are offering cutting-edge insights and workable solutions to emerging battles in cyberspace.
Phishing and spear-phishing are growing problems. The clever enticements to click are getting more sophisticated and more targeted than ever. The data breach costs are mounting. What can your organization do to take phishing awareness and response to the next level?
Many government technology leaders are struggling. From national headlines to local audit findings, the majority of the news has not been good. Meanwhile, public trust in government as a whole is near historic lows. What can be done? Is it time for reinvention? Back to the drawing board? If so, there is a lot to learn from the journey and actions of Tim Tebow.
The technology and security industries are struggling to keep up with an ever-growing list of problems and cyberattack vectors. There has been a consistent call for new solutions to address evolving cyberspace challenges. One popular answer: New innovative startup companies to help. In order to accelerate these companies, the 'Security Startup Challenge' was formed earlier this year by Kaspersky Lab and several partners. And now, we have the winners.
A new survey of top IT executives reconfirms the findings from other recent cybersecurity studies regarding the online defense at utilities and other vitally important public- and private-sector organizations. The report outlines what is good and what needs improvement in our online defense of critical infrastructure facilities.
A series of recent news headlines reveal cybersecurity experts, who were being paid to defend networks, battle malware and fight cybercrime, were actually black hat hackers. What happened and what can be done to address this growing trend? Is your enterprise prepared?
Talking about security in effective ways is hard – whether the audience is an auditorium full of professionals or a small room at home with a few children. Here are some tips to help.
How well do you know your IT infrastructure? Who is communicating with whom across your network backbone? What systems are bandwidth starved? With legacy systems, PII data, hundreds of networks, complicated databases, hybrid clouds, data warehouses, countless mobile devices and outsourced functions needing 7x24 access, how do you determine what's truly secure? As we prepare for the new Internet of Things (IoT) era, here are some questions that need answers now.
On July 8, 2015, a string of major computer outages occurred at approximately the same time - grabbing global media attention. Significant operational disruptions occurred as a result of computer incidents at the New York Stock Exchange (NYSE), the Wall Street Journal (WSJ) and United Airlines. The nation briefly 'woke-up' to our reliance on technology and got a small taste of the fear that may come if a cyberattack cripples critical infrastructure. What lessons can we learn from these incidents? How can public and private-sector enterprises better prepare for more inevitable disruptions?
Network failures. Colossal data breaches. Global online privacy problems. The bad news reignites debate. Do Internet troubles necessitate a new start? Is it time to push the 'reset' button? But others say that cyberspace is improving and will go much further -- even solving a long list of historic problems. One thing is indisputable: The Internet is changing rapidly before our eyes.
A recent article in The New York Times describes a highly coordinated disinformation campaign using social media. This scary development raises new questions about the reliability of alerts and other emergency communications that rely on social media platforms. Will disinformation campaigns become a growing trend that will undermine recent advances in spreading important information during emergencies?
Data breaches are becoming much more common. Most states have laws mandating the public disclosure of data breaches where personally identifiable information (PII) is at risk. Cyberinsurance policies even cover data breach costs. However, not all data breaches are the same. We need a data breach scale. Here's why...
We are continuing the series of interviews with top CIOs and CISOs from around the nation regarding the best state and local government cybersecurity strategies. This week, we turn toward the Buckeye State to learn from two respected executive leaders. At a time when the federal government is reeling from a major OPM data breach, this security discussion has never been more important.
Alan B. Trabue worked for the CIA for over 38 years, and he has hundreds of true stories to tell about domestic and foreign agents and lies and spies. He has just published an amazing book that tells about his career as a covert operations polygraph interrogator with exciting travels all over the world. For anyone who is interested in polygraph exams or for those who are intrigued by the complexities of intelligence operations around the world, you must read this book. Here is a brief book preview and an interview with the author of 'A Life of Lies and Spies.'
Will Pelgrin started the MS-ISAC more than a decade ago, and he is a leading voice in government cyberdefense. Tomorrow is his last day with the Center for Internet Security, and I caught up with him and new CEO Jane Lute to discuss the past, the present and the future of global cybersecurity -- especially within governments.
Everyone is talking about smart cities. And yet, new public- and private-sector questions are emerging as more organizations engage with this global technology megatrend. So how can you take these opportunities to the next level? Who are the leaders within this hot Internet of Things (IoT) category? Which academic studies and white papers offer best practices and the most helpful resources to take your region to the next level? What cyber-risks are emerging? Here are answers and resources to consider.
Industry experts disagree on whether the Islamic State’s ability to mount a dangerous cyberattack is a top concern or an emerging online threat or completely overblown. But one thing is not in doubt, ISIS is making news headlines in 2015 for their exploits in cyberspace. In my view, ISIS is an emerging online threat to keep a close watch on. Here’s why.
The latest bills, privacy concerns and information-sharing actions.
I traveled to the United Arab Emirates (UAE) this past week to present the opening keynote at the Gulf Information Security Expo & Conference (GISEC 2015) in Dubai. The event offered a refreshing mix of leading global voices on security and technology topics. But most surprising, the Gulf region's public and private sector executive leaders who presented, the companies exhibiting and the amazing city as a whole offered attendees a different perspective and a positive model for the current cybersecurity and technology infrastructure challenges in the Middle East and the world as a whole.
Attendance records were probably broken, and there were numerous very good sessions. Still, surprisingly, government announcements may have been the highlight of the week.
We are continuing the series of interviews with leading state government CIOs and CISOs from around the nation. This week, we turn to Washington state and its security priorities and technology plans.
A new report released this week by Trend Micro and the Organization of American States (OAS) shows a dramatic increase in cyberattacks directed against critical infrastructure owners and operators.
Are you having trouble getting the needed resources for your cybersecurity program or key projects in government? Is staffing, funding or gaining executive support not adequate to get the job done right? Do you want to strengthen your influence and trust with management? While there are no easy answers, these ideas may help.
Just as many government organizations wrap up enterprise XP migrations a year after initially planned, it's time to start ramping up another major infrastructure effort. Microsoft Windows 10 will be arriving this summer. What new features are coming and is it time to prepare your strategic upgrade plan?
On Friday, March 20, 2015, CyberOU, the student cybersecurity club at Oakland University, held its second annual Cyber Summit in Michigan. Here's why CyberOU is a student-run organization for others around the world to emulate.
We are continuing a series of educational interviews with state and local government technology and security leaders around the nation. This week we visit an intriguing local government in the Pacific Northwest part of the country to learn more about its overall mission and how it keeps customer data safe.
What cybersecurity priorities, challenges, actions and plans are Missouri's CIO and CISO working on right now?
By a 3-to-2 vote along party lines, the Federal Communications Commission (FCC) passed new rules on Net neutrality last week. The rules establish the Internet as a utility, but court battles loom before the FCC actions can take effect. Here's what happened, a summary of the news coverage, what it all means, reaction from different sources and what is likely to happen next.
'States Leading on Cybersecurity' was the name of session at National Governors Association (NGA) Annual Winter Meeting on Sunday. Homeland Security Secretary Jeh Johnson addressed looming DHS shutdown impacts as well as federal / state opportunities to work together to share cyberthreats and other critical information across the public and private sectors.
The White House Summit on Cybersecurity and Consumer Protection at Stanford University was a very good event with meaningful outcomes. But it could have been much more.
Unique Indiana state government partnership with Purdue University will also utilize private-sector expertise to defend state networks from next-generation cyberattacks. This breaking news demonstrates that cyberdefense is a top priority for Indiana Gov. Mike Pence.
Governments around the globe are rushing to prepare for computer-generated threats that can cause real-world calamity to our way of life. And while opinions vary on the likelihood of human error causing a major crisis or hostile cyberthreats causing severe societal disruptions, few argue against being prepared. So how are leading governments getting ready for inevitable cyber emergencies?
As you think about resolutions for the coming year, or the next four years in government, don't forget your people. Here are seven important actions to consider.
This should be the year that significant bipartisan progress is made on cybersecurity legislation, with new laws set to pass on issues ranging from data breach notification to sharing sensitive cyber intelligence between the public and private sectors. In fact, since President Obama and Republican congressional leaders can't agree on much else, cybersecurity action is moving to center stage.
The International Consumer Electronics Show (CES) in Las Vegas drew huge crowds again this year, with audiences seeing, touching and enjoying the hottest new gadgets and technology. From cars that drive you to drones that are smart to 4K high-definition TVs, it was all there. But the biggest story of all, may be the virtual reality (VR) revolution. VR tools and devices will transform 21st century IT infrastructure.
As we begin 2015, what do your customers really need from you? What is your government technology infrastructure plan of action for the coming year? Here are seven must-have strategies for enterprises to enable long-lasting innovation.
Predictions are everywhere. Most security companies now make them. As I examined 2015 lists and checked them twice, everyone is saying that our online situation will get worse. But how much worse? What surprises await us? Here's what technology experts are saying - along with my naughty and nice labels.
Cybersecurity stories were more popular than ever in 2014, with the word 'cyber' showing up in front of topics ranging from security to shopping scams to global online attacks. But no matter how we rename, reclassify or reanalyze the data in cyberspace, it is clear that the dollars spent, problems encountered and attention given cyber has virtually doubled in 2014.
Recent reports show that morale is low across the nation for government employees. Are there answers that can help even as public sector pay lags behind the private sector? Here's an example to consider.
Everyone is bringing their own devices to work. But is sensitive data being secured properly on our smartphones and tablets? Soon, new technology will be worn wherever we go. Is your enterprise preparing for WYOD?
Another Cyber Monday, and more online sales records will be set. What can you do to protect yourself at home and work?
The North American International Cyber Summit was held in Detroit's Cobo Hall on Nov. 16-17, 2014, and Michigan Gov. Rick Snyder unveiled an updated 'Michigan Cyber Initiative 2015.' Here are the details on the event and the new cyber plan that's a model for the nation.
What can we learn from the annual American Petroleum Institute (API) Cybersecurity Conference in Houston? Many things, but nothing more important than we are all part of the same cyber ecosystem. We sink or swim together in cyberspace.
Back in the spring of 2014, speculation was already growing about the significant impact that technology and cybersecurity might have on the 2014 midterm elections.
The government security leadership series continues with another set of CIO/CISO interviews. This week we travel to Minnesota.
As the headlines around the world continue to focus on the spreading Ebola health crisis, how can technology help? Effective answers must take advantage of recent advances in big data.
Once every four years, most state and local governments go through a multi-month period of major upheaval. Regardless of which political party wins in the November midterm elections, major executive turnover usually occurs at the highest levels of government. This fall and winter is one of those times. How can you prepare?
Cybersecurity protections in Wisconsin government took another step forward last week with an impressive cyber summit that included Gov. Scott Walker, Maj. Gen. Don Dunbar (the adjutant general in Wisconsin) and security leaders from around the nation and the world.
The 11th annual National Cyber Security Awareness Month kicked off on Oct. 1, with perhaps the biggest set of activities ever planned. But on day two of the festivities, a huge JPMorgan Chase security breach stole the headlines.
The speaker was Facebook VP Vaughan Smith. "We all know that innovation is key to success, but how do we innovate at Facebook? The first key to innovation is moving fast, very fast," he said.
As cyber leaders from across federal, state, local and tribal governments prepare to gather for another annual meeting, the future of government cybersecurity in our local communities now hangs in the balance.
There were two very different events this past week in Michigan, but both offered similar messages. The Intelligent Transport System (ITS) World Congress and the Michigan Digital Summit pointed to the radical transformation occurring right now in transportation. There is a paradigm shift occurring using smart transportation systems and mobile technology that enables 'realistic solutions to our global mobility, safety, and environmental challenges.'
Whether the topic is modernizing health care, attracting retaining the right talent, the role(s) of the Chief Data Officer (or the new Chief Digital Officer), the value of big data or even securing enterprises from insider threats, the answer entails culture change. So how do we begin?
Just as mobile technology and cloud computing became a normal part of our lives, along comes the next set of disruptive innovations that will radically change the way we work and play. Get ready for robots to appear in virtually every area of life. But just as with the Internet, there will also be a dark side.
It's time to get in the game. Just as in the 1984 movie 'The Last Starfighter,' being the best at a game could lead to a future that exceeds your wildest imagination. The British Intelligence equivalent to NSA is offering a challenge to play a game, with a great cyber job as the prize for winners.
The National Cyber Security Alliance is taking the online safety message to a city near you. A national campaign is spreading the word that multifactor authentication is easy to use and available now — often for free.
More cyberdefense action is needed, but many people seem content to hit the snooze button for now. Meanwhile, Black Hat speakers offer some policy advice to help, while smart Americans change passwords - again.
August 1, 2014, was my last full day as Michigan Government's Chief Security Officer (CSO). As I look back at seventeen years of action-packed public service, I will remember the wonderful people who made it all possible and who served (and continue to serve) our citizens so well.
The Michigan Cyber Civilian Corps, state and local government cyber analysts and the West Michigan Cyber Security Consortium participated in an attack-defend-respond tabletop exercise in a virtual city called Alphaville, which exists within the Michigan Cyber Range. Here's why it matters to a town near you.
As we head into the mid-term elections, what cyber policy action is likely in 2014?
Recent cyber stories resemble plots from James Bond films. Can you tell the difference?
As global online harassment concerns rise, workable solutions seem elusive.
A Spartan fan visits Husker Country to learn about cybersecurity in Lincoln.
Coming IoT growth surge will both utilize and surpass cloud computing's appeal.
What has Brazil done to improve technology and other infrastructure to prepare to host the world?
Are you ready to handle big data, more video, new firewalls and an exploding number of mobile devices?
A look at cyber in "Big Sky Country."
David Gustafson and Chris Ipsen offer experience, vision and proven information security leadership.
On Mother's Day, it's time to take another look at this complex issue.
Facebook, Google, LinkedIn and others want to be your trusted data broker
Tempting the click is everywhere in cyberspace. Keep asking: Is that really true?
CIO and CISO offer the nation best-practices to mitigate cyberthreats.
Security pros are feeling the pressure. Are you ready for another action-packed week?
We can learn from front-line government experts who are 'in the arena.' Delaware is raising the bar for the nation in many areas of cybersecurity.
A key NIST Cybersecurity Framework kickoff event was held in Washington DC this week. What happened, what can we learn from the event and what's next?
I am kicking-off a series of interviews with state and local government CIOs and CISOs from around the country. The goal is simple: To listen to their words and learn from their ideas and actions.
Can these hot trends mix, or are they like oil and water? Can we find middle ground on data? Or, will these two trains collide? Do you feel the tension building yet?
How do we improve the security culture in our organizations? It's time to take another look at what works for security awareness programs.
RSA Conference sessions ask: Who can you really trust to protect your data online?
Even if you are not going to California, you still need to pay attention.
This new approach matters more than most people realize.
Yes, federal, state and local governments are impacted.
CyberTech 2014 demonstrates disruptive tech solutions
Why it matters to a community near you.
What do we really do with all that data we collect in government? The answer must be to improve customer service and provide a radical transformation in the way governments interact with residents. Anything less will bring big problems. Here's why.
Quick Pop Quiz: Don't worry, this will be easy.
7 Predictions for optimists and 7 predictions for pessimists for government IT in 2014.
New global fiber, with faster pipes, and end-to-end deliver, owned by tech giants like Google, are a central part of the plan to deliver trust.
2013 was another eventful year in the brief history of cyberspace - with more online holiday shopping, more spear-phishing, some big government project failures and more virtual surprises than ever before.
A few years back, experts predicted that the smartphone would replace the wallet by now. The trouble is, most of these predictions were way too optimistic.
What traps do new security leaders face? How can they avoid them? Where can they go for help?
Everyone loves a deal. And geeks, nerds, government technology staff and cyber pros especially like deals on new technology.
A familiar hot topic is back in the #1 priority slot for state CIOs. But why is cybersecurity back at the top of the 'must do' list?
As the eyes of the entire nation are focused on whether Healthcare.gov will regroup and still be successful. Skeptical citizens are raising wider questions on big government IT projects once again.
Everyone knows that IT security is hot around the globe right now. But it's about to get much hotter, according to Richard Stiennon, who was the lunch keynote at the 2013 Michigan Cyber Summit yesterday.
The 2013 Michigan Cyber Summit is Friday, October 25. You can watch it live on the Internet or access sessions on-demand after the event.
What do state government Chief Information Officers (CIOs) believe are the greatest enterprise risks in 2013?
Is rogue IT threatening to cause a major breach?
From home mortgages to university grants to interns enhancing their career prospects, the federal government shutdown of 2013 is hitting home - and hitting hard.
The NGA released a new compelling strategy paper called Act and Adjust: A Call to Action for Governors for Cybersecurity.
Another National Cyber Security Awareness Month (NCSAM) begins on October 1, 2013, and this could be the best or one of the worst ever. This is why...
The Intelligence and National Security Alliance (INSA) organization just held an excellent summit on CSPAN that is worth a second look.
Spam is back. But this new spam is harder to deal with. Here are some tips to help.
Outgoing Secretary of Homeland Security Janet Napolitano warned that a major cyber attack is coming
There have been a number of futuristic technology ventures recently announced that are either visionary game-changers or a huge waste of money.
Where were you when the lights went out in 2003?
How much tracking by advertisers is ok? The answer relies on trust...
"And my challenge to each of you is to take the cyber awareness training... like me..."
But how do we take these vital security goals to the next level? What are the desired outcomes and corresponding actions required to strengthen our mutual cyber defenses? Where do you start?
No service? My Verizon connection has great all week why now? Something was wrong.
Enquiring minds typically want to know: What is the next big thing in technology? The nice thing about that question is that you can go almost anywhere with the answer.
Early this week the European Union (EU) mandated national maximum sentences of at least two years in prison for attempting to illegally access information systems. Will these tougher penalties deter cybercrime?
Are insiders or outsiders the greatest IT threat to enterprise security? Lately, the pendulum seems to be swinging towards the insider threat.
Ms. Teresa M. (Teri) Takai, who is the CIO for the United States Department of Defense (DoD), has been an exceptional leader in government for more than a decade. She served as state government CIO in both Michigan and California before joining DoD as CIO in 2010. Ms. Takai was appointed to the FirstNet Board of Directors in August 2012.
There is a free webinar coming up on the topic of BYOD. The online event will be on Tuesday, June 18, at 2 PM (EST).
Do the ends justify the means in the case of Edward Snowden disclosing classified NSA secrets to the world? I think not.
The news media this week was full of articles describing the U.S. government's role in gathering, mining and analyzing big data from nine leading U.S. Internet companies in order to stop terrorism. Where is this capability going?
Yes, spear phishing is hot all over the USA - very hot. In fact, this threat may be #1 on the list.
For those who worry that individual privacy rights and personal freedoms are already being eroded by the Internet and new technology hold on to your virtual safety belts. Many experts are predicting almost everything will be recorded in public in the near future with wearable tech, whether you like it or not.
For some reason, there seems to be an abundance of career advice floating around social media web pages right now. What are some of these good career tips, and what is the best career advice I ever received?
What do hackers and Mother's Day have in common? According to the wealth of cyberspace knowledge that is defined by Wikipedia, a hacker can mean many things...
What will actually happen in (or to) cyberspace on May 7, 2013? Is this the new normal in cyber threats?
There has been a lot of discussion over the past week about Twitter and the power of social media following the breach of the Associated Press (AP) Twitter feed last Tuesday. Bottom line, each of us still needs to decide: Can I trust that tweet?
After the unprecedented events of that took place in and around Boston last week, where are we now and where are we going?
I am excited to announce the release of my new eBook on the hot topic of mobile technology and specifically bringing your own device to work (BYOD).
Recently, my family was discussing lesser known facts about our first President, George Washington. The intriguing conversation centered on George Washingtons 110 Rules of Civility & Decent Behavior in Company and Conversation. How can we apply these rules to online decency today?
What are futurists predicting regarding technology? And for security, what is coming down the road?
What are the top infrastructure projects in the world? Why were they chosen? What projects are hot in North America? How is cloud computing changing the way business in conducted?
If Internet connection speed was an Olympic event, America wouldn't even get a medal.
The European Network and Information Security Agency (ENISA), which is a part of the European Union (EU), recently issued a report that describes the current global cyber threat landscape - including infrastructure.
As we head into the heart of the holiday season, our thoughts and prayers still turn towards the families and devastated communities following the horrible events in Newtown, Connecticut, on December 14, 2012.
Ever since the Western States Contracting Alliance (WSCA) was formed in the October 1993 by the state purchasing directors from fifteen states, governments have been saving millions of dollars through cooperative purchasing.
More and more companies and governments are implementing technology policies that allow their staff to bring your own device to work (or BYOD). But is BYOD really cheaper for governments?
The impact of Tropical Storm Sandy is being felt far and wide.
Patch Tuesday is just around the corner, and I feel an urge to rant.
I noticed ads showing up all over the place asking me to come back to their websites. Whether I was checking baseball scores at ESPN, doing a Google maps search for driving directions or researching a cybersecurity article at various tech websites, the computer browser was beckoning me to return and buy plane tickets, with targeted ads asking me questions. Will governments be next to use targeted ads online?
Suddenly, without warning, no power. The blackout spreads. The grid goes down. What can we learn from this?
e-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?
Everyone is talking about the sinking of the Titanic and they should be. Here are five lessons for technology and security professionals from the sinking of the Titanic ...
Mark Weatherford has been named as the new deputy undersecretary for cybersecurity at the Department of Homeland Security (DHS). Mark is a thoughtful executive who has both military service and hands-on experience dealing with every aspect of our cyber ecosystem. I am confident that he is the right person for this job as we head into 2012.
There have been several recent articles and reports that offer ways to save Information Technology (IT) dollars. The lists of potential cuts are worth reviewing, but I urge some caution as well.
Governor Snyder quickly raised the bar: "If people walk away tomorrow saying that we had a nice conference with good speakers, we will have failed. We need everyone walking away saying that it is time to act now on cyber whatever their role."
As reported by Government Technology Magazine last week, Michigan is merging physical and cyber security. I will be moving to the newly created role of Michigan Chief Security Officer (CSO) in October. The reaction from my friends and colleagues from around the country has been all over the map ranging from Great move to Are you really ok with this?
I had just come out of an e-Michigan meeting in the Romney Building in downtown Lansing. It was a few minutes after 9 AM on 9/11/01. Someone yelled, A small plane just hit the World Trade Center in New York!
Where did you first learn what it means to out-hustle the competition? How did you develop that strong will to win? When was the first time you worked hard with teammates to accomplish a goal? For many readers, the answer is likely to be playing sports.
Hurricanes are notorious for disabling technology by cutting off electricity. In some cases, the threat of coming storms can overwhelm our phone systems and websites. But technology is also being used in new ways to prepare for and clean up after natural disasters, like hurricane Irene.
Governments across North America are now consolidating data centers at an unprecedented pace. This is not just talk, but real action is (finally) occurring.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) is holding its annual meeting in Nashville, TN, this week, and the focus is all about ways to strengthen partnerships.
The string of major cyber hacking attacks continued this week, with ManTech International reportedly being the latest company hit. What's to be done?
Going Back to the Future may no longer be just for the movies. The intelligence community has launched a new project which attempts to predict what will happen next by using crowdsourcing techniques.
Where do you get your blog and/or article ideas? I'm often asked that question. Or colleagues want to know: What are the top ten websites you turn to in order to gauge innovative technology trends?
Sometimes we come across a new word or phrase that is not only different, but intriguing. Which brings me to the topic of today's blog: What is a healthy cyber ecosystem?
Recently I decided, if you cant beat the spammers, I might as well just relax on Memorial Day Weekend and enjoy a good laugh on them.
This has been a rough week for our technology operations. The good news is that our critical Secretary of State systems are up and offices are open and helping customers.
I was recently asked: What is the next big thing in technology?
Youre never as good as you look when you're winning, and never as bad as you look when you're losing. I think that adage applies beyond sports to many aspects of life and business including the management of computer operations connected to the global Internet in 2011.
How important is social networking to leading companies right now? Very important. In some cases, it may even be the most important priority. Its time for state and local government agencies to reexamine these social networking trends and build new strategies to engage partners with social media.
What is FedRAMP? How does it help with cloud-computing environments? Can we use it here in our state? I expect these questions will be asked across America over the next few years in the halls of state and local governments.
Microsoft released the new Internet Explorer (IE) 9 this past week, and government enterprises across the world now have another important decision to make.
As Japan strives to recovers from the devastating earthquake and tsunamis, global governments are sending aid in a variety of forms.
As state leaders gather in Washington, D.C., this weekend for the 2011 National Governors Association (NGA) Winter Meeting, one topic on the agenda is cyber-security. Experts in the field will be addressing questions like: What threats in cyber-space do we now face? What are the potential ramifications of these cyber-threats? What steps can governments take now?
Egyptian democracy and high-speed Internet are not topics that typically go together, but they were both highlighted during President Obamas speech this week in Marquette, Michigan.
A quiet, but dramatic, change is well under way in rural America. Over the next two years, Broadband Internet access will become available to many parts of the United States that have been struggling with only dial-up connectivity up until now
What do think about that WikiLeaks situation? Ive been getting that question a lot lately - not only from the typical techies or security pros, but from just about everyone else.
Its that time of year when everyone seems to be recapping 2010 and making technology predictions for 2011. Here are my favorite predictions and some important trends to watch regarding government technology infrastructures for 2011.
The Federal Government has issued a cloud first policy as a part of the Office of Management and Budget s 25-point plan to reform federal information technology management. What does it mean for state and local governments?
It s not in the contract. We hear these words every day in government. The challenge is huge: To be innovative in our RFPs or Invitations to Bid (ITBs) and still be efficient.
The US Office of Management & Budget (OMB) will be implementing fundamental changes that entail structural changes in how programs are funded, staffed and managed. The plans call for a cloud-first policy which boosts the use of government cloud computing for new systems.
There are many ramifications from the state and local government election results this week, such as this article which highlights new Governors to bring big turnover of State CIOs. So what should current (or prospective) government technology professionals be doing now to prepare for 2011?
Our Michigan Digital Summit was held this past week, and the opening keynote was truly different in a fun way.
What is clear is that the battle for mobile apps is heating up, and the mobile OS space has moved up to become a core issue for CxOs over the next few years.
Day three at the NASCIO conference began with a keynote session led by Thornton May, who is an IT Futurist, Executive Director and Dean at the IT leadership Academy and Author of The New Know: Innovation Powered by Analytics.
The opening keynote by best-selling author Don Yaeger was inspiring and funny.
Microsoft released the new Internet Explorer 9 (IE 9) beta web browser this past week, and the initial reviews from technology critics and even competitors like Google are positive.
There have been quite a few headlines lately about the current challenges facing Virginia's government technology infrastructure . From this IEEE Spectrum article, to Computerworld in ...
Everyone's talking about Intel's pending acquisition of McAfee for $7.7 billion. The list of questions is long. Did they pay too much - or too little? ...
Are recent announcements of product offerings from Google, Microsoft and others going to fundamentally change government technology service delivery? Has the long ...
"We need your help to stop online thieves." This surprising message from many banks to their customer base is becoming more popular as online ...
How much email is too much? New survey results from Harris Interactive found that 50 emails a day may be the breaking point for employees. ...
Earlier this week I received an email from an out of state friend and respected colleague who I haven't heard from in a while. He ...
In a unanimous decision last week, the US Supreme Court rejected the privacy claims of an employee who was texting using employer-provided equipment. According ...
Imagine this: " A motorist still at the office can use a cell phone to remotely start his car or truck, adjust the temperature, confirm ...
Move over Second Life , a new virtual world is being created for the federal government called vGov. According to Government Computer News: "The ...
Try typing "free storage" into a Google search, and you'll get almost 47 million results. Here are a few highlights: Mozy.com offers: "2GB, Absolutely Free ...
The National Association of State CIOs (NASCIO) Midyear Conference for 2010 was held during the last week of April in Baltimore. The attendance was the ...
Since posting a blog on the Apple iPad's effect on government standards a few weeks back, I've received several questions from around the country regarding ...
There's been some tough press lately for cloud computing. Recent conferences on the topic have turned more negative as very high expectations are slow to ...
iPad fever is here! On a weekend that celebrates Easter, the NCAA Final Four and record warm temperatures over half the country, everyone seems to ...
I was jogging on my treadmill when I saw the breaking news on ABC - Moscow subway bombing just occurred. It was Monday morning, March 29, ...
In my twenty-five years as a security and technology professional, I have never seen so many hot headlines around technology issues. Whether you are ...
I read a very interesting CNET article yesterday entitled, "Why no one cares about privacy anymore." I urge you to take five ...
Microsoft is warning that the extended support phase is ending for Windows 2000 (server and client), on July 13, 2010 . In addition, other products with lapsing service ...
Many schools around the nation issue student laptops. But what activities are allowed with those laptops by students or family members? What policies apply? What ...
What's all the Buzz about? No, I'm not referring to the Olympics, an uptick in the economy or even springtime bees. Google ...
This is not your grandfather's winter games. Every Olympic city makes major investments in technology, security and infrastructure in the 21st Century, and ...
Now that Oracle's acquisition of Sun has been approved by the European Commission , what's next? That is, what does this merger mean for government technology ...
The world-wide media was full of stories this week regarding the Google situation in China. Articles ranged from the Global Implications of Google's ...
The Federal Communications Commission (FCC) Chairman Julius Genachowski has asked congressional leaders for more time to deliver the much anticipated National Broadband Plan, ...
What's around the corner for 2010? What new invention will be the next iPhone, iPod or blackberry? Are there any hot ...
As we approach a new decade in 2010, my mind instinctively goes back in time and scans the past decade. My thoughts easily jump ...
Wireless Local Area Networks (LANs) have been around for years, but how can state and local governments manage wireless networks efficiently and effectively from an ...
A funny thing happened on my way to work yesterday. Actually, the situation was pretty frustrating, and there were a few lessons learned ...
Are deeper budget cuts coming for struggling state and local governments? After a year filled with tough news regarding furlough days and more belt ...
Technology directors around the nation were watching the weekend news very closely for events regarding online sales on Black Friday (the ...
How do you give thanks at work? One USA Today headline this morning read, "The spirit of the season: Be thankful, spend less." ...
The National Association of State CIOs (NASCIO) has again polled state CIOs to determine what's hot and what's not as we head into&...
Lockheed Martin and thirteen other leading technology providers announced the formation of a new cyber security technology alliance yesterday. The announcement took place ...
The National Association of State Chief Information Officers (NASCIO) released their list of best practices at their annual conference in Austin, Texas last week. ...
The University of Michigan released a report today rating and ranking 104 federal government websites in terms of how well the satisfy citizens. The report is ...
What's the best strategy regarding upgrades to your desktop and netbook operating systems? Should governments move to Windows 7, Linux or wait for Google's ...
This past week we held the annual Michigan Digital Government Summit in Lansing. Our opening keynote was presented by Mark Allen, six ...
It was Saturday morning, October 3, 2009, and I was trying to log into my gmail (Google mail) account about 7:45 AM (EST). After typing in ...
Got any calls lately from vendors who want to share their new cloud computing strategy? I certainly have - and from some unlikely sources. ...
I just returned from a nine day trip to South Africa where I was one of the keynote speakers during&...
EMC continues to lead IBM, Dell and HP in the external disk storage systems market, but worldwide revenue declined by 18.7% from the ...
In a recent interview with Government Computer News (GCN), Federal CIO Vivek Kundra revealed some very interesting perspectives regarding the need to upgrade technology ...
The State Alliance for e-Health, which is sponsored by the National Governor's Association (NGA), has released new guidance which urges states to start planning ...
Do you ever struggle with balancing work and family time? I certainly do. Turning off a Blackberry can be hard - even on vacation. No ...
Every few weeks I visit a few of the federal government technology websites like Government Computer News or Federal Computer Week to see ...
A few times a year I feel the need to rant. This blog entry is one of those times, and the topic is dealing ...
After a revolt over cost, timelines and a host of other difficult issues, the original "Real ID" appears dead. Secretary Napolitano testified ...
As our national and local economies continue to struggle, managing a technology budget is getting increasingly difficult. There are many unknowns as we ...
The race has begun. Across America, state and local governments, private sector infrastructure providers, libraries, universities, non-profit groups, school districts and more are all ...
Over the past few weeks, I've dedicated significant time and energy to learning more about the latest trends in cloud ...
A few months ago we held a one day management offsite which included some inspiring words from the top, a great (but ...
I was sitting in the back of the auditorium inside the Michigan State University's Kellogg Center in East Lansing. The event was the Michigan ...
Are we truly at a significant crossroads in the protection of our Nation's critical infrastructure? More specifically, will the cross-sector cyber infrastructure ...
The nation's first all-digital election was deemed a success by Honolulu's city officials over the weekend. According to the Associated Press: "Some 115,000 voters in Honolulu's ...
There have been quite a few articles about insourcing over the past few months. As expected, this buzz has sparked another debate about ...
To buy or not to buy (more telework capacity) - that is the question during an epidemic. As the H1N1 flu situation evolved rapidly ...
Government Technology Magazine hosted an invitation only CTO Summit for government CIOs and CTOs on April 14-15. This year's focus was "Data ...