IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
Dan Lohrman

Dan Lohrmann

Contributing Writer

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.

During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.

Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 – August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.

Dan currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor, Inc. Lohrmann is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and non-profit institutions.

Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US / UK military facility.

Lohrmann is the author of two books - Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow.

Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

Follow Dan on Twitter at: @govcso

Dan’s award-winning blog: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/

For decades, NASCIO has provided best practices for governments to learn from. This year is no different, and three finalists offer lessons for all public-sector agencies.
Using software bots has become commonplace in many workplaces around the world, but with worker shortages, will robots start filling more roles soon?
For more than a decade there have been calls to merge physical and cybersecurity in global organizations. Is this the right time? What are the benefits?
From cryptocurrency thefts to hacking bank accounts, SIM swapping is a growing threat online. Here are relevant definitions, real-world examples and tips to help stop cyber criminals.
The desperate images coming out of Afghanistan following the Taliban’s takeover last weekend underline the importance of technology and the real-life impacts when planning goes well — or not so well.  
Email tips abound, but lasting email etiquette is severely lacking at home and work in 2021.
Exponential increases in global cyber crime. Ransomware crippling governments and businesses. Nations ignoring cyber criminals operating on their soil. The time for international cooperation on cybersecurity is now.  
A new presidential directive announced that performance standards will be released for critical infrastructure operated by the public sector and private companies to bolster national cybersecurity.
Vincent Hoang became the CISO in Hawaii in 2016. In this interview, Vince shares his journey and cyber priorities in protecting the Aloha State, particularly among the challenges presented by COVID-19.
A zero-trust environment may suggest a hardened cybersecurity posture, but it’s important to keep the approach in check. Some definitions that go beyond questioning trust in data may be impractical.
Global leaders want to carve out specific areas of critical infrastructure to be protected under international agreements from cyber attacks. But where does that leave others?
With a red-hot job market and great career prospects, more and more people want to know what they have to do to get a cybersecurity job — or better yet a career.
Guy Perelmuter offers an insightful, easy to read, helpful guide to present and future technology in business areas ranging from the future of jobs to AI and from cryptocurrencies to quantum computing.    
The North Atlantic Treaty Organization (NATO) opened the door for cyber attacks to trigger “Article 5” actions. This is a big deal — here’s why.
After the recent ransomware attacks against Colonial Pipeline, JBS and others, there are new calls for the U.S. to hack back against cyber criminals and hold nation-states responsible. So what now?   
Maria Thompson’s last day as North Carolina’s chief risk officer was June 4, 2021. In this interview, she shares her team’s cyber journey, along with helpful insights for others to benefit from.  
The Department of Homeland Security is mandating that pipeline companies report cyber breaches to federal authorities within 12 hours of an incident, and the list of organizations who must do the same will likely grow.
Artificial intelligence is slowly transforming many areas of life — and fast — but we all need to pay attention. Reactions are all over the map, and AI will be used for both good and evil.  
America finally woke up to the reality that we have a ransomware emergency worthy of real attention. How did events unfold and what will happen next?  
The Biden administration has proposed a bold new infrastructure plan that includes road, bridges, airports, broadband, people and more. What’s in the plan — and what’s next?
What is the future of passwords? More urgently, how are you doing with using (or reusing) passwords now? Here are some helpful tips ahead of World Password Day on May 6.
As we emerge from the worst pandemic in a century, many public- and private-sector employees and employers are reassessing their options within technology and cybersecurity roles.
Keith Tresh, currently the chief information security officer in Idaho, offers tips from his wealth of experience in government leadership within federal, state and local governments.
Georgia CTO Steve Nichols and CISO David Allen discuss what’s new and what’s coming soon at the Georgia Cyber Center, a global resource for cybersecurity training, leadership and more.
The National Institute of Standards and Technology (NIST) has released draft guidelines to help local election officials prepare for and respond to cyber threats that could affect elections.
State auditors and chief information security officers should work together to identify gaps in government IT systems and strengthen the state's overall cybersecurity posture.
What are the pros and cons of free technology and cybersecurity product training? How far should vendors go to make sure your staff become experts?
The whole world is talking about COVID-19 vaccines, and the travel and hospitality industries are abuzz over potential vaccine passports. But people, process and technology questions abound.
In the past 90 days, the world has witnessed a serious escalation in cyberattacks. Some experts are still predicting that the worst is yet to come. Are we prepared?
In this exclusive interview, Mike Davis, CISO for alliantgroup, offers practical ways to assess, mitigate and manage cybersecurity risks in your organization — even on a tight budget.