Dan Lohrman

Dan Lohrmann

Contributing Writer

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.

During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.

Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 – August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.

Dan currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor, Inc. Lohrmann is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and non-profit institutions.

Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US / UK military facility.

Lohrmann is the author of two books - Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow.

Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

Follow Dan on Twitter at: @govcso

Dan’s award-winning blog: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/

After the recent ransomware attacks against Colonial Pipeline, JBS and others, there are new calls for the U.S. to hack back against cyber criminals and hold nation-states responsible. So what now?   
Maria Thompson’s last day as North Carolina’s chief risk officer was June 4, 2021. In this interview, she shares her team’s cyber journey, along with helpful insights for others to benefit from.  
The Department of Homeland Security is mandating that pipeline companies report cyber breaches to federal authorities within 12 hours of an incident, and the list of organizations who must do the same will likely grow.
Artificial intelligence is slowly transforming many areas of life — and fast — but we all need to pay attention. Reactions are all over the map, and AI will be used for both good and evil.  
America finally woke up to the reality that we have a ransomware emergency worthy of real attention. How did events unfold and what will happen next?  
The Biden administration has proposed a bold new infrastructure plan that includes road, bridges, airports, broadband, people and more. What’s in the plan — and what’s next?
What is the future of passwords? More urgently, how are you doing with using (or reusing) passwords now? Here are some helpful tips ahead of World Password Day on May 6.
As we emerge from the worst pandemic in a century, many public- and private-sector employees and employers are reassessing their options within technology and cybersecurity roles.
Keith Tresh, currently the chief information security officer in Idaho, offers tips from his wealth of experience in government leadership within federal, state and local governments.
Georgia CTO Steve Nichols and CISO David Allen discuss what’s new and what’s coming soon at the Georgia Cyber Center, a global resource for cybersecurity training, leadership and more.
The National Institute of Standards and Technology (NIST) has released draft guidelines to help local election officials prepare for and respond to cyber threats that could affect elections.
State auditors and chief information security officers should work together to identify gaps in government IT systems and strengthen the state's overall cybersecurity posture.
What are the pros and cons of free technology and cybersecurity product training? How far should vendors go to make sure your staff become experts?
The whole world is talking about COVID-19 vaccines, and the travel and hospitality industries are abuzz over potential vaccine passports. But people, process and technology questions abound.
In the past 90 days, the world has witnessed a serious escalation in cyberattacks. Some experts are still predicting that the worst is yet to come. Are we prepared?
In this exclusive interview, Mike Davis, CISO for alliantgroup, offers practical ways to assess, mitigate and manage cybersecurity risks in your organization — even on a tight budget.
In both public and private organizations, chief information security officers have shorter tenures than CIOs. Why do cybersecurity heads so quickly leave jobs — or get forced out?
Eric S. Green is an industry thought leader who serves as the head of mobile security for HSBC Bank. In this interview, Eric shares insights from his cybersecurity career.
The use of QR codes is growing as a convenient input mechanism to make mobile transactions more efficient. But Qshing, or QR code abuse, is also a growing cyberthreat.
Following the passage of his stimulus plan in the U.S. Senate last week, President Biden is next expected to unveil how he will improve America’s infrastructure, including transit, innovation and energy.
The new book “Senior Cyber: Best Security Practices for Your Golden Years” by Scott N. Schober offers a timely resource for anyone, especially seniors, who wants an easy, fun read that helps safely manage online life.
As the COVID-19 pandemic grabbed 2020 headlines, the list of data breaches in government and the private sector quietly grew. And then came SolarWinds. What’s next?
After an unprecedented level of unemployment insurance fraud hit states in 2020, new details are emerging on the severity of the ongoing threat in 2021.
What were the top government security blog posts in 2020? The metrics tell us what cybersecurity and technology infrastructure topics were most popular in the past year.
Colorado State Government CISO Deborah (Debbi) Blyth is widely recognized as an innovator among government cybersecurity leaders. Here, she discusses her past accomplishments, COVID-19 challenges and Colorado’s future security plans.
The new decade offers more challenges for cybersecurity leaders than ever, from tracking evolving threats to navigating budget constraints. Keep these best practices in mind for effective security management.
Amid the COVID-19 pandemic, new ideas are springing up around the globe to help marginalized communities. Teenspire Global Mission is a new model with innovative ways young people can make a difference.
As we recover from the worst pandemic in a century, what will the New Year bring in cyberspace? Here’s your annual roundup of security industry forecasts, trends, themes and cybersecurity predictions.
2020 will be remembered as a uniquely disruptive year — but not just for a global health crisis. Online life was digitally transformed, as exponential change accelerated at home and work via cyberspace.
Now that the U.S. Senate has passed the IoT Cybersecurity Improvement Act by unanimous consent, the stage is set for new regulation on securing Internet of Things devices and protecting essential infrastructure.