IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
Dan Lohrman

Dan Lohrmann

Contributing Writer

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.

During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.

Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 – August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. He works with cybersecurity technology companies to provide insights and long-term strategic support. Dan is a Senior Fellow with the Center for Digital Government and a contributor to Government Technology magazine. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and non-profit institutions.

Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a U.S./UK military facility. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow.

Dan currently serves as Field CISO for the public sector at Presidio. He is the co-author of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions, published by Wiley in November, 2021. He is also the author of two earlier books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work.

Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

Follow Dan on Twitter at: @govcso

Dan’s award-winning blog: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/

  • The recent round of global terrorist attacks have reignited the homeland security versus personal privacy debate. Law enforcement officials point to the apparent use of encryption by ISIS terrorists as proof that encrypted communications need “back doors” to protect the public. But many security experts disagree. So what is the future for encrypted communication as we head into 2016?
  • Advanced cyberthreats, zero-day exploits, sophisticated malware, ransomware and more. These are just a few of the daily challenges that enterprises face as they try to protect their network endpoints each and every day. How can it be done? Enter next-generation endpoint security products and services. Here’s an overview.
  • Where is Florida heading regarding cybersecurity in government? What are the top priorities and hot projects? Hear what the Florida state CIO and CISO have to say in this exclusive interview.
  • Emerging cyberthreats are a hot topic at cybersecurity summits, in executive boardrooms and remain a top priority with back-office security teams. Here's what you need to know about where we've been, where we are and where online security threats are going.
  • From smart drones to smart homes to smart cars that drive themselves, the world is dramatically changing all around us. So are governments ready to take advantage of these new innovative opportunities emerging within the Internet of Things (IoT)? Or, as almost everything gets connected to the Internet, could these newly connected devices become “Trojan Horses” that inadvertently bring the next generation of data breaches? What’s being done globally in the public sector with IoT right now?
  • The National Association of State Chief Information Officers (NASCIO) held its annual conference in Salt Lake City, Utah, this past week. So what were the highlights? From the Internet of Things (IoT) to cloud computing to data center consolidation, which projects, technologies and issues rose to the top of the agenda? Most important, what’s on the minds of government CIOs, and what projects are they actually implementing as we move into 2016?
  • It is October, so National Cybersecurity Awareness Month (NCAM) is front and center from sea to shining sea. But attention on information security, along with events and helpful publications, have evolved over the years. It’s time to take another look at the new resources along with helpful tools and relationships that can last long after your Halloween candy runs out.
  • North Carolina Gov. Pat McCrory just established the new Department of Information Technology as the single source of accountability and authority over state government technology projects. State CIO Chris Estes will lead the consolidation effort, along with executive support from his leadership team, including Chief Information Risk Officer Maria Thompson. So who are these leaders? What are their plans and priorities? Where are they heading regarding information security? These are just a few of the questions answered in this exclusive interview.
  • A new 'understanding' on cybersecurity was announced this past week during Chinese President Xi Jinping's formal state visit. But while this agreement certainly offers a positive step forward for security in cyberspace, many questions remain unanswered.
  • Elected officials often fail to prioritize cybersecurity until after a data breach when it's too late. So what are the important security issues and actions that are needed by state and local elected officials right now? A new guide by Governing magazine and CGI was just released to answer that question.