Corporate Leadership Series: The Vocabulary of IT and Information Security

By Phil Schenkenberg and Scot Ganow, Taft LawSeptember 17, 2020 A key partner for any security leader is the in-house legal team at your organization. Together, you have to make important decisions as your company evaluates and manages cyber risk and prepares for and responds to data-related incidents. The relationship often requires navigating a knowledge […]

Read more

Healthcare cybersecurity: Lessons learned from the 2020 pandemic

By Anita Finnegan, CEO, Nova LeahSeptember 14, 2020 What have we learned from the 2020 pandemic? We know that in an instant, life as we know it can be swiped away from under our feet. We’ve learned to stay at home and distance ourselves from everyone including friends and family. Many of us have learned […]

Read more

Ripples to Waves: Managing Cybersecurity within the Growing Convergence of IT / OT / IoT

By Paul Veeneman, VP of Operations, MBA EngineeringSeptember 15, 2020 The convergence of Operations Technology (OT), Information Technology (IT), Internet of Things (IoT), and Industrial IoT has brought with it a wave of connected devices, systems and applications that present significant cybersecurity challenges. In the coming years, these changes will have an impact on the […]

Read more

Current Challenges and Future Opportunities to Better Secure Medical Devices

By Ken Hoyme and Judy HatchettCo-Chairs, Oct. 26 Healthcare and Med Device SeminarSeptember 14, 2020 There are several fundamental characteristics of medical devices that make them a unique challenge for security practitioners. One is the long lifecycle that these systems typically have – sometimes as long as 10 or 15 years. Imagine if you were […]

Read more

Election Security: A Case Study in Cybersecurity and Public Trust

By Sean S. CostiganAugust 17, 2020 If you are a local government election official, a vendor of electronic voting machines, an intelligence analyst, a cybersecurity expert working for a social media company, someone holding high office, or simply a voter, you are invested in election security.  You may even hold strong, expert opinions on aspects […]

Read more

Cyber Election Meddling – Is Virtual Disenfranchisement the Next Normal?

By Mark RitchieJuly 23, 2020 Last year I was sworn in as Civilian Aide to the Secretary of the Army, pledging to “support and defend the Constitution of the United States against all enemies, foreign and domestic.” During that solemn moment of the swearing in ceremony I thought about my former role as the State […]

Read more

With Expanded Focus on International Cooperation, Minnesota’s Cyber Security Summit is “Unapologetically Ambitious”

By Anne C. Bader, Founder, The International Cybersecurity Dialogue August 17, 2020 A few years ago, I met Eileen Manning, producer of the annual Cyber Security Summit (CSS) in Minneapolis, while attending a security event in Washington D.C.  I was there as Founder of The International Cybersecurity Dialogue (ICD), whose mission is to promote dialogue […]

Read more

You Read the Privacy Policy, Right? Sure You Did. A New Federal Bill Seeks to Address the Transparency Gap.

By Brett Hebert on August 5, 2020 Posted in FTC, Privacy Policy Thank you, reader, for taking time out of your day to read this blog post. I trust before clicking on this link you first sought out our website’s Privacy Policy and reviewed it in full, took mental notes while silently nodding throughout, and finished with an audible […]

Read more

Keeping teams engaged during remote work environment

By Betty Elliott, Partner and Chief Information Security Officer, MercerJuly 14, 2020 In this time of change and uncertainty, it’s very important to stay connected to your teams.  My team and I already were a remote team before the pandemic but I still felt it was necessary to take extra steps to ensure the safety […]

Read more

What if We Use a Collective Framework to Measure Individual Success

By Loren Dealy Mahler, President, Dealy Mahler StrategiesJuly 13, 2020 When we measure individual success in the cybersecurity industry, we most often look towards metrics that can best be described as “on paper” achievements. We evaluate whether someone has the requisite security certificates, a sufficiently lengthy resume to prove years of practice and time spent […]

Read more

Navigating New Terrain, Together

By Tina Meeker, Sr. Director of Information Security, Sleep Number; Vice President – Minnesota WiCyS AffiliateJuly 13, 2020 As an industry, we are all acutely aware of how important it is to identify, foster and promote new and existing talent (from ALL backgrounds) in the ever-evolving cybersecurity field.  Our industry is much too monolithic today […]

Read more