Writing
Posts on leadership, cybersecurity, and AI governance from the CISO seat at the National Football League.
free mentoring!
Want to learn how to get into cyber? Join this evenings Fireside Chat with Joshua Selfe to learn how he went from the #Army to Microsoft ! ! As Russell Eubanks always says, get…
Home networking
Don't have IOT devices or a need to connect to your home network remotely while you're out of town? Turn off your internet router when traveling.
Profile settings
You're aware that you don't have to input your correct DOB or mothers maiden name on your social media or other non-relevant type accounts right? Make it harder for the cyber…
Device Encryption
Encrypting your devices is an important step in protecting your data from unauthorized access.
Application Security
When using applications on your device, ensure that they are updated regularly to ensure they are running the latest security patches.
Cyber Insurance
Cyber insurance can provide coverage for a range of losses, including loss of income, data recovery costs, and legal expenses.
Sandboxing system
A sandboxing system can help you to test suspicious files and applications in a safe environment.
Don’t be the Weakest Link
When it comes to cybersecurity, you don't want to be the weakest link in the chain. Be sure to follow your organization's security policies and best practices, and don't be the…
I’m often asked what it’s like to secure the NFL Draft and my response is simple, Draft a great team!
Special thanks to the local cyber teams at KCPD, Federal Bureau of Investigation (FBI), Jen Easterly’s local KC’s Cybersecurity and Infrastructure Security Agency team, Marriott,…
E-Vites
Be wary of e-vites from unknown sources! Cyber criminals may use fake e-vites, especially during holiday seasons or special events, to trick you into clicking on malicious links…