Writing
Posts on leadership, cybersecurity, and AI governance from the CISO seat at the National Football League.
BYOD
Think twice before bringing your own device (BYOD) to work! While it may be convenient, using personal devices for work-related tasks can pose security risks.
Hardware Security
When disposing of old electronic devices, remember to securely wipe any data stored on them and physically destroy the hard drives or storage media to prevent potential data…
Browser Extensions
Be mindful of the browser extensions you install, as they can pose potential security risks.
Ephemeral Messaging
Consider using ephemeral messaging apps that automatically delete messages after a short period of time.
This month we have Macy Dennis joining us for a conversation.
Co-hosts: Katie Hanahan, Lisa Beth Lentini Walker, Russell Eubanks, Vijay Bala, David Cass, Hussein Syed, Anil Varghese, Stephen Garcia, and Tomás Maldonado Prior shows:…
Beware of ‘tailgating’. (Not the kind done at Football games, those are fun!)
When entering a secure facility, don't hold the door open for someone who isn't authorized to enter.
File Extensions & security
Did you know that changing the file extension of a file can make it appear as a different file type? For example, you can change a .txt file to a .
Data hygiene
Keep your device clean, just like your teeth! Regularly delete unnecessary files, temporary files, and cached data. It's like brushing away the digital plaque
Account Security
Did you know that one of the easiest ways to protect your online accounts is by using a unique and obscure username? Most people use common usernames that can be easily guessed or…
Wifi Security
Have you heard of the "Evil Twin" attack? It's a type of wireless attack where cybercriminals create a fake Wi-Fi access point with a name similar to a legitimate one in order to…