Johns Hopkins University - Business
부학장 & 미래기술 학과장 우송대학교 Vice Dean & Technology Studies Department Chair, ECIS
Dr. J.R.
Reagan 부학장
Korea
부학장 & 미래기술 학과장 우송대학교 Endicott 국제대학
Dr. Reagan is Vice Dean at Endicott College of International Studies (Woosong University). As the Vice Dean, Dr. Reagan establishes the vision, mission, development strategy and plans for Endicott College of International Studies. In addition, he is responsible for establishing reciprocal global campuses with partner universities and developing alliance programs with global companies and institutions. He also serves as advisor to startups including cybersecurity, innovation and big data.
He previously served as Global Chief Information Security Officer (CISO) of Deloitte with revenue of $34B, over 210,000 employees and operating in more than 150 countries.
In addition to his role at Woosong University, he taught at Johns Hopkins University (Carey Business School), Cornell University (Johnson Graduate School of Management) and Columbia University (Graduate Studies Mentor). He holds a Doctorate in Organizational Leadership from Shenandoah University and has been a guest lecturer on Innovation, Cybersecurity, Analytics and Marketing at Harvard, Wharton, Georgetown, Notre Dame, Northwestern, American and Southern Methodist Universities.
#CSO #cybersecurity #bigdata #startup #vc #innovation #highereducation
BA
Sociology
Advanced Negotiation Certificate
Harvard Negotiation Institute
Graduate Certificate
Advanced International Affairs
Certificate
Advanced Korean Studies Program (KSP)
MS
Management Information Systems
Doctor of Professional Studies (DProf)
Organizational Leadership & Innovation
Certificate, AACSB PQ Bridge Program
Graduate Studies Mentor (Technology Management) 교수
http://ce.columbia.edu/technology-management/mentors/jr-reagan
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
From autonomous cars to cybersecurity, technology is only as perfect as the human interacting with it.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
From autonomous cars to cybersecurity, technology is only as perfect as the human interacting with it.
FedScoop
Organizations should consider how the idea of workplace safety has evolved if they want strategies for baking cybersecurity into their culture.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
From autonomous cars to cybersecurity, technology is only as perfect as the human interacting with it.
FedScoop
Organizations should consider how the idea of workplace safety has evolved if they want strategies for baking cybersecurity into their culture.
FedScoop
A once-not-so-reliable phone company set the standard for "five nines" service. Perhaps it's time to ask how cybersecurity might achieve the same standard.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
From autonomous cars to cybersecurity, technology is only as perfect as the human interacting with it.
FedScoop
Organizations should consider how the idea of workplace safety has evolved if they want strategies for baking cybersecurity into their culture.
FedScoop
A once-not-so-reliable phone company set the standard for "five nines" service. Perhaps it's time to ask how cybersecurity might achieve the same standard.
FedScoop
Rising chief information security officers, like CIOs before them, need to start thinking like business people.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
From autonomous cars to cybersecurity, technology is only as perfect as the human interacting with it.
FedScoop
Organizations should consider how the idea of workplace safety has evolved if they want strategies for baking cybersecurity into their culture.
FedScoop
A once-not-so-reliable phone company set the standard for "five nines" service. Perhaps it's time to ask how cybersecurity might achieve the same standard.
FedScoop
Rising chief information security officers, like CIOs before them, need to start thinking like business people.
WSJ
Just as the safety of self-driving vehicles hinges on human drivers following the rules of the road, the effectiveness of many corporate cyber security measures depends on employees exercising due care when carrying them out.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
From autonomous cars to cybersecurity, technology is only as perfect as the human interacting with it.
FedScoop
Organizations should consider how the idea of workplace safety has evolved if they want strategies for baking cybersecurity into their culture.
FedScoop
A once-not-so-reliable phone company set the standard for "five nines" service. Perhaps it's time to ask how cybersecurity might achieve the same standard.
FedScoop
Rising chief information security officers, like CIOs before them, need to start thinking like business people.
WSJ
Just as the safety of self-driving vehicles hinges on human drivers following the rules of the road, the effectiveness of many corporate cyber security measures depends on employees exercising due care when carrying them out.
FedScoop
In the digital era, it's important not only for companies but also individuals to innovate. Fortunately, developing an innovator's mindset is a learnable skill.
FedScoop
The Internet of Things could turn commonplace objects into data collectors that allow us to examine our lives in minute detail.
RSA
If you corporate privacy people think you have it tough, pity your peers in the government sector. A panel of experts told attendees at the RSA Conference Wednesday that the government agencies we should trust most with our data are not only overwhelmed, they're also severely handicapped in their efforts to keep that data safe. And that's a crying shame, given what government could be accomplishing with that data.
SecurityLedger
Plagued by cyber criminal and state actors and under scrutiny by privacy and civil rights advocates, the near future does not look bright for Federal, state and local government IT.
FedScoop
Our every keystroke adds another byte to the data pool, revealing more about who we are, and doubling the world's data every 18 months.
Locked Down Episode 16
Podcast
SecurityCurrent
People love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s a convergence of technologies? How will we then secure our networks and data?
FedScoop
Cell phones as "pass phones," Internet of Things in the workplace and a shift from rigid to resilient are among the developments to watch
TechWire
As one of the largest collectors of personal data, government is in the unique position to both use and lose valuable constituent information. An expert panel took to the issue to at the 2016 RSA Conference the morning of Wednesday, March 2, discussing the risks and necessary next steps in this space.
Forbes
Being “social” isn’t just about Tweeting and putting up pictures on Instagram. In fact being social is crucial for your success both inside and outside of the organization. To explore why this is the case, my guest this week for The Future of Work Podcast is Dr. J.R. Reagan, the Global Chief Information Security Officer at Deloitte. Now typically when you hear about being social you don’t hear the top security executive at a large global company advocating for it which is what makes this episode especially interesting.
CSOonline
We will discuss cybersecurity reliability, authentication after the mobile phone, EU General Data Protection Regulation, the role of the CISO and systems could protect users from themselves.
WSJ
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature
FedScoop
Biomimicry is catching on in the cybersecurity field, as engineers seek to protect data and thwart cybercrime using mechanisms found in nature.
WashingtonExec
“You are what you eat,” goes the saying, long accepted as true. In the Age of Technology, the adage may need an update. As the Internet of Things and its cousin, self-quantification, provide us with new ways to consider who, and how, we are, an equally valid claim might be, “You are what you own.”
FedScoop
From autonomous cars to cybersecurity, technology is only as perfect as the human interacting with it.
FedScoop
Organizations should consider how the idea of workplace safety has evolved if they want strategies for baking cybersecurity into their culture.
FedScoop
A once-not-so-reliable phone company set the standard for "five nines" service. Perhaps it's time to ask how cybersecurity might achieve the same standard.
FedScoop
Rising chief information security officers, like CIOs before them, need to start thinking like business people.
WSJ
Just as the safety of self-driving vehicles hinges on human drivers following the rules of the road, the effectiveness of many corporate cyber security measures depends on employees exercising due care when carrying them out.
FedScoop
In the digital era, it's important not only for companies but also individuals to innovate. Fortunately, developing an innovator's mindset is a learnable skill.
FedScoop
If we can use digital tethers to track goods, pets and people, why can't we do the same with data?