Winn Schwartau

Last updated
Winn Schwartau
GD Winn Library leaning 2MB Small.jpg
Winn in his library
Born (1952-07-01) July 1, 1952 (age 71)
New York City
Occupation(s) Computer security Writer, Theoretician
Website Schwartau's personal website

Winn Schwartau (born July 1, 1952) is a computer security analyst who focuses on internet security, internet privacy, infowar, cyber-terrorism and related topics.

Contents

Schwartau coined the term "Electronic Pearl Harbor" while testifying before Congress in 1991,. [1] Schwartau has published several books.

In 2002, Schwartau was honored as a “Power Thinker” and one of the 50 most powerful people in networking by Network World. [2] In 2008, he was voted one of the 25 Most Influential People in the Security Industry by Security Magazine. [2]

Early life

Winn is the son of audio engineer and producer Bill Schwartau and Mary Caroline Bell, the first female audio engineer at NBC during World War II. At 16, he began his professional audio-video career and worked at studios including Mirasound Studios in New York, A&R Recording with Phil Ramone, The Hit Factory, Electric Lady Studios. He engineered 96 live concert broadcasts from The Lone Star Cafe 1978-1981.

Written work

His 1991 cyber-terrorism book, Terminal Compromise, outlines a cyber-terrorist attack on the U.S. using 1980s technology. It was updated in 2001 to Pearl Harbor Dot Com.

His first non-fiction book, Information Warfare: Chaos on the Electronic Superhighway (1994, 1996, 1997) discusses cyberterrorism and cyberwar with governments and the private sector. [3] Cybershock (2000, 2001) is a non-technical look at hackers, information warriors, hacking technologies, and offensive cyber capabilities. [4] In Time Based Security, Schwartau added math and outlines the principles of using time as a prime security metric. [5]

As a parent of children growing up with technology, he wrote Internet and Computer Ethics for Kids (and Parents and Teachers Without a Clue) (2001/2002). [6] Dr. Fred Cohen, from all.net, described this book as "the best security book ever written". [7]

His latest work, Analogue Network Security, formalized the mathematics and principles of creating provably secure cyber and physical environments. In February 2021, it was named "the Best CyberSecurity Book of all Time" by Cyber Defense Magazine. [8]

Entrepreneurial career

Schwartau has said that he wants the United States to put more emphasis on computer security. He recalled in 1996 that some of his ideas were not taken seriously despite what he believed to be demonstrable threats. [9]

In 2001, Winn was labeled one of the Network World major "Power Thinkers". [10] In 2007, SC Magazine labeled him one of the Top 5 Security Thinkers. [11]

SC Magazine called him the "civilian architect of information warfare", [12] and Security Magazine identified him as one of the 25 most influential people in the security industry. [13]

Schwartau was the Chairman of the Board of Mobile Active Defense, specializing in security and compliance for smartphones and tablets, [14] and was president and founder of The Security Awareness Company (formerly known as Interpact, Inc. sold to KnowBe4 in 2017), [15] which develops security awareness programs for private and public organisations.

Currently, Schwartau is the Chief Visionary Officer for SAC Labs, a division of KnowBe4. He also founded InfowarCon (1994) [16] and Trusted Learning (2003), [17] and co-founded SCIPP International (2007) [18]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">Information warfare</span> Battlespace use and management of information and communication technology

Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism. Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

<span class="mw-page-title-main">Dorothy E. Denning</span> American information security researcher

Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

Brian Krebs is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals. Krebs is the author of a daily blog, KrebsOnSecurity.com, covering computer security and cybercrime. From 1995 to 2009, Krebs was a reporter for The Washington Post and covered tech policy, privacy and computer security as well as authoring the Security Fix blog.

<span class="mw-page-title-main">Jeff Moss (hacker)</span> American computer security expert (born 1975)

Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

<span class="mw-page-title-main">Howard Schmidt</span> American computer security expert (1949 - 2017)

Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.

The EINSTEIN System is a network intrusion detection and prevention system that monitors the networks of US federal government departments and agencies. The system is developed and managed by the Cybersecurity and Infrastructure Security Agency in the United States Department of Homeland Security (DHS).

Proactive cyber defense, means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence.

Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and power projection thanks to comparatively advanced technology and a large military budget. Cyber warfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.

<span class="mw-page-title-main">Military-digital complex</span> Link between militaries and cyberwarfare

The military-digital complex (MDC) is the militarization of cyber operations by governments and corporations, often through monetary relationships between computer programmers in private companies and the military to combat the threat of cyber terrorism and warfare. Cyber operations since 2000 have increased dramatically, with the recent branch of the US Strategic Command the United States Cyber Command. Cyber operations has been defined by the Washington Post as,

<span class="mw-page-title-main">DB Networks</span>

DB Networks is a privately held Information Security company founded in the United States The company is headquartered in San Diego, California, and its regional offices are located in Palo Alto, California and Seattle, Washington.

Mark Weatherford is an American cybersecurity professional who has held a variety of executive level positions in both the public and private sectors. He was appointed as the first deputy under secretary for cybersecurity at the US Department of Homeland Security from 2011 to 2013. He is currently the Global Information Security Strategist for Booking Holdings.

Phil Agcaoili is a technologist, entrepreneur, and cyber security, information security, and privacy expert.

<span class="mw-page-title-main">Iftach Ian Amit</span> Israeli Hacker

Iftach Ian Amit is an Israeli Hacker/computer security researcher and practitioner. He is one of the co-founders of the Tel Aviv DEF CON Group DC9723, the Penetration Testing Execution Standard, and presented at hacker conventions such as DEF CON, Black Hat, BlueHat, RSA Conference. He has been named SC Magazine's top experts and featured at Narratively's cover piece on Attack of the Superhackers and is frequently quoted and interviewed

Corporate warfare is a form of information warfare in which attacks on companies by other companies take place. Such warfare may be part of economic warfare and cyberwarfare; but can involve espionage, 'dirty' PR tactics, or physical theft. The intention is largely to destabilise or sink the value of the opposing company for financial gain, or to steal trade secrets from them.

<span class="mw-page-title-main">RSA Conference</span> Annual cryptography convention

The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991 as a small cryptography conference. RSA conferences take place in the United States, Europe, Asia, and the United Arab Emirates each year. The conference also hosts educational, professional networking, and awards programs.

Caroline Wong is an American chief cybersecurity leader who has worked to advance software security programs and promote the mission, vision, and values D&I in cybersecurity. Throughout her career, Wong has been working to "boost the number of women in the field" and advocate for workplace equality. She regularly speaks at industry events and in publications such as The Washington Post and CBS News, and publishes editorial articles on topics such as DevSecOps alignment, infosec best practices, diversity in cybersecurity, and women in tech.

Cybersecurity in popular culture examines the various ways in which the themes and concepts related to cybersecurity have been portrayed and explored in different forms of popular culture, such as music, movies, television shows, and literature. As the digital age continues to expand and the importance of protecting computer systems, networks, and digital information grows, the awareness and understanding of cybersecurity have increasingly become a part of mainstream culture. Popular culture often portraits the gloomy underworld of cybersecurity, where unconventional tactics are used to combat a diverse range of threats to individuals, businesses, and governments. The integration of dark and mysterious elements into cybersecurity stories helps create a sense of uncertainty, rule-breaking, and intriguing ambiguity. This captures the public's attention and highlights the high stakes involved in the ongoing struggle to protect our digital world. This article highlights the creative works and cultural phenomena that have brought cybersecurity issues to the forefront, reflecting society's evolving relationship with technology, privacy, and digital security.

References

  1. Trigaux, Robert (1998-06-15). "Computer Security's Rock 'N' Roll Pioneer". Tampa Bay Times. Retrieved 2019-08-23.
  2. 1 2 "Winn Schwartau, author, chairman at Mobile Active Defense". SC Media. 2012-01-18. Retrieved 2019-08-23.
  3. "Information Warfare: Chaos on the Electronic Superhighway". Publishers Weekly . Retrieved August 9, 2021.
  4. Radcliff, Deb (November 13, 2000). "Should You Strike Back?". Computerworld . Retrieved August 8, 2021.
  5. Winn Schwartau (Author) (1999). Time Based Security. ISBN   0962870048.{{cite book}}: |author= has generic name (help)
  6. Schwartau, Winn (2001). Internet Ethics For Kids. ISBN   0962870056.
  7. "The Security Awareness Company Biography: Winn Schwartau" (PDF). Archived from the original (PDF) on 2005-05-27. Retrieved September 10, 2016., retrieved 2009-01-05
  8. "Top 100 Cybersecurity Books". 15 February 2021.
  9. Venzke, Ben (1996). "Information Warrior". Wired . Retrieved August 8, 2021.
  10. Network World Archived December 1, 2008, at the Wayback Machine
  11. "SC Magazine". Scmagazineus.com. 2007-12-01. Retrieved 2014-07-17.
  12. "Industry Pioneers". Scmagazineus.com. 2009-11-06. Retrieved 2014-07-17.
  13. "Security Magazine". Security Magazine. 2008-12-01. Retrieved 2014-07-17.
  14. Mobile Active Defense Archived October 26, 2010, at the Wayback Machine
  15. "The Security Awareness Company". The Security Awareness Company. Retrieved 2014-07-17.
  16. infowarcon.com
  17. "Trusted Learning". Trusted Learning. Retrieved 2014-07-17.
  18. [ dead link ]
  19. "Find a Fellow - RSA".
  20. url=https://www.ponemon.org/fellows/winn-schwartau.html
  21. "ISSA International Awards Winners".
  22. "Cybersecurity: Top 100 Influencers at RSA Conference 2019". 14 March 2019.

Commons-logo.svg Media related to Winn Schwartau at Wikimedia Commons