A major contributor to this article appears to have a close connection with its subject.(August 2017) |
Eric Vanderburg | |
---|---|
Born | Parma, Ohio, U.S. |
Citizenship | American |
Alma mater | University of Fairfax Kent State University |
Occupation(s) | Author, Business Leader TCDI |
Known for | storage networking, security |
Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio. [1] [2]
Vanderburg is Vice President of Cybersecurity at TCDI [3] and an author and speaker on information security. He has been interviewed on TV [4] and radio [5] to discuss information security and he presents and conferences and seminars [6] [7] [8] and has participated in panels on information security. [9]
Vanderburg attended Kent State University earning both a bachelor of Science in Technology and a Masters in Business Administration. [10] He also has a Master of Business Administration (MBA), and pursued a doctorate in information assurance. [11]
Vanderburg has been interested in technology from an early age, often reading through computer manuals in his library, thus allowing himself to learn "some basics of programming". [12] After spending some time with hackers and "Internet deviants" in the early 1990s, he managed to turn his interest in IT security into a career, and since the late 1990s his interest has primarily been that of cybersecurity within the business world. [12] [11] He has also spoken about the development of DevOps in the business world. [13] [14] [15] [16]
Vanderburg founded Independent Systems Consulting, [17] an IT consulting firm, in 1997, [18] which he ran for almost ten years. He then joined Jurinnov in 2006 where he directed IT, digital forensics, and cybersecurity consulting teams. [18] [19] [20] [21] In 2009, he built a network operations center at Jurinnov's headquarters to monitor data center operations and to perform transaction monitoring of key business and client systems. [22] In 2016, Vanderburg became Vice President of Cybersecurity at TCDI [3] when TCDI acquired Jurinnov. He is also a TechMin Network board member. [23]
Vanderburg was involved with Hitachi Data Systems in testing their Essential NAS product [24] which he compared to the Netapp FAS3000 NAS [25] [26] and he partnered with Lateral Data in using their Viewpoint eDiscovery tool to perform large-scale litigation document review. [27] He worked with Venio on their litigation review tool with early case assessment (ECA), [28] and has worked with companies including Dell, Carbonite, BitDefender, Microsoft and AT&T. [11]
Vanderburg has served as an expert witness in cases involving digital preservation, [29] electronic communication, [30] access control and confidential information disclosure, [31] database management systems, [32] and directory services. [33]
Vanderburg taught courses in security, database management systems, and computer networking at Remington College's Cleveland-West campus as an instructor and chair of the Computer Networking Technology program. He served as an adjunct instructor in the Computer Information Systems department at Lorain County Community College in Elyria, Ohio. [34] [35] Vanderburg has delivered commencement speeches at the Vatterott College Cleveland campus 2010 commencement [36] and Remington College Cleveland-West campus's final graduation in 2013. He has also taught web-based courses for professional development for eForensics Magazine. [37] Vanderburg has served on the advisory boards for Remington College, Vatterott College, Lincoln School of Technology and Cuyahoga Community College Workforce and Economic Development Division (WEDD). [38]
Vanderburg has published in CIO Magazine, [39] eForensics Magazine, [40] Network World, [41] Computer World, [42] Networks Asia [43] Certification Magazine, [44] [45] PC Security World, [46] CSO Magazine, [47] ARN, [48] TechWorld, [49] and McGladrey Technology News Brief [50] Vanderburg also maintains a blog called Security Thinking Cap. [51] [52]
Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.
Fortinet, Inc. is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world.
UST, formerly known as UST GLOBAL, is a provider of digital technology and transformation, information technology and services, headquartered in Aliso Viejo, California, United States. Stephen Ross founded UST in 1998 in Laguna Hills. The company has offices in the Americas, EMEA, APAC, and India.
Dimension Data is a company specialising in information technology services. Based in Johannesburg, South Africa, the company maintains operations on every inhabited continent. Dimension Data focuses on services including IT consulting, technical and support services, and managed services. The company is the official technology partner of the Tour de France, the Vuelta a España and also sponsored a team of the same name. In 2010, the company was fully acquired by Nippon Telegraph and Telephone (NTT). On 1 July 2019, all Dimension Data operations, excluding those in the Middle East and Africa, became part of NTT Ltd.
ManTech International Corporation is an American defense contracting firm based in Herndon, Virginia. It was co-founded in 1968 by Franc Wertheimer and George J. Pedersen. The company uses technology to help government and industry clients. The company name "ManTech" is a portmanteau formed through the combination of "management" and "technology."
Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a web-style interface. Its software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.
Information technology infrastructure is defined broadly as a set of information technology (IT) components that are the foundation of an IT service; typically physical components, but also various software and network components.
Merit Network, Inc., is a nonprofit member-governed organization providing high-performance computer networking and related services to educational, government, health care, and nonprofit organizations, primarily in Michigan. Created in 1966, Merit operates the longest running regional computer network in the United States.
Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and power projection thanks to comparatively advanced technology and a large military budget. Cyber warfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.
Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack.
Analytica is a consulting and information technology firm serving US public and private sector enterprises focused on national security, law enforcement, health care and financial services. The company specializes in implementing on-premises and cloud computing solutions for information management, Cyber security, big data, data analytics, and business intelligence. Analytica is a member of NYU Governance Lab's Open Data 500 Project, as one of 500 U.S. companies profiled for their involvement in implementing Open Data initiatives for public sector organizations to address requirements under the Digital Accountability and Transparency Act.
Infrastructure as code (IaC) is the process of managing and provisioning computer data center resources through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools. The IT infrastructure managed by this process comprises both physical equipment, such as bare-metal servers, as well as virtual machines, and associated configuration resources. The definitions may be in a version control system, rather than maintaining the code through manual processes. The code in the definition files may use either scripts or declarative definitions, but IaC more often employs declarative approaches.
In cybersecurity, cyber self-defense refers to self-defense against cyberattack. While it generally emphasizes active cybersecurity measures by computer users themselves, cyber self-defense is sometimes used to refer to the self-defense of organizations as a whole, such as corporate entities or entire nations. Surveillance self-defense is a variant of cyber self-defense and largely overlaps with it. Active and passive cybersecurity measures provide defenders with higher levels of cybersecurity, intrusion detection, incident handling and remediation capabilities. Various sectors and organizations are legally obligated to adhere to cyber security standards.
William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.
Caroline Wong is an American chief cybersecurity leader who has worked to advance software security programs and promote the mission, vision, and values D&I in cybersecurity. Throughout her career, Wong has been working to "boost the number of women in the field" and advocate for workplace equality. She regularly speaks at industry events and in publications such as The Washington Post and CBS News, and publishes editorial articles on topics such as DevSecOps alignment, infosec best practices, diversity in cybersecurity, and women in tech.
Checkmarx is an enterprise application security company headquartered in Atlanta, Georgia in the United States. Founded in 2006, the company provides application security testing (AST) solutions that embed security into every phase of the software development lifecycle (SDLC), an approach to software testing known as "shift everywhere."
{{cite book}}
: |website=
ignored (help)