Eric Vanderburg

Last updated
Eric Vanderburg
Eric Vanderburg 2011.jpg
Vanderburg at Jurinnov headquarters in Cleveland, 2011
Born
CitizenshipAmerican
Alma mater University of Fairfax
Kent State University
Occupation(s)Author, Business Leader
TCDI
Known for storage networking, security

Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio. [1] [2]

Contents

Vanderburg is Vice President of Cybersecurity at TCDI [3] and an author and speaker on information security. He has been interviewed on TV [4] and radio [5] to discuss information security and he presents and conferences and seminars [6] [7] [8] and has participated in panels on information security. [9]

Education

Vanderburg attended Kent State University earning both a bachelor of Science in Technology and a Masters in Business Administration. [10] He also has a Master of Business Administration (MBA), and pursued a doctorate in information assurance. [11]

Life and career

Vanderburg has been interested in technology from an early age, often reading through computer manuals in his library, thus allowing himself to learn "some basics of programming". [12] After spending some time with hackers and "Internet deviants" in the early 1990s, he managed to turn his interest in IT security into a career, and since the late 1990s his interest has primarily been that of cybersecurity within the business world. [12] [11] He has also spoken about the development of DevOps in the business world. [13] [14] [15] [16]

Vanderburg founded Independent Systems Consulting, [17] an IT consulting firm, in 1997, [18] which he ran for almost ten years. He then joined Jurinnov in 2006 where he directed IT, digital forensics, and cybersecurity consulting teams. [18] [19] [20] [21] In 2009, he built a network operations center at Jurinnov's headquarters to monitor data center operations and to perform transaction monitoring of key business and client systems. [22] In 2016, Vanderburg became Vice President of Cybersecurity at TCDI [3] when TCDI acquired Jurinnov. He is also a TechMin Network board member. [23]

Vanderburg was involved with Hitachi Data Systems in testing their Essential NAS product [24] which he compared to the Netapp FAS3000 NAS [25] [26] and he partnered with Lateral Data in using their Viewpoint eDiscovery tool to perform large-scale litigation document review. [27] He worked with Venio on their litigation review tool with early case assessment (ECA), [28] and has worked with companies including Dell, Carbonite, BitDefender, Microsoft and AT&T. [11]

Vanderburg has served as an expert witness in cases involving digital preservation, [29] electronic communication, [30] access control and confidential information disclosure, [31] database management systems, [32] and directory services. [33]

Academic contributions

Eric Vanderburg delivering the commencement address to the graduating class of 2010 at Vatterott College Vatterott Commencement 2010 Vanderburg.jpg
Eric Vanderburg delivering the commencement address to the graduating class of 2010 at Vatterott College

Vanderburg taught courses in security, database management systems, and computer networking at Remington College's Cleveland-West campus as an instructor and chair of the Computer Networking Technology program. He served as an adjunct instructor in the Computer Information Systems department at Lorain County Community College in Elyria, Ohio. [34] [35] Vanderburg has delivered commencement speeches at the Vatterott College Cleveland campus 2010 commencement [36] and Remington College Cleveland-West campus's final graduation in 2013. He has also taught web-based courses for professional development for eForensics Magazine. [37] Vanderburg has served on the advisory boards for Remington College, Vatterott College, Lincoln School of Technology and Cuyahoga Community College Workforce and Economic Development Division (WEDD). [38]

Publications and bibliography

Vanderburg has published in CIO Magazine, [39] eForensics Magazine, [40] Network World, [41] Computer World, [42] Networks Asia [43] Certification Magazine, [44] [45] PC Security World, [46] CSO Magazine, [47] ARN, [48] TechWorld, [49] and McGladrey Technology News Brief [50] Vanderburg also maintains a blog called Security Thinking Cap. [51] [52]

Bibliography

See also

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

Fortinet, Inc. is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world.

<span class="mw-page-title-main">UST (company)</span> American technology company

UST, formerly known as UST GLOBAL, is a provider of digital technology and transformation, information technology and services, headquartered in Aliso Viejo, California, United States. Stephen Ross founded UST in 1998 in Laguna Hills. The company has offices in the Americas, EMEA, APAC, and India.

<span class="mw-page-title-main">Howard Schmidt</span> American computer security expert (1949 - 2017)

Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.

ManTech International Corporation is an American defense contracting firm based in Herndon, Virginia. It was co-founded in 1968 by Franc Wertheimer and George J. Pedersen. The company uses technology to help government and industry clients. The company name "ManTech" is a portmanteau formed through the combination of "management" and "technology."

<span class="mw-page-title-main">Splunk</span> American technology company

Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a web-style interface. Its software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.

<span class="mw-page-title-main">IT infrastructure</span> Set of information technology components that are the foundation of an IT service

Information technology infrastructure is defined broadly as a set of information technology (IT) components that are the foundation of an IT service; typically physical components, but also various software and network components.

<span class="mw-page-title-main">Merit Network</span> Global LTE

Merit Network, Inc., is a nonprofit member-governed organization providing high-performance computer networking and related services to educational, government, health care, and nonprofit organizations, primarily in Michigan. Created in 1966, Merit operates the longest running regional computer network in the United States.

Veracode is an application security company based in Burlington, Massachusetts. Founded in 2006, it provides SaaS application security that integrates application analysis into development pipelines.

Control system security, or industrial control system (ICS) cybersecurity, is the prevention of interference with the proper operation of industrial automation and control systems. These control systems manage essential services including electricity, petroleum production, water, transportation, manufacturing, and communications. They rely on computers, networks, operating systems, applications, and programmable controllers, each of which could contain security vulnerabilities. The 2010 discovery of the Stuxnet worm demonstrated the vulnerability of these systems to cyber incidents. The United States and other governments have passed cyber-security regulations requiring enhanced protection for control systems operating critical infrastructure.

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.

Analytica is a consulting and information technology firm serving US public and private sector enterprises focused on national security, law enforcement, health care and financial services. The company specializes in implementing on-premises and cloud computing solutions for information management, Cyber security, big data, data analytics, and business intelligence. Analytica is a member of NYU Governance Lab's Open Data 500 Project, as one of 500 U.S. companies profiled for their involvement in implementing Open Data initiatives for public sector organizations to address requirements under the Digital Accountability and Transparency Act.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

Caroline Wong is an American chief cybersecurity leader who has worked to advance software security programs and promote the mission, vision, and values D&I in cybersecurity. Throughout her career, Wong has been working to "boost the number of women in the field" and advocate for workplace equality. She regularly speaks at industry events and in publications such as The Washington Post and CBS News, and publishes editorial articles on topics such as DevSecOps alignment, infosec best practices, diversity in cybersecurity, and women in tech.

<span class="mw-page-title-main">Raheem Beyah</span> American computer engineer

Raheem Beyah is an American computer engineer, researcher, and educator. As of January 15, 2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean, he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic, Inc.

Checkmarx is an enterprise application security company headquartered in Atlanta, Georgia in the United States. Founded in 2006, the company provides application security testing (AST) solutions that embed security into every phase of the software development lifecycle (SDLC), an approach to software testing known as "shift everywhere."

Edward G. Amoroso is an American computer security professional, entrepreneur, author, and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development. the application of these methods to secure software development for critical projects in the defense and aerospace industries, and redefining trust parameters for improved security in the cloud.

References

  1. Dixon Murray, Teresa (September 27, 2012). "Banks can't prevent cyber attacks like those hitting PNC, Key, U.S. Bank this week". The Plain Dealer.
  2. Coventry, Andrea (4 November 2014). "An Interview with Dr. Eric Vanderburg". Considered Bookshelf. Retrieved 4 November 2014.
  3. 1 2 our expert – Eric Vanderburg, eforensicsmag.org
  4. Jackson, Curtis (February 28, 2011). "Corporate espionage on the rise in Northeast Ohio". NewsNet 5 Cleveland. Archived from the original on 2014-06-09.
  5. "The Sound of Ideas: Cyber Security and Your Information". NPR. November 5, 2013. Archived from the original on 2014-12-22.
  6. "Information Security Summit 2012 Conference Agenda" (PDF). Information Security Summit. Retrieved 27 October 2014.
  7. "Membership News". The Union Club Newsletter: 4. May 2013.
  8. "Information Security Summit 2014 Fall Agenda" (PDF). 12th annual Information Security Summit. Retrieved 30 October 2014.
  9. "Jumpstart - Cyber Security: Can your company afford to breach?". Jumpstart Network. Archived from the original on 29 October 2014. Retrieved 28 October 2014.
  10. "Effectively gathering facts following a data breach". Outlook Series. Constituent Works. January 15, 2013.
  11. 1 2 3 Khan, Sheheryar (21 July 2017). "How to Become a Cyber Security Expert?". Pure VPN. Retrieved 3 August 2017.
  12. 1 2 Cocking, Simon (19 August 2016). "Cybersecurity is a global challenge, data security insights with Eric Vanderburg". Irish Tech News. Retrieved 3 August 2017.
  13. "How to get DevOps right - JAX DevOps". JAX DevOps. 17 March 2017. Retrieved 3 August 2017.
  14. "The first-aid DevOps toolkit: What does it contain? - JAXenter". JAXenter. 4 April 2017. Retrieved 3 August 2017.
  15. "Should containers be part of the DevOps genome? - JAXenter". JAXenter. 10 April 2017. Retrieved 3 August 2017.
  16. "It's a cultural movement, it's a magic bullet, it's a catalyst. It's DevOps - JAXenter". JAXenter. 27 March 2017. Retrieved 3 August 2017.
  17. "About Us - Independent Systems Consulting". Independent Systems Consulting. Retrieved 27 October 2014.
  18. 1 2 Worrell, Curt (October 5, 2014). "CLP 024 – Eric Vanderburg: Cybersecurity – Protect Your Lifestyle Business". Confessions of a Lifestyle Preneur. Archived from the original on October 22, 2014.
  19. "JurInnov Rated a Top-Twenty Electronic Discovery Service Provider in 2007 Socha-Gelbmann Survey". Socha Consulting LLC. Retrieved 17 October 2014.
  20. "JurInnov Ltd. Honored As The 2010 Ringtail Partner Consultants Of The Year". The Street. 2011-03-17. Retrieved 17 October 2014.
  21. "Inc Profile - JURINNOV". Inc. Retrieved 17 October 2014.
  22. "JurInnov Increases Document Review Efficiency". PRWeb. ocus PRW Holdings, LLC. Retrieved 28 October 2014.
  23. "Our Team". TechMin. Retrieved 3 August 2017.
  24. "Hitachi Announces New Line-Up of Advanced NAS Services". Hitachi Data Systems. HDS. March 4, 2008. Archived from the original on 2014-11-07.
  25. Raffo, Dave (March 4, 2008). "Hitachi turns its attention to file services, discovery". Tech Target. Search Storage.
  26. "Hitachi advanced NAS services". Data Storage Connection. Jameson Publishing. March 17, 2008.
  27. Koblentz, Evan (June 17, 2011). "JurInnov Adding Lower-Cost E-Discovery Wares". Law Technology News. ALM Media Properties.
  28. "E-Discovery Software Provider Venio Systems Announces New Partnership with JurInnov". Venio Systems. Archived from the original on 2014-11-09. Retrieved 2014-10-27.
  29. C4Polymers, Inc., v. Huntington National Bank, ET AL,993N.E.2d(Ohio Com. PleasMarch 14, 2014).
  30. Gorilla Store LTD, ET AL v. Michael Thompson,993N.E.2d(Ohio Com. PleasNovember 11, 2014).
  31. Invista North America S.À R.L., and Auriga Polymers, Inc., v. M&G Corporation and M&G Polymers USA, LLC,75A.(D. Del.February 19, 2013).
  32. Slapikas v. First American Title Insurance Company,75A.2d(W.D. Pa.June 25, 2008).
  33. Frank Gates Managed Care Services v. Ohio Bureau of Workers' Compensation,993N.E.2d(Ohio Com. PleasAugust 17, 2012).
  34. "Eric Vanderburg at Lorain County Community College". LeadFerret. Retrieved 14 October 2014.
  35. "LCCC Faculty Staff Directory - V". Lorain County Community College. Archived from the original on 19 November 2007. Retrieved 19 January 2008.
  36. Implementing a Best Practice Risk Assessment Methodology. GRIN Publishing. May 22, 2013.{{cite book}}: |website= ignored (help)
  37. "Packet Analysis with Wireshark and PCAP analysis tools (W1)". eForensics Magazine. Retrieved 24 October 2014.
  38. "Cuyahoga Community College Workforce and Economic Development Division". tri-c.edu. Archived from the original on 23 July 2013. Retrieved 13 August 2013.
  39. "Author CIO Eric Vanderburg". cio.com. Retrieved 22 June 2014.
  40. "Meet our Expert - Eric Vanderburg". eforensicsmag.com. 23 September 2012. Retrieved 22 June 2014.
  41. "When to call for help after a data breach". Network World. IDG Communications, Inc. January 10, 2013.
  42. "Stories by Eric Vanderburg, director of information systems and security at JurInnov". Computer World. Retrieved 27 October 2014.
  43. "Four keys to successful BYOD". Networks Asia. Questex Media Group. February 16, 2012.
  44. "Eric Vanderburg, Author at Certification Magazine". Certification Magazine. Vallejo Media Group.
  45. Chapin, Rick (October 17, 2008). CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam. Global Knowledge.
  46. "Fail Secure – The right way to fail". PC Security World. February 18, 2013. Archived from the original on October 27, 2014. Retrieved October 27, 2014.
  47. "Eric Vanderburg - Author at CSO Magazine". CSO Magazine. Retrieved 2 September 2014.
  48. "Eric Vanderburg, CISSP, and director of Information Systems and Security at consultancy JurInnov - Author - ARN". ARN. IDG Communications.
  49. "Eric Vanderburg - Author - Techworld". TechWorld. Tech World.
  50. "Articles from Eric Vanderburg, CISSP,, director of Information Systems, Security at consultancy JurInnov". McGladrey Technology News Brief. McGladrey. Archived from the original on 7 November 2014. Retrieved 7 November 2014.
  51. "10 Must-Follow InfoSec Bloggers 2015". Thycotic. 12 November 2015. Retrieved 3 August 2017.
  52. "The Top 20 Cloud Security Blogs of 2015". Skyhigh. 21 December 2015. Retrieved 3 August 2017.